<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1940875218994878492</atom:id><lastBuildDate>Thu, 19 Dec 2024 03:30:22 +0000</lastBuildDate><category>safer computing</category><category>anti-virus</category><category>malware</category><category>utility</category><category>anti-malware</category><category>google</category><category>Computer Games</category><category>Easter eggs</category><category>blogging</category><category>fake anti-virus</category><category>software review</category><category>Google Docs</category><category>autorun.inf</category><category>facebook</category><category>firefox add-on</category><category>removing malware</category><category>removing virus</category><category>videos</category><category>virus</category><category>web protection</category><category>worm</category><category>zacurama.exe</category><category>Computers</category><category>Defragler</category><category>Online Aps</category><category>PCOS</category><category>Pac-man</category><category>Photoshop effects</category><category>Poll Automation</category><category>Sharing online</category><category>Yahoo</category><category>anti-ageing technology</category><category>antivirus</category><category>automated election</category><category>avoiding virus</category><category>definition of terms</category><category>dropbox</category><category>e-mail</category><category>exploit</category><category>graphic tablet</category><category>greetings</category><category>hacking</category><category>hardware</category><category>health</category><category>injury</category><category>laptop</category><category>mail</category><category>my lot</category><category>new year</category><category>precautions</category><category>redgage</category><category>repetitive</category><category>smartbro problems.</category><category>social network</category><category>social networking</category><category>spam</category><category>strain</category><category>tips</category><category>web apps review</category><category>webpage review</category><category>work from home scam</category><category>worms</category><title>TeK Bytes Online!  Tips and information for safer computing</title><description>Tips and information on how to remove virus and malware.Safer computing tips and practices. News and information about the latest technology, computers, fun stuff, tutorials.</description><link>http://tekbytes.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>65</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-4461832740761910583</guid><pubDate>Fri, 02 Mar 2012 23:18:00 +0000</pubDate><atom:updated>2012-03-02T15:18:47.769-08:00</atom:updated><title>Xtreme Impact Protection for Your iPhone</title><description>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
This is really extreme! The iPone survived an 82 mph slapshot and still working!&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
Originally posted by&amp;nbsp;&lt;a href=&quot;http://gadgetzz.com/&quot;&gt;Gadgetzz&lt;/a&gt;&lt;br /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2012/03/xtreme-impact-protection-for-your.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-728929182803123551</guid><pubDate>Mon, 21 Nov 2011 19:49:00 +0000</pubDate><atom:updated>2011-11-21T17:49:54.782-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">social network</category><category domain="http://www.blogger.com/atom/ns#">spam</category><title>Protect Your Facebook From Porn Spam!</title><description>For the past day, Facebook&amp;nbsp; users has been bombarded by pornougraphic and violent pictures spammed on their news feeds. &lt;br /&gt;
&lt;br /&gt;
&quot;Many people have reported seeing highly-offensive images on their  Facebook news feeds,&quot; said Graham Cluley, a senior technology consultant  at antivirus vendor Sophos, in an interview Tuesday. &quot;But exactly how  those images got there and what cause them to appear, is still somewhat  of a mystery.&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-8205817373286810&quot;;
/* TekbytesContentAd */
google_ad_slot = &quot;5249882571&quot;;
google_ad_width = 250;
google_ad_height = 250;
//--&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Facebook has currently quarantined the&amp;nbsp; accounts and pages used in the attacks, however, users are still urged to safeguard themselves in the future:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Make sure your browser is updated.&lt;/li&gt;
&lt;li&gt;Be careful in allowing apps access your personal info.&lt;/li&gt;
&lt;li&gt; Don&#39;t ever copy and paste code into your browser&#39;s address bar unless you&#39;re confident the source is legit.&lt;/li&gt;
&lt;li&gt;Change&amp;nbsp; your password. Make it strong by combining numbers, symbols, upper and lower case letters. as much as possible, avoid using dictionary words.&lt;/li&gt;
&lt;li&gt;Remove unwanted apps. This can be done in the accuount settings.&lt;/li&gt;
&lt;li&gt;Run an antivirus and anti-malware scan on your system.&lt;/li&gt;
&lt;li&gt;Report anything unusual that you see in Facebook by clicking the &quot;report&quot; links on the social network site.&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2011/11/protect-your-facebook-from-porn-spam.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-8893331769918658289</guid><pubDate>Mon, 29 Aug 2011 22:46:00 +0000</pubDate><atom:updated>2011-10-13T05:52:02.206-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computers</category><category domain="http://www.blogger.com/atom/ns#">health</category><category domain="http://www.blogger.com/atom/ns#">injury</category><category domain="http://www.blogger.com/atom/ns#">repetitive</category><category domain="http://www.blogger.com/atom/ns#">strain</category><title>Repetitive Strain Injury: A Bane for Computer Users</title><description>&lt;h1&gt;Repetitive Strain Injury: A Bane for Computer Users &lt;/h1&gt;&lt;i&gt;1st part of a series.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Lately, I&#39;ve been feeling some tingling and numbness on my fingers. Also, I fel&lt;span style=&quot;color: #444444;&quot;&gt;t&lt;/span&gt; some pain around my elbow joints, specially&amp;nbsp; on the tendon on my forearm. I realized that these are alr&lt;span style=&quot;color: #444444;&quot;&gt;e&lt;/span&gt;ady symptoms of &lt;b&gt;Repetitive Strain Injury.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Repetitive Strain Injury &lt;/b&gt;or &lt;b&gt;RSI&lt;/b&gt; has be&lt;span style=&quot;color: #444444;&quot;&gt;c&lt;/span&gt;ome a common problem in almost any workplace these days specially among computer users&lt;i&gt;.&lt;/i&gt; As t&lt;span style=&quot;color: #444444;&quot;&gt;h&lt;/span&gt;e num&lt;span style=&quot;color: #444444;&quot;&gt;b&lt;/span&gt;er of computer users continue to grow exponentiall&lt;span style=&quot;color: #444444;&quot;&gt;y&lt;/span&gt; the number of persons that will soon be affec&lt;span style=&quot;color: #444444;&quot;&gt;t&lt;/span&gt;ed with &lt;b&gt;Rep&lt;span style=&quot;color: #444444;&quot;&gt;e&lt;/span&gt;titive Strain Injury&lt;/b&gt;. The fact the younger generation&lt;span style=&quot;color: #444444;&quot;&gt;s&lt;/span&gt; have started to use computers at much earlier age and they spend more hours in front of the computer than any other activities makes them more susceptible to this injury. What makes matters worse, very few of the computer users are aware of &lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=1940875218994878492&amp;amp;postID=8893331769918658289#rsi&quot;&gt;RSI &lt;/a&gt;and most likely will mistakenly associate the arm pain to other diseases like arthritis.&lt;br /&gt;
&lt;br /&gt;
What is quite alarming, however this health problem is less recognized and most often ignored until it&#39;s too late.&amp;nbsp;&amp;nbsp; In order to raise the awareness of computer users of this disabling injury, this article is focused on computer related &lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=1940875218994878492&amp;amp;postID=8893331769918658289#rsi&quot;&gt;RSI&lt;/a&gt;. In order to fully recognize what&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=1940875218994878492&amp;amp;postID=8893331769918658289#rsi&quot;&gt; RSI &lt;/a&gt; is and how can a computer user avoid developing it, this article is organized in this manner:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;The first part covers:&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;the definition,&amp;nbsp;&lt;/li&gt;
&lt;li&gt;the symptoms of &lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=1940875218994878492&amp;amp;postID=8893331769918658289#rsi&quot;&gt;RSI &lt;/a&gt;,&amp;nbsp;&lt;/li&gt;
&lt;li&gt;the effects of RSI once developed.&lt;/li&gt;
&lt;li&gt;and who is at risk&lt;/li&gt;
&lt;/ul&gt;&lt;li&gt; The second part covers&amp;nbsp; the causes of RSI&amp;nbsp;&lt;/li&gt;
&lt;li&gt;and the third part covers &amp;nbsp; remedy and prevention.&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;b&gt;What is RSI or Repetitive Strain Injury?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=1940875218994878492&amp;amp;postID=8893331769918658289&quot; name=&quot;RSI&quot;&gt;Repetitive Strain Injury &lt;/a&gt; &lt;/b&gt;is an injury of the muscular and skeletal system (musculoskeletal system) caused by (as the name implies) repetitive tasks, over exertion, or prolonged or awkward position .&lt;br /&gt;
Computer related RSI usually affects any parts, if not all, of the upper body, from the neck down to the lower back including the shoulders down to the wrist. Different areas will actually be affected depending on your work habits.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What are the Symptoms of &lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=1940875218994878492&amp;amp;postID=8893331769918658289#rsi&quot;&gt;RSI&lt;/a&gt;?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Typical symptoms of RSI could be the following:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Tightness, burning sensation or discomfort in the fingers, hands, wrist, forearms or elbows.&lt;/li&gt;
&lt;li&gt;Soreness or pain in the neck, shoulder, upper and/or lower back &lt;/li&gt;
&lt;li&gt;Weakness, lack of endurance.&lt;/li&gt;
&lt;li&gt;Tingling, numbness, or loss of sensation (in the arms and hands)&lt;/li&gt;
&lt;li&gt;Lack of control or coordination.&lt;/li&gt;
&lt;li&gt;The pain is worse with activity. &lt;/li&gt;
&lt;/ul&gt;In any case, you may feel at least of the symptoms listed above. In my case, I started to feel tingling sensation on my fingers and pain on my right forearm. The pain on my forearm actually increases every time I drive my motor bike. Occasionally I feel some pain on my neck and shoulder.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What happens if I already have developed RSI?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RSI &lt;/b&gt;does not develop overnight, but rather it is developed overtime by repeating certain motion. As the name implies, Repetitive Strain Injury meaning the injury is a result of repeating a certain activity over a long period of time. Thus the development of RSI is long term and gradual. Yet if left untreated it could result to a disability and may require surgery to repair.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;An early stage&lt;/b&gt;, RSI may felt as pain, aching and tiredness of the wrists, arms, shoulders, neck or legs  during work, which improves overnight. At this stage, the pain experienced are often mistakenly contributed to fatigue. The pain may last for weeks or even months but reversible.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;In the next stage&lt;/b&gt;, the pain, and tiredness will now be recurring in the early hours of the day and may persist throughout the day and even at night and may even disturb the sleep of the sufferer. Swelling of the tendon areas will be visible.&amp;nbsp; &lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Advance stage.&lt;/b&gt;&amp;nbsp; This stage is now severe. Pain and fatigue may still be experienced even if the person is well rested. Even doing the slightest task, may be painful for the sufferer. This stage could last for months. In extreme cases surgery may be necessary to repair the damage or worse, the condition is already irreversible.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Who is at risk?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Everyone who does repetitive tasks for a long period of time is always at risk of developing RSI and not computer users only. Not only those who are working with computers but even those who play musical instruments.&lt;br /&gt;
&lt;br /&gt;
A study back in 2008 sates that 68% of workers in UK are suffering from repetitive strain injury. &lt;br /&gt;
However there are factors that increases the risk of developing RSI. In the next part of this article the list of common causes of computer related RSI will be discussed. These cause, needless to say, are also the factors that greatly increases the risk of developing RSI. The list that will be presented in the next chapter will be limited to computer related RSI.&lt;br /&gt;
&lt;br /&gt;
Next: RSI Factors: The Causes of Repetitive Strain Injury &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.wikipedia.org/&quot;&gt;http://en.wikipedia.org/wiki/Repetitive_strain_injury&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://solutions.3mphilippines.com.ph/wps/portal/3M/en_PH/APACFuturo/Futuro/Resources/Healthy_Living_Articles/?PC_7_RJH9U5230OF800IQP32PEK0OK2_assetId=1258563896869&quot;&gt;3M Healthy Living Articles&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.dailymail.co.uk/health/article-1024097/Two-thirds-office-staff-suffer-Repetitive-Strain-Injury.html&quot;&gt;Mail Online: Health&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.rsi-solutions.co.uk/documents/49.html&quot;&gt;RSI Solutions UK&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;81df659a-347f-489f-b0c8-224a1ea2cf89&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2011/08/repetitive-strain-injury-bane-for.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-6643299029555113223</guid><pubDate>Thu, 04 Aug 2011 01:53:00 +0000</pubDate><atom:updated>2011-08-03T18:53:20.226-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">e-mail</category><category domain="http://www.blogger.com/atom/ns#">mail</category><category domain="http://www.blogger.com/atom/ns#">webpage review</category><category domain="http://www.blogger.com/atom/ns#">Yahoo</category><title>New Yahoo Mail! Better and Faster!</title><description>When I logged in to Yahoo mail today I was greeted with this Yahoo splash page:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizs48P5mmPLWVSgmqzWLEIL1fk4HfYtTdQ9hKZRMzAl80cP0XQxB7Tfq-9saV3bNMkqWjH5U0W7Of1MveZ4LXuw-tjYk-lHwJpGGHJxyRRHCYWLYSNZakLYb_a0fJlFyEJ8zM0XvfT0lap/s1600/newyahoo1+copy.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizs48P5mmPLWVSgmqzWLEIL1fk4HfYtTdQ9hKZRMzAl80cP0XQxB7Tfq-9saV3bNMkqWjH5U0W7Of1MveZ4LXuw-tjYk-lHwJpGGHJxyRRHCYWLYSNZakLYb_a0fJlFyEJ8zM0XvfT0lap/s320/newyahoo1+copy.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;One thing that you could notice instantly is the simplistic yet attractive design and color combination. For sure you wouldn&#39;t hesitate to click the &quot;Let&#39;s Go&quot; button. I did not and it did not took me a minute to click that button.&lt;br /&gt;
&lt;br /&gt;
After I clicked the &quot;Let&#39;s Go!&quot; button, I was surprised how quickly the New Yahoo Mail&#39;s first page got loaded! &amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM8FbJDAaJcAjFVJGXhugBAES3prL5QX2t_aot6GzHHLwv5s6a6m0WwOcCMubsCDNW1UR-r1rWShZIAqCcyySl2rkDIWXVwc2Et0NacSTBR3kY1YHWueV7aNhlbhrMeXV2ZCwR8sPcu1Fy/s1600/newym.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;205&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM8FbJDAaJcAjFVJGXhugBAES3prL5QX2t_aot6GzHHLwv5s6a6m0WwOcCMubsCDNW1UR-r1rWShZIAqCcyySl2rkDIWXVwc2Et0NacSTBR3kY1YHWueV7aNhlbhrMeXV2ZCwR8sPcu1Fy/s320/newym.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Again, what is pretty obvious is the new design: very simple, especially on the color combination, yet, it&#39;s pleasing to the eyes and you could even say very attractive. What else is good in this new Yahoo mail? click the Inbox and any of your mail.&lt;br /&gt;
&lt;br /&gt;
The splash page says the new Yahoo Mail is&amp;nbsp; 2x faster. Frankly speaking, I think Yahoo! is being modest, because I think it&#39;s much faster than that.&lt;br /&gt;
&lt;br /&gt;
So, If you haven&#39;t tried it yet, click that &quot;Let&#39;s Go&quot; button!&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2011/08/new-yahoo-mail-better-and-faster.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizs48P5mmPLWVSgmqzWLEIL1fk4HfYtTdQ9hKZRMzAl80cP0XQxB7Tfq-9saV3bNMkqWjH5U0W7Of1MveZ4LXuw-tjYk-lHwJpGGHJxyRRHCYWLYSNZakLYb_a0fJlFyEJ8zM0XvfT0lap/s72-c/newyahoo1+copy.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-4533052387908501943</guid><pubDate>Mon, 18 Jul 2011 05:56:00 +0000</pubDate><atom:updated>2011-07-17T22:56:21.642-07:00</atom:updated><title>Summer Blockbuster- Green lantern - ad</title><description>&lt;a title=&#39;Summer Blockbuster- Green lantern - ad&#39; href=&#39;http://lx.im/1dNMM?v=n6pJfhzoYz20U9Kgrx5MEp5TSEcPFE50PSyNiN9i1dM&#39;&gt;&lt;img alt=&#39;Summer Blockbuster- Green lantern - ad&#39; src=&#39;http://d.likes-media.com/uimg/191e507904c89aa5ef082fbfc3e22fa7&#39;/&gt;&lt;/a&gt;&lt;br/&gt;Check out an exclusive trailer of the Green Lantern Movie &amp;gt;&amp;gt;&lt;img src=&#39;http://lx.im/_t.gif?v=n6pJfhzoYz20U9Kgrx5MEp5TSEcPFE50PSyNiN9i1dM&#39; style=&#39;border: 0px;height:0px;background:transparent;width:0px;position:absolute;left:-10000px;top:-10000px;&#39;/&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2011/07/summer-blockbuster-green-lantern-ad.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-6289664866019129258</guid><pubDate>Tue, 08 Mar 2011 03:13:00 +0000</pubDate><atom:updated>2011-03-07T19:15:44.424-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-virus</category><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">safer computing</category><category domain="http://www.blogger.com/atom/ns#">worm</category><title>Has ClickJacking Hit Facebook Again?</title><description>&lt;h1&gt;Has ClickJacking Hit Facebook Again? &lt;/h1&gt;Yesterday (March 7, 2011) I received messages from two of my friends in Facebook. I checked one and it says &quot;Hey what are you doing in this video?...&quot; followed by a link that, appears to be, to another page in Facebook. When I clicked it however, I got an error page. I checked the other one and it says the same. I suspected that it was a form of malware, so I asked my friends regarding the messages, at least one said she did not send any message to me.&lt;br /&gt;
&lt;br /&gt;
A few hours later, I logged in again and got the same message again from eight different persons who had never sent a message to me before. I noticed this time that the links-- that all starts with facebook.com -- are quite different. So I thought this could be a worm or another form of malware. I Googled for information and found out that a similar attack happened sometime in 2010.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In 2010, it was an exploit of a vulnerability of&amp;nbsp; Facebook in which it tricks the users to click on a link to page where apparently will &#39;like&#39; a page without the user&#39;s knowledge.&lt;br /&gt;
&lt;br /&gt;
Read the details&lt;a href=&quot;http://www.theregister.co.uk/2010/06/01/facebook_clickjacking_worm/&quot;&gt; here&lt;/a&gt; and &lt;a href=&quot;http://nakedsecurity.sophos.com/2010/05/31/viral-clickjacking-like-worm-hits-facebook-users/&quot;&gt;here. &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
I found no updated information about this recent &#39;clickjacking&#39; yet, but it is obviously not the first time that it happened in Facebook and probably not the last.&lt;br /&gt;
&lt;br /&gt;
Just a word of caution, if your friend sent you a link and would look suspicious, at least ask your friend first if he/she really had sent that message and take extra precaution in opening any links.&lt;br /&gt;
&lt;br /&gt;
Have a Safer computing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;c8ba4617-3a79-4050-8410-c56d91305d7b&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;c8ba4617-3a79-4050-8410-c56d91305d7b&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2011/03/has-clickjacking-hit-facebook-again.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-2016345994204922131</guid><pubDate>Fri, 11 Feb 2011 02:17:00 +0000</pubDate><atom:updated>2011-02-10T18:17:34.562-08:00</atom:updated><title>Today in the History of Technology</title><description>&lt;h1&gt;Today in the History of Technology&lt;/h1&gt;&lt;a href=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/9/9d/Thomas_Edison2.jpg/220px-Thomas_Edison2.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/9/9d/Thomas_Edison2.jpg/220px-Thomas_Edison2.jpg&quot; /&gt;&lt;/a&gt;In  February 11, 1847 the &#39;Wizard of Menlo Park&#39; was born. The nickname was  given to the one of the most prolific inventor in our history - Thomas  Alva Edison. Widely known for his very practical invention, the electric  light bulb,&amp;nbsp; the American inventor, scientist and businessman, have  developed many more devices that influenced our lives even up to this  date.&lt;br /&gt;
&lt;br /&gt;
Perhaps we can connect the widely used devices  today to some of Edison&#39;s inventions. |The portable I-pod and Mp3  players could not have been developed if Mr. Edison had not invented the  phonograph.&lt;br /&gt;
&lt;br /&gt;
The commonly used handy-digital video camera these days is an evolution of the &lt;a href=&quot;http://inventors.about.com/library/inventors/bledison.htm&quot;&gt;Edison Motion Picture&lt;/a&gt;.&lt;br /&gt;
&amp;nbsp;He  also has a number of inventions that greatly contributed to  telecommunications and mass media communications. Inventions that  perhaps lead to the development of the cellular phones today. But all  these inventions could not possibly continue to work if Edison has not  developed the&lt;a href=&quot;http://en.wikipedia.org/wiki/Power_station&quot;&gt; power station &lt;/a&gt;as well.&lt;br /&gt;
&lt;br /&gt;
Thanks  to Mr. Edison for all his inventions, for without them, the world of  technology is perhaps will be quite different these days.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;a href=&quot;http://en.wikipedia.org/wiki/Thomas_Edison&quot;&gt;http://en.wikipedia.org/wiki/Thomas_Edison&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://inventors.about.com/library/inventors/bledison.htm&quot;&gt;http://inventors.about.com &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;c8ba4617-3a79-4050-8410-c56d91305d7b&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2011/02/today-in-history-of-technology.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-3144105788485217518</guid><pubDate>Fri, 31 Dec 2010 12:28:00 +0000</pubDate><atom:updated>2010-12-31T04:28:55.397-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">dropbox</category><category domain="http://www.blogger.com/atom/ns#">greetings</category><category domain="http://www.blogger.com/atom/ns#">new year</category><category domain="http://www.blogger.com/atom/ns#">redgage</category><title>Happy New Year Everyone!!!</title><description>Whew, it&#39;s been a very busy year for me! Especially on my daytime job, that&#39;s one reason I haven&#39;t made an update here. And just today, early this morning in fact, my old HDD conked out! Though I can fix but I haven&#39;t any time to do it yet. I&#39;m currently running on my back-up system.&lt;br /&gt;
&lt;br /&gt;
One thing I&#39;m very thankful for is I have some my important files on my &lt;a href=&quot;https://www.dropbox.com/referrals/NTc3NTQ4Mzg5?src=global0&quot;&gt;Dropbox&lt;/a&gt; folder. I&#39;ll post another blog about this and how &lt;a href=&quot;https://www.dropbox.com/referrals/NTc3NTQ4Mzg5?src=global0&quot;&gt;Dropbox&lt;/a&gt; saved me some trouble!&lt;br /&gt;
&lt;br /&gt;
For now I just want to share what kept me really busy this year.&lt;br /&gt;
1. My full time job as a secondary school computer teacher! (ugh)&lt;br /&gt;
2. I&#39;ve been busy starting a new hobby (photography) and restarting an old one (drawing, both by hand and digital) and you can see my works here at &lt;a href=&quot;http://www.redgage.com/?refby=tekbytes&quot;&gt;Redgage.com&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
This is it for now! Have a happy and prosperous new year everyone&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/12/happy-new-year-everyone.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-7047917303926943254</guid><pubDate>Fri, 10 Dec 2010 20:46:00 +0000</pubDate><atom:updated>2010-12-10T12:46:35.516-08:00</atom:updated><title>Beamdog - Sponsored Post</title><description>&lt;a title=&#39;Beamdog - Sponsored Post&#39; href=&#39;http://beamdog.com/&#39;&gt;&lt;img alt=&#39;Beamdog - Sponsored Post&#39; src=&#39;http://d.likes-media.com/uimg/2c60206f31e1e676935453a617ca6aed&#39;/&gt;&lt;/a&gt;&lt;br/&gt;Browse free and paid video game content with out the hassle of installing software&lt;img src=&#39;http://lx.im/_t.gif?v=07t1uBKXvc9ts4ebCOi1B4kXKAqVY-8EAm7HWCS8LY0&#39; style=&#39;border: 0px;height:0px;background:transparent;width:0px;&#39;/&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/12/beamdog-sponsored-post.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-4717541614505746369</guid><pubDate>Sat, 27 Nov 2010 07:16:00 +0000</pubDate><atom:updated>2010-11-26T23:16:08.623-08:00</atom:updated><title>MyLot</title><description>&lt;a title=&#39;MyLot&#39; href=&#39;http://www.mylot.com/&#39;&gt;&lt;img alt=&#39;MyLot&#39; src=&#39;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd8uo7TIxcyJei4ijwLK5eZK7DhHnlpYW177qoWPTumYiM_JSjgLtMpY6S9z532NoPYpSej_XFZP-Oj_nMDfY2dHog9dd5F6mOYcyvM4sknU5SgMsItJO5r1WoAkDo-XWTnAifk_BjChbo/s400/Mylot&#39;/&gt;&lt;/a&gt;&lt;br/&gt;I enjoy starting and joining online discussions on myLot! Join now! http://www.mylot.com/?ref=archon309&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/11/mylot.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd8uo7TIxcyJei4ijwLK5eZK7DhHnlpYW177qoWPTumYiM_JSjgLtMpY6S9z532NoPYpSej_XFZP-Oj_nMDfY2dHog9dd5F6mOYcyvM4sknU5SgMsItJO5r1WoAkDo-XWTnAifk_BjChbo/s72-c/Mylot" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-4470187879153629507</guid><pubDate>Sat, 06 Nov 2010 01:38:00 +0000</pubDate><atom:updated>2010-11-05T18:38:54.254-07:00</atom:updated><title>Hottest Deal Ever! - Sponsored Post</title><description>&lt;a title=&#39;Hottest Deal Ever! - Sponsored Post&#39; href=&#39;http://www.consumertipline.org/?engine=mlk&amp;amp;ch=macbook&amp;amp;campaign=Auction&amp;amp;cd=text&amp;amp;keyword=just_won_66&amp;amp;utm_content=just_won_66&amp;amp;utm_campaign=article&amp;amp;utm_source=mlk&amp;amp;utm_medium=text&#39;&gt;&lt;img alt=&#39;Hottest Deal Ever! - Sponsored Post&#39; src=&#39;http://d.likes-media.com/uimg/832269daada6f2a4949a65c03a53a65f&#39;/&gt;&lt;/a&gt;&lt;br/&gt;get a chance to win a new Macbok Pro for $66.34!&lt;img src=&#39;http://lx.im/_t.gif?v=M0A-1d4y36jK4pTTKuzwD8NlPU0XlainidXl5nReARo&#39; style=&#39;border: 0px;height:0px;background:transparent;width:0px;&#39;/&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/11/hottest-deal-ever-sponsored-post.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-1065783251108109458</guid><pubDate>Thu, 04 Nov 2010 05:48:00 +0000</pubDate><atom:updated>2010-11-04T18:25:42.251-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-virus</category><category domain="http://www.blogger.com/atom/ns#">removing malware</category><category domain="http://www.blogger.com/atom/ns#">worms</category><category domain="http://www.blogger.com/atom/ns#">zacurama.exe</category><title>Have you encountered any new virus or  worms, malware lately?</title><description>For years now, I have always been excited to encounter new virus or worms or any other form of malware (as long as they don&#39;t completely disable my system). The latest to date is when I found the zacurama.exe worm hidden in some of my students&#39; flash drives. Since I wasn&#39;t able to find solutions from the Internet,&amp;nbsp; I tried to remove the worm manually.&lt;br /&gt;
&lt;br /&gt;
After I did it, I posted the steps in &lt;a href=&quot;http://tekbytes.blogspot.com/2010/10/how-to-remove-zacuramaexe.html&quot;&gt;http://tekbytes.blogspot.com/2010/10/how-to-remove-zacuramaexe.html&lt;/a&gt;. &lt;br /&gt;
Hopefully, this posted have helped a lot of computer users out there.&lt;br /&gt;
&lt;br /&gt;
I&#39;ve always wanted to know if you have encountered new strains of worms or viruses out there. And maybe I can help you remove it from your computer. You can post your comments here or better yet you can join me at &lt;a href=&quot;http://www.mylot.com/?ref=archon309&quot;&gt;Mylot &lt;/a&gt;and we can discuss your problem (and earn along the way) or join directly the discussion at &lt;a href=&quot;http://www.mylot.com/w/discussions/2434174.aspx?p=0&quot;&gt;http://www.mylot.com/w/discussions/2434174.aspx?p=0 &lt;/a&gt;(Of course you need to be a member of &lt;a href=&quot;http://www.mylot.com/?ref=archon309&quot;&gt;Mylot&lt;/a&gt; to join the disccusion).&lt;br /&gt;
&lt;br /&gt;
Whichever way, I want to hear about your problems regards worms and viruses. Maybe we can find a solution for them&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;c8ba4617-3a79-4050-8410-c56d91305d7b&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;c8ba4617-3a79-4050-8410-c56d91305d7b&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/11/have-you-encounered-any-new-virus-or.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-7103117543268430231</guid><pubDate>Tue, 02 Nov 2010 01:00:00 +0000</pubDate><atom:updated>2010-11-01T18:00:51.193-07:00</atom:updated><title>Western Digital Elements (750GB) - Sponsored Post</title><description>Check out this 750 GB Western Digital Hard drive! #harddrive #portable &lt;img src=&#39;http://lx.im/_t.gif?v=x9t8DrVYi5gh4DlqlHE-wReu8sI4CDHnL-OjzQPkjlQ&#39; style=&#39;border: 0px;height:0px;background:transparent;width:0px;&#39;/&gt; &lt;a title=&#39;Western Digital Elements (750GB) - Sponsored Post&#39; href=&#39;http://www.bizrate.com/oid1879896052/index__rf--af1__af_assettype_id--10__af_creative_id--6__af_id--28405__af_placement_id--1.html&#39;&gt;http://www.bizrate.com/oid1879896052/index__rf--af1__af_assettype_id--10__af_creative_id--6__af_id--28405__af_placement_id--1.html&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/11/western-digital-elements-750gb.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-9062050096757957646</guid><pubDate>Sat, 16 Oct 2010 06:13:00 +0000</pubDate><atom:updated>2010-10-17T14:39:06.391-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">worm</category><category domain="http://www.blogger.com/atom/ns#">zacurama.exe</category><title>How to Remove Zacurama.exe</title><description>&lt;h1&gt;How to remove Zacurama.exe&lt;/h1&gt;&lt;br /&gt;
A few days ago I noticed autorun.inf on a USB drive that I inserted on my computer. When I tried to delete it, it is being used by another application. I concluded then that a worm must have gotten into my computer. I killed the explorer.exe (which appears on the task manager as &quot;Explorer.Exe&quot;) after that, I was able to delete the autorun.inf.&lt;br /&gt;
&lt;br /&gt;
However, I noticed this morning that the autorun.inf kept on coming back even after I have cleaned the USB disk. After updating my Avast and Malwarebytes, I scanned my computer and both programs found no threat but I know something is wrong.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
After doing some manual investigation on the infected drive, I discovered that the autorun.inf is launching a worm named zacurama.exe. After discovering where the Zacurama.exe is hiding, I did the following steps.&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;kill the explorer.exe on the task manager. I suggest you use task killer (&lt;a href=&quot;http://www.softpedia.com/get/System/Launchers-Shutdown-Tools/Task-Killer.shtml&quot;&gt;download it from here&lt;/a&gt;) to do it and it will also start a fresh copy explorer.exe without the worm.&lt;/li&gt;
&lt;li&gt;From the &lt;i&gt;My Computer&lt;/i&gt; window right click on the infected drive and select explore. (&lt;a href=&quot;http://tekbytes.blogspot.com/2010/07/how-to-prevent-autorun-from-running.html&quot;&gt;Read: How to Prevent Autorun.inf From Runing&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;If you can see autorun.inf delete it. If not follow the next steps. If you cannot delete&amp;nbsp; the autorun.inf go back to step 1.&lt;/li&gt;
&lt;li&gt;From the main menu select &lt;i&gt;Tools&lt;/i&gt; -&amp;gt;&lt;i&gt; Folder Options&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Click on the &lt;i&gt;View&lt;/i&gt; tab&lt;/li&gt;
&lt;li&gt;On the &lt;i&gt;Advance Settings&lt;/i&gt;, select &lt;i&gt;Show hidden files and folders&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;Un-check &lt;i&gt;Hide protected operating system files&lt;/i&gt;. Click &lt;b&gt;yes&lt;/b&gt; on the verification message that will pop-up&lt;/li&gt;
&lt;li&gt;Click Apply&lt;/li&gt;
&lt;li&gt;From here you can now see a hidden folder NOKTE. Delete it right away.&lt;/li&gt;
&lt;li&gt;If were not able to see autorun.inf, you should be able to see it now and you can delete it. &lt;/li&gt;
&lt;/ol&gt;If you want to see the zacurama.exe&amp;nbsp; follow these steps. &lt;u&gt;&lt;b style=&quot;color: red;&quot;&gt;WARNING&lt;/b&gt;&lt;/u&gt;: &lt;b&gt;Be extremely careful in following these steps, you might enable the worm accidentally.!!!!&lt;/b&gt;&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;If you open the NOKTE folder, you will see there the Zacurama.exe folder. However if the file extension (e.g .exe) is hidden in your computer, it will appear like a folder- which is a common ploy of worms to entice the curious users to double click on it. &lt;b&gt;DO NOT DOUBLE CLICK on Zacurama.exe&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Delete Zacurama.exe.&lt;/li&gt;
&lt;/ol&gt;After following this, your system should be free of the worm.&amp;nbsp; &lt;br /&gt;
As of this time, I am submitting a sample of the worm to Malwarebytes.&lt;br /&gt;
&lt;br /&gt;
Originally posted: at http://tekbytes.blogspot.com&lt;br /&gt;
under, malware, worm, zacurama.exe &lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;c8ba4617-3a79-4050-8410-c56d91305d7b&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;0a46af5c-3936-40c5-acc1-65ee450a243d&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;0a46af5c-3936-40c5-acc1-65ee450a243d&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/10/how-to-remove-zacuramaexe.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-2102655739578587512</guid><pubDate>Mon, 04 Oct 2010 13:07:00 +0000</pubDate><atom:updated>2010-10-04T06:07:48.549-07:00</atom:updated><title>Flip Ultra HD  - Sponsored Post</title><description>Easy-to-use, pocket-sized HD camcorder featuring one-touch recording and digital zoom&lt;img src=&#39;http://lx.im/_t.gif?v=-Rixtde1wNPCk-FXWpiNexqKpVdAO_O3_4M39Kk1KO8&#39; style=&#39;border: 0px;height:0px;background:transparent;width:0px;&#39;/&gt; &lt;a title=&#39;Flip Ultra HD  - Sponsored Post&#39; href=&#39;http://www.amazon.com/gp/product/B0023B14TK?ie=UTF8&amp;amp;tag=likaholix-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B0023B14TK&#39;&gt;http://www.amazon.com/gp/product/B0023B14TK?ie=UTF8&amp;amp;tag=likaholix-20&amp;amp;linkCode=as2&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B0023B14TK&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/10/flip-ultra-hd-sponsored-post.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-911813160903727646</guid><pubDate>Wed, 29 Sep 2010 04:58:00 +0000</pubDate><atom:updated>2010-09-28T21:59:04.098-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">utility</category><category domain="http://www.blogger.com/atom/ns#">web protection</category><title>Stop Accessing Unwanted Sites with k9</title><description>&lt;h1 style=&quot;text-align: left;&quot;&gt;Today’s Tip For Safer Computing: Stop Accessing Unwanted Site with K9 &lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www1.k9webprotection.com/sites/default/files/k9_logo.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;101&quot; src=&quot;http://www1.k9webprotection.com/sites/default/files/k9_logo.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
With hundreds (or probably thousands) of websites popping up everyday, it is very difficult to determine which is a valid website or a site purposely created with malicious intent. Some of these sites are &lt;a href=&quot;http://en.wikipedia.org/wiki/Phishing&quot;&gt;phishing &lt;/a&gt;sites or &lt;a href=&quot;http://en.wikipedia.org/wiki/Pharming&quot;&gt;pharming&lt;/a&gt; sites or could be sources of some forms of &lt;a href=&quot;http://www.bukisa.com/articles/309579_difference-between-a-virus-a-worm-a-trojan-horse-and-malware&quot;&gt;virus, worms and other malwares&lt;/a&gt;. Some are scam sites that could take the time and/or money of people who are looking for some ways to earn money online. Some are simply sites that, if you&#39;re a parent, simply don&#39;t want your children to access like adult, online-gambling sites or even sites that offer violent games as a form of entertainment. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, anti-virus and anti-malware utilities are not capable of to blocking these sites (which could be sources of malwares your anti-virus and anti-malware programs can&#39;t detect yet). Using the browser&#39;s web filtering means you have to see first if a site falls under these malicious site and updating it probably everyday.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Fortunately, there&#39;s one utility that once installed, you&#39;ll never have to worry about these sites again.&lt;a href=&quot;http://www1.k9webprotection.com/&quot;&gt;K9 Web Protection&lt;/a&gt; from Blue Coat. &lt;br /&gt;
&lt;br /&gt;
Last June I posted here how K9 could &lt;a href=&quot;http://tekbytes.blogspot.com/search/label/web%20protection&quot;&gt;protect you from fake anti-virus and other hoaxes&lt;/a&gt;. Among other things what k9 can do is, block adult sites, gambling sites and any other sites that could belong any category that you want block. (You can even block social networking sites if you think its necessary).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lately, since I&#39;ve been looking for some ways to earn some extra cash online, I have been joining some sites like PTC sites and other sites that offers to earn extra cash. Some of these sites are simply made with the intention of scamming some cash from the ones who are looking to earn some! The main problem however is to determine which is a legitimate site and a scam site. Some of these sites posts ads to other legitimate PTC sites.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;c8ba4617-3a79-4050-8410-c56d91305d7b&#39;; var geo_isCG = trWtih
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
With K9 installed however in my computer, it blocks these sites and shows a message that the site in question falls under illegal or unwanted site. Although it does not filter out all scam sites (perhaps others were not yet reviewed by K9&#39;s staff) at least it already filter out some of these sites for me.&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
var geo_Partner = &#39;c8ba4617-3a79-4050-8410-c56d91305d7b&#39;; var geo_isCG = true;
&lt;/script&gt;&lt;script src=&quot;http://js.geoads.com/geoLink.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/09/stop-accessing-unwanted-sites-with-k9.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-7769237699222076103</guid><pubDate>Sat, 25 Sep 2010 14:05:00 +0000</pubDate><atom:updated>2010-09-25T07:05:06.071-07:00</atom:updated><title>Sandisk MP3 Player  - Sponsored Post</title><description>&lt;a title=&#39;Sandisk MP3 Player  - Sponsored Post&#39; href=&#39;http://www.bizrate.com/rd?t=http://tracking.searchmarketing.com/click.asp?aid=408419265&amp;amp;mid=28463&amp;amp;cat_id=499&amp;amp;atom=10056&amp;amp;prod_id=1667532008&amp;amp;oid=1908742207&amp;amp;pos=1&amp;amp;b_id=18&amp;amp;bid_type=0&amp;amp;bamt=15834372142709c7&amp;amp;rf=af1&amp;amp;af_assettype_id=10&amp;amp;af_creative_id=6&amp;amp;af_id=28405&amp;amp;af_placement_id=1&#39;&gt;&lt;img alt=&#39;Sandisk MP3 Player  - Sponsored Post&#39; height=&#39;100&#39; width=&#39;100&#39; src=&#39;http://img.bizrate.com/resize?sq=100&amp;amp;uid=1908742207&amp;amp;mid=28463&#39;/&gt;&lt;/a&gt;&lt;br/&gt;Tiny player that comes with great features!&lt;img src=&#39;http://lx.im/_t.gif?v=z6no8jsP2pzwIf3v0n0l27iOaFTpD8dx3JWTbOp8yLc&#39; style=&#39;border: 0px;height:0px;background:transparent;width:0px;&#39;/&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/09/sandisk-mp3-player-sponsored-post.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-8025911335497556362</guid><pubDate>Thu, 23 Sep 2010 20:37:00 +0000</pubDate><atom:updated>2010-09-23T13:37:41.695-07:00</atom:updated><title>Online Flash school - Sponsored Post</title><description>Learn how to build flash/AS3 sites. 5 free hours to get your rolling(and then .67 cents a day) #tutorial&lt;img src=&#39;http://lx.im/_t.gif?v=MxtczzcMrlKUp0NJO5PWvBYxnJgkMMAyJ7BaUJAZikU&#39; style=&#39;border: 0px;height:0px;background:transparent;width:0px;&#39;/&gt; &lt;a title=&#39;Online Flash school - Sponsored Post&#39; href=&#39;http://everythingfla.com/?o=mylikes201009-01&#39;&gt;http://everythingfla.com/?o=mylikes201009-01&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/09/online-flash-school-sponsored-post.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-954239638186831301</guid><pubDate>Fri, 27 Aug 2010 21:13:00 +0000</pubDate><atom:updated>2010-08-27T14:13:05.083-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">software review</category><category domain="http://www.blogger.com/atom/ns#">utility</category><title>Remove Malware With Spybot Search and Destroy.</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP3yhubpQzWiH3YAMfRrR1AhFBghuF75BNTJfjXTsj0hXHKdqLsjIrV7GTa12PG9586DkdCEz9oTWFpFzZFS9HQLakkUMaz-my86hQSwvuYqnxVrRzFZpWF5aevR8quw47nJqoAmMLMN5L/s1600/snd.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP3yhubpQzWiH3YAMfRrR1AhFBghuF75BNTJfjXTsj0hXHKdqLsjIrV7GTa12PG9586DkdCEz9oTWFpFzZFS9HQLakkUMaz-my86hQSwvuYqnxVrRzFZpWF5aevR8quw47nJqoAmMLMN5L/s200/snd.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;One of the best free utilities so far that I have used is Spybot Search and Destroy. It is capable of removing most of the hard-to-remove malware. Also, it has features that protect your computer in more ways than one.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Remove Malware and Fix Problems.&lt;/b&gt;&lt;br /&gt;
On it’s default mode or the standard mode, checking your computer for malware and other problems can be done by just a click of a button. The Search for Problems button will scan your computer for spyware and other prob,ems that Spybot recognized. This feature of Spybot will scan all the files in your hard disk and your registry for problems.&lt;br /&gt;
&lt;br /&gt;
When problems are found, Spybot will display the list of the problems with the details of each problem, e.g. what file or registry is the cause of the problem. The user will have the option to fix all problems or uncheck the items that would seem to a ‘false-positive’ result.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Passive Security.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Spybot also has a passive security feature in the form of immunization. The immunization feature protects your computer from known threats. It also prevents access to sites that contains spyware and other form of malware.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;More Control with the Advance Tools&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUuKDRvvKWDrX3RNAXUGu5pmwrtKH4gWKOTTDEJ5qD7WaYDUqo4Yqk_JCdYnQV21MiP3V8gLmd9UwxSVLfASyxPhEgN24hjcLJpsYitc3rXGNE4vaTues0bhyAvwLMiCpqqDTec3ht0PFG/s1600/spybot.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUuKDRvvKWDrX3RNAXUGu5pmwrtKH4gWKOTTDEJ5qD7WaYDUqo4Yqk_JCdYnQV21MiP3V8gLmd9UwxSVLfASyxPhEgN24hjcLJpsYitc3rXGNE4vaTues0bhyAvwLMiCpqqDTec3ht0PFG/s320/spybot.jpg&quot; /&gt;&lt;/a&gt;Switching to Advance Mode will show you options that gives you more control on the protection settings. In advance mode, you can:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Manage the System Startup- here you might recognize the unwanted applications and dll’s that runs on start-up.&lt;/li&gt;
&lt;li&gt;Manage the Process List- this utility is an alternate way to kill the unwanted application&lt;/li&gt;
&lt;li&gt;Manage the Host File- this file prevents the access to web sites that is known to install spyware or some other forms of malware.&lt;/li&gt;
&lt;li&gt;Manage the Resident Protection- Spybot has two resident protection options.&lt;/li&gt;

&lt;ul&gt;&lt;li&gt;The SDHelper which blocks the automatic download for IE and the&lt;/li&gt;
&lt;li&gt;Tea Timer- an add-on that protects the computer by tracking all changes and the computer registry and prompts the user if the changes should be applied or blocked. This will help prevent malware from making any changes on your registry.&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;For a free software utility, Spybot Search and Destroy offers a very good protection for your computer and it is also a great program to remove problems caused by malwares, even some residual settings left behind by some malwares.&lt;br /&gt;
&lt;br /&gt;
tagged as software review, utility, anti-malware&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/08/remove-malware-with-spybot-search-and.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP3yhubpQzWiH3YAMfRrR1AhFBghuF75BNTJfjXTsj0hXHKdqLsjIrV7GTa12PG9586DkdCEz9oTWFpFzZFS9HQLakkUMaz-my86hQSwvuYqnxVrRzFZpWF5aevR8quw47nJqoAmMLMN5L/s72-c/snd.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-3412486288708674694</guid><pubDate>Sun, 01 Aug 2010 06:28:00 +0000</pubDate><atom:updated>2010-07-31T23:28:10.630-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">safer computing</category><title>Today’s Tip For Safer Computing: Scan Your Computer With Malware Remover</title><description>&lt;h3&gt;Today’s Tip For Safer Computing: Scan Your Computer With Malware Remover&lt;/h3&gt;Technically&amp;nbsp; &lt;b&gt;virus&lt;/b&gt; is a kind of &lt;b&gt;malware&lt;/b&gt;, or malicious software. Not all malware are virus. Malware can be a virus, a worm, a trojan horse, (see: &lt;br /&gt;
&lt;a href=&quot;http://tekbytes.blogspot.com/2010/06/difference-between-virus-worm-trojan.html&quot;&gt;Difference  between A Virus, A Worm, A Trojan Horse and Malware&lt;/a&gt;)&lt;br /&gt;
or ad-ware, spy-ware or any forms of programs or scripts that was made with malicious intent - from merely annoyance, ID/Password theft to corrupt a whole operating system.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Unfortunately anti-virus software are primarily designed to look for computer viruses. Even though some have the features of detecting common malware, they are not enough to detect most if not all malware or even repair the damage done by these rouge software or remove them entirely from a computer system.&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;b&gt;Today’s Tip For Safer Computing: &lt;/b&gt;Malware removers are capable of not just detecting and removing malwares but also repair the registry and remove scripts and other residual files that may bring back the malware to your computer.&lt;br /&gt;
&lt;hr /&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Best solution, aside from installing a good antivirus (see:&lt;a href=&quot;http://tekbytes.blogspot.com/2010/07/tips-for-safer-computing-get-right-anti.html&quot;&gt;) Tips  for Safer Computing: Get the Right Anti-Virus&lt;/a&gt;&lt;br /&gt;
) is install a good Anti-malware program.&lt;br /&gt;
&lt;br /&gt;
I have featured here before &lt;b&gt;Malware Bytes&lt;/b&gt; : (See: &lt;a href=&quot;http://tekbytes.blogspot.com/2010/06/safer-computing-utility-malware-bytes.html&quot;&gt;Safer  Computing Utility: Malware Bytes&lt;/a&gt;), which is a good anti-malware program.&lt;br /&gt;
&lt;br /&gt;
Another effective malware remover which also allows you to control the start-up programs plus other useful&amp;nbsp; utilities is the &lt;a href=&quot;http://www.safer-networking.org/en/index.html&quot;&gt;SpyBot Search and Destroy&lt;/a&gt;. (I&#39;ll be posting a review on this soon).&lt;br /&gt;
&lt;br /&gt;
The two utilities mentioned above are available for free. &lt;br /&gt;
Download and install any one of&amp;nbsp; these two, (or if you know any good malware remover, please post the name and the url of the program on the comment box ) and scan your system with this at least once a week or whenever you think your computer has been infected with a malware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;b&gt;Today’s Tip For Safer Computing: DO NOT &lt;/b&gt;install two different anti-virus programs, there&#39;s a tendency that two anti-virus programs will conflict with each other, or will take so much of your system memory. Worst is, with two antivirus programs, there&#39;s a chance that your computer will hang-up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Instead, install one antivirus program and enable the live protection, and install also one anti-malware program and &lt;b&gt;scan your computer regularly with both&lt;/b&gt;. If both anti-virus and anti-malware programs have live protection however, it might slow down your computer if it does have a limited memory. Best configuration is, enable the live protection of the anti-virus and turn off the live protection of anti-malware.&lt;br /&gt;
&lt;hr /&gt;&lt;br /&gt;
Have a safer computing&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/07/todays-tip-for-safer-computing-scan.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-3354075906445834949</guid><pubDate>Sat, 31 Jul 2010 06:14:00 +0000</pubDate><atom:updated>2010-07-30T23:14:47.316-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">antivirus</category><category domain="http://www.blogger.com/atom/ns#">safer computing</category><title>Today’s Tip For Safer Computing: Do Full System Scan Regularly</title><description>&lt;h1&gt;Today’s Tip For Safer Computing: Do Full System Scan Regularly &lt;/h1&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrKGqdrV7PU9SEpATzG_t6SPoAzKLC1FRbXYjSwNW4DT00bFlVSS77DPDARiTSt471gf9cScWkK_I9fMsVMTH6bb_oInPBwwJ440HrpcuRps4zGMss36zrACkUh2Nc6gWmTzNLpwrXXGaL/s1600/spyware+icon.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrKGqdrV7PU9SEpATzG_t6SPoAzKLC1FRbXYjSwNW4DT00bFlVSS77DPDARiTSt471gf9cScWkK_I9fMsVMTH6bb_oInPBwwJ440HrpcuRps4zGMss36zrACkUh2Nc6gWmTzNLpwrXXGaL/s200/spyware+icon.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;“I already have a good antivirus that works well on my computer and I now update it regurlaly, So I don’t have to worry about any virus getting into my computer.”&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;WRONG!&lt;/b&gt;&amp;nbsp; In my previous post (See:&amp;nbsp; &lt;a href=&quot;http://tekbytes.blogspot.com/2010/07/tip-for-safer-computing-update-your.html&quot;&gt;Tip for Safer Computing: Update your Anti-virus Definition Regularly&lt;/a&gt;), I mentioned there that new virus or variations of existing virus pop-up almost every minute and recommended that your anti-virus definition file should be updated regularly.&lt;br /&gt;
&lt;br /&gt;
However it would take at least days or even weeks for an anti-virus to create a solution after a new virus comes out. So before it does, and you always go online, there are chances that a new virus could infect your computer without your anti-virus program detecting it.&lt;br /&gt;
&lt;hr /&gt;&lt;b&gt;Safer Computing Tip:&lt;/b&gt; Run a full System Scan every after you manually update your antivirus definition file&lt;br /&gt;
&lt;hr /&gt;The best way to protect your computer is to run a full system scan after you manually update the antivirus definition file. Doing a full system scan enables your antivirus program scan sections of your drives that are normally not scanned by the automatic scan (also known as passive scan- usually scans your hard drive’s system&amp;nbsp; folder and root folder only, it also scans a folder only when you access it).&lt;br /&gt;
&lt;br /&gt;
Full system scans all folders including hidden folders and system folders that are normally cannot be accessed or even seen by the users. These are the areas where virus /malwares usually hide.&lt;br /&gt;
&lt;br /&gt;
Have a safer computing.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/07/todays-tip-for-safer-computing-do-full.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrKGqdrV7PU9SEpATzG_t6SPoAzKLC1FRbXYjSwNW4DT00bFlVSS77DPDARiTSt471gf9cScWkK_I9fMsVMTH6bb_oInPBwwJ440HrpcuRps4zGMss36zrACkUh2Nc6gWmTzNLpwrXXGaL/s72-c/spyware+icon.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-4083131761753933218</guid><pubDate>Fri, 30 Jul 2010 05:55:00 +0000</pubDate><atom:updated>2010-07-29T22:55:49.051-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-virus</category><category domain="http://www.blogger.com/atom/ns#">safer computing</category><title>Tip for Safer Computing: Update your Anti-virus Definition Regularly</title><description>&lt;h2&gt;Today&#39;s Tip for Safer Computing: Update your Antivirus Definition Regularly&lt;/h2&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd-95jTa4yydN4ChL5VL6_IsTrjoB9MGR5L3Zv5JiHHZ6XrnKZIefI8O8AbHZpdlUEr71wGtFw3jybBwHKKgBvo13WovAv1ug6Bn3OtWgQcw8MNTbfp0fDMvz6VbS5dO3Cz8lwpzfmnDpB/s1600/computer-virus11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd-95jTa4yydN4ChL5VL6_IsTrjoB9MGR5L3Zv5JiHHZ6XrnKZIefI8O8AbHZpdlUEr71wGtFw3jybBwHKKgBvo13WovAv1ug6Bn3OtWgQcw8MNTbfp0fDMvz6VbS5dO3Cz8lwpzfmnDpB/s200/computer-virus11.jpg&quot; width=&quot;199&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Yesterday&#39;s tip for safer computing was &lt;a href=&quot;http://linkbee.com/F396Q&quot;&gt;Get the Right Anti Virus&lt;/a&gt;. Now assuming that you already have a good anti-virus installed, the question to ask yourself is, &quot;How often should I update my virus definition file?&quot;&lt;br /&gt;
&lt;br /&gt;
Having a &lt;a href=&quot;http://tekbytes.blogspot.com/2010/07/tips-for-safer-computing-get-right-anti.html&quot;&gt;the right anti-virus &lt;/a&gt;installed in your computer does not guarantee a long term protection against computer virus or any other &lt;a href=&quot;http://tekbytes.blogspot.com/search/label/malware&quot;&gt;malware&lt;/a&gt;. New virus and variants of the existing virus pop-up almost every minute and if you are always connected online, chances are high that a virus or a malware will contaminate your computer. To minimize this, you must regularly update your &lt;b&gt;Antivirus or the virus definition file&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;b&gt;Safer Computing &lt;/b&gt;Note: &lt;b&gt;Virus Definition&lt;/b&gt; File- is the file that contains the list of known viruses, their signatures and even how they behave. This is used by your anti-virus program to identify if a virus or a malware on your computer. Hence, your antivirus will catch only virus that are listed on the definition file or some of their variants.&lt;br /&gt;
&lt;hr /&gt;&lt;br /&gt;
&lt;b&gt;&quot;How often should I update my antivirus definition file?&quot;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;For Online Computers&lt;/b&gt; - if your computer is always online, chances are your antivirus program updates this file regularly. If you want to know how often your anti-virus program updates, leave a comment here and tell me what anti-virus program and version you are using and I&#39;ll try to help you find out.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Once A Week Update&lt;/b&gt; - normally if you&#39;re not connected online all the time, you should update your antivirus definition file for at least once a week. If your computer is not really connected to the Internet, use an antivirus that allows you to download an update file from their site so you can update your computer offline.&lt;br /&gt;
&lt;hr /&gt;&lt;h4&gt;Have a safer computing.&lt;/h4&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/07/tip-for-safer-computing-update-your.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd-95jTa4yydN4ChL5VL6_IsTrjoB9MGR5L3Zv5JiHHZ6XrnKZIefI8O8AbHZpdlUEr71wGtFw3jybBwHKKgBvo13WovAv1ug6Bn3OtWgQcw8MNTbfp0fDMvz6VbS5dO3Cz8lwpzfmnDpB/s72-c/computer-virus11.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-2043527072105779705</guid><pubDate>Thu, 29 Jul 2010 05:56:00 +0000</pubDate><atom:updated>2010-07-29T00:16:00.762-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-virus</category><title>Tips for Safer Computing: Get the Right Anti-Virus</title><description>&lt;h2&gt;Today&#39;s Tip for Safer Computing: Get the Right Anti-Virus.&lt;/h2&gt;&lt;br /&gt;
The very first thing a computer user needs to protect his/her unit from virus and other malware is to get good anti-virus program. However the best anti-virus program might not just be the right anti-virus for your computer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read my previous post &lt;a href=&quot;http://linkbee.com/F395F&quot;&gt;Which Anti-virus should I choose?&lt;/a&gt; to give you some guidelines regarding the best anti-virus programs in the market.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aside from the ratings given to these programs, there are still other things that you need to consider so that you can choose the correct anti-virus that will work on your computer.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;hr /&gt;&lt;b&gt;&amp;nbsp;Safer Computing Tip:&lt;/b&gt; Consider your hardware specifications&lt;br /&gt;
&lt;hr /&gt;First of all, consider your &lt;b&gt;hardware specifications&lt;/b&gt;. Some of the best anti-virus programs require a large amount of memory. These type of anti-virus of programs are best used in high-end computers especially on a corporate settings. For personal use, consider your processor speed, the size of your harddisk and more importantly, the size of your computer memory (RAM)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Budget consideration&lt;/b&gt;. A good anti-virus program has an average price tag of $30.00. But it doesn&#39;t mean that the most expensive is the best. If you don&#39;t have the budget go for a free version, but don&#39;t get the cracked ones.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Avoid hacked or cracked anti-virus&lt;/b&gt;. Some anti-virus programs have the capability to check if a software has somehow been altered or cracked. If the anti-virus program itself has been cracked, there&#39;s a possibility that it lost some of its features or capability to detect some types of virus.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Some Free Versions are good.&lt;/b&gt; Free doesn&#39;t mean they don&#39;t worth a thing. Although most some free version does not have all the features of the paid anti-virus, some are good enough to give your computer a descent protection.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;&lt;b&gt;&amp;nbsp;Safer Computing Recommended Anti-virus Programs:&amp;nbsp; &lt;/b&gt;These are personally tested.&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;&lt;span id=&quot;main&quot; style=&quot;visibility: visible;&quot;&gt;&lt;span id=&quot;search&quot; style=&quot;visibility: visible;&quot;&gt;&lt;span id=&quot;main&quot; style=&quot;visibility: visible;&quot;&gt;&lt;span id=&quot;search&quot; style=&quot;visibility: visible;&quot;&gt;&lt;a href=&quot;http://www.bitdefender.com/&quot;&gt;Bitdefender&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span id=&quot;main&quot; style=&quot;visibility: visible;&quot;&gt;&lt;span id=&quot;search&quot; style=&quot;visibility: visible;&quot;&gt;&lt;span id=&quot;main&quot; style=&quot;visibility: visible;&quot;&gt;&lt;span id=&quot;search&quot; style=&quot;visibility: visible;&quot;&gt;&lt;a href=&quot;http://www.kaspersky.com/%20&quot;&gt;Kaspersky Anti-Virus&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span id=&quot;main&quot; style=&quot;visibility: visible;&quot;&gt;&lt;span id=&quot;search&quot; style=&quot;visibility: visible;&quot;&gt;&lt;span id=&quot;main&quot; style=&quot;visibility: visible;&quot;&gt;&lt;span id=&quot;search&quot; style=&quot;visibility: visible;&quot;&gt;&lt;a href=&quot;http://www.eset.com/&quot;&gt;Eset Nod32&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;b&gt;&amp;nbsp;Recommend Free Version&lt;/b&gt;&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Avast Anti-Virus &lt;/li&gt;
&lt;li&gt;Avira Anti-Virus&lt;/li&gt;
&lt;/ol&gt;&lt;hr /&gt;&lt;br /&gt;
&lt;br /&gt;
Feel free to post a question or comment.&lt;br /&gt;
Have a Safer Computing.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/07/tips-for-safer-computing-get-right-anti.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-5456807629937703268</guid><pubDate>Wed, 21 Jul 2010 02:28:00 +0000</pubDate><atom:updated>2010-07-20T19:56:30.917-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">safer computing</category><category domain="http://www.blogger.com/atom/ns#">social networking</category><title>Are You Exposed to the Social Networking Risks?</title><description>&lt;b&gt;Social networking&lt;/b&gt; sites like Facebook and Twitter were intendd to connect as many users as possible through their sites. Facebook, since 2009 have reached more than 300 million users. Twitter reported to get as at least 55 million visitors a month.&lt;br /&gt;
&lt;br /&gt;
These social networking giants not only attracted the millions of regular people to connect to their sites, but these huge numbers have attracted cyber-predators as well. As a result, security and privacy related stories and issues have plagued these social network leaders. Frequently, they were criticized for lack of the lack of security and user information privacy control.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
News about accounts of celebrities were hacked and hijacked—including the account of one of the executives of these sites. A more disturbing story came out about a girl who was befriended by a sex offender through one of the social networking sites. Later the girl, reportedly, met this seemingly friendly character in person and later was found dead … after she was sexually abused. Though this story is not verified, the way people post and share personal information through the social networking media, it is very likely that this story could happen anytime.&lt;br /&gt;
&lt;br /&gt;
In response to these issues, both Twitter and Facebook have tightened up their securities and anti-hacking anti-malware measures.&amp;nbsp; Facebook, recently have also changed their user information privacy control, giving more control to the users with regards to the information they are willing to share to applications and other websites that they link to their Facebook account.&lt;br /&gt;
&lt;br /&gt;
Despite these moves by the social network providers however, users unknowingly exposes themselves to some of the risks in social networking.&lt;br /&gt;
&lt;br /&gt;
WHAT ARE THE RISKS?&lt;br /&gt;
&lt;br /&gt;
Hacking – one of the most common risks not only in social networking but in almost all online accounts.&amp;nbsp; This type of attack may be in the form of modification of personal info or even access one’s online bank account.&lt;br /&gt;
&lt;br /&gt;
Account Hijacking – Once accessed, an account may be used to send malicious messages and most often these are offensive messages. Worse is, those who receive these messages may think it was actually sent by the real owner of the account.&lt;br /&gt;
&lt;br /&gt;
Online Scams – Online scams comes in many forms these days. Some are merely lying out there waiting for unsuspecting victims. Due to available personal information on the web, targeted scams are now prevalent. Cyber predators choose their victims carefully, gathering as much information about a person. Commonly targeted victims are people who are away from their family and/or the family of such person.&lt;br /&gt;
&lt;br /&gt;
An example of this type of scam is someone would contact the wife of a person working abroad and pretend that he works with the husband. The caller would come up with a story like the husband is in jail or in a hospital and needs a certain amount of money and needs to be sent immediately. They will be able to say details about a person and or even the family to verify that he knows the husband. Of course the information could have been taken from the social networking sites directly or indirectly.&lt;br /&gt;
&lt;br /&gt;
After the wife sends the money, they would either disappear or try to get more money.&lt;br /&gt;
&lt;br /&gt;
Risks in Eyeball– Eyeballing or meeting a cyber friend in person is just like meeting with a text-mate or, back in the days of pre-Internet, a pen-pal and/or phone-pal. &lt;br /&gt;
&lt;br /&gt;
Meeting a cyber-friend or a chat mate however still be risky specially to the females. A cyber-predator can easily post fake information and even pictures on a social networking site and can pretend to very friendly. Once you meet them in person however, it could be too late to realize how un-friendly they really are.&lt;br /&gt;
&lt;br /&gt;
Another risk in eyeballing. A news report came out about a year ago about a person who met with two of his chat mates in an expensive restaurant. Thinking that the two will be paying for what they have eaten. In the end he was left alone in the restaurant with the bill which he cannot afford and two got out of the restaurant with a take-out bag charged to their bill. &lt;br /&gt;
&lt;br /&gt;
WHAT ARE THE CAUSES?&lt;br /&gt;
These cyber-crimes however, are in part made possible by the users themselves. Here are some of the common practices that make these cyber-crimes possible.&lt;br /&gt;
&lt;br /&gt;
PASSWORD:&lt;br /&gt;
One Password For All. This is also called ‘password sloth’. Using a single password for all online accounts seems convenient for most users, which is a mistake that puts not just one account but all the user’s accounts at risks. Passwords may be discovered, accidentally or through intentional hacking. Once a password is discovered, the cyber-predators will try to open other accounts in other servers with that password.&lt;br /&gt;
&lt;br /&gt;
Birthday as passwords. This is very convenient to all but sad to say this is still the biggest and one of the most common mistakes that is still being practiced. Birthdays is one of the password that cyber predators will try to enter to hack an account. &lt;br /&gt;
&lt;br /&gt;
TOO MUCH PERSONAL DETAILS&lt;br /&gt;
&lt;br /&gt;
Posting personal information is good, but posting too much personal details is just one way of inviting these cyber-predators. This will give them enough information to think of a scheme to scam you or your family or if you are an attractive female, you might be attracting a sexual offender and he could find a way to get to you.&lt;br /&gt;
&lt;br /&gt;
USING PUBLIC COMPUTERS.&lt;br /&gt;
&lt;br /&gt;
Using public computers like in the Internet Cafés may expose your account to those ‘hijackers-out-of-opportunity’. Especially if these establishments are using an automated internet café program, which closes the computer when the time limit is reached. This will leave your account online. Unless you restart the computer it will not be logged out and you will never know what the next person will do with your account.&lt;br /&gt;
&lt;br /&gt;
Knowing these risks and their possible causes is just the first step to protect you from these cyber-crimes.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;~o0o~&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;Safer Computing tip(s).&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/07/are-you-exposed-to-social-networking.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1940875218994878492.post-6440734596403990534</guid><pubDate>Mon, 12 Jul 2010 00:27:00 +0000</pubDate><atom:updated>2010-07-11T17:27:43.542-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">blogging</category><title>A BLOGGERS’ CODE OF ETHICS</title><description>This is just a repost from my old &lt;a href=&quot;http://tekbytes.i.ph/&quot;&gt;tekbytes.i.ph&lt;/a&gt; blog&lt;u&gt;.&lt;/u&gt;&lt;br /&gt;
&lt;u&gt;I&lt;/u&gt; posted this after one of my articles there was plagiarized by another blogger without even acknowledging the source which was my blog. This one though not my original article or list of coding ethics, the source is indicated after the title and at the bottom of the page.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;A BLOGGERS’ CODE OF ETHICS&amp;nbsp;&lt;/u&gt;&lt;i&gt;(from &lt;a href=&quot;http://www.cyberjournalist.net/news/000215.php&quot;&gt;cyberjournalist.net&lt;/a&gt;)&lt;/i&gt;  &lt;br /&gt;
&lt;strong&gt;Be Honest and Fair&lt;/strong&gt;&lt;br /&gt;
Bloggers should be honest and fair in gathering, reporting and interpreting information.&lt;br /&gt;
Bloggers should:&lt;br /&gt;
• Never plagiarize.&lt;br /&gt;
• Identify and link to sources whenever feasible. The public is entitled to as much information as possible on sources’ reliability.&lt;br /&gt;
• Make certain that Weblog entries, quotations, headlines, photos and all other content do not misrepresent. They should not oversimplify or highlight incidents out of context.&lt;br /&gt;
• Never distort the content of photos without disclosing what has been changed. Image enhancement is only acceptable for for technical clarity. Label montages and photo illustrations.&lt;br /&gt;
• Never publish information they know is inaccurate — and if publishing questionable information, make it clear it’s in doubt.&lt;br /&gt;
• Distinguish between advocacy, commentary and factual information. Even advocacy writing and commentary should not misrepresent fact or context.&lt;br /&gt;
• Distinguish factual information and commentary from advertising and shun hybrids that blur the lines between the two. &lt;br /&gt;
&lt;strong&gt;Minimize Harm &lt;/strong&gt;&lt;br /&gt;
Ethical bloggers treat sources and subjects as human beings deserving of respect.&lt;br /&gt;
Bloggers should:&lt;br /&gt;
• Show compassion for those who may be affected adversely by Weblog content. Use special sensitivity when dealing with children and inexperienced sources or subjects.&lt;br /&gt;
• Be sensitive when seeking or using interviews or photographs of those affected by tragedy or grief.&lt;br /&gt;
• Recognize that gathering and reporting information may cause harm or discomfort. Pursuit of information is not a license for arrogance.&lt;br /&gt;
• Recognize that private people have a greater right to control information about themselves than do public officials and others who seek power, influence or attention. Only an overriding public need can justify intrusion into anyone’s privacy.&lt;br /&gt;
• Show good taste. Avoid pandering to lurid curiosity.&lt;br /&gt;
Be cautious about identifying juvenile suspects, victims of sex crimes and criminal suspects before the formal filing of charges. &lt;br /&gt;
&lt;strong&gt;Be Accountable &lt;/strong&gt;&lt;br /&gt;
Bloggers should:&lt;br /&gt;
• Admit mistakes and correct them promptly.&lt;br /&gt;
• Explain each Weblog’s mission and invite dialogue with the public over its content and the bloggers’ conduct.&lt;br /&gt;
• Disclose conflicts of interest, affiliations, activities and personal agendas.&lt;br /&gt;
• Deny favored treatment to advertisers and special interests and resist their pressure to influence content. When exceptions are made, disclose them fully to readers.&lt;br /&gt;
• Be wary of sources offering information for favors. When accepting such information, disclose the favors.&lt;br /&gt;
• Expose unethical practices of other bloggers.&lt;br /&gt;
• Abide by the same high standards to which they hold others.&lt;br /&gt;
&lt;br /&gt;
Source: &lt;a href=&quot;http://www.cyberjournalist.net/news/000215.php&quot;&gt;cyberjournalist.net&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a id=&quot;ck_sharethis&quot; class=&quot;stbar chicklet&quot; href=&quot;javascript:void(0);&quot;&gt;
ShareThis&lt;/a&gt;&lt;/div&gt;</description><link>http://tekbytes.blogspot.com/2010/07/bloggers-code-of-ethics.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>2</thr:total></item></channel></rss>