Thursday, December 10, 2009

Computer "Tip of the Day" 12-10-09

Software update locations
- - Patches and Updates
Windows & PC Office: http://update.microsoft.com and http://www.microsoft.com/security/updates/bulletins/200911.aspx

OS X: http://support.apple.com/kb/HT1338

Mac Office:
http://www.microsoft.com/mac/help.mspx?CTT=PageView&clr=99-0-0&ep=7&target=ffe35357-8f25-4df8-a0a3-c258526c64ea1033

iPhone/iPod: http://support.apple.com/kb/HT1414

iPod: http://support.apple.com/kb/HT1483

Windows Acrobat Reader:
http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows

OS X Acrobat Reader:
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh

Flash Player: http://get.adobe.com/flashplayer/

Firefox: http://www.mozilla.com/en-US/firefox/update/

Safari:
http://www.apple.com/downloads/macosx/apple/application_updates/safari.html

Opera: http://www.opera.com/

Chrome: http://googlechromeupdate.com/updates.html

Java: http://www.java.com/en/download/manual.jsp

iTunes:
http://www.tuaw.com/2009/09/22/itunes-9-0-1-now-in-software-update/

Symantec:
http://service1.symantec.com/SUPPORT/sharedtech.nsf/docid/2002021908382713

Norton:
http://www.symantec.com/business/security_response/definitions/download/detail.jsp?gid=n95

McAfee: http://www.mcafee.com/apps/downloads/security_updates/dat.asp

Kaspersky: http://www.kaspersky.com/avupdates

Sophos: https://secure.sophos.com/support/updates/

Panda: http://www.pandasecurity.com/homeusers/downloads/clients/

BitDefender:
http://www.bitdefender.com/site/view/Desktop-Products-Updates.html

Microsoft Security Essentials:
http://www.microsoft.com/security/portal/Definitions/HowToMSE.aspx

Wednesday, December 9, 2009

Computer "Tip of the Day" 12-09-09

BAD GUYS
HACKERS AND CRACKERS: Individuals who break into systems with malicious intent, destroy data, steal copyrighted software or confidential information, and perform other destructive or illegal acts with computers and networks.

VULNERABILITIES AND EXPLOITS: Your computer is vulnerable when a hardware or software flaw makes it possible to compromise its security and smooth operation. An exploit is a software application or program that takes advantage of a vulnerability to attack your system.

SNIFFING: Listening in on a network in order to capture and steal sensitive information.

SPOOFING: An attack in which a person or program you shouldn't trust masquerades as a person or program you do trust. For example, an attacker forges an email address in order to make you believe it's from someone you know and trust.

PHISHING: A widespread form of Internet fraud that aims to steal valuable information such as credit card and social security numbers and usernames and passwords, by sending you misleading emails designed to lure you into visiting phony or rigged websites.

IDENTITY THEFT: Cybercriminals steal identities by overhearing conversations on cellphones, intercepting faxes and emails, hacking into computers, employing telephone and email scams, and phishing the users of online services.

SOCIAL ENGINEERING: Deceptions by criminals posing as someone you trust in order to get you to divulge sensitive information.

Tuesday, December 8, 2009

Computer "Tip of the Day" 12-08-09

Information: - - Getting Connected
BROADBAND: Broad bandwidth networking. High-speed Internet connections, like DSL (Digital Subscriber Line), Cable Internet, and 3G (Third
Generation) cellular services.

DSL: Digital Subscriber Line. One of the most common ways to bring Internet to homes and small businesses over a telephone line at up to
12 Megabits/second.

CABLE OR CABLE INTERNET: The other most common way to bring Internet to homes over cable TV lines at speeds ranging from 1.5 to 50 Megabits/second.

FiOS: Fiber-Optic Service. An emerging technology that provides Internet to homes and offices over fiber-optic cables at speeds from 15 to 50 Megabits/second.

WI-FI: Wireless Fidelity. The most common kind of short-range wireless networking--about 300 feet--at speeds of up to 108 Megabits/second.

EDGE or EVDO: An older kind of wide-area wireless networking-like a whole city--based on first and second generation cellphone technology with speeds ranging from 300 to 400 kilobits/second.

3G: Third Generation cellular service. Enhanced wide-area wireless networking at speeds of up to 14 Megabits/second.

4G: Fourth Generation cellular service or WIMAX. An emerging wide-area networking technology that promises a range of 10 miles and speeds of up to 100 Megabits/second.

ETHERNET: A way of connecting computers to networks using a cable at speeds ranging from 10 to 10,000 Megabits/second.

FIREWALL: Software or hardware that prevents outsiders from accessing a computer or network.

ROUTER: A device that finds the best route for sending information between networks.

IP ADDRESS: Internet Protocol Address. Every computer on the Internet is identified by a unique set of numbers known as an Internet Protocol address--usually four numbers separated by dots, for example:
74.125.53.100. These numerical addresses are normally invisible to users and are translated into familiar Web addresses, like http://www.google.com.

Monday, November 30, 2009

Safety "Tip of the Day" 11-30-09

Avoiding Lead in Toys!
(Phoenix, Ariz. - Nov. 25, 2009) Arizona Attorney General Terry Goddard today urged parents and anyone buying toys for children this holiday season to take steps to avoid toys contaminated with potentially dangerous levels of lead.

Last year, the Arizona Attorney General’s Office reached a multi-state settlement with Mattel, Inc. and its subsidiary Fisher-Price, Inc., to protect children from lead in popular toys.
The agreement required Mattel to implement strict new limits on the amount of lead allowed in children’s toys, to notify the state Attorneys General if it finds that lead levels in any of its products exceed state or federal law, and to work with the Attorneys General to remedy any such violations.

Recently, the California Attorney General announced that the following products were found to have excessive lead in violation of California’s Safe Drinking Water and Toxic Enforcement Act of 1986:


- Kids Poncho sold by Walmart, 677 ppm.

- MSY Faded Glory Rebecca Shoes sold by Walmart, 1,331 ppm.

- Reversible Croco Belt sold by Target, 4,270 ppm.

- Dora the Explorer Activity Tote sold by TJ Maxx, 2,348 ppm.

- Paula Fuschia Open-Toed Shoes sold by Sears, 3,957 ppm.

- Disney Fairies Silvermist's Water Lily Necklace sold by Walgreens, 22,000 ppm.

- Barbie Bike Flair Accessory Kit sold by Tuesday Morning, 6,196 ppm.


Following Monday’s recall of more than one million cribs, Goddard also warns consumers to remain cautious when purchasing products for children and offered the following tips to anyone shopping for a children’s product or toy:

o Visit www.recalls.gov <http://www.recalls.gov/> before purchasing children’s products to ensure the item has not been recalled.

o Check the manufacturer’s suggested age restrictions.

o Visit the Consumer Product Safety Commission’s Web site, www.cpsc.gov <http://www.cpsc.gov/> , to sign up for regular recall notice emails.

If you believe you have been a victim of fraud, please contact the Attorney General's Office in Phoenix at 602.542.5763; in Tucson at 520.628.6504; or outside the Phoenix and Tucson metro areas at 1.800.352.8431. To file a complaint in person, the Attorney General’s Office has satellite offices throughout the state with volunteers available to help. Locations and hours of operation are posted on the Attorney General’s Web site at www.azag.gov <http://www.azag.gov/> . Consumers can also file complaints online by visiting the Attorney General's Web site.

Recall 2009.mp3

Tuesday, November 24, 2009

Security "Tip of the Day" 11-24-09

Microsoft Security Update
Microsoft is investigating new public reports of a vulnerability in Internet Explorer. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.
Our investigation so far has shown that Internet Explorer 5.01 Service Pack 4 and Internet Explorer 8 on all supported versions of Microsoft Windows are not affected, and that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6 and Internet Explorer 7 on supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 are affected.
The vulnerability exists as an invalid pointer reference of Internet Explorer. It is possible under certain conditions for a CSS/Style object to be accessed after the object is deleted. In a specially-crafted attack, Internet Explorer attempting to access a freed object can lead to running attacker-supplied code.
At this time, we are aware of no attacks attempting to use this vulnerability against Internet Explorer 6 Service Pack 1 and Internet Explorer 7. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.
We are actively working with partners in our Microsoft Active Protections Program (MAPP) and our Microsoft Security Response Alliance (MSRA) programs to provide information that they can use to provide broader protections to customers. In addition, we’re actively working with partners to monitor the threat landscape and take action against malicious sites that attempt to exploit this vulnerability.
Microsoft continues to encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Additional information can be found at Security at home.
Mitigating Factors:

Internet Explorer 8 is not affected.

Protected Mode in Internet Explorer 7 in Windows Vista limits the impact of the vulnerability.

By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone.

An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.

By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone. The Restricted sites zone helps mitigate attacks that could try to exploit this vulnerability by preventing Active Scripting and ActiveX controls from being used when reading HTML e-mail messages. However, if a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario.

Monday, November 23, 2009

Security "Tip of the Day" 11-23-09

Terry Goddard Offers Tips to Avoid Fraudulent Holiday Charitable Appeals
(Phoenix, Ariz. - Nov. 12, 2009) The holiday season is fast approaching, a time of year when many Arizonans give back to their communities. To help ensure a rewarding experience, Attorney General Terry Goddard recommends consumers take the following precautions when making charitable donations:

o Do not pay bills or invoices you have received from charities unless you know you have already made a commitment to support them.

o Be skeptical of anyone asking for a donation by requesting your credit card number or bank account information over the phone unless you already donate to that charity.

o Don’t be shy about asking what percentage of your donation will go directly to the charity versus what percentage will go toward administrative costs.

o Remember to ask for a receipt and a statement that the contribution is tax deductible.

o Call the Secretary of State's Office at (602) 542-4285 or visit their Web site, www.azsos.gov <http://www.azsos.gov/> , to make sure the charity is registered with the Secretary of State.
A charity that operates without such registration is violating the law and should be a red flag for consumers. Be aware, however, that registration with the Secretary of State does not ensure that all of the charity’s activities are legitimate.

Several Web sites, including www.charitynavigator.org <http://www.charitynavigator.org/>
, www.give.org <http://www.give.org/>
and www.guidestar.org <http://www.guidestar.org/> , provide information on the financial histories of numerous charities. These can be a useful starting point for consumers looking to research companies to which they are thinking of making donations.

The Attorney General’s Office offers numerous resources to help consumers stay safe this holiday season, including red flags for common holiday consumer scams and resources to make sure the gifts you give are safe and age appropriate. New information will be released each week throughout the holiday season and is available at Attorney General’s Web site, www.azag.gov <http://www.azag.gov/> .

If you believe you have been a victim of fraud, please contact the Attorney General's Office in Phoenix at 602.542.5763; in Tucson at 520.628.6504; or outside the Phoenix and Tucson metro areas at 1.800.352.8431. To file a complaint in person, the Attorney General’s Office has satellite offices throughout the State with volunteers available to help. Locations and hours of operation are posted on the Attorney General’s Web site at www.azag.gov <http://www.azag.gov/> . Consumers can also file complaints online through the Web site.

Friday, November 20, 2009

Computer "Tip of the Day" 11-20-09

Anyone in Health Net?
--Lost Hard Drive Holds Seven Years of Health Net Patient Data (November 19, 2009) A hard drive containing personal and medical information of 1.5 million Health Net customers was lost in May, but the loss was not disclosed
until earlier this week. The drive contains unencrypted Social
Security numbers and medical information dating back to 2002; the breach affects customers in Arizona, Connecticut, New Jersey, and New York.
Connecticut Attorney general Richard Blumenthal is investigating why the company waited six months to disclose the device's loss. Health Net, which is based in California, is also investigating the incident. The company will send out breach notification letters to affected customers the week of November 30.
http://www.wired.com/threatlevel/2009/11/healthnet
http://www.courant.com/health/hc-healthbreach1119.artnov19,0,1798384.story
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1374839,00.html
http://www.computerworld.com/s/article/9141172/Health_Net_says_1.5M_medical_records_lost_in_data_breach?source=rss_security
http://healthnet.tekgroup.com/press_kits.cfm?presskit_id=13

Thursday, November 19, 2009

Computer "Tip of the day" 11-19-09

What is spyware? Despite its name, the term "spyware" doesn't refer to something used by
undercover operatives, but rather by the advertising industry. In fact, spyware is also known as "adware." It refers to a category of software that, when installed on your computer, may send you pop-up ads, redirect your browser to certain web sites, or monitor the web sites that you visit. Some extreme, invasive versions of spyware may track exactly what keys you type.
Attackers may also use spyware for malicious purposes.

Because of the extra processing, spyware may cause your computer to become
slow or sluggish. There are also privacy implications:
* What information is being gathered?
* Who is receiving it?
* How is it being used?

How do you know if there is spyware on your computer?

The following symptoms may indicate that spyware is installed on your
computer:
* you are subjected to endless pop-up windows
* you are redirected to web sites other than the one you typed into your
browser
* new, unexpected toolbars appear in your web browser
* new, unexpected icons appear in the task tray at the bottom of your
screen
* your browser's home page suddenly changed
* the search engine your browser opens when you click "search" has been
changed
* certain keys fail to work in your browser (e.g., the tab key doesn't
work when you are moving to the next field within a form)
* random Windows error messages begin to appear
* your computer suddenly seems very slow when opening programs or
processing tasks (saving files, etc.)

Tomorrow see; How can you prevent spyware from installing on your computer.

Tuesday, November 17, 2009

Computer "Tip of the Day" 11-16-09

--Flash Flaw Could be Exploited to Upload Malicious Code to Websites (November 12, 13 & 16, 2009) A vulnerability in Adobe Flash can be exploited to upload malicious code to websites. The flaw could also affect other active content, such as JavaScript. Adobe says the flaw is "unpatchable" and that the problem lies in widely used web design practices that are not secure. Adobe director for product security and privacy Brad Arkin noted that "Sites should not allow user uploads to a trusted domain."
http://www.theregister.co.uk/2009/11/13/adobe_flash_wallop/
http://www.scmagazineus.com/researcher-finds-frighteningly-bad-adobe-flash-flaw/article/157734/
http://www.v3.co.uk/v3/news/2253145/researchers-warn-flash-issue
http://www.computerworld.com/s/article/9140768/Flash_flaw_puts_most_sites_users_at_risk_say_researchers
ISC: http://isc.sans.org/diary.html?storyid=7585

Monday, November 9, 2009

Computer "Tip of the Day" 11-09-09

Naked Windows 7 vulnerable to Malware if left in default state.
Sophos did some testing with a retail copy of Windows 7 installed on a clean system. Configuring it to follow the default settings for User Account Control (UAC), and leaving out any anti-Malware protection, Sophos discovered they were able to infect the system with Malware.
“Unfortunately, despite Microsoft's claims, Windows 7 disappointed just like earlier versions of Windows. The good news is that, of the freshest 10 samples that arrived, 2 would not operate correctly under Windows 7,” Sophos said.
UAC did block one sample, Sophos said, but failed to block anything else. “Lesson learned? You still need to run anti-virus on Windows 7,” wrote Sophos’ Chester Wisniewski.
Chester has a valid point, and the testing was done to prove that Windows 7, when left without layered security, is just as vulnerable as any other Windows operating system, including Vista, which had an infection rate 61.9-percent less than Windows XP according to Microsoft’s latest numbers in their Security Intelligence Report. The problem is that Vista has about a 20-percent market share, while XP is just over 70-percent.
"Chester Wisniewski's observations that, on a clean machine, Windows 7 became infected with eight out of the ten viruses tested sounds bad, but, in our opinion, this is indicative of the sheer volume of code that goes into operating systems today," said Richard Kirk, Fortify's European director.
"When you factor in the issue that there are often more than a million lines of code in a typical Windows application
, you begin to understand the scale of the problem for software developers.”
Kirk went on to say that since there are a range of free-to-use anti-Malware applications, as well as a plethora of low-cost pay-for IT security suites available, the problem is not a major one for most Windows 7 users.
The testing by Sophos, as mentioned, showed the exact infection level that can be expected when you use default settings and leave out layered security. Just because Windows 7 added in a good deal to make security easier to use and improved several elements, does not mean it is flawless or bulletproof.

Saturday, November 7, 2009

Thursday, November 5, 2009

Computer "Tip of the Day" 11-05-09

- - Windows Update. A yellow shield with a black exclamation point in the middle near the lower right corner of your desktop in the Notification area. This icon comes and goes. It appears when Windows Update is busy downloading or installing critical security updates intended to patch security holes and help keep your computer safe. When you touch the icon with your cursor, a bubble message tells you what Auto-Update is doing.
It may be busy downloading updates. Avoid logging off or shutting down your system until the download and installation are complete. If it has finished downloading updates, it may be waiting for the nod from you to install them. Click on the icon and tell it to go ahead. Or your computer may need to be restarted in order to complete the installation.
The sooner you restart your system, the sooner the updates will take effect.

Heads-up! The Auto-Update icon won't appear if Automatic Updating is turned off. Make sure Auto-Update is turned on and has the recommended
settings:
http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off

Friday, October 30, 2009

Computer "Tip of the Day" 10-30-09

--US-CERT Warns of Blackberry Spyware
(October 27, 28 & 29, 2009)
The US-CERT has issued a warning about a free spyware program called PhoneSnoop that can be used to bug BlackBerry phones. If the program is installed, one call from a designated number can turn the phones into listening devices, capable of eavesdropping on everything that happens nearby. The person who created the program said it was done as a proof-of-concept to demonstrate the vulnerabilities inherent in being careless with the phones. Users could be tricked into downloading PhoneSnoop onto their phones, or it could be installed by someone else with access to the device. US-CERT recommends that BlackBerry users use passwords to prevent other people from accessing the phones and to allow downloads only from trusted sources.
http://www.h-online.com/security/news/item/BlackBerry-spyware-alert-843992.html
http://news.cnet.com/8301-27080_3-10384179-245.html
http://www.securecomputing.net.au/News/159209,us-cert-warns-of-malware-attack-against-blackberry.aspx
http://www.us-cert.gov/current/index.html#blackberry_phonesnoop_application_used_to
[Editor's Note (Schultz): Smart phones and other mobile devices are increasingly becoming the target of malware writers. Several excellent talks on this subject were presented at the recent Black Hat Conference.]

Wednesday, October 28, 2009

Computer "Tip of the Day" 10-28-09

Free Software & File Sharing!
WORTH THE HIDDEN COSTS?
--Every day, millions of computer users share files online. File-sharing can give people access to a wealth of information, including music, games, and software. How does it work? You download a special software that connects your computer to an informal network of other computers running the same software. Millions of users could be connected to each other through this software at one time. Often the software is free and easily accessible.
--But file-sharing can have a number of risks. If you don't check the proper settings, you could allow access not just to the files you intend to share, but also to other information on your hard drive, like your tax returns, email messages, medical records, photos, or other personal documents. In addition, you may unwittingly download pornography labeled as something else. Or you may download material that is protected by the copyright laws, which would mean you could be breaking the law.
--If you decide to use file-sharing software, set it up very carefully. Take the time to read the End User License Agreement (EULA) to be sure you understand the side effects of any free downloads.

Tuesday, October 27, 2009

Computer "Tip of the Day 10-27-09"

--Cyber Thieves Stole US $40 Million from Small and Mid-Sized Businesses (October 26, 2009) The FBI says that since 2004, cyber thieves believed to be based in Eastern Europe have stolen US $40 million from small and mid-sized US businesses. The thieves use spam to infect the companies' computers with malware that steals online banking credentials, then transfer funds in amounts below the US $10,000 threshold that triggers alerts. The FBI is acknowledging the trend in the hope that companies become aware of the threat and put security safeguards in place. For instance, companies can protect themselves from cyber thieves by conducting online banking transactions on dedicated, locked-down machines. Larger banks have adopted anti-fraud technology to detect anomalous transaction patterns. The companies hardest hit by the fraud, meaning those least likely to recover funds, often use small and regional banks that lack the fraud detection mechanisms of the larger institutions. In some cases, very small banks have prevented fraudulent transactions because they know their customers personally and are alert to behavior that seems out of the character.
http://voices.washingtonpost.com/securityfix/2009/10/fbi_cyber_gangs_stole_40mi.html

Computer "Tip of the Day" 10-27-09

--Cyber Thieves Stole US $40 Million from Small and Mid-Sized Businesses (October 26, 2009) The FBI says that since 2004, cyber thieves believed to be based in Eastern Europe have stolen US $40 million from small and mid-sized US businesses. The thieves use spam to infect the companies' computers with malware that steals online banking credentials, then transfer funds in amounts below the US $10,000 threshold that triggers alerts. The FBI is acknowledging the trend in the hope that companies become aware of the threat and put security safeguards in place. For instance, companies can protect themselves from cyber thieves by conducting online banking transactions on dedicated, locked-down machines. Larger banks have adopted anti-fraud technology to detect anomalous transaction patterns. The companies hardest hit by the fraud, meaning those least likely to recover funds, often use small and regional banks that lack the fraud detection mechanisms of the larger institutions. In some cases, very small banks have prevented fraudulent transactions because they know their customers personally and are alert to behavior that seems out of the character.
http://voices.washingtonpost.com/securityfix/2009/10/fbi_cyber_gangs_stole_40mi.html

Tuesday, October 20, 2009

Computer "Tip of the Day 10-20-09"

--Postini Delivery Problems Vex Users
(October 13, 14 & 15, 2009)
Users of email security and archiving service Postini were frustrated last week when the service began experiencing significant delivery problems. Users were particularly angered by Postini's lack of communication about the problem. Postini was acquired by Google in 2007. The service scans emails for malware. The problem seems to have been caused by a combination of a bad email filter update and "a power-related hardware failure."
http://www.informationweek.com/news/showArticle.jhtml?articleID=220600859
http://news.cnet.com/8301-30684_3-10374344-265.html
http://www.theregister.co.uk/2009/10/15/google_postini_snafu/
http://www.computerworld.com/s/article/9139316/Postini_trouble_stymies_U.S._e_mail_users?taxonomyId=1

--Scareware Locks Apps on Infected PCs
(October 15 & 19, 2009)
A new variant of scareware has been detected that not only inundates users with exhortations to purchase phony antivirus software called "Total Security 2009," but that also locks users out of nearly all applications until they purchase the disreputable product. Once their PCs are infected with the malware, the only program users can open is Internet Explorer, so they can navigate to the site and make a purchase.
http://blogs.usatoday.com/technologylive/2009/10/new-twist-on-scareware-locks-up-your-pc.html
http://www.pcworld.com/article/173765/a_rogue_demands_a_ransom.html

Thursday, October 15, 2009

Computer "Tip of the DAy 10-15-09"

DATA SECURITY
--Maine Supreme Court to Decide Hannaford Liability (October 9 & 12, 2009) The Maine Supreme Court will decide whether or not retailers that fail to protect consumers' payment card data will be required to compensate those people for the time they spend correcting any problems that arise from a data security breach. Consumers are already covered for unauthorized charges under banks' zero-liability protection policies.
In this case, the court must decide if "time and effort alone, spent in a reasonable effort to avert reasonably foreseeable harm, constitute a cognizable injury under Maine common law." The case involves the breach at Hannaford Bros. in which millions of payment card numbers were compromised.
http://consumerist.com/5379157/maines-supreme-court-to-decide-if-consumers-should-be-compensated-for-hannaford-security-breach
http://www.wired.com/threatlevel/2009/10/hannaford/

Wednesday, October 7, 2009

Computer Tip of the Day "10-07-09"

You and Your Browser!
- - What exactly is a browser anyway?
Let's start with what it's not. A browser is not Google, not a search engine, not AOL, and not broadband. A browser is software that you use to see and hear what's available on the World Wide Web. (You can use a browser for other things, too, but let's stay with their more common uses for now.) Browsers take you to websites and webpages where you can read and send email, see images and movies, and listen to music. You can also download and upload files using your browser. Your browser allows you to navigate to information resources that are organized as URL's (Uniform Resource Locators) or web addresses. The major web browsers are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, and Opera.

- - Why do I need a browser to connect to the Internet? Why can't my computer just do it?
You need a browser to connect to the Internet because browsing is only one of many things that a computer can do. A browser is software that directs your computer to the Internet, interprets your requests, and translates them into the language used by all of the computers on World Wide Web. Your computer is simply hardware -- a machine that will follow instructions. Software supplies the instructions.

- - OK, so just HOW does my browser connect to the Internet?
Strictly speaking, it's your computer and its operating system that connect to the Internet, either by a wired or a wireless connection, such as Ethernet, Cable Internet or DSL (Digital Subscriber Line), or by Wi-Fi or wireless broadband. Your browser communicates with the operating system, and the operating system communicates with the Internet.

- - Why is there such a choice of browsers? What's the difference?
A browser, like all software, is a product, produced and marketed by people who want you to use it. Objective: To gain market share. It is estimated that 1.7 billion people are using the Internet worldwide in 2009. If you make a better browser, the world will beat a path to your website and download it, and your customer base could number in the hundreds of millions quickly. Anatomically speaking, all web browsers are about the same. They differ from one another in their "look and feel"-when, where, and how you click to make something happen. It's largely a matter of taste. All of the major browsers can use plug-in's and add-on's, like Flash Player for movies and Acrobat Reader for opening PDF files.

- - My computer came with a browser on it. Why would I want another one?
Microsoft includes Internet Explorer with Windows for the same reason that Apple includes Safari in OS X--so you will use it and they can command a greater share of the market. Web browsing is what most people do on a computer most of the time, and competition among browser makers is stiff. Back in 1990's the Mozilla Foundation produced the earliest browser, called "Mosaic," and later "Netscape." Today, Firefox is considered by some to be faster and more secure than Internet Explorer and Safari, while Google's Chrome and the Opera browser are attempts to provide a new look and feel for the browsing experience.

- - What exactly do people mean when they talk about web-based malware?
Malware is a catch-all term for thousands of varieties of computer viruses and worms. While viruses and worms are not new-we have all heard about computers getting infected by email and email attachments-websites emerged in 2009 as the primary vehicle for spreading of malware.
Browsers create a two-way communications channel between your computer and a website. If the site is infected or "dirty," malware may enter your computer without warning in a matter of seconds. That's web-based malware.

- - Why isn't my anti-virus or anti-spyware program enough to protect my computer from web-based malware?
There are two reasons. Anti-virus and anti-spyware work pretty much like vaccines. Just as no single vaccine can protect you against every strain of flu, no security program can protect your computer against every kind of malware. And just as new strains of flu emerge season after season, so too new kinds of computer viruses-as well as variants of old ones--crop up on a daily basis. Even if you have effective security software, the Bad Guys are always cooking up ways to beat it, like tricking you into downloading malware voluntarily by browsing to a dirty website or clicking on a rigged link that promises you something you want and delivers something else you don't want.

- - What DOES protect my computer from malware and other threats on the Web?
You are your first line of defense-you need to be aware of threats posed by browsing. But don't make the mistake of thinking that you can tell which websites are clean and dirty by how they look, who appears to own or run them, how often you have visited them without incident, or based on a recommendation from a friend or co-worker. What was a safe website or webpage yesterday may have been hacked overnight and now contain malware. Remember: You browse at your own risk. Your second line of defense is good-quality security software-including anti-virus, anti-spyware, and a two-way software firewall-and a hardware firewall.
Third, use key scrambling or anti-keylogging software that encrypts your keystrokes and helps prevent Bad Guys from getting a hold of sensitive information you enter on your computer. Fourth, keep your software updated and patched. (See Updates and Patches below.) If you suspect that your computer may be infected, call the support line of the manufacturer of your security software or of your computer, your ISP (Internet Service Provider) or contact your local computer support personnel or a computer consultant.

- - What should I look for when I am shopping for the right protection against malware?
Read reviews that compare the effectiveness, reliability, and ease-of-use of security software products. Get recommendations by calling the support line of the manufacturer of your computer or your Internet Service Provider, or by talking with your local computer support personnel or a computer consultant knowledgeable about security.
Many good-quality security software suites cost less than $100, so this is not a big budget item. Concentrate on quality, not on a $10 or $20 price difference. When considering freeware, keep in mind that if you have a problem, support may be hard to come by or simply non-existent.

Tuesday, October 6, 2009

Computer Tip of the Day "10-06-09"

"Dirty Websites" Pose Biggest Security Risk
The 100 most dangerous sites on the web are propagating an average of 18,000 different pieces of malware, according to leading security software maker Symantec. While 48 of the top 100 worst are adult-themed sites, others featured diverse topics, ranging from deer hunting and catering, to figure skating, electronics, and legal services. "We used to tell people if you stick with the ‘safe neighborhood’ you will be safe, and what we see from this list is that even if you stick to the safe neighborhood, it doesn't mean you are safe," said Symantec’s Dan Schrader. "Your own judgment doesn't tell you anything about the security practices of that site." Ken Pappas of Top Layer Security adds that "The list of most-offensive websites is changing and new websites are constantly being infected. This is not something like building a ten most-wanted for criminals at large. "Whether it's ten viruses or ten thousand doesn't matter; the point is, many people are going to what they believe is a legitimate and trusted website. They have no idea or warnings it will potentially put malware in the computer."

More information: http://www.scmagazineus.com/dirtiest-websites-host-average-18000-threats/article/146919/

http://safeweb.norton.com/dirtysites

Friday, October 2, 2009

Computer "Tip of the Day 10-02-09"

Security concerns about popup windows and other hacker tricks.

When connected to and using the Internet, do not respond to popup windows requesting that you to click "ok" for anything.

If a window pops up on your screen informing you that you have a virus or spyware and suggesting that you download an antivirus or antispyware program to take care of it, close the popup window by selecting the X in the upper right corner of the popup window. Do not respond to popup windows informing you that you have to have a new codec, driver, or special program for something in the web page you are visiting. Close the popup window by selecting the X in the upper right corner of the popup window.

Most of these popup windows are actually trying to trick you into clicking on "OK" to download and install spyware or other malicious code onto your computer.

Hackers are known to scatter infected USB drives with provocative labels in public places where their target business’s employees hang out, knowing that curious individuals will pick them up and take them back to their office system to "see what’s on them." What is on them is generally malicious code which installs a spy program or remote control program on the computer. Teach your employees to not bring USB drives into the office and plug them into your business computers (or take them home and plug into their home systems). It is a good idea to disable the "AutoRun" feature for the USB ports on your business computers to help prevent such malicious programs from installing on your systems.

Thursday, October 1, 2009

Computer "Tip of the Day 10-01-09"

Security concerns about web links in email, instant messages, social media, or other means.

For business or personal email, do not click on links in email messages. Recently, scams are in the form of embedded links in emails. Once a recipient clicks on the link, malicious software (for example, key stroke logging software) is installed on the user’s computer.
Don’t do it unless you know what the web link connects to and you trust the person who sent the email to you. It is a good idea to call the individual prior to clicking on a link and ask if they sent the email and what the link is for. Always hold the mouse pointer over the link and look at the bottom of the browser window to ensure that the actual link (displayed there) matches the link description in the message. (the mouse pointer changes from an arrow to a tiny hand when placed over an active link)

Wednesday, September 30, 2009

Computer "Tip of the Day 09-30-09"

- IMPORTANT - IMPORTANT - IMPORTANT - IMPORTANT - IMPORTANT -
--US-CERT Warns of Spam Pretending to be From IRS (September 25 & 28, 2009) The US Computer Emergency Readiness team (US-CERT) has issued an alert warning of a spam attack in which the messages are spoofed to appear to come from the US Internal Revenue Service (IRS) regarding underreported income. The messages encourage the recipients to open an attachment or click on a link to view their tax statement, but the attachment contains malware and the link leads to a malicious website. The IRS warns people not to open attachments in emails claiming to be from the agency. The malware used in this attack is the Zeus Trojan horse program, which is difficult to detect. Zeus is used to help cyber criminals steal money from bank accounts.
http://www.computerworld.com/s/article/9138527/IRS_scam_now_world_s_biggest_e_mail_virus_problem?source=CTWNLE_nlt_dailyam_2009-09-28
http://voices.washingtonpost.com/securityfix/2009/09/irs_scam_e-mail_could_be_costl.html
http://www.us-cert.gov/current/#malicious_code_spreading_via_irs

Tuesday, September 29, 2009

Computer "Tip of the Day 09-29-09"

IMPORTANT - IMPORTANT - IMPORTANT - IMPORTANT

Security concerns about popup windows and other hacker tricks.

When connected to and using the Internet, do not respond to popup windows requesting that you to click "ok" for anything.

If a window pops up on your screen informing you that you have a virus or spyware and suggesting that you download an antivirus or antispyware program to take care of it, close the popup window by selecting the X in the upper right corner of the popup window. Do not respond to popup windows informing you that you have to have a new codec, driver, or special program for something in the web page you are visiting. Close the popup window by selecting the X in the upper right corner of the popup window.
Most of these popup windows are actually trying to trick you into clicking on "OK" to download and install spyware or other malicious code onto your computer.
Hackers are known to scatter infected USB drives with provocative labels in public places where their target business’s employees hang out, knowing that curious individuals will pick them up and take them back to their office system to "see what’s on them." What is on them is generally malicious code which installs a spy program or remote control program on the computer. Teach your employees to not bring USB drives into the office and plug them into your business computers (or take them home and plug into their home systems). It is a good idea to disable the "AutoRun" feature for the USB ports on your business computers to help prevent such malicious programs from installing on your systems.

Friday, September 25, 2009

Computer "Tip of the Day 09-25-09"

Limit employee access to data and information, and limit authority to install software.


Use good business practices to protect your information. Do not provide access to all data to any employee. Do not provide access to all systems (financial, personnel, inventory, manufacturing, etc) to any employee. For all employees, provide access to only those systems and only to the specific information that they need to do their jobs.

Do not allow a single individual to both initiate and approve a transaction (financial or otherwise).
The unfortunate truth is that insiders – those who work in a business – are the source of most security incidents in the business. The reason is that they already are inside, they are already trusted, and they have already been given access to important business information and systems. So, when they perform harmful actions (deliberately or otherwise), business information, systems, and networks suffer harm.

To better protect systems and information, ensure that all employees use computer accounts which do not have administrative privileges. This will stop any attempt – automated or not – by employees to install unauthorized software.

Wednesday, September 23, 2009

Computer "Tip of the Day" 09-23

Require individual user accounts for each employee on business computers and for business applications.

Set up a separate account for each individual and require that good passwords be used for each account. Good passwords consist of a random sequence of letters, numbers, and special characters – and are at least 8 to 10 characters long.

To better protect systems and information, ensure that all employees use computer accounts which do not have administrative privileges. This will stop any attempt – automated or not – by employees to install unauthorized software. If an employee uses a computer with an administrative user account, then any malicious code that they activate (deliberately or by deception) will be able to install itself on their computer – since the malicious code will have the same administrative rights as the user account has.

Without individual accounts for each user, you may find it difficult to hold anyone accountable for data loss or unauthorized data manipulation.

Passwords which stay the same, will, over time, be shared and become common knowledge to an individual user’s coworkers. Therefore, passwords should be changed at least every 3 months.

Tuesday, September 22, 2009

Computer "Tip of the Day" 09-22

Train your employees in basic security principles.

Employees who use any computer programs containing sensitive information should be told about that information and must be taught how to properly use and protect that information. On the first day that your new employees start work, they need to be taught what your information security policies are and what they are expected to do to protect your sensitive business information. They need to be taught what your policies require for their use of your computers, networks, and Internet connections.

In addition, teach them your expectations concerning limited personal use of telephones, printers, and any other business owned or provided resources. After this training, they should be requested to sign a statement that they understand these business policies, that they will follow your policies, and that they understand the penalties for not following your policies. (You will need clearly spelled-out penalties for violation of business policies.)

Set up and teach "rules of behavior" which describe how to handle and protect customer data and other business data. This may include not taking business data home or rules about doing business work on home computers.
Having your employees trained in the fundamentals of information, system, and network security is one of the most effective investments you can make to better secure your business information, systems, and networks. You want to develop a "culture of security" in your employees and in your business.

Typical providers of such security training could be your local Small Business Development Center (SBDC), community college, technical college, or commercial training vendors.

Monday, September 21, 2009

Computer "Tip of the Day" 09-21

Secure your wireless access point and networks.

If you use wireless networking, it is a good idea to set the wireless access point so that it does not broadcast its Service Set Identifier (SSID). Also, it is critical to change the default administrative password. It is important to use strong encryption so that your data being transmitted between your computers and the wireless access point cannot be easily intercepted and read by electronic eavesdroppers. The current recommended encryption is WiFi Protected Access 2 (WPA-2) – using the Advanced Encryption Standard (AES) for secure encryption. See your owner’s manual for directions on how to make the above changes. Note that WEP (Wired-Equivalent Privacy) is not considered secure; do not use it for encrypting your wireless traffic.

Friday, September 18, 2009

Computer "Tip of the Day 09-18"

Control physical access to your computers and network components.

Do not allow unauthorized persons to have physical access to or to use of any of your business computers. This includes locking up laptops when they are not in use. It is a good idea to position each computer’s display so that people walking by cannot see the information on the screen.

Controlling access to your systems and networks also involves being fully aware of anyone who has access to the systems or networks. This includes cleaning crews who come into the office space at night to clean the trash and office space. Criminals often attempt to get jobs on cleaning crews for the purpose of breaking into computers for the sensitive information that they expect to find there. Controlling access also includes being careful about having computer or network repair personnel working unsupervised in office space on systems. It is easy for them to steal many gigabytes of information and walk out the door with it without anyone noticing anything unusual.

No one should be able to walk into your office space without being challenged by an employee. This can be done in a pleasant, cordial manner, but it must be done to identify those who do not have a legitimate reason for being in your offices. "How may I help you?" is a pleasant way to challenge an unknown individual.

Wednesday, September 16, 2009

Computer Tip of the Day "09-16"

Make backup copies of important business data/information.

Back up your data on each computer used in your business. Your data includes (but is not limited to) word processing documents, electronic spreadsheets, databases, financial files, human resources files, accounts receivable/payable files, and other information used in or generated by your business.

It is necessary to back up your data because computers die, hard disks fail, employees make mistakes, and malicious programs can destroy data on computers. Without data backups, you can easily get into a situation where you have to recreate your business data from paper copies and other manual files.

Do this automatically if possible. Many security software suites offer automated backup functions that will do this on a regular schedule for you. Back up only your data, not the applications themselves (for which you should have distribution CDs from your vendor). This automatic backup should be done at least once a week, and stored on a separate hard disk on your computer if not off line using some form of removable media. The hard disk should have enough capacity to hold data for 52 weekly backups (500GB should be sufficient). Remember, this should be done on each of your business computers. It is important to periodically test your backed up data to ensure that you can read it reliably. There are "plug and play" products which, when connected to your computer, will automatically search for files and back them up to a removable media, such as an external USB hard disk.

It is important to make a full backup once a month and store it away from your office location in a protected place. If something happens to your office (fire, flood, tornado, theft, etc) then your data is safe in another location and you can restore your business operations using your backup data and replacement computers and other necessary hardware and software. As you test your individual computer backups to ensure they can be read, it is equally important that you test your monthly backups to ensure that you can read them. If you don’t test your backups, you have no grounds for confidence that you will be able to use them in the event of a disaster or contingency.

If you choose to do this monthly backup manually, an easy way is to purchase a form of removable media, such as DVDs if you have a DVD writer or an external USB hard drive (at least 1000 Gigabytes capacity). On the hard drive, create a separate folder for each of your computers, and create 12 folders in each computer folder – one for each month. Bring the external disk into your office on the day that you do your monthly backup. Then, complete the following steps: connect the external disk to your first computer and make your backup by copying your data into the designated monthly folder; immediately do a test restore of a file or folder into a separate folder on your computer that has been set up for this test (to ensure that you can read the restored file or folder). Repeat this process for each of your business computers and, at the end of the process, disconnect the external drive. At the end of the day, take the backup hard drive to the location where you store your monthly backups. You may, when each of the monthly folders has been used, purchase more media for the following 12 months.

It is very important to do this monthly backup on each computer used in your business.

Sunday, September 13, 2009

Wow What a Month!! for Discover the Region.com

Wow What a Month.
Discover the region.com started off with our Birthday Bash, celebrating our first Birthday with many more to come. We have spent numerous hours on upgrading the DTR.com business directory listing. The new upgrades to the Global listing includes; being able to include 10 keywords, 2000 word Meta tags, 10 Meta tag words, the ability to attach your directory listing to any of the social media outlets (i.e. FaceBook, Linkedin, and Twitter). What does this mean to you? Increased branding exposure, Free SEO ( search engine optimization), social networking recognition, promotion and publicity for your business as your climate changes. Local, as well as national branding. A “Business Directory” that puts you in the driver seat to update, spotlight & promote.

This month I have also created word press blog pages that increase SEO and allows Discover the Region to maximize the internet to showcase, DTR clients, DTR resources for City and Local reference, & Discover the Region Publications in Dayton, Northeast Ohio & The West Valley –Phoenix.

I took the plunge and spent the day taking a class on social media sites. It was well worth my time and money.
Twitter facts: May 2009
Twitter had 24 million people visit (US)
60% are College educated or higher
79% make 30K or more
I have found tricks that make participating on the internet more time efficient. I will share the best one for me. Tweetlater.com allows you to spend an hour entering your tweet thoughts and schedule them for a number of days. You then have information going out consistently which builds your following. There are other tools you can use to accomplish scheduled tweets. This one is FREE.

Finally, I have spent time with entrepreneurs….. Providing counsel on the organization and creative steps necessary to transform their dreams into successful business realities. Entrepreneurs still have to put in the work, but with guidance from someone who has worked through these issues, missteps can be minimized and progress in the right direction increased.

I take a deep breath and reflect how grateful I am to be right here, right now. I can’t wait to see what is in store for this month.

Jodie Wilson
www.discovertheregion.com

Thursday, September 10, 2009

Computer Tip of the Day "09-10"

Patch your operating systems and applications.
All operating system vendors provide patches and updates to their products to correct security problems and to improve functionality. Microsoft provides monthly patches on the second Tuesday of each month. From time to time, Microsoft will issue an "off schedule" patch to respond to a particularly serious threat. To update any supported version of Windows, go to "Start" and select "Windows Update" or "Microsoft Update." Follow the prompts to select and install the recommended patches. Other operating system vendors have similar functionality. Ensure that you know how to update and patch any operating system you select.
For Microsoft Windows XP, select "Start", then "Control Panel", then "System", then "Automatic Updates". After that, set the day and time to download and install updates. Select "Apply" and click "OK".
For Microsoft Windows Vista, select "Start", then "Control Panel", then "Security", then "Turn Automatic Updating on or off". If the circle is marked which says "Install updates automatically (recommended)", check to see that the day/time tabs are set to "every day" and "11:00pm" or some other convenient time. If the circle is not marked which says "Install updates automatically (recommended)", then check the circle to activate automatic updates and select "every day" on the left tab, then select an appropriate time (11:00pm is fine) for the right tab. Then, towards the bottom of the window, check "Recommended Updates" and for "Update Service" check "Use Microsoft Update". Then click on "OK" at the bottom of the window and you are all set for automatic updates for your Windows Vista system.
Office automation software products such as Microsoft Office also need to be patched & updated on a regular basis. For Microsoft products, the patch/update process is similar to that of the Microsoft Windows operating systems. Other business software products also need to be updated regularly.

Friday, September 4, 2009

Computer Tip of the Day "09-04"

Install and activate software firewalls on all your business systems.
Install, use, and keep updated a software firewall on each computer system used in your small business.
If you use the Microsoft Windows operating system, it probably has a firewall included. You have to ensure that the firewall is operating, but it should be available.

To check the software firewall provided with Microsoft Windows XP, click on "Start" then "Settings", then "Control Panel", then "Windows Firewall". Select the "General" tab on the top of the popup window. You can see if the firewall is on or off. If it is off, select "On-Recommended" in the hollow circle next to the green check-mark icon.

To check the software firewall provided with Microsoft Windows Vista, click on "Start" then "Control Panel" then "Windows Firewall." If your firewall is working, you should see a message that "Windows Firewall is helping to protect your computer." If not, click on ‘Turn Windows Firewall on or off" (in the upper left corner of the window) and select "Turn on firewall."

When using other commercial operating systems, ensure that you fully review operations manuals to discover if your system has a firewall included and how it is enabled.

There are commercial software firewalls that you can purchase at a reasonable price or free that you can use with your Windows systems or with other operating systems. Again, internet searches and using online/trade magazine reviews and references can assist in selecting a good solution.

As recommended in Section 2.1, ensure that your home systems and your employees’ home systems have firewalls installed and operational on them.

It is necessary to have software firewalls on each computer even if you have a hardware firewall protecting your network. If your hardware firewall is compromised by a hacker or by malicious code of some kind, you don’t want the intruder or malicious program to have unlimited access to your computers and the information on those computers.

Wednesday, September 2, 2009

ALL AMERICAN EYEGLASS REPAIR
because you need to see now!

Located on the Southwest corner of 35th Ave. and Dunlap
Tel: 602-589-0401
Have glasses that need fixing and can not find an inexpensive repair shop?
I was in and out in 5 minutes.
I was impressed by the professional service.

Tuesday, September 1, 2009

Computer Tip of the Day "09-01"

Provide Security for your Internet Connection.

Most businesses have broadband (high speed) access to the Internet. This may be from a local cable TV company or a local telephone company. It is important to keep in mind that this type of Internet access is always "on." Therefore, your computer - or any network your computer is attached to - is exposed to threats from the Internet on a 24 hour a day/7 day a week basis.

For broadband Internet access, it is critical to install and keep operational a hardware firewall between your internal network and the Internet. This may be a function of a wireless access point/router or may be a function of a router provided by the Internet Service Provider (ISP) of the small business. There are many hardware vendors which provide firewall wireless access points/routers, firewall routers, and firewalls.

As recommended in Section 2.1, ensure that your and your employees’ home systems are protected by a hardware firewall between your/their system(s) and the Internet.

For these devices, change the administrative password upon installation and regularly thereafter. It is a good idea to change the administrator’s name as well. The default values are easily guessed, and, if not changed, may allow hackers to control your device and thus, to monitor or record your communications (and data) to/from the Internet.

Do I Mean What I Say?

Do I say what I mean? Do I mean what I say?This month at my ABWA luncheon our business introductions were switched up. We were paired up and the goal was to introduce the other persons business, promote their unique attributes and possibly come up with a tag line. We spent 15 minutes with another member answering 5 questions. It is a wonderful learning exercise. Checking in and making sure what you are trying to convey about your business is actually coming across.My partner was ReNay Mushier, owner of The Personal Touch Massage. I thought I would share what ReNay shared about DiscoverTheRegion.com. I loved what ReNay put together for me.I'd like to introduce Jodie Wilson.She offers Resource information & Directory Ad Space at DiscoverTheRegion.com
Jodie's website was established to compliment the Ohio based publication that has taken root in our Phoenix West Valley, which promotes Economic Development, Tourism and Relocation to our beautiful area.
Her burning desire is to learn more about internet lingo, website design and anything computerized.
Jodie enjoys finding the hidden treasures and meeting people.
Jodie would enjoy being introduced to people who recognize the benefit of showcasing region’s and what they have to offer both residents and visitors, alike.
Did you know....for as little as $20 a month, Jodie can help you take “the Search out of Research” through discovertheregion.comIf you are not part of a networking group that you can practice this exercise, ask some of your colleges to answer these 5 questions and have them give you an introduction, just to check in with what message you are promoting about your business.
1. Your Name:
2. Business Name:
3. What do you want to learn this year?
4. What do you enjoy most in your business?
5. What client would you most like to meet?

Jodie Wilson
www.discovertheregion.com

Monday, August 31, 2009

Computer Tip of the Day "08-31"

The "absolutely necessary" actions that a small business should take to protect its information, systems, and networks.
These practices must be done to provide basic information security for your information, computers, and networks.
For the next ten posts by me I will cover the necessary actions mentioned above.

Install, use (in "real-time" mode, if available), and keep regularly updated anti-virus and anti-spyware software on every computer used in your business.
Many commercial software vendors provide adequate protection at a reasonable price and some for free. An internet search for anti-virus and anti-spyware products will show many of these organizations. Most vendors now offer subscriptions to "security service" applications, which provides multiple layers of protection (in addition to anti-virus and anti-spyware protection).
You should be able to set the antivirus software to automatically check for updates at some scheduled time during the night (12 Midnight, for example) and then set it to do a scan soon afterwards (12:30am, for example). Schedule the anti-spyware software to check for updates at 2:30am and to do a full system scan at 3:00am. This assumes that you have an always-on, high-speed connection to the Internet. Regardless of the actual scheduled times for the above updates/scans, schedule them so that only one activity is taking place at any given time.
It is a good idea to obtain copies of your business anti-virus software for your and your employees’ home computers. Most people do business work at home now and then. You want their home systems to be protected, too.

Tuesday, August 25, 2009

Discover the Region Celebrates 1st Birthday

Celebrating Our 1st Birthday

2008-2009 has been a year full of FIRST achievements. We have beaten the odds, and DTR is growing strong. Our achievements are a direct result of the support we receive from all of you, Cities, Coalitions, Large and Small business, personal relationships and of course our families.

Let's count the FIRST's
Creating and operating a business
DTR.com becomes an LLC (Limited Liability Corp)
Radio show guest spot
2 million organic hits to the website
3 Updates to create a business directory that sets the standard
TV feature for a non-profit group
Showing up on the front of a newspaper
Creating and editing a monthly e-newsletter
Recruiting Expert Bloggers to share their wisdom, Thank you Dr. Bret, Dr. Peggy, Becky, Art, Cindy, Kas, Peters and Brown, Gail & Sharon.
Writing published articles
Showing up to work day after day with anticipation of what the day ‘s events will bring
Being involved in a community opportunity that rescued, delivered and fed hundreds of families fresh produce
DTR has been instrumental in helping many business market, brand and grow in a tough economy.
DTR has learned so many things, about so many industries, from so many people, especially my mentors Eve Georgiou and Steve Feaster
Creating a website from a basic idea with the guidance and patience of my web-Guru Rick Rome
Managing Data, content, building increased awareness of Discover The Region, our Business partners & Clients
Becoming a Social Networking Butterfly....Tweeting, Face booking, Linked-in among my Favs.

These are just a few things that DTR can say have been goals accomplished. DTR new goals can be summed up as “The sky is the limit and driven by you”. This celebration is not possible without each and every person who has participated with the 6th issue of Discover the Dayton Region magazine, and the inaugural issues of Northeast Ohio and Phoenix West Valley, as well as DiscoverTheRegion.com.

Thank you from all of us to all of you. DTR is excited to STEP up, (create the buzz), SHOW up (Participate), and Celebrate (people, places and business that make this journey so great).

August Meeting Notice

Thursday, August 20, 2009

Security Tip 08-20

--Mozilla Issues Firefox Update
(August 4, 2009)
On Monday, August 3, Mozilla issued an update for Firefox to address a number of critical security flaws. One of the vulnerabilities allows attackers to spoof SSL certificates. Users are urged to upgrade to Firefox 3.5.2 as soon as possible. Other vulnerabilities addressed in the update include a memory corruption flaw, a heap overflow flaw and a privilege escalation flaw. The SSL flaw also affects Mozilla's Thunderbird, SeaMonkey and NSS products; fixes for those products are likely to be available soon.
http://www.theregister.co.uk/2009/08/04/firefox_critical_update/
http://www.h-online.com/security/Firefox-3-5-2-and-3-0-13-fix-security-vulnerabilities--/news/113922
http://blog.mozilla.com/blog/2009/08/03/firefox-3-5-2-and-3-0-13-security-updates-now-available-for-download/

MALWARE
--Blue Screen of Death Scareware
(August 4 & 5, 2009)
A new scareware variant exploits the pit-of-the-stomach feeling that accompanies the Windows Blue Screen of Death. The malware displays what appears to be the blue screen indicative of a Windows system crash along with an alert window urging users to download software to fix the alleged problem. The phony antivirus package is called SystemSecurity.
http://blogs.zdnet.com/security/?p=3912
http://www.theregister.co.uk/2009/08/04/bsod_scareware/

Tuesday, August 11, 2009

Computer Tip of the Day "08-11"

Managing E-mail while out of the Office.
Even when you're away from the office for a vacation, your e-mail doesn't take a break. If you don't have a strategy for handling these incoming messages, people may be expecting you to respond, which could be a problem. Fortunately, several easy strategies can help you handle e-mail when you're away.
Jim Boyce, author of Microsoft Office Outlook 2003 Inside Out by Microsoft Press, offers several ways to tame e-mail while you're away. If it's important to stay connected to the office while you're out, you can use several methods to access your inbox remotely. This makes it easy to respond to or manage e-mail messages when you're away from your computer at work.
Jim Boyce also explains how to set up your e-mail to respond to senders automatically with a reply message that you create. This keeps your colleagues from wondering why you haven't responded, and lets them know who to contact in your absence. Learn how to use the Out of Office Assistant in Microsoft Office Outlook 2003. Also, see how to create a custom rule that turns the Out of Office Assistant on or off at your convenience.
Using the information that follows, you can learn to manage e-mail while you're away, instead of letting it manage you.
Access your mailbox remotely (Article)Outlook expert Jim Boyce explains the different ways to access e-mail when you're away from your computer at work.
Manage e-mail from outside the office with Outlook (Article)Jim Boyce provides different strategies for using Outlook to handle your incoming e-mail messages while you're away.
Automatically reply to incoming messages while out of the office (Article)Learn how to activate the Out of Office Assistant in Outlook.
About managing your Inbox automatically while out of the office (Article)See how you can use rules to customize the way that Outlook handles e-mail messages while you're out of the office.
Turn an Out of Office Assistant rule on or off (Article)Control the rules you apply to the Out of Office Assistant.

Thursday, August 6, 2009

Computer Tip of the Day "08-06"

- - Information-Stealing Phishing Email Targets Chase Customers. The Consumer Protection Board (CPB) of New York State has issued a warning to Chase Bank customers that they could be attacked by a phishing scam involving emails that seek personal information on the pretext of upholding new security measures. Customers receive a phony email that asks them to fill in a form with details including personal identifiable information. Citing fresh security measures ostensibly launched by Chase, the fake email explains that it is important that recipients complete the form. Additionally, it displays a web-link and asks the recipients to click on the link. However, the link leads to a fake website where personal information is stolen from the consumers.
More information:http://www.consumer.state.ny.us/pressreleases/2009/july012009.htm

- - Work-At-Home Scams Make Their Way to Twitter Through tweets, email and websites. Job hunters are being told that they can make lots of money from the comfort of home using Twitter, and falling prey to Twitter-based job scams. The Better Business Bureau warns that although the large print for such offers may promise big returns, the fine print can cost them every month.
More information:
http://www.sanantonio.bbb.org/article/work-at-home-scams-make-their-way-to-twitter-11445

Wednesday, August 5, 2009

Computer Tip of the Day "08-05"

Tips for Wi-Fi Security at Home
Many people rush through setting up wireless home networks to get their Internet connectivity working as quickly as possible. While this is understandable, it is also risky because unless properly secured, wireless networks are a security problem waiting to happen. Today's Wi-Fi networking products don't always help the situation either. Their security features are complicated and can be time-consuming to set up correctly. You may wish to retain the services of a qualified technician to help you be sure the job gets done right. Here are some tips for how you can improve the security of your home wireless network. Next month we'll provide tips for improving Wi-Fi security while on the road.

- - Replace that old access point. If your access point is older than 2 or 3 years, it probably doesn't include the latest security protocols.
At a cost of $75 or less, an up-to-date access point is cheap insurance against having your computers broken into.

- - Change the default passwords on your wireless access point. The default passwords are simple, often posted on the manufacturer's website, and well-known to hackers. Change them immediately, and use strong passwords.

- - Use WPA2 security. Older wireless access points offer WEP and WPA security which provide only weak and unreliable security. Verify that your wireless access point supports WPA2 (Wi-Fi Protected Access, version 2). If it does not have WPA2, don't use it. Get another one that does.

- - Change the default SSID. Wireless access points use a network name called the SSID (service set identifier). Manufacturers ship their products with the same SSID. While knowing the SSID does not by itself allow a hacker to break into your network, it is a start. More importantly, operating your access point with the default SSID suggests that security has not been handled well, and that encourages hacking.

- - Do not Auto-Connect to open Wi-Fi networks. Connecting to an open Wi-Fi network, such as a free, public wireless hotspot or your neighbor's wireless access point, exposes your computer to security risks. Most computers have a setting which will allow these connections to happen automatically without notifying you. Make sure auto-connect is shut off.

- - Enable the hardware firewall on your wireless access point. If your access point does not have a hardware firewall, don't use it. Get another one that does.

- - Position your access point carefully. It is normal for Wi-Fi signals to leak out through walls of your home. While a small amount of signal leakage is not a problem, the further the signal spills out into the neighborhood, the easier it is for others to pick it up. That is the first step toward someone gaining access to your wireless access point without your permission. Position your access point near the center of your home, rather than near a window or an outside wall.

- - Turn off your access point if you aren't using it. If it's not turned on, hackers can't break in.

- - If you don't feel confident about the security of your wireless access point, don't use it. Get advice and answers to your questions from a computer consultant knowledgeable about wireless security.

More information:
http://arstechnica.com/security/news/2008/04/wireless-security.ars

Wednesday, July 29, 2009

Computer Tip of the Day "07-29"

Here is something to be very carefull about if you have children who download music.
--Summary Judgment in Downloading Undermines Defense (July 27, 2009) Opening arguments are set to begin on Tuesday, July 28 in the filesharing case against a Boston University student. Joel Tenenbaum's defense rested on his assertion of fair use, a defense rejected by US District Judge Nancy Gertner on Monday morning when she granted RIAA"s request for summary judgment on the issue of fair use. The Recording Industry Association of America (RIAA) is suing Tenenbaum for 30 recordings he allegedly made available for downloading through the Kazaa filesharing network; he faces up to US $150,000 for each recording if he is found guilty of making available for illegal download. The RIAA says it detected a total of about 800 songs in Tenenbaum's open share folder in 2004. The RIAA has said it is moving away from suing illegal downloaders, instead looking to partner with ISPs to help stem the practice.
http://www.wired.com/threatlevel/2009/07/riaa-file-sharing-trial-starting/
http://arstechnica.com/tech-policy/news/2009/07/judge-rejects-fair-use-defense-as-tenenbaum-p2p-trial-begins.ars

Tuesday, July 28, 2009

Computer Tip of the Day "07-28"

Microsoft and Apple Security Updates!
Microsoft and Apple provide free security updates for their software products.
Windows: Microsoft issues patches for all Microsoft products on the second Tuesday of each month as well as out-of-cycle patches on any day of the month. The next scheduled release date is July 14th. This is a good occasion to check manually, a practice that you should follow once every two weeks, to make sure all of the updates have been installed.
More information: http://www.microsoft.com/athome/security/default.mspx
OS X: Updates are issued frequently, and their contents may differ depending on which processor is in your Mac (PPC or Intel).
More information: http://support.apple.com/kb/HT1338
iPhones & iPods: Must be updated manually: http://docs.info.apple.com/article.html?artnum=305744
http://support.apple.com/kb/HT1483

Lets Thank Jackie for the meeting August announcement.

Friday, July 24, 2009

August Meeting Notice

Computer Tip of the Day "07-24"

Here are a few things to watch for!
Friend Stranded in Foreign Country Scam Emails
You receive an email from a friend or colleague claiming that he or she is stranded in a foreign country and desperately needs your help to get home. The email originates from the friend's real email account and may even include the same email signature that your friend usually uses when emailing you. The emails can be a clever scheme by Internet criminals designed to trick people into sending them money. Be wary of any email that you receive that asks you to wire money, even if the message appears to come from a friend.
More information: http://www.hoax-slayer.com/stranded-scam.shtml
Enter your PIN In Reverse to Call Police?
This spam email claims that if criminals force you to withdraw money from an ATM, entering your PIN in reverse will automatically alert police. The technology that makes this possible exists, but banks have not implemented it. If you are ever forced to withdraw money from an ATM against your will, co-operate fully and let law-enforcement pursue the matter. There is little chance the reverse-PIN technology will be installed.
More information: http://www.hoax-slayer.com/reverse-pin-ATM.shtml
Web Sites Offer Bogus Swine Flu Products
The U.S. Food and Drug Administration (FDA) released another warning about bogus flu products that are targeting consumers via websites. The FDA has issued more than 50 warning letters to offending websites, and 66% of those have removed the offending claims or products. Examples include: a shampoo that claimed to protect against the swine flu virus, a dietary supplement that claimed to prevent infants and young children from contracting swine flu, a "new" supplement that claimed to cure swine flu infection in 4-8 hours, a spray that claimed to leave a layer of ionic silver on your hands that killed the virus, and several tests to detect the virus not approved by the FDA.
More information: http://www.newsinferno.com/archives/6935

Thursday, July 23, 2009

Computer Tip of the Day "07-23"

Malware Targets Macs and PC’s Alike
Security company Sophos has Internet users on the alert for booby-trapped websites. Sophos has identified two new malware attacks that target Mac OSX with the malware OSX/Jahlav-C and OSX/Tored-Fam. Mac users visiting a rigged site receive a pop-up message that indicates a "Video ActiveX Object" needs to be installed. Users who follow the instructions end up with an infected Mac. Windows users are equally vulnerable. The booby trap identifies visitors’ operating systems (whether the web browser is running on Mac OS X or Windows) and implants malware specifically designed for PC’s.
More information: http://www.spamfighter.com/News-12607-Sophos-Identified-Porn-Site-Malware-Targeting-Mac-Users.htm

Phony Anti-Virus Program Takes Aim at Microsoft’s MSRT
Security researchers at Computer Associates are warning about a newly unleashed fake anti-virus program that pretends to be Microsoft’s MSRT (Malicious Software Removal Tool). A fake anti-virus planted on a user’s computer displays a message that says that Microsoft's MSRT has been installed and the user needs to click on the message so that the scanning process can start. Pressing the "Finish" button causes another window named "OEM Purchase Center" to appear that offers lifelong licenses at discounted prices for products like McAfee Total Protection 2009, Norton SystemWorks 2009, Norton Internet Security 2009, and Norton 360. The "licenses" are not genuine. When users try to cancel out of the window, another bogus warning will display insisting that they purchase a license in order to protect their computers.
More information: http://www.spamfighter.com/News-12609-Phony-Antivirus-Poses-as-Microsoft-MSRT.htm

Tuesday, July 21, 2009

Computer Tip of the Day "07-22"

The Dark Side of Social Networking
11-Be wary if a new online friend wants to meet you in person. Do some research about them. If you decide to meet them, be smart about it: meet in a public place, during the day, accompanied by friends you trust.
12-Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, report it to the police and to the operators of the social networking site. You could end up preventing someone else from becoming a victim.

Friday, July 17, 2009

Computer Tip of the Day "07-17"

"The Dark Side of Social Networking"

7-Post only information that you are comfortable with others seeing — and knowing — about you. Many people will see your page or postings, including the people who will be interviewing you for a job five years from now.
8-Remember that once you post information online, you can’t take it back. Even if you delete the information from a site, older versions are stored on other people’s computers and may be archived for years by Web search services.
9-Think hard before posting your photo. It can be altered and broadcast in ways you may not be happy about. If you do post one, ask yourself whether it’s one you’d include in your professional resume. Posting pictures of children invites exploitation and could expose them to real-world danger.
10-Flirting with strangers online could have serious consequences. Some people lie about who they are; you never really know whom you’re dealing with.
Come back Monday for the rest of the story.

July meeting notice

Tuesday, July 14, 2009

Computer Tip of the Day "07-14"

"The Dark Side of Social Networking" (cont.)

3-Don't click on shortened (or "condensed") URL's, like those created by TinyURL and Bit.ly. There's no telling where these links lead to, and that makes it easy to funnel you to malicious websites. Watch out for "misspelled" links, like www.yuotube.com. Could be a typo or a trick.

4-Keep control over the information you post. Consider restricting access to your page or postings to a select group of people, like friends, members of your team, your community groups, or your family.

5-Keep your information to yourself. Don’t post your full name, or any personal information about yourself or about anyone else. Be cautious about posting information that could be used to identify you or locate you offline, such as where you work or work-out.

6-Make sure your screen name doesn’t say too much about you. Don’t use your name, your age, or your hometown. Even if you think your screen name makes you anonymous, it doesn’t take a genius to combine clues and figure out who you are and where you can be found.

Monday, July 13, 2009

Computer Tip of the Day "07-13"

The Dark Side of Social Networking

The openness of these sites is an invitation to the Dark Side. No email verification is required, for example, when new users set up a Twitter account. It's hard to imagine an easier system in which to create counterfeit accounts. Social networking sites rely on a username and a password for security, which means that anyone who finds out your username and password can gain access to your account, assume your online identity, use it mischievously or maliciously, and leave you with little, if any, control over the situation. Until social networking site security evolves with time and improves by necessity, here are 12 Tips for Safer Social Networking.
1- Think about how a social networking site works before deciding to join it.
Some will allow only a defined community of users to access posted content; others allow anyone and everyone to view postings. Don’t join any social network that asks you to share your address book or contacts.
2- Always think before you click.
Be wary of visiting the blog or webpage of other members because that other "member" may be a scammer, whose blog or webpage has been rigged to deliver a drive-by download of malware to your computer. If you think you have clicked on the wrong thing, contact your local computer support staff, your Internet Service Provider, or a computer consultant knowledgeable about security.
More tips tomorrow!

Thursday, July 9, 2009

Computer Tip of the Day "07-09"

-The Dark Side of Social Networking -

If you are not already engaging in social networking, statistics indicate you will be soon. Visits to social networking sites now account for 10% of the total time people spend on the Internet, according Nielsen Online. Two-thirds of Internet users in the U.S., Europe, Brazil and Australia visit social networking or blogging sites. Internet users total almost 156 million in the U.S. alone. Add in over 29 million in the United Kingdom and over 25 million in Brazil, and the numbers are just too large for the Bad Guys to ignore.
Ordinary Internet users have fallen in love with social networking. While the amount of time users spent on MySpace decreased from April 2008 to April 2009, the use of Facebook increased by 700% and of Twitter by 3,700% during the same period. Cybercriminals love social networking sites, too, because they have to remain easily accessible in order to grow their memberships. That means social networkers are in effect attending an open party where just about everybody is welcome, and who knows if anybody is watching the door.

Tomorrow I will continue with more information on Social Networking.

Thursday, July 2, 2009

Happy Independence Day 2009




http://www.nccs.net/
to read the Constitution of
the United States of America.



Monday, June 22, 2009

Sunrise Business Builders Promo Film

Click on the link to watch the Sunrise Business Builders promo.

A flash player is required.

http://xtranormal.com/watch?e=20090627195038391

Friday, June 19, 2009

Computer Tip of the Day "06-19"

Be very careful when downloading music!!!
--Jammie Thomas-Rasset Ordered to Pay US $1.92 Million in Music Downloading Case (June 18 & 19, 2009) On Thursday, a federal jury ruled that Minnesota mother Jammie Thomas-Rasset downloaded music files in "willful violation" of copyright law. The jury awarded the Recording Industry association of America
(RIAA) US $80,000 for each song Thomas downloaded, or US $1.92 million.
This is the second trial for Thomas-Rasset; the judge presiding at the first trial declared a mistrial because he said the instructions given to the jury had been incorrect. That trial had ended with a fine of US $9,250 for each of the 24 songs, a total of US $220,000.
http://www.crn.com/software/218100291;jsessionid=IWBPIKJBSN5BSQSNDLPSKH0CJUNN2JVN
http://www.pcmag.com/article2/0,2817,2349029,00.asp
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9134571