Wednesday, July 29, 2009

Computer Tip of the Day "07-29"

Here is something to be very carefull about if you have children who download music.
--Summary Judgment in Downloading Undermines Defense (July 27, 2009) Opening arguments are set to begin on Tuesday, July 28 in the filesharing case against a Boston University student. Joel Tenenbaum's defense rested on his assertion of fair use, a defense rejected by US District Judge Nancy Gertner on Monday morning when she granted RIAA"s request for summary judgment on the issue of fair use. The Recording Industry Association of America (RIAA) is suing Tenenbaum for 30 recordings he allegedly made available for downloading through the Kazaa filesharing network; he faces up to US $150,000 for each recording if he is found guilty of making available for illegal download. The RIAA says it detected a total of about 800 songs in Tenenbaum's open share folder in 2004. The RIAA has said it is moving away from suing illegal downloaders, instead looking to partner with ISPs to help stem the practice.
http://www.wired.com/threatlevel/2009/07/riaa-file-sharing-trial-starting/
http://arstechnica.com/tech-policy/news/2009/07/judge-rejects-fair-use-defense-as-tenenbaum-p2p-trial-begins.ars

Tuesday, July 28, 2009

Computer Tip of the Day "07-28"

Microsoft and Apple Security Updates!
Microsoft and Apple provide free security updates for their software products.
Windows: Microsoft issues patches for all Microsoft products on the second Tuesday of each month as well as out-of-cycle patches on any day of the month. The next scheduled release date is July 14th. This is a good occasion to check manually, a practice that you should follow once every two weeks, to make sure all of the updates have been installed.
More information: http://www.microsoft.com/athome/security/default.mspx
OS X: Updates are issued frequently, and their contents may differ depending on which processor is in your Mac (PPC or Intel).
More information: http://support.apple.com/kb/HT1338
iPhones & iPods: Must be updated manually: http://docs.info.apple.com/article.html?artnum=305744
http://support.apple.com/kb/HT1483

Lets Thank Jackie for the meeting August announcement.

Friday, July 24, 2009

August Meeting Notice

Computer Tip of the Day "07-24"

Here are a few things to watch for!
Friend Stranded in Foreign Country Scam Emails
You receive an email from a friend or colleague claiming that he or she is stranded in a foreign country and desperately needs your help to get home. The email originates from the friend's real email account and may even include the same email signature that your friend usually uses when emailing you. The emails can be a clever scheme by Internet criminals designed to trick people into sending them money. Be wary of any email that you receive that asks you to wire money, even if the message appears to come from a friend.
More information: http://www.hoax-slayer.com/stranded-scam.shtml
Enter your PIN In Reverse to Call Police?
This spam email claims that if criminals force you to withdraw money from an ATM, entering your PIN in reverse will automatically alert police. The technology that makes this possible exists, but banks have not implemented it. If you are ever forced to withdraw money from an ATM against your will, co-operate fully and let law-enforcement pursue the matter. There is little chance the reverse-PIN technology will be installed.
More information: http://www.hoax-slayer.com/reverse-pin-ATM.shtml
Web Sites Offer Bogus Swine Flu Products
The U.S. Food and Drug Administration (FDA) released another warning about bogus flu products that are targeting consumers via websites. The FDA has issued more than 50 warning letters to offending websites, and 66% of those have removed the offending claims or products. Examples include: a shampoo that claimed to protect against the swine flu virus, a dietary supplement that claimed to prevent infants and young children from contracting swine flu, a "new" supplement that claimed to cure swine flu infection in 4-8 hours, a spray that claimed to leave a layer of ionic silver on your hands that killed the virus, and several tests to detect the virus not approved by the FDA.
More information: http://www.newsinferno.com/archives/6935

Thursday, July 23, 2009

Computer Tip of the Day "07-23"

Malware Targets Macs and PC’s Alike
Security company Sophos has Internet users on the alert for booby-trapped websites. Sophos has identified two new malware attacks that target Mac OSX with the malware OSX/Jahlav-C and OSX/Tored-Fam. Mac users visiting a rigged site receive a pop-up message that indicates a "Video ActiveX Object" needs to be installed. Users who follow the instructions end up with an infected Mac. Windows users are equally vulnerable. The booby trap identifies visitors’ operating systems (whether the web browser is running on Mac OS X or Windows) and implants malware specifically designed for PC’s.
More information: http://www.spamfighter.com/News-12607-Sophos-Identified-Porn-Site-Malware-Targeting-Mac-Users.htm

Phony Anti-Virus Program Takes Aim at Microsoft’s MSRT
Security researchers at Computer Associates are warning about a newly unleashed fake anti-virus program that pretends to be Microsoft’s MSRT (Malicious Software Removal Tool). A fake anti-virus planted on a user’s computer displays a message that says that Microsoft's MSRT has been installed and the user needs to click on the message so that the scanning process can start. Pressing the "Finish" button causes another window named "OEM Purchase Center" to appear that offers lifelong licenses at discounted prices for products like McAfee Total Protection 2009, Norton SystemWorks 2009, Norton Internet Security 2009, and Norton 360. The "licenses" are not genuine. When users try to cancel out of the window, another bogus warning will display insisting that they purchase a license in order to protect their computers.
More information: http://www.spamfighter.com/News-12609-Phony-Antivirus-Poses-as-Microsoft-MSRT.htm

Tuesday, July 21, 2009

Computer Tip of the Day "07-22"

The Dark Side of Social Networking
11-Be wary if a new online friend wants to meet you in person. Do some research about them. If you decide to meet them, be smart about it: meet in a public place, during the day, accompanied by friends you trust.
12-Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, report it to the police and to the operators of the social networking site. You could end up preventing someone else from becoming a victim.

Friday, July 17, 2009

Computer Tip of the Day "07-17"

"The Dark Side of Social Networking"

7-Post only information that you are comfortable with others seeing — and knowing — about you. Many people will see your page or postings, including the people who will be interviewing you for a job five years from now.
8-Remember that once you post information online, you can’t take it back. Even if you delete the information from a site, older versions are stored on other people’s computers and may be archived for years by Web search services.
9-Think hard before posting your photo. It can be altered and broadcast in ways you may not be happy about. If you do post one, ask yourself whether it’s one you’d include in your professional resume. Posting pictures of children invites exploitation and could expose them to real-world danger.
10-Flirting with strangers online could have serious consequences. Some people lie about who they are; you never really know whom you’re dealing with.
Come back Monday for the rest of the story.

July meeting notice

Tuesday, July 14, 2009

Computer Tip of the Day "07-14"

"The Dark Side of Social Networking" (cont.)

3-Don't click on shortened (or "condensed") URL's, like those created by TinyURL and Bit.ly. There's no telling where these links lead to, and that makes it easy to funnel you to malicious websites. Watch out for "misspelled" links, like www.yuotube.com. Could be a typo or a trick.

4-Keep control over the information you post. Consider restricting access to your page or postings to a select group of people, like friends, members of your team, your community groups, or your family.

5-Keep your information to yourself. Don’t post your full name, or any personal information about yourself or about anyone else. Be cautious about posting information that could be used to identify you or locate you offline, such as where you work or work-out.

6-Make sure your screen name doesn’t say too much about you. Don’t use your name, your age, or your hometown. Even if you think your screen name makes you anonymous, it doesn’t take a genius to combine clues and figure out who you are and where you can be found.

Monday, July 13, 2009

Computer Tip of the Day "07-13"

The Dark Side of Social Networking

The openness of these sites is an invitation to the Dark Side. No email verification is required, for example, when new users set up a Twitter account. It's hard to imagine an easier system in which to create counterfeit accounts. Social networking sites rely on a username and a password for security, which means that anyone who finds out your username and password can gain access to your account, assume your online identity, use it mischievously or maliciously, and leave you with little, if any, control over the situation. Until social networking site security evolves with time and improves by necessity, here are 12 Tips for Safer Social Networking.
1- Think about how a social networking site works before deciding to join it.
Some will allow only a defined community of users to access posted content; others allow anyone and everyone to view postings. Don’t join any social network that asks you to share your address book or contacts.
2- Always think before you click.
Be wary of visiting the blog or webpage of other members because that other "member" may be a scammer, whose blog or webpage has been rigged to deliver a drive-by download of malware to your computer. If you think you have clicked on the wrong thing, contact your local computer support staff, your Internet Service Provider, or a computer consultant knowledgeable about security.
More tips tomorrow!

Thursday, July 9, 2009

Computer Tip of the Day "07-09"

-The Dark Side of Social Networking -

If you are not already engaging in social networking, statistics indicate you will be soon. Visits to social networking sites now account for 10% of the total time people spend on the Internet, according Nielsen Online. Two-thirds of Internet users in the U.S., Europe, Brazil and Australia visit social networking or blogging sites. Internet users total almost 156 million in the U.S. alone. Add in over 29 million in the United Kingdom and over 25 million in Brazil, and the numbers are just too large for the Bad Guys to ignore.
Ordinary Internet users have fallen in love with social networking. While the amount of time users spent on MySpace decreased from April 2008 to April 2009, the use of Facebook increased by 700% and of Twitter by 3,700% during the same period. Cybercriminals love social networking sites, too, because they have to remain easily accessible in order to grow their memberships. That means social networkers are in effect attending an open party where just about everybody is welcome, and who knows if anybody is watching the door.

Tomorrow I will continue with more information on Social Networking.

Thursday, July 2, 2009

Happy Independence Day 2009




http://www.nccs.net/
to read the Constitution of
the United States of America.