Tuesday, February 28, 2012

General Computer Maintenance Tips:

Keep all of your working files in one folder.                                                                                                       
           The My Documents folder is offered by Windows expressly for this purpose. The benefits of keeping all your files in one place are multiple. One, you know where all your files are, two, it's easy to back them all up at once, and three, your machine will run faster.

Don't put your personal files on the root of the C:drive.                                                                 
             
          If you store a large number of files in the root folder, you could corrupt your disk file table which could lead to a "NTLDR is missing" error message when you boot the computer. Very bad. If you have personal files on the C: drive now, move them to the My Documents folder.

Uninstall programs that you are not using.
          
         But don’t just delete the program. Remove it correctly so you won’t cause Windows errors. Go to Start, Control Panel, Add or Remove Programs. Find the program you want to remove in the list, and click the Remove button.

Eleven Tips to Keep your Computer Running Smoothly

1. Never, never, turn your computer off with the power switch until Windows has shut down
                The one exception to this rule is when your computer locks up and your hard drive is not running (hard drive light is not blinking). In this situation, you can turn the power off without harmful effects to the hard drive. As cutting the power can also result in lost data or Windows files, you should only do this when you have to.
Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting the surface of the drive disc, and it will prevent a host of Windows problems.
Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time. Press them again to reboot your computer.

2. I highly recommend that you purchase an UPS 
                  (uninterruptible power supply) for your computer. This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences.

An UPS is far superior to a surge protector and will save your computer from almost any type of power disaster. (See #1 above for what happens when your computer crashes.)

This is an especially important thing to have if you live or will be living in old houses or apartments. The reason for this is the electrical work in apartments like those can often have faulty wiring that may short out resulting in a damaged computer or loss of information for you. Why have a surge protector when you could put that money towards a UPS? 

3. Backup, backup, backup
                 any data you cannot afford to lose to at least two separate physical drives. So backup data to external hard drives, USB/thumb drives, CD-RW's etc.

The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.

If you have mistakenly deleted any files, documents, photos, or even crashed your hard drive, and you want to recover your data, please see our article, "Best Data Recovery Programs for Windows and Macs".

4. Run Scandisk and Defragment at least once a month
                  This will keep your hard drive healthy and prevent crashes. Alternatively, purchase a disk utility program and use it to keep your hard drive healthy. These programs are part of Windows and can be found at Start/Computer then Right click on the drive you want to fix. Choose Scandisk or Defragment from the menu.

5. Never unplug peripherals from the computer when it is powered up
                Unplugging with the power on can short out the connector socket or the motherboard. The only exception to this rule is if you know a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this exception.

6. Do keep at least 300 MBs of your C: drive free for Windows to use
              If you use Windows XP, Vista, or WIndows 7 then you should have 400-600 MBs of free space on your C: drive.

If you do not have enough free space you will choke Windows and it will start dumping data to your hard drive (or designated virtual drive), or it will just get really, really, slow (you will see your hard drive light on all the time and your computer will be locked up until the drive stops spinning).

Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.

You can also use disk/utility cleaning programs and speed-up programs to get rid of clutter on your hard drive and to speed up your system, we recommend using a PC speed up program like PC Cleaner. See our review of PC Cleaner for more information.

7. Do not let a lot of programs load up when you start your computer
            They use valuable memory and Windows Resources (Windows internal workspace).

All programs in your Windows System Tray (in the lower left of your screen) are running on your computer. Close them if you don't need them or run them and configure them not to load when you boot up.

Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same time. 

8. Do use an antivirus checker regularly.  
              Everyone should have an antivirus checker that boots up when their computer starts. The best type of protection is continuous monitoring from a dedicated anti-virus program (for example Ad Aware Pro, Panda AntiVirus Pro, BitDefender Total Security, Spyware Doctor with AntiVirus). Also, make sure the anti-virus program is set to update automatically. These programs must regularly update their virus definitions to provide the best defense against new viruses and other malware..

9. If you have a high speed Internet connection, you need a firewall program.
               A firewall program keeps those who want to hijack your computer from gaining access to your system. You really do not want someone else running your computer.

All current versions of Windows come with a built in firewall program. You can access the Windows firewall at Start/Control Panel/Internet Connections/Windows Firewall. This program should always be running unless you choose to use a different firewall program.

For additional protection, you should consider Internet security software that has firewall programs and other web security tools built-in e.g. PC Tools Internet Security, Panda AntiVirus Pro, and BitDefender Total Security have firewall, antivirus, and other security programs bundled together in one package.

Case in point: When I am online 10 hours or more with my DSL connection, my computer is usually attacked by a hacker at least once.

Do not think you are safe from hackers!! Hackers use search programs to seek out computers at random. Get a firewall program and use it.

10. Keep track of the software disks you receive 
               with your computer and new peripherals. These disks contain valuable software drivers and programs for Windows and are needed when Windows must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never know when you will need them.

11. Make sure Windows Update is set to Automatically Update your computer
               Windows is frequently updated by Microsoft to prevent virus and malware attacks, to improve Windows performance, and to provide new features. Access Windows Update at Start/Control Panel/System/ Security/Windows Update.

Benefits and Risks of Free Email Services

 "Although free email services are convenient for sending personal correspondence, you should not use them to send messages containing sensitive information"

What is the appeal of free email services?

Many service providers offer free email accounts (e.g., Yahoo!, Hotmail, Gmail). These email services typically provide you with a browser interface to access your mail. In addition to the monetary savings, these services often offer other benefits:
  • accessibility - Because you can access your account(s) from any computer, these services are useful if you cannot be near your computer or are in the process of relocating and do not have an ISP. Even if you are able to access your ISP-based email account remotely, being able to rely on a free email account is ideal if you are using a public computer or a shared wireless hot spot and are concerned about exposing the details of your primary account.
  • competitive features - With so many of these service providers competing for users, they now offer additional features such as large amounts of storage, spam filtering, virus protection, and enhanced fonts and graphics.
  • additional capabilities - It is becoming more common for service providers to package additional software or services (e.g., instant messaging) with their free email accounts to attract customers.
Free email accounts are also effective tools for reducing the amount of spam you receive at your primary email address. Instead of submitting your primary address when shopping online, requesting services, or participating in online forums, you can set up a free secondary address to use (see Reducing Spam for more information).

What risks are associated with free email services?

Although free email services have many benefits, you should not use them to send sensitive information. Because you are not paying for the account, the organization may not have a strong commitment to protecting you from various threats or to offering you the best service. Some of the elements you risk are
  • security - If your login, password, or messages are sent in plain text, they may easily be intercepted. If a service provider offers SSL encryption, you should use it. You can find out whether this is available by looking for a "secure mode" or by replacing the "http:" in the URL with "https:" (see Protecting Your Privacy for more information).
  • privacy - You aren't paying for your email account, but the service provider has to find some way to recover the costs of providing the service. One way of generating revenue is to sell advertising space, but another is to sell or trade information. Make sure to read the service provider's privacy policy or terms of use to see if your name, your email address, the email addresses in your address book, or any of the information in your profile has the potential of being given to other organizations (see Protecting Your Privacy for more information). If you are considering forwarding your work email to a free email account, check with your employer first. You do not want to violate any established security policies.
  • reliability - Although you may be able to access your account from any computer, you need to make sure that the account is going to be available when you want to access it. Familiarize yourself with the service provider's terms of service so that you know exactly what they have committed to providing you. For example, if the service ends or your account disappears, can you retrieve your messages? Does the service provider give you the ability to download messages that you want to archive onto your machine? Also, if you happen to be in a different time zone than the provider, you may find that their server maintenance interferes with your normal email routine.

Understanding Firewalls

"When anyone or anything can access your computer at any time, your computer is more susceptible to being attacked. You can restrict outside access to your computer and the information on it with a firewall".

What do firewalls do?

Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary Internet traffic. Firewalls can be configured to block data from certain locations while allowing the relevant and necessary data through. They are especially important for users who rely on "always on" connections such as cable or DSL modems.

What type of firewall is best?

Firewalls are offered in two forms: hardware (external) and software (internal). While both have their advantages and disadvantages, the decision to use a firewall is far more important than deciding which type you use.
  • Hardware - Typically called network firewalls, these external devices are positioned between your computer or network and your cable or DSL modem. Many vendors and some Internet service providers (ISPs) offer devices called "routers" that also include firewall features. Hardware-based firewalls are particularly useful for protecting multiple computers but also offer a high degree of protection for a single computer. If you only have one computer behind the firewall, or if you are certain that all of the other computers on the network are up to date on patches and are free from viruses, worms, or other malicious code, you may not need the extra protection of a software firewall. Hardware-based firewalls have the advantage of being separate devices running their own operating systems, so they provide an additional line of defense against attacks. Their major drawback is cost, but many products are available for less than $100 (and there are even some for less than $50).
  • Software - Some operating systems include a built-in firewall; if yours does, consider enabling it to add another layer of protection even if you have an external firewall. If you don't have a built-in firewall, you can obtain a software firewall for relatively little or no cost from your local computer store, software vendors, or ISP. Because of the risks associated with downloading software from the Internet onto an unprotected computer, it is best to install the firewall from a CD or DVD. If you do download software from the Internet, make sure it is a reputable, secure website (see Understanding Web Site Certificates for more information). Although relying on a software firewall alone does provide some protection, realize that having the firewall on the same computer as the information you're trying to protect may hinder the firewall's ability to catch malicious traffic before it enters your system.

How do you know what configuration settings to apply?

Most commercially available firewall products, both hardware- and software-based, come configured in a manner that is acceptably secure for most users. Since each firewall is different, you'll need to read and understand the documentation that comes with it to determine whether or not the default settings on your firewall are sufficient for your needs. Additional assistance may be available from your firewall vendor or your ISP (either from tech support or a website). Also, alerts about current viruses or worms (such as US-CERT's Cyber Security Alerts) sometimes include information about restrictions you can implement through your firewall.

Unfortunately, while properly configured firewalls may be effective at blocking some attacks, don't be lulled into a false sense of security. Although they do offer a certain amount of protection, firewalls do not guarantee that your computer will not be attacked. In particular, a firewall offers little to no protection against viruses that work by having you run the infected program on your computer, as many email-borne viruses do.

Monday, February 27, 2012

Trojan virus tricks Apple Mac users to steal passwords

Apple Mac users have been warned that a new Trojan virus is capable of infecting their computers and stealing passwords to services such as Google, PayPal and online banking. 

 

The new malware is a "particularly insidious" strain of Flashback, a Trojan virus first discovered in September, and is said to be increasing the infection rate.
It tries to take covert control of Macs using three methods. Two exploit vulnerabilities in Java, a software language commonly used by websites to deliver interactive elements, and require no intervention from the user to succeed.
If Java is not installed or all its security patches are up-to-date, however, the new variant, Flashback.G, attempts to trick users into installing it by presenting a fake security certificate that looks like it comes from Apple, according to Intego, a computer security firm.
"Most users won’t understand what this means, and click on 'Continue' to allow the installation to continue," the firm said.
Mac users running the most recent version of OS X, Snow Leopard, are most at risk, because Java was included as part of the installation package for the first time.

"It is therefore essential that anyone running OS X 10.6 update Java immediately," Intego said.
Users running previois versions of OS X, such as Lion, may have installed Java themselves, however, and should also ensure it fully updated.

"Nevertheless, many Macs are getting infected by the social engineering trick of the bogus certificate purporting to be signed by Apple, as shown in our screenshot above. If you see this, don’t trust it, and cancel the process," Intego warned.

If a Mac is infected, certain applications such as Safari and Skype will frequently crash.

The Flashback Trojan caused a stir because cyber criminals rarely target Macs compared to Windows PCs. According to security experts it is showing increasing sophistication with each variant, suggesting Apple's growing market share is making it more worthwhile to invest time an money in creating Mac-specific viruses.
Nevertheless, according to the security firm McAfee, there were more than four million new Windows malware strains in the fourth quarter of 2011, compared to fewer than 50 that targeted Apple computers.

x.o.ware Launches ExoNetwork Security Products

The ExoNetwork is a small device that creates a personal cloud that provides secure access from an unencrypted wireless network.

    Network security specialist x.o.ware Inc. introduced the ExoNetwork, a secure exoskeleton for small and midsize business (SMB) networks that protects a local network from unauthorized access and extends security to anywhere users access the Internet, even over unsecure public networks.

The company also introduced the ExoKey, a USB appliance that provides encrypted remote access to everything connected to the ExoNetwork, even if a user is accessing it from an insecure location, such as a coffee shop hotspot.

The ExoNetwork is a small device that creates a personal cloud that provides the owner with control and secure access from any unencrypted wireless network, using the Virtual Private ExoNetwork server (VPEx) that is integrated into the ExoNetwork. Unlike other solutions in which users connect network storage devices and must learn a procedure for configuring their routers and VPNs, storage attached to the ExoNetwork is automatically and securely accessible from the ExoNetwork.

Features include a VPEx server that implements two-factor security with a unique 256-bit key for each user for hardware-based encryption processors employing 256-bit AES encryption, integrated network storage with seamless security and high-performance dual-WAN interfaces. The ExoKey features an encryption processor that can store encryption keys and perform encryption in hardware and the ability to perform all the encryption in real time. This helps ensure keys are never exposed to malware and performance is not impacted by the encryption/decryption that is normally done in software on the host computer.

The ExoKey also features registration with one or more VPEx servers so that it can be used in any computer without having to register each computer with the server. The ExoKey also provides portability to secure remote access, and it leaves no trace of encrypted sessions on the remote computers. The technology includes a socket for a microSD card, which can store encrypted user data, using keys that are never accessible to anything other than its on-board processor. The ExoKey can also be used by network administrators, not only to encrypt traffic to and from their network, but also to control access to the network. The VPEx server in the ExoNetwork can be configured to only grant access to devices using an ExoKey, ensuring that only registered users can traverse the network.

"We are entering a new era where wireless networks are more frequently unencrypted to fulfill their role in the mobile network; therefore, the security must be implemented at the source of the data (i.e., the end points)," said Ken Goldsholl, CEO of x.o.ware. "At x.o.ware, we are addressing one of the biggest obstacles to ubiquitous security—the user interface—which is typically so complicated that people don't enable security and are unable to fully utilize all of the capabilities of most network access devices. Our easy-to-use technology is solving this need by simultaneously providing advanced functionality, the highest performance in its price class and unmatched security."

 

Friday, February 24, 2012

There can only be one! New 'Highlander' virus steals EVERYTHING from your computer, even other viruses Read more: http://www.dailymail.co.uk/sciencetech/article-2102731/There-New-Highlander-virus-steals-EVERYTHING-viruses

Computer security experts are warning of a new virus which logs users' online activities, steals bank information, downloads malicious software and seizes control of your computer.
The virus, which has been christened Ainslot.L, even searches for competing viruses on the computer and removes them, earning it the nickname 'Highlander'.
Luis Corrons, technical director of computer security company PandaLabs, explained: 'It eliminates all competition, leaving the computer at its mercy.
'It reminds us of the popular ‘Highlander’ movies, "There can be only one".


 

Highlander starring Christopher Lambert as Connor MacLeod: A new virus has earned the nickname 'Highlander' because it eliminates other viruses on users computers

The Highlander film franchise chronicles an ages-old battle between immortal warriors, who are all competing to be the last left and gain the powers of all the others.
Ainscot.L is what is actually known as a 'bot', a piece of software that surreptitiously takes control of computers connected to the internet, adding them to its 'botnet'.

Indian hackers planning new offensives on Bangladeshi sites

While more than 26,000 Indian sites have been hacked by the Black Hat Hackers and their international supporting cooperating forces, Indian hackers are reported taking preparation for making a fresh attack on Bangladeshi sites within next 72 hours. It is learnt from various sources that, Indian hackers this time may try hacking into websites of Bangladeshi financial institutions as well as online banking system. They also are targeting websites of Bangladesh Police, Rapid Action Battalion and Bangladesh Armed Forces. Meanwhile Bangladeshi hackers have penetrated into more than 27 websites of various departments of Andhra Pradesh on late hours of Thursday. The hackers broke into one of the government servers and hacked those websites. The websites which were hacked include those of departments of commercial taxes, general administration department, horticulture, factories, gazette notifications and government orders.

The Indian officials said the hackers did not deface the pages or steal the information but only added additional pages with their message. State Information Technology Minister Ponnala Lakshmaiah said there was no loss of data. He told reporters that one of the 50 government servers was hacked and 27 websites supported by the server were affected. Indian government denied reports that the data relating to the state budget was stolen. The officials said none of the websites had data relating to 2012-13 budgets, which is to be presented in the state legislature Friday. Finance Minister Anam Ramnarayan Reddy denied that the website of finance department was hacked. He denied that the budget was leaked. The minister said the budget would be posted on the website only after it was presented in the budget.

Meanwhile as retaliation of India's silence in protecting the Israeli diplomats in New Delhi who were recently attacked, an Israeli hacker group named who got by name IDF-TEAM has already extended support towards Bangladeshi Black Hat Hackers. While Indian authorities are in greatest ever threat following the continuous hacking of their sites, it is learnt from various sources that, Indian intelligence has already warned the government of a "severe offensive" on their air traffic control system, which may cause "devastating fate for the airlines operating within Indian airports". Indian intelligence think, in case of such offensives by the Bangladeshi Black Hat Hackers and its international supporters, India's aviation industry will witness worst ever fate with possible death of hundreds of people. Sensing such threat from the Bangladeshi hackers, a team of Indian cyber specialists as well as members of the "Cyber Crime Prevention Team" and "Central Bureau of Investigation" has secretly arrived in Bangladesh on Thursday evening. This team came under various camouflages of businessmen and tourists. But a highly placed source hinted to Weekly Blitz that, Bangladeshi high commission in New Delhi, Tariq Karim as well as the foreign minister are fully aware of the arrival of these people, who will start working in identifying "strategic information" on the Bangladeshi hackers. The foreign ministry as well as telecommunication ministry are going to give "silent directives" to Bangladesh Telecommunication Regulatory Commission [BTRC] and Bangladesh Telecommunication Company Limited [BTCL] to "extend all out cooperation" to the Indian team. Some of the Bangladeshi IT experts are also reportedly collaborating with Indian authorities in identifying the information of the Bangladeshi Black Hat Hackers or its international partners. Front-ranking Bangladeshi IT expert Mustafa Jabbar recently said, "Hacking into Indian sites would bring dire consequence to Bangladesh". It is also learnt that a leading private television channel in Bangladesh, which has collaboration contract with an Indian TV channel is also going to start massive campaign against Bangladeshi Black Hat Hackers and its international partners. Such initiative of this channel was taken following specific request from New Delhi as well as some of the members of Indian intelligence network.

A group of alleged Bangladeshi hackers named 'Black Hat Hackers' and their counterparts such as Anonymous and others from a number of countries including Pakistan, Saudi Arabia, Indonesia, Malaysia and United Arab Emirates have already taken more than 26,000 websites in India, which includes some of the important sites such as the website of the Border Security Forces [BSF] etc. It is also learnt that Indian hackers have already hacked into five websites of various ministries in Bangladesh and are now making frantic bid in hacking into the sites of Bangladesh Telecommunications Company Limited [BTCL] as well as some other key websites. According to the alleged Bangladeshi hacker announcement on various social networking sites, the cyber war is continuing in protest of severe brutality and murder of Border Security Forces [BSF] on India on Bangladeshi civilians for decades. Chief of categorically ruled out the possibility of stopping such notoriety though Indian Home Minister as well as the Prime Minister made number of false promises assuring Bangladeshi government of stopping any form of acts by BSF which goes against basic norms of human rights as well as responsibility towards any neighboring country. Bangladeshi government did not confront such statement of the BSF chief. Though it was already reported in the media that hackers from Pakistan, Indonesia, Saudi Arabia, Malaysia and United Arab Emirates are cooperating with the Bangladeshi hackers, it is also learnt that, several hacker groups from China, Sri Lanka, CIS countries and few nations in the West have also joined hands with the Bangladeshi side. It is even assumed that hackers from some of the African countries may also join the Bangladeshi side in days. Bangladesh hackers are even trying to hack into Indian aviation and naval sites, which may cause severe damage to the country, if the hackers are successful in hacking into any of them even for some minutes. In similar way, account in Indian banks may be totally garbled by the hackers causing serious problem to Indian financial institutions.

Microsoft store in India hacked, usernames and passwords leaked



        If you were of the thinking that incidents of hacking were predominant abroad, then you're sorely mistaken; read on.

Reportedly, the latest victim, in a long series of hacks is the high-profile website of the Indian Microsoft Store. The store suffered a hack, carried out by a team of hackers called 'Evil Shadow Team'.

WPSauce first reported about the incident, and according to a statement in the report, "It has been hacked by EvilShadow team – 7z1&Ancker. From the tiny little flag and blog links, it looks like the hackers are from China. Their motivation is unknown at this point."


Mumbai: If you were of the thinking that incidents of hacking were predominant abroad, then you're sorely mistaken; read on.
Reportedly, the latest victim, in a long series of hacks is the high-profile website of the Indian Microsoft Store. The store suffered a hack, carried out by a team of hackers called 'Evil Shadow Team'.
WPSauce first reported about the incident, and according to a statement in the report, "It has been hacked by EvilShadow team – 7z1&Ancker. From the tiny little flag and blog links, it looks like the hackers are from China. Their motivation is unknown at this point."
In a later update to the report, it was learnt that the database of the Microsoft Store India had been exploited and the passwords were saved in plain text. Shortly after the website was compromised, the site was taken offline, indicating that Microsoft had seized control of their online store once more.

This comes in as bad news for those who have their usernames and passwords associated with the website, as it is now available for anyone to access. As a precautionary measure, those who have the usernames and passwords linked with this website should immediately change it. Also, those using the same password for any other web service should change it.

The website reports that when the online store was hacked, the site had the picture of the Guy Fawkes mask. This picture is usually associated with hacker group, Anonymous who are known for their high profile hacks on major corporations and government organizations the world over. The latest high profile victims of Anonymous were websites that were associated with the CIA as well as UN websites.