Laptops of 2012: What to Expect
Posted by admin on Feb 19, 2012
Taken from PCWorld Magazine, February 2012 Edition
Tablets and smartphones are in, but don’t count laptops out. Impressive models planned for 2012 promise to the thinner, lighter, and faster, with longer-lasting batteries.
Ubiquitous Ultrabooks – Thin, and lightweight are the watchword, thanks to Intel, which has trademarked the name for a new category of ultraportable laptops. The category will kick into high gear when Intel’s next-gen CPUs, code-named Ivy Bridge, hit the market. Their power use and performance, and steadily falling prices on solid-state drives, should make these laptops more affordable and appealing. Ivy Bridge CPUS – which may debut this spring – will have a new graphics architecture that runs faster, provides better video acceleration, and supports Microsoft’s DirectX 11. They will use much less power for longer battery life. The integrated graphics could mean 50 percent better performance in 3D games.
Windows 8: A Big OS – Windows 8 changes Windows more profoundly than any release since Windows 95. The new Start screen and Metro-style interface will put off some longtime Windows users. Other users will love the new look and feel. Most important, Windows 8 will undoubtedly inspire a major surge in PC purchases, and an enormous marketing push. Windows 8 will provide a first-class touch interface without sacrificing good old-fashioned keyboard and mouse use. That means a better user experience on thouchscreen-equipped notebooks, so expect to see more of those machines. It will also support ARM-based processors for the first time, so we may see hybrid laptops with a detachable tabletlike display – or convertible Ultrabooks.
What to Do After a Data Breach
Posted by admin on Oct 21, 2011
Taken from PC World Magazine, October 2011 Edition
2011 has been the year of the data breach, and data breaches are extremely common. And once your personal information is out there, it’s exposed for good. You can take a few steps to reduce the potential for damage, however.
1) Change your passwords: Your very first step should be to make a new password for your account on the affected site. If you used the same login information for any other websites, be sure to change your password on those sites too.
2) Watch for phishing attempts and malicious email: If your email address is exposed in a data breach, scammers, spammers, and malware authors may try to send malicious messages to you (well, more than usual, anyway), so you might see a spike in spam. As always, look out for any suspicious email.
3) Look for suspicious snail mail: If street addresses were compromised in a hack, cybercriminals may attempt to send you scam mail via the postal service. Keep your guard up. Be wary of anything you receive in the mail that asks for money or personal information.
4) Watch for financial statments: Even if your information wasn’t compromised in a major data breach, criminals can still get at your credit card and bank account information through a malware infection on your PC, a compromised ATM or credit card payment terminal, lost or improperly discarded documents that contain sensitive information, or even an unscrupulous employee at a fancy restaurant.
5) Put a fraud alert on your credit report: Here’s another must if you’re a data-breach victim. A fraud alert tells the major credit agencies that your identity may have been stolen, and that they should be on guard for anything suspicious, such as new credit or bank accounts opened under your name.
To Update or Not To Update
Posted by admin on Oct 7, 2011
That is the question…. or at least that is a question I get a lot. When Windows or another program bugs you to download and install an update, should you? Well, the short answer is YES! In many cases that update is going to plug a hole that some malicious attacker might use to get in. That update may also add a feature that you wished was included in that program.
The nice thing about most updates is that you can click the “remind me later” button and continue working. The problem is that we keep doing that and the update never gets installed. Then, an attacker plants a virus on our machine through one of the security holes, and we have the hassle of getting our system cleaned. I agree that these updates seem to nag us when were are in the middle of something important, but it is necessary that they be installed.
Microsoft releases updates on the third Tuesday of the month (aka Patch Tuesday). Most versions of Windows are set to check for those updates on the following Wednesday, or at least the next time the computer is turned on and accesses the Internet. The updates come in three types – Critical Updates, Recommended Updates and Driver Updates. The Critical Updates should be installed as soon as they are available because it is these updates that are plugging those security holes. The Recommended Updates are usually upgraded versions of programs or improve the functionality of the system. Driver Updates are for the various hardware devices that you have installed.
New to Windows 7 is what we refer to as the “forced update”. If you have been putting off those Windows Updates for too long, your computer might just lock you out and install them anyway. Depending on how many Critical Updates are needing to be installed, it can take several hours. You cannot stop the install, and forcing your computer to shut down might prevent the system from restarting. It would have been easier to install the update as they were needed.
Most programs are also set to periodically check for updates, or at least have a button that you can manually check for updates. It is important that you update these programs as well, especially if they access the Internet or open files that you have
received by email or online. Adobe Acrobat, for instance, is used to open PDF files. Those files can contain a hacker’s code, and can exploit a flaw in Acrobat – unless it has been patched. Java, Flash, .Net Framework and others can also contain the same types of security holes.
So the next time your computer bugs you to install an update, take a few moments and install it. That might be the perfect time to stand up and stretch, go visit a co-worker, or just do nothing!
Protect Your Data From The Breach Epidemic
Posted by admin on Jul 14, 2011
Taken from PC World Magazine, July 2011 Edition
In 2011 alone, tens of millions of users have had personal information exposed or put at risk in some way by data breaches at Epsilon, RSA Security, the PlayStation Network, among others.
The impact of a data breach depends on what information is compromised and what the attackers do with the data they steal. If a breach is limited to exposing e-mail addresses, as was the case with the Epsilon data breach, the main concern it raised is the possibility of targeting phishing attacks.
If a breach exposes personal details such as names, addresses, birth dates, Social Insurance numbers, and driver’s license numbers, identity theft becomes a serious concern.
The worst case involves the loss of actual bank account or credit card numbers. The attacker can use your credit card information to buy things or – with additional information such as your account password – drain your bank account.
5 Ways To Keep Your I.T. Guy Away
Posted by admin on Jul 11, 2011
Why would I write an article that would make me lose business? Well, a happy customer will be a long-term customer. I would rather get you to spend your money on improving your equipment, than paying me to fix things you can prevent.
Rule #1 – Keep your computer free of malware and viruses. Make sure you have a good antivirus program installed, keep it renewed & updated, and schedule a regular scan. Sometimes you get a virus, even if you have done everything right – but at least give your computer a fighting chance.
Rule #2 – Keep your software patched. Virtually every program – from Accounting Software to Windows – checks itself for updates. When a program pops up a notice that there is an update – download and install it. In most cases, these updates provide security patches and feature enhancements that will help keep your system safe.
Rule #3 – Keep your equipment clean. Dust is public enemy number one. Due to the nature of electronic devices, they attract dust. Most computers have at least a few fans that move air through the system to keep it cool. When dust builds up in the fans and heat-sinks, your system starts to run hotter, and won’t run as well.
Rule #4 – Protect your hardware. Make sure your system is plugged into a good surge protector, or better yet, a battery backup unit. If your tower sits on the floor, consider placing it on a platform to raise it off the floor a few inches. That will help with dust control and potential water damage, as well as making the drives easier to access. Don’t place your electronics where they could get wet, dirty or in direct sunlight.
Rule #5 – If you notice your system acting a bit strange, or you are not sure about installing a certain update, give your “computer guy” a call. If you rely on someone to keep your systems running smoothly, then ask for their advice. Why wait until there is a major problem, and you have time-sensitive tasks to complete? Chances are, you can avoid a catastrophe buy keeping your I.T. guy in the loop.
If you follow these simple rules, you should be able to keep your equipment running problem-free and avoid costly emergency repairs. Then, you can plan to invest in new and better equipment – a task your I.T. guys would prefer to help you with.
RIM’s Blackberry Playbook: A Promising Tablet
Posted by admin on Jul 8, 2011
Taken from PC World Magazine, July 2011 Edition
Research in Motion’s Blackberry Playbook offers a convenient size and novel navigation, but its software can be frustrating.
In some respects, the Playbook is the most impressive tablet I’ve seen. But native apps such as its browser have disappointing glitches, and its variety of third-party apps is limited.
The Playbook is compact and light. Offering a 7-inch display, it can fit into a roomy coat pocket. And its weight is just under 1 pound, which makes it lighter than the iPad2. The Playbook is very easy to hold too.
There is a front-facing camera, as well as a rear-facing camera. The stereo speakers offer the best audio output I’ve heard yet from a tablet. Along the bottom of the tablet are three ports, for HDMI Micro, Micro-USB, and a magnetic rapid charger connection.
Powering the tablet is a 1Ghz dual-core processor and 1GB of memory. It connects to 802.11 a/b/g/n Wi-Fi, but a mobile broadband connection must wait until late summer, when RIM will release 4G LTE and WiMax versions. The tablet has no memory expansion card slot.
Watch out for Microsoft Tech Support scams
Posted by admin on May 10, 2011
An edited article by Woody Leonhard, Windows Secrets
“I’m from Microsoft and I’m here to help.” At least, that’s what reader MP thought he heard when he answered the phone. It wasn’t.
Con artists all over the world are bilking big bucks out of unsuspecting Microsoft customers — including savvy Windows users.
In this new epidemic, the scammers are sophisticated, glib, and oh-so-convincing. Know the warning signs. You may be next.
Inside one con that almost succeeded
Here’s how MP describes his experience:
“I was having a problem with Windows XP and posted an inquiry on one of the [presumed to be] Microsoft support sites. My wife received a call from someone wanting to talk to me about my computer. She gave a time when I would be home. I was expecting a call from my ISP. The call came at the arranged time, but it was not the ISP. The caller said he was working on behalf of Microsoft and directed me to a very convincing website for confirmation of his company and his credentials. The caller knew my name and telephone number.
“We talked about the problems I’ve been having with Windows XP. He said it sounded like a virus. He guided me into Windows XP’s Event Viewer and showed me a number of red and yellow flags for applications and systems, which he said were indicative of a malware attack.
“He offered to get a technician to sort the problem for free and directed me to a website, where I had to enter some contact information and my Windows activation code, from the sticker on my PC. He talked me through the process — we were on the phone for almost an hour at that point — and it all went smoothly until I had to enter some sort of warranty code that I didn’t have. He told me to hang on while he checked with his boss.
“A few minutes later, he was back and gave me the unfortunate news that my free support period had ended. He told me I would have to pay $99 for extended support and directed me to a place on the website to enter my credit card information. I’m not sure why, but I smelled a rat, so I hung up on him.
“The caller knew what he was talking about, knew my name and phone number, knew that I was running Windows XP, and knew that I was having problems. I’m a professional electrical engineer and fully aware of phishing and other scams, but I was nearly taken in.”
MP sent me the address of the site the caller used for a reference. I won’t repeat it here because, to this day, I’m not sure whether it’s a legitimate consulting firm site or whether it exists only to provide a backstory for swindlers.
The website certainly had an air of legitimacy. It identified the caller’s company as a “Microsoft Registered Partner” with an official Microsoft logo. “This company is a Technical Support Provider,” the site says. “As computers have become more popular and sophisticated, the job of keeping them running has fallen to an ever-expanding group of specialists, collectively known as Solution Engineers.”
The site went on to say, “The first point of contact is generally the manufacturer’s tech support. However, as manufacturers and others scale back on in-house technical support to control costs, innovative and entrepreneurial technical support companies are building a robust business of providing help and a sense of security to consumers.”
Then I noticed that the site’s mailing address is in Kolkata and the domain is registered in Jharkhand, India — a long, long way from MP’s stomping grounds.
Robust? You could call it that.
No password on your Wi-Fi? This nightmare could happen to you.
Posted by admin on May 6, 2011
Taken from The Toronto Star, article by Carolyn Thompson, Associated Press
Lying on his family-room floor with assault weapons trained on him, shouts of “pedophile!” and “pornographer!” stinging like his fresh cuts and bruises, the Buffalo homeowner didn’t need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.
That new wireless router. He’d gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.
“We know who you are! You downloaded thousands of images at 11:30 last night,” the man’s lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, “Doldrum.”
“No, I didn’t,” he insisted. “Somebody else could have, but I didn’t do anything like that.”
“You’re a creep . . . just admit it,” they said.
Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.
LizaMoon Infection: A Blow-by-Blow Account
Posted by admin on May 1, 2011
An edited version of an Article by Fred Langa, Windows Secrets
A nasty piece of malware known as LizaMoon has hijacked links on millions of websites in the past weeks, including some normally safe iTunes and Google links.
Fortunately, LizaMoon is easy to avoid if you know what to look for.
Using rogue-AV scare tactics, LizaMoon tries to trick you into running bogus security-scan and virus-cleanup tools on your PC — but it’s pure malware.
If allowed onto your PC, this particular ploy is especially troublesome because it can partially disable the Windows Security Center and change the Registry so that the full WSC can’t be restarted. It also interferes with Microsoft Security Essentials, if MSE is running. (You’ll find lots more LizaMoon news coverage via Google.)
My encounter with LizaMoon started unexpectedly one evening when a suspicious warning popped up on my screen. As discussed in a previous Top Story, I use Microsoft Security Essentials and the Windows 7 firewall to protect all of my PCs. In over a year of constant use, I’d never had any malware trouble. But that abruptly changed.
That evening, I was searching for something through Google — I don’t recall what. When I clicked a link, a blank page overlaid with a dialog popped up instead of the site I was expecting.
Ged Rid Of Those Unwanted Electronics
Posted by admin on Apr 11, 2011
Spring is approaching, and it’s time to whisk away those dull, dark days of winter and celebrate the new season with a spotless home or office. So, go ahead, open the doors and windows and let the fresh air guide your rhythm, but be mindful that you’re not just cleaning up, you’re freeing up space too. Don’t simply dust over those old or unused items that have been sitting idle in your basement, storage room or garange. Chances are that if you haven’t used them all winter, it’s time for them to go. And let’s face it, that old television of DVD player isn’t going to fix itselft. Use it, or lose it.
Unwanted electronics can take up unnecessary space in your home or office and research shows that four out of fice Ontario households have at least one item they want to get rid of. If you can’t give them away, do the right thing for the environment and recycle them.
Electronics can contain hazardous materials such as batteries, mercury, lead, inks and toners, which must be properly handled and kept from needlessly contaminating landfills in Canada or overseas. Electronics also contain valuable materials, such as copper, aluminum and precious metals that can be recycled and used to manufacture new electronic products.
Ontario Electronic Stewardship (OES) is the not-for-profit organization responsible for implementing an electronic waste recycling program in Ontario. You can find an OES-approved drop-off location or event near you a www.recycleyourelectronics.ca, along with a full list of acceptable items. You can be confident that these once-treasured gadgets are being safely and responsibly handled, but more importantly you can reclaim all that space in your home or office as well.
This spring you can rid your space of unnecessary clutter, breathe easier and do the world a favour: recycle your electronics.