Showing posts with label beginners. Show all posts
Showing posts with label beginners. Show all posts

More Scareware On Major News Sites

More reports are coming in of scareware coming from major news sites including The New York Times and the Philadelphia Inquirer.

As I mentioned in my previous alert about scareware via Newsweek, it's important to note that these scams can happen anywhere, anytime, even on the most reliable of sites. Please be careful, and bear in mind my recommendations on how to protect yourself from scareware.

Posted byTriona Guidry at 2:31 PM 0 comments  

Social Networking: Marketing Your Business Online Seminar On September 24th

Don't miss my upcoming seminar, Social Networking: Marketing Your Business Online, sponsored by the Cary Grove Chamber Of Commerce. It will be held Thursday, September 24th, 2009, from 11:30am-1pm (registration includes box lunch) at the Fox River Grove, Illinois, Village Hall, 305 Illinois St. Click here for downloadable flyer (PDF).

Have you been asked to get LinkedIn? Can you make business contacts through Facebook or MySpace? Should you Twitter your business? Join us for this computer series workshop on using social networking to market your business. To register, contact the Cary Grove Chamber at (847) 639-2800.

For a full list of my computer classes for PC and Mac, please see my events calendar. And be sure to sign up for FREE Tech Tips by email.

Hope to see you there!

Posted byTriona Guidry at 10:13 AM 0 comments  

Newsweek And Other Legit Sites May Contain Scareware

This article caught my attention recently, concerning a scareware scam that is being distributed via Newsweek's web site. I mention this one in particular because it's an example of how bad links sometimes come from good sites.

Scareware is when you receive a popup that insists there's something wrong with your computer. It's a scam to try to get you to click on a link, thus infecting your computer with viruses and possibly also ripping off your credit card. Don't expect your antivirus software to catch this stuff, it often sneaks through. I strongly encourage you to protect yourself through a combination of good computer security, free web site ratings software like McAfee SiteAdvisor or LinkExtend for Firefox, and plain old common sense.

Here are some of my previous articles which may help you out in this situation:

I'll be reprising my class on How To Protect From Cybercrime this November with the Cary Park District if you're looking for further help. See my class schedule for details and registration information.

Posted byTriona Guidry at 3:14 PM 0 comments  

What I'm Doing With Twitter And Tech Tips

I thought I'd take a moment to explain to my regular readers how I'm using Twitter in relation to Tech Tips.

Most of you already know that I offer Tech Tips in two formats. There is the email version, where I publish my newsletter on the 15th of the month and also provide notification of new blog entries as they become available. My blog is where I add tidbits pertinent to the computer needs of small businesses and consumers.

Some of you may not know that I am a freelance writer as well as a computer consultant. To that end, my Twitter account contains a little of both. In addition to providing computer news and links to relevant articles, I will also be including updates about freelancing, writing, Web 2.0 and my primary genres, science fiction and fantasy.

If you're interested, come join me on Twitter. If you prefer your Tech Tips straight up, you may wish to stick with my blog and email list. Don't forget that email subscribers receive bonus product reviews and other information. As always it's completely FREE, and your email address will never be sold to third parties. You can also find my Twitter updates (tweets) in the upper right-hand corner of the Tech Tips blog.

And if you're curious about Twitter but not sure how to start, come to my Social Networking: Marketing Your Business Online class on September 24th. You're always welcome to follow me on Twitter to get your feet wet. I promise to give you a stress-free introduction to the world of social networking.

Posted byTriona Guidry at 2:58 PM 0 comments  

Securing Gmail

Gmail, Google's email service, has some vulnerabilities that could allow unauthorized access to your email. To beef up security, make sure you are using a secure HTTPS connection to Gmail by checking your browser's address bar. The address should begin with "https://" if you are using a secure connection. While HTTPS is not without its own vulnerabilities, it's better than naked surfing.

You can configure Gmail to always use HTTP by clicking Settings from the main Gmail window. In the General tab under Browser Connection (at the bottom), select "Always use https."

Other email services like Yahoo and Hotmail don't allow this option. Your most secure option is to download your email using a program like Mozilla Thunderbird instead of viewing it on the Web. (In my opinion Outlook and Outlook Express won't do anything to enhance your security because they have their own problems.)

Posted byTriona Guidry at 9:47 AM 0 comments  

Spring 2009 Computer Classes

This spring I'm offering several new computer classes as well as a reprise of my Blogs For Business seminar. For full information on class times and registration, please visit the Guidry Consulting web site.

To receive updates on these and future classes, click here.

  • Blogs For Business
    Sponsored by the Cary Grove Chamber Of Commerce
    Thursday, May 21, 2009

  • Protecting Yourself From Cybercrime
    Sponsored by the Cary Park District
    April-August 2009

  • Computer Housekeeping
    Sponsored by the Cary Park District
    April-August 2009

  • Internet Safety For Kids (ages 5-10 years)
    Sponsored by the Cary Park District
    April-August 2009

  • Internet Safety For Teens And Tweens (ages 11 years-adult)
    Sponsored by the Cary Park District
    April-August 2009

Posted byTriona Guidry at 10:53 AM 0 comments  

Break The Internet Explorer Habit

For many people, the Internet is synonymous with the Web. Actually the Web is a service that runs on the Internet, like email or file sharing; it happens to be the most popular service at the moment because it's so versatile. If you use Windows, you probably access the Web through Internet Explorer, the big blue E on your desktop.

I recommend that you not use Internet Explorer. Why? Because IE, for all that it comes with Windows, may not be the safest way to access the Web.

Built into IE are special mechanisms (collectively called ActiveX) used by web developers to create code. This is good in some ways; it makes web sites simpler and less expensive to design. Unfortunately the same mechanisms can also be used by viruses to infect your computer. Newer versions of IE offer more protection, but IE's intrinsic weaknesses are part of the reason why viruses are particularly virulent in the Windows world.

There is a Catch-22 in that some web sites require you to use Internet Explorer (or function so poorly without it that it's pointless to try). Often these addresses end in ".asp" or ".aspx," meaning they were written in Microsoft's web language. If you must use Internet Explorer, lock it down to minimize the risk. Otherwise I strongly encourage you to explore alternate web browsers.

In March I'll teach you about Streamlined Surfing. If you have any computer questions click Comments below this article, and don't forget to subscribe to the email version of Tech Tips for bonus tips and product reviews.

Posted byTriona Guidry at 12:34 PM 0 comments  

Alternate Web Browsers

If an alternate web browser is safer than Internet Explorer, which one should you use?

The most popular is Mozilla Firefox, available for both PC and Mac. I use it on both platforms. Another option for PC and Mac is Opera, which tends to do better with IE-insistent sites. Windows users might want to explore Google Chrome (a version for Mac is in development). And Mac users can rely on Apple's default browser, Safari. Be sure to set the alternate browser as the default when asked. For more information on alternate browsers, please visit the Alternate Browser Alliance.

You can also install plug-ins to enhance your browser's capabilities. I'm fond of McAfee SiteAdvisor for security. You can find Firefox plug-ins on Mozilla's site.

Next month we'll talk about How To Organize Your Email. If you have any computer questions click Comments below this article, and don't forget to subscribe to the email version of Tech Tips for bonus tips and product reviews.

Posted byTriona Guidry at 12:21 PM 3 comments  

Phishing Without A Net

A new method of phishing may be your next battle. Researchers report that scammers can now phish you--pretend to be your bank--while you're logged into your bank's legitimate web site.

Until now, phishing was done by emails that try to trick you into clicking links to phony sites. This new variant is sophisticated and almost invisible, because it doesn't come through email but on the web, and only after you have successfully logged into your bank's actual site. Then malicious code takes over and sends a realistic-looking popup window asking for your credentials. The complexity of this attack makes it difficult to avoid, and switching from Internet Explorer to another browser like Firefox won't help.

This attack isn't widespread (yet), but you can expect more near-invisible scams like this in the future. Be sure to keep your computer updated, and don't forget to subscribe to Tech Tips for the latest computer news.

Posted byTriona Guidry at 4:33 AM 0 comments  

Holiday Computer Gift Guide

With the economy a mess, many people are looking to upgrade rather than replace computer equipment. This year's Holiday Gift Guide will help you give the gift of technology for less.

  • Memory
    Nothing says "I love you" like a faster computer. In Windows, go to Start, Control Panel, and look at how much memory you have in the System control panel. Mac users can find the same thing under the Apple menu, About This Mac. Note the model of your machine, and contact your local computer shop to find out what your upgrade options are.

  • Belkin Mini Surge Protector With USB Charger
    This little gem from Belkin offers portable power protection, and charges USB devices too.

  • HP SimpleSave Photo DVD-R
    If you have Windows and a DVD burner, backing up photos couldn't be simpler. Just insert the CD and the software does the rest. Also available for music and data.
In January we'll discuss Orphaned Server Accounts. Be sure to sign up for the email version of Tech Tips for regular alerts plus bonus tips and product reviews.

Posted byTriona Guidry at 8:18 AM 0 comments  

Should You Buy PC Or Mac?

When choosing a computer, you want to be happy with it in the long run. By evaluating the best computer for your needs, you can stretch its lifespan and spare your wallet.

The first question people ask is, "PC or Mac?" I call it the "Coke or Pepsi" argument because it's a matter of personal preference. PCs and Macs let you do the same things: check email, surf the Web, write documents. They differ in how you use them.

PCs are ubiquitous in the business world, so if you already have an investment in Windows it's wise to keep it. This is especially true for those who use the enhanced features of programs like Outlook,Windows Server, and Exchange. For your average consumer, Windows works well but can be difficult to keep protected from Internet threats.

Everyone knows Macs rule the graphics world, but what you may not know is that they are the foundation of many businesses as well. Now that Macs run Windows, the old argument that Macs can't run the same software as PCs is moot. Quite a few of my corporate clients are mixed-platform, meaning they have both PCs and Macs.

I personally believe the Mac is "more secure" than the PC, not that any computer is truly secure. Macs are based on the UNIX operating system, the same systems upon which the Internet was developed and continues to run. That's forty years' worth of security testing, compared to half that for Windows. I still advocate antivirus for Macs, and I hold out hope that Windows can be redesigned to be more secure without losing the features that have made it so popular.

So, should you buy PC or Mac? It's up to you but either way, I'll be here to give you a hand.

Next month ask me why I say, Don't Renew Your AntiVirus Software. Be sure to sign up for the email version of Tech Tips for regular alerts plus bonus tips and product reviews.

Posted byTriona Guidry at 8:16 AM 0 comments  

Phony Web Pop-Ups

The next time your computer gives you an error message, take a second look.

Because it may be a phony web pop-up, trying to convince you that your computer has an error. These pop-ups look remarkably like regular system alerts, but they're really Web ads trying to get you to click and infect your computer. The notorious WinAntiVirus scam (aka Winifixer or the Smitfraud trojan) uses this ploy to convince you that your computer is at risk unless you install their purported product.

Other Web pop-ups may try to get you to click on seemingly legitimate ads or offers. It can be extremely difficult to tell the difference between a real ad and a fake one, or even between a real Web site and a malicious clone. You can test your Web savvy through the McAfee SiteAdvisor spam and spyware quizzes, which will show you just how deceptive these phony pop-ups can be. (I also recommend you install the SiteAdvisor plug-in for your browser.)

Worse, there's the practice of clickjacking, which allows a malicious program to force your browser to click any link. This means you could get infected without any interaction on your part.

How can you protect yourself? Be sure to run the latest version of your antivirus software (see the Windows Help and Mac Help sidebars for suggestions). Windows users, don't use Internet Explorer, try Mozilla Firefox instead. Using IE can increase your risk of infection. I also strongly recommend that you not click on web pop-ups, ever. Use Firefox's pop-up blocker or a similar tool to keep the pop-ups away, and ignore the ones that do slip through.

Next month we'll go over my Holiday Computer Gift Guide. If you have any computer questions, click Comments below this article, and be sure to sign up for the email version of Tech Tips for bonus tips and product reviews.

Posted byTriona Guidry at 4:48 PM 0 comments  

Home Computer Nightmares

Home computer users suffer more than their fair share of nightmarish problems, largely due to a dearth of support from computer and software makers. Here are some common nightmares, and what you can do to banish them.

  • The Blue Screen Of Death, or The Sad Mac
    These are what we call the Windows and Mac "fatal system errors," fatal in that they prevent the computer from operating at all. The BSOD is that bright blue screen that appears when you try to start Windows. Similarly, Mac users may get The Sad Mac when the computer is too sick to start. Review any new hardware or software you may have installed, note the error number if available, and check online listings to determine the source of the problem.

  • The Deadly Freeze
    Computers can unexpectedly freeze, or lock up, in the middle of normal duties. Sometimes you can move the mouse, other times you can't even find the pointer. Your best bet is to hit the power button. Unfortunately you usually can't save work when the computer is frozen.

  • The Printer From Hell
    Ever had your printer pull a Linda Blair? Spewing blank sheets, printing weird characters, and other misbehavior can sometimes be solved through the printer's software control panel.

  • The Ghost Of Errors Past
    Do you reboot when you get an error? If not, you should. Once a computer runs into trouble, it tends to keep getting in trouble until its next reboot, when it refreshes its memory.
Do you have a home computer nightmare? Click Comments below this article and I'll help you solve it. Next month I'll warn you about Phony Web Pop-Ups. And be sure to sign up for the email version of Tech Tips for bonus tips and product reviews.

Posted byTriona Guidry at 12:49 PM 0 comments  

Revenge Of The Computer Zombies!

We've talked before about computer zombies, compromised computers that do everything from sending spam to unleashing viruses. Many unsuspecting users have these monsters on their desks and don't even know it.

Why infect computers? Because it's profitable. Zombie computers are organized into botnets, electronic armies whose computing power is sold to for-profit spammers and identity thieves. In the past three months alone, the Shadowserver Foundation estimates the size of botnets has quadrupled. That's enough to give any computer user the shivers.

As a computer user, the most important thing you can do is be aware if your computer's behavior deviates from the norm. Decreased performance and increased errors can be signs of zombie infection. Be sure to use a reliable security software suite, but don't assume it will automatically keep you safe. Sometimes security software fails to load at startup, or forgets to update itself. You should verify that you are current on your subscription and receiving several updates a week. You can find recommendations in this Tech Tips article, and in the sidebar on the Tech Tips blog.

Remember, never click on links in email messages, as they may lead to phony web sites (phishing). And be sure to install those updates your computer requests. Too many of us click "later" and never get around to it. But you should also be warned, if you are surfing the Web, that phony pop-ups will try to make you believe they are bona fide update requests. Never trust an update request from a web pop-up, only those that appear to you from software you know you have installed.

In November we'll wonder about Planned Computer Obsolescence. If you have any computer questions, click Comments below this article, and be sure to sign up for the email version of Tech Tips for bonus tips and product reviews.

Posted byTriona Guidry at 12:48 PM 0 comments  

Alert: Firefox 2 Users Should Upgrade To Firefox 3

Mozilla Firefox users should be aware that version 2 of the web browser software will be discontinued December 31, 2008. For maximum protection against web-borne threats, PC and Mac users alike should upgrade to the latest version of Firefox 3. To find out which version you have, select About Mozilla Firefox under the Help menu (PC) or Firefox menu (Mac).

Posted byTriona Guidry at 5:17 PM 1 comments  

WiFi Poaching

Admit it, we've all done it: used someone's unsecured wireless connection without their knowledge.

It's called WiFi poaching, and there's been debate as to whether it's actually illegal. In Britain, there have been prosecutions for poaching, but in the U.S. the legality is less clear.

Some argue that those who run unsecured connections set themselves up for the situation. But most wireless access points are unsecured by default. Is it the fault of the unwitting consumer, who likely has no idea?

Either way, it's best to protect yourself by enabling security on your wireless access point. The best security is an encrypted passphrase called WPA. There's another standard for passphrases (WEP) but don't use it, as it's easily cracked. Your access point's Web management feature will allow you to set this passphrase, which you will then have to enter on each computer connecting to your wireless network.

It goes without saying--don't give out your passphrase! And while you're in that web management panel, change your access point's default administrator password, to keep snoops from resetting your security.

Do you think WiFi poaching is unethical? Discuss the issue here (click Comments below any article), and be sure to sign up for the email version of Tech Tips for bonus tips and product reviews.

[This article is reprinted from the March 2008 issue of Triona's Tech Tips. Look for more computer security tips in the October issue.]

Posted byTriona Guidry at 11:44 AM 0 comments  

Online Safety For Kids (And Adults)

There is a lot of discussion these days about kids and the Internet. Parents, myself included, are rightfully concerned about what our children can access, and who has access to them. Businesses are concerned about liability issues and the compromise of customer data, in the pervasively interpersonal world of instant communication.

The same techniques used to secure a corporate computer can, and should, be used to secure a personal home computer. The same policies used by corporations can be modified for a family environment. By including your kids in the process of creating a home Internet policy, you'll be able to supervise their Internet access while allowing them the freedom to explore.

Corporations typically have an "acceptable use policy," which governs what is allowed or prohibited on the company network. It's part of the employee handbook, and looks like this:

This computer system is for authorized use only. By using this system, the user consents to such interception, monitoring, recording, copying, auditing, inspection, and disclosure at the discretion of authorized personnel. Unauthorized or improper use of this system may result in disciplinary action and civil and criminal penalties. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use.
Parents can create a home policy based on these ideas. This is not to say you should treat your children like little employees, but you can use the same concepts to start a family discussion about online safety. It's up to you to keep up with the latest techno-fashions, so you know how to respond to things like MySpace accounts and multiplayer games. You're reading this article, so you've already made a good start.

First things first, you have to properly protect your machine. It's no use badgering your kids about downloading music when you don't even have up-to-date antivirus software. We've been over the drill, but let's review the "four-legged chair," the four critical things you need to secure your computer:

  • Antivirus software
  • Anti-spyware software
  • A firewall, hardware or software
  • The latest updates
I presume you've taken care of this. If not, or you're not sure, I can check for you on my next visit. You might also want to re-read "How To Protect From Cybercrime" and "You Could Be A Computer Criminal" from the August 2008 issue of Tech Tips, which include more detail on security protections.

Now, you need to decide what your home policies will be. Are your kids only allowed to use the Internet during certain hours, or after homework is done? What services can they use (such as email, web, and chat)? Will you use parental controls, and if so, what kind? Will you be recording their chat sessions, logging the sites they visit, counting the tunes they buy? Be open to negotiation. Nothing will alienate a kid faster than laying down the law, and they seem to view the Internet as their personal possession.

Once it's been discussed, put your policy in writing and sign it with your kids, just like a corporate policy. Now that the rules are clear, and protections in place, you can let your kids surf. But remember, no technology can substitute for supervision. Consider locating the computer in a public area. You'll also want to review with them the following safety tips. If they're chatting with friends, suggest they set up a code phrase, so they can verify the human behind the screenname. Never give out personal information, such as full name, address, or school. And they should never, ever, make arrangements to meet an online friend in the real world unless they, and you, are positive of that person's true identity.

What parental control options are available? Your Internet service may already include some; check with your provider. Otherwise you can use a software program. I'll be reviewing your choices for "Parental Control Software" in the upcoming September 2008 issue of Tech Tips.

Finally, hand this column to your kids. This paragraph is for them:
Yes, I'm your parents' age, but my generation came up with all that technology you're enjoying, so take off the earbuds and listen. When you're on the computer, use your common sense. The Internet is a public network, and anything you post can be viewed by perfect strangers, potential employers, or your parents. Be aware of how to protect yourself, and your computer. Then next time you want to go online, you won't have to worry that your computer will crash, and your parents won't have to worry about you.

[This article is reprinted from the March 2007 issue of Triona's Tech Tips. More advice on kids, computers and the Internet coming in September.]

Posted byTriona Guidry at 2:03 PM 0 comments  

How To Protect From Cybercrime

If the cybercrime situation is so dire, what can an average person do about it? I present the four-legged chair of computer security. Without all four legs, your computer's defenses could collapse.

  • Antivirus software
    You know this; what you may not know is that antivirus alone does not catch every threat.

  • Anti-spyware software
    Spyware is software you don't want, similar to viruses but using different tactics. Adware, malware, keyloggers, Trojan horses, they all fit into the category of spyware.

  • Firewall
    Just like a fire door in a hospital, a firewall keeps out Internet nasties that try to sneak under the radar of antivirus and anti-spyware software.

  • Regular updates ("patches")
    Every program has bugs, and these bugs can be used by viruses to manipulate your computer. Harden your security defenses by keeping your software up-to-date.
At home, you're your own computer security czar. Run a full-fledged security suite, and install a firewall for extra protection. (See the sidebar, right, for suggestions.) Remember, you must purchase security software yearly, and update it every few days. And don't forget those patches! For Windows I like a combination of Microsoft Update plus Secunia's Personal Software Inspector. Mac users, be sure to check for new patches via Apple's Software Updates, Adobe Updater and the other update features of your software.

If you have a company-owned computer, talk to your IT department about the protections that are installed. Find out if your corporate network prevents laptops from logging on unless the laptop has updated security. You can also explore one-time password systems, or biometric options like the fingerprint scanners now built in to most laptops.

Do you have questions about protecting yourself from cybercrime? Ask them here (click Comments below any article), and be sure to sign up for the email version of Tech Tips for bonus tips and product reviews.

Posted byTriona Guidry at 8:49 AM 0 comments  

You Could Be A Computer Criminal

Imagine there's a knock at your door. "Police," they say. "You're under arrest for child pornography."

Are you a computer criminal? You could be a thief, a spammer, a spyware sender... and you could get arrested for it, all without knowing.

Take the case of substitute teacher Julie Amero. She was given a classroom computer that, according to reports, was completely unprotected, and when the machine displayed pornographic popups, she was arrested for child endangerment. Another article tells the story of a state employee arrested for having child porn on his work-provided laptop, which did not have functional antivirus software.

Most people have no idea whether their computers are truly protected from Internet threats. We pay token attention to antivirus, or trust that our company-owned computers are defended. Computer makers leave it up to the consumer to figure out how to install and maintain security software. What can you do to ensure you're not the next victim?

You don't have to be a tech expert, and it doesn't take much time. See this month's Tech Tip on How To Protect From Cybercrime.

And if you are ever in doubt, feel free to post your computer questions here (click Comments below any article) and I'll do my best to answer them.

Posted byTriona Guidry at 8:44 AM 0 comments  

Windows Vista, Revisited

Last January we discussed Windows Vista, touted as the best thing for PCs since... well, since Windows XP. How good is this new version, and does it measure up to the marketing?

In short, no. I have not received a single call from someone saying, "Gee, Triona, I really want to upgrade to Vista today." Those who have it are folks who found themselves with it when they bought new machines. I've seen some compatibility trouble with older hardware and software, and of course we're all still getting used to Vista's new look.

Low-cost computers may turn out to be less than a bargain. Microsoft says Vista will run on a PC with 512MB of memory and 20GB on the hard drive. But anyone in the IT world will tell you, there's a big difference between Microsoft's "minimum" system requirements and the real world. You'll need at least 1GB of memory, preferably 2GB, and as much disk space as you can muster. And if you don't have a 256MB graphics card, you can say goodbye to Aero, the fancy Vista interface. Budget computers don't have enough graphics capability. Since it's hard to upgrade graphics on laptops, mobile users in particular may be looking for new machines earlier than they thought.

Most people will find it more cost-effective to replace their computers instead of upgrading to handle Vista, a sad remark on our society's throwaway attitude toward technology. Unless you have a good reason to move to this new Windows version, you might as well stick with XP. But if you're not at XP yet, consider skipping straight to Vista. And do it sooner, not later. Older Windows versions cannot be adequately protected from Internet threats. You can still buy a new computer with Windows XP through June 30, 2008. That's a good option for those of you with older programs that can't yet be moved to Vista.

[This article is reprinted from the January 2008 issue of Triona's Tech Tips. See Green Computing in the right-hand sidebar for electronics recycling solutions, and don't forget to read about the problems folks are having with Windows XP downgrades now that the June 30 deadline has expired.]

Posted byTriona Guidry at 6:31 AM 0 comments