Donations

Friday, July 6, 2012

Understanding Malware: Its Forms and Top Six Malicious Uses





In the digital era, the threat posed by malware has become increasingly prevalent and complex. Malware, short for malicious software, includes a variety of harmful types like viruses, spyware, adware, and trojans. These are not just nuisances but potent tools used by cybercriminals to infiltrate, damage, and exploit personal and corporate systems. This blog post delves into the sinister world of malware, exploring its top six uses that jeopardize both individual and organizational security.

1. Ransomware Attacks
One of the most aggressive forms of malware attacks is ransomware. This type of malware locks out legitimate users from accessing their systems or personal files and demands ransom payment in return for access. It typically enters through phishing emails or visiting an infected website. The consequences can be devastating, ranging from loss of valuable personal and business data to significant financial losses and reputational damage.

2. Redirection to Profit-Generating Sites
Malware can also be used to hijack browsers and redirect users to specific websites. These redirects often lead to advertising sites or phishing pages. The motive behind this is to generate revenue through ad impressions or steal sensitive information like login credentials and credit card numbers. This method is frequently seen with adware, a type of malware that bombards users with unwanted ads.

3. Cyber Espionage
Spyware is a form of malware used extensively in cyber espionage to monitor and steal confidential information without the user's knowledge. It can track keystrokes, capture screenshots, record browsing activity, and access cameras and microphones. This data can include personal identification information, corporate secrets, and national security information. Cyber espionage represents a significant threat to personal privacy, corporate integrity, and national security.

4. Hacktivism
Hacktivism involves the use of hacking techniques to promote a political agenda or social change. While the intentions behind hacktivism can vary widely, the methods often involve deploying malware to disrupt services or expose information. Hacktivists use malware to carry out denial-of-service attacks, deface websites, or leak sensitive information to the public or press, aiming to draw attention to their cause.

5. Social Media Targeting
Social media platforms are fertile ground for malware dissemination due to their vast user bases and the sharing nature of these networks. Cybercriminals use trojans, phishing links, or malicious software disguised as legitimate apps to compromise accounts. Once an account is compromised, it can be used to spread malware further or to perpetrate scams and theft.

6. Infiltrating Android Phones
Android devices, due to their widespread use and relatively open operating system, are particularly vulnerable to malware attacks. Malicious apps can be downloaded from third-party sites or even sometimes sneak into legitimate app stores. These apps can access sensitive information, send SMS messages to premium-rate numbers, or integrate the device into a botnet.

Protecting Yourself Against Malware
To safeguard against these malware uses, it is crucial to adopt robust cybersecurity measures:

Use reputable antivirus software: Keep your antivirus software up to date to detect and remove malware.

Regular updates: Keep your operating system, browsers, and all applications updated to patch vulnerabilities.

Beware of phishing: Learn to identify suspicious emails and links. Do not open attachments or click on links from unknown sources.

Download wisely: Only download apps from trusted sources and verify app permissions.

Back up data: Regularly back up important data to mitigate the impact of potential ransomware attacks.

Understanding the diverse uses of malware and the risks associated with them is essential for maintaining cybersecurity. By taking proactive steps and practicing safe computing, individuals and organizations can significantly reduce their vulnerability to these malicious threats.

Thursday, July 5, 2012

The FBI may shut down your internet access


Will July 9th be the end of your internet access? For months now, the FBI has been warning people that a blackout of their access to the Internet could be coming.  The warnings about the Internet problem have been splashed across Facebook and Google, and Internet service providers have sent notices as well. But tens of thousands of Americans may still lose their Internet service Monday unless they do a quick check of their computers for malware that could have taken over their machines more than a year ago. So how do you make sure your computer is not infected if you have been notified? Download the free version of Malwarebytes at http://www.malwarebytes.org/

The iPad mini coming soon?

That's right Apple's component suppliers in Asia are preparing for mass production in September of a tablet computer with a smaller screen than the iPad, people familiar with the situation said, suggesting a launch for the device is near. The screen size  is said to be less than eight inches compared to the current iPad which measures 9.7 inches. With the Smaller Screen comes a smaller price to try and defend off all the other tablets coming to market. 

Wednesday, July 4, 2012

Computer and Tablet Wars are in full swing

With the announcement of Google's new tablets the Nexus 7 and the Nexus Q and Microsoft's new tablet the Surface the tablet wars are on. Apple is working on a new device that is a merge between a Mac and the iPad. No matter who wins this will be a win for consumers.
As Google brings the war to the computer market, Computers are starting to hit the market running the Chrome OS. No longer with you have to to just decide between an Apple computer and a Windows computer but now you have a new alternative in the Chrome OS this is good news for those of us using android phones. Right now the Chrome OS only supports the computers that it ships on but I'm sure that will change in the near future. So hold on this may be a bumpy ride...

Tuesday, July 3, 2012

Microsoft makes Windows 8 upgrade affordable


Microsoft has announced that, for a limited time only, Windows 8 Pro upgrades will cost just $39.99 via download, or $69.99 for a boxed DVD from retail outlets. Download customers will be able to buy a backup DVD for $15 plus shipping and handling.
Between its launch—whenever that will be—and January 1st, 2013, users of Windows XP, Windows Vista, and Windows 7 will be able to buy the cheap upgrades to Windows 8 Pro. Windows 8 Pro is the higher of the two mainstream Windows 8 SKUs, and it includes features such as BitLocker, Hyper-V, and the ability to join Windows domains.
So if your looking to upgrade to Windows 8 get it quick before the price goes up.

Saturday, June 30, 2012

Facebook e-mail mess effects contact lists on phone and computers

The recent change face book has made to to members Facebook profile to the @facebook.com have caused issues with contact lists and emails. Facebook users say contacts' e-mail addresses on phones and personal devices have been altered without their consent -- and their e-mail communication is being redirected elsewhere, and lost. so check your contacts. So check your devices and you may be able to resync your contact from other sources I sync mine with Google so its an easy fix for me.

New Malware uses Mac- and Windows-based malware to snoop on Chinese dissidents.

Just recently  Kaspersky and security firm AlienVault found a new piece of Malware out of China. . It arrives in e-mails that attempt to trick the receiver into installing a new variant of the MaControl backdoor and works on Macs that are powered with processors from Intel, as well as older PowerPC CPUs. They added that the Windows malware they found also uses e-mail-based social engineering to infect users. Once the malware is on your computer it allows the creator of the virus to take control of your computer. The malware has ties to Gh0stRat, a huge malware-based spy network uncovered three years ago that infiltrated government and private offices in 103 countries. So be on your toes and don't open any attachments from people you don't know and even if you do know them talk with the sender to confirm they sent it.

FEMA and National Weather Service launch Wireless Emergency Alert System

While it's a little later than expected, the free SMS emergency notification system has now gone live. Wireless Emergency Alert (WEA) messages will be delivered to cell towers in affected areas, which will then broadcast them to all compatible devices in their range. While the system is looking to cover over 97 percent of the country, it's being gradually rolled out across carriers.  check out the CITA website at http://www.ctia.org/consumer_info/safety/index.cfm/AID/12082 for more information and to see device compatibility


If you have a WEA-enabled phone, you are automatically enrolled.
For example, if a person with a WEA-capable device from Washington, D.C., happened to be in Southern California when an earthquake occurred in that area, they would receive an "Imminent Threat Alert" on their device.  
The alert messages will not disrupt text, calls or data sessions that are in progress..

Friday, June 29, 2012

How card skimmers getting millions from banks

Skimming isn’t new—it’s been around almost as long as ATM machines. But a pair of Bulgarian-born Canadians named Nikolai Ivanov and Dimitar Stamatov  benefitted from a new generation of skimming technology that has turned the once-difficult crime into a mass-market business. Using pre-fabricated gear perfectly matched to the hardware of Chase Bank ATMs, they were able to read the magnetic stripe off of victims' cards and even record victims punching in their PINs. After this bit of fun, the duo went on a cross-country withdrawal spree using clones made from their victims' cards, pulling over $264,000 in cash from machines in Arizona, Illinois, and Canada.



At left, one of the Chase ATMs "compromised" by Ivanov and Stamatov's skimming gear. At right, the card reader—disguised as a lip that fits over the ATM's existing card slot—and the pinhole video camera used to capture victims' PINs.




Skimmers are cleaning house getting an average of $50,000 per incident there are not only hit ATM's but also Self check out lanes in stores and gas pumps.
In an effort to fight skimmers banks are come up with new ways to fight this in Europe the have begun to  use smart chips in place of the magnetic strips. US banks have started adding sensors to detect if something is added to the machine and jammers to prevent the transmission of data find out even more at http://arstechnica.com/security/2012/06/automated-robbery-how-card-skimmers-still-steal-millions-from-banks/

Google's Chrome browser can now be used to surf the Web on the iPhone and iPad.

Google Inc.'s Chrome, the world's top Internet browser, is now available on the iPhone and iPad, as Apple Inc. finally granted access to its foe's more popular Web-surfing app. So now you can take information in Google chrome right to your iPhone or iPad. so all your bookmarks with you where ever you go. Go to the Apple app store and download it now.

Thursday, June 28, 2012

SWAT team throws flashbangs, raids wrong home due to open WiFi network

 That right more often that you would think law enforcement offices from local police to the FBI are raiding homes for warrants related to internet activities only to find out its the wrong home.  This problem is being caused by unsecured WiFi Networks everywhere.  Unknown to the homeowner criminals are using there WiFi network for illegal activities online.


So don't have the SWAT team come knocking on your door get your WiFi network secured today.

What to do when your Facebook account keeps posting spam links

One of the most obvious and common signs that something is wrong with your Facebook account is when you notice it automatically posting spam messages and links to websites without your permission. These potentially malicious messages and links are likely to start appearing in the newsfeeds of all your Facebook friends who may think you posted them, so it is important to find out why your account is posting them and how to stop it.













So how do you Identify what they are and how to get rid of them?





Take a look at http://thatsnonsense.com/blog/?p=243 they have detail instructions.

Google Glass Explorer Edition


Google Glass Explorer Edition is the first product to come out of the company's Project Glass. At its most basic level, the Glass is a device that lets you show and interact with the world around you without disconnecting from it.
The Glass is designed to be out of the way so it doesn't interfere with your activity. According to Google, it weighs less than most sunglasses. On the side is a touch pad for control, on top is a button for shooting photos and videos with the built-in camera, and there's a small information display positioned above the eye out of the line of sight.
The actual spec details given were pretty light, other than to say it has a camera, multiple radios for data communication, a speaker and a mic, and a gyroscope so the Glass can tell your position and orientation at all times.

Wednesday, June 27, 2012

Facebook Hides Your Email Address Leaving Only @Facebook.com Visible.


In an attempt to improve email address privacy, Facebook has screwed up big time in what seems like a self-serving attempt to increase usage of@facebook.com email addresses that direct to your Facebook Messages Inbox.
Now everyone’s personal email addresses have been hidden from their profiles, regardless of previously selected privacy settings. Instead, your@facebook.com contact info is the only one visible to people with permission to see your email addresses. This makes it harder for friends to contact you via third-party email unless you reset your controls. So once again Facebook makes changes for you and doesn't tell you.

Raise of the Machines??

They may not fit in our homes or budgets yet but Artificial Intelligence computers are just around the corner A neural network built over the years by researchers from Stanford University and Google has managed to teach itself to recognize faces and cats. The network consists of 16,000 processors on a cluster of 1,000 computers. After being exposed to 10 million images downloaded from the Internet, the network software learned to recognize human and cat faces, as well as human bodies, according to the researchers.  

Your Facebook status shared with the world

If you think that only your friends see what you post to Facebook you might just be wrong.  check out this site www.weknowwhatyouredoing.com  due to a  lack of, with regards to their account privacy settings. People have lost their jobs in the past due to some of the posts they put on Facebook, so maybe this demonstrates why. Efforts have been made to remove any personal data from the results, such as the actual phone numbers, surnames, etc. The data is still easily accessible from the API, the filters have been put in place to protect the site from legal issues. 

So how do you make sure your posts don't end up on this site or some other site just go to https://www.facebook.com/settings/?tab=privacy and make sure Control Your Default Privacy is not set to "Public". You can set it to "Friends" but for the best privacy it is recommended you choose "Custom" and go through each option to choose who can see what

Tuesday, June 26, 2012

Not so friendly friend finder in Facebook

Yesterday Facebook started testing a new add-on to Facebook Mobile this feature would allow you to find Facebook members nearby you even if you are not friends with them. Can you say Facebook for stalkers? Facebook quietly pulled this feature earlier today when a company called Friendthem accused Facebook of stealing the idea. In a release provided to CNET and other outlets, Friendthem's CEO said the company was mulling a lawsuit. Lets all keep an eye on this and protect our own privacy.

Monday, June 25, 2012

All about the weather

Florida is a beautiful place to live most of the time but there are some days like today that all you can do is stay inside and look out your window and watch it rain sideways. With Tropical Storm Chris looming off our coast we get lost of rain, thunderstorms, and Tornadoes.

There are some very important things you should do for your computer:

 1. Do a backup and take the back up with you if you leave the area. If you are using an external and your not leaving put it some where safe I would put it in a couple layers of Ziploc bags if you can.

2. Shut your computer down and unplug it. Sure you may have the really nice surge protectors but what are you going to do for the few months it will take you to collect on the insurance they have to get a new computer?

3.  It's a good idea to to put your computer, Monitor and printer in heavy duty garbage bags and seal the bags shut. ( don't for get all your extras speaker, keyboard ,  mouse ect...)

4. Stay safe remember its all just stuff and its not worth dying over.

Sunday, June 24, 2012

iPhone 5 Coming Soon

For all you iPhone Junkies out there rumor has it you may get your latest fix with the New iPhone 5 later this year first the bad news the iPhone 5 will have a smaller 19-pin port. According to earlier rumors, this type of connector is supposedly going to make its way into all of Apple's future mobile devices. While the 30-pin connector is what the iPhone maker has been using for years, a smaller port will create more space in the internal structure of the device. so there goes all those useful docks that you had on your devices or cars. now the good stuff you may be able to swap out the camera lens, screen has a 3.95-inch display,reported details of a development version of the hardware, and iOS 6, the next major version of iOS. Among the details is that the next iPhone will sport 1GB of RAM, powered by mobile chip design specialist ARM (of which Apple is a licensee), we'll see a quad-core processor debut in the new iPhone 5 - probably called the Apple A6. all of this will be tucked neatly inside a gray, metal, and sleek all over outer shell. So when will you find this in your local iStore ? Rumor has it that it will be released in Sept and Oct of this year. So Starting Saving now because this may cost you $800. 

Saturday, June 23, 2012

What are Viruses,Trojans, and Malware


computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
Malware includes computer viruses, computer wormsTrojan horses, most rootkitsspyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

So why do People create Malware and Viruses

There are many reasons why people make virus/malware. Ill start with viruses.
Viruses are made to prove something such as a hole in Microsoft, a recongnition of the programmers skills "I was responsible for the...", to harvest sensitive information (passwords, ccard numbers and such) or to take over PCs to become part of a "botnet" which can be used for things like attacking webservers to bring them down.

As for malware, its usually made for financial purposes. With Adware you get ads popping up on your computer, they want you to click it and/or buy whatever is being advertised and the Malware maker gets a commission for it. It might be X amount per click, might be a percentage of the product cost.

Spyware is typically used to gain market information. For example, lets say you installed a Music downloading program to get MP3s and it has spyware in it. The spyware will keep track of what type of songs you download and what type of bands, send it back to base and now they have information like who is the most popular band and what genre is becoming more popular so a record company can sign more of that genre.

Thursday, June 21, 2012

Google bots detect 9,500 new malicious websites every day

According to Google Security Team member Niels Provos, the program detects about 9,500 new malicious websites and pops up several million warnings every day to Internet users.

"Approximately 12-14 million Google Search queries per day show our warning to caution users from going to sites that are currently compromised. Once a site has been cleaned up, the warning is lifted," he pointed out, and added that they provide malware warnings for about 300 thousand downloads per day through their download protection service for Chrome.

This just another reason I recommend Google Chrome.

Wednesday, June 20, 2012

Hacker put a Trojan out with malware built-in chat to toy

Researchers found a Trojan linked in a gaming forum as a how-to video for Diablo III got a surprise when the hacker started chatting with them—through a feature in the malware. Read the whole story at http://arstechnica.com/security/2012/06/hacker-uses-malware-built-in-chat-to-toy-with-researchers/

Tuesday, June 19, 2012

Surface for Windows 8 Pro tablet

Here is what we have been looking for the new Windows 8 surface tablet

  • Processor: Intel Core i5 (Ivy Bridge)
  • Weight: 903 grams
  • Thickness: 13.5 millimeters
  • Display: 10.6-inch ClearType Full HD (1080p) capactive touchpanel
  • Battery: 42Wh
  • I/O: microSDXC, USB 3.0, Mini DisplayPort, 2x2 MIMO antennae
  • Software: Windows 8 Pro
  • Accessories: Touch Cover, Type Cover, VaporMg Case & Stand, Pen with Palm Block
  • Capacity: 64GB / 128GB
  • Availability: "Three months after" the Windows 8 launch this fall
  • Pricing: To be determined
See the video now


Monday, June 18, 2012

Is Blackberry coming to an end?

With the Androids, Windows Phones and the Iphone will the blackberry go to the wayside like the VCR and Tube Television? We aren't holding a Wake for the blackberry yet but it may be coming soon  so if your looking for a new smartphone I would look elsewhere.  One of RIM's manufacturers, Celestica, is planning to phase out its production for the smartphone maker through the next three to six months.  Read more about it at  http://www.engadget.com/2012/06/18/celestica-phases-out-blackberry-related-production-for-rim/.

Sunday, June 17, 2012

Everyone needs a pet

What pet can you get that geek in your life that spends so much time on the computer a regular animal would abandon him. Get him the new I-SODOG Robot no more cleaning up after your pet and you can control it from your phone. Sure you have to charge it and  clean up the occasional Data puddles but your. So start saving now because this puppy will cost you $400 when it gets released in  the spring of 2013.




Saturday, June 16, 2012

Facebook yanks spammy 'Verify Your Account' app


This is the message that popped up when someone clicked the suspicious "Verify Your Account" link before Facebook disabled the app.
Facebook has removed an app called "Verify Your Account" that attempted to trick people by posing as an official Facebook message.
"This app has been disabled," a Facebook spokeswoman confirmed via email. "We take action against apps that violate our platform policies as laid out here: https://developers.facebook.com/policy/, in order to maintain a trustworthy experience for users."

Microsoft to take on Apple with own Windows 8 tablet?

That's right next week it is rumored that Microsoft will announce the release of its own tablet running Windows 8. Will this tablet finally have the punch to dethrone the Ipad?  As far as Tablets I think Windows 8 will be a strong platform, the question is will Microsoft have the apps to support it like the Android tablets or the Ipad. If it does my next tablet may just be the Windows 8 tablet.

Friday, June 15, 2012

Skype calls to feature ads big enough to interrupt any conversation


Skype has provided a great service for years, keeping us connected with friends and family. But there's always been one thing missing—marketers interrupting calls with giant display ads.
Skype is finally fixing that problem, with today's launch of so-called "Conversation Ads" that will appear within the calling window during audio calls. Why are they called Conversation Ads? Because Skype is actually hoping users will discuss the content of the ads during phone calls. In other words, Skype (now owned by Microsoft) is hoping to interrupt the normal flow of human conversation, with advertisements targeted at users based on their location, gender, and age.

Thursday, June 14, 2012

Best antivirus programs

I was just reading an article on the top antivirus programs bitfinder plus was rated #1
#2 Kaspersky
#3Panda
#4 F-secure
#5 AVG
#6 Avasit!

here are how some of the more popular AV Programs did
NOD32 #10
Norton #11
Mcaffee #14
webroot#15

See the whole list at http://anti-virus-software-review.toptenreviews.com/

Facebook, Google, Twitter spearhead Ads Integrity Alliance to thwart villainous ads

Online heavy-hitters GoogleFacebookTwitterAOL (Engadget's parent company) and the Interactive Advertising Bureau have have struck an alliance aimed at ridding nasty advertising "from all corners of the web." Stemming from the existing StopBadware group that began in 2006, the group will develop policies, build a platform for identifying scofflaws and share trends with government and law enforcement. For its part, Google curbed 130 million ads promoting counterfeit articles, malware and worse in 2011, but said baddies would normally move their shady businesses to another corner of the internet. Thus, the aim of this new league is to aid players across the web with its super resources in a bid to stop the knavery, no matter where it tries to hide.

Wednesday, June 13, 2012

Creating apps

Today I am spending the day creating Android and Facebook apps for my computer business there is a really cool app creation site that is free and easy to use http://www.appsbar.com

Dropbox offers up to 5GB of free space to anyone willing to go beta

Here's some good news for all you Dropboxers out there: the company is offering a bundle of free storage space to anyone who tries the beta version of its new Experimental software. It's really quite simple: just download the test program, upload a photo, and instantly get 500MB of free storage. Upload another photo or video, and an additional 500MB will magically appear at your doorstep. The idea is to test out the beta software's new photo and video uploader, which automatically pulls media from any camera, smartphone or SD card and drops it in the cloud. Free space is limited to 5GB per user, and there's an inherent risk to testing any unfinished product, but those willing to make the leap can find all the requisite materials and information at the source link, below.  visit http://www.engadget.com/2012/02/03/dropbox-beta-5gb-free-space/ for more information

Microsoft patent application could match online moods with emotionally-targeted ads

so what do you think of this? It's a match made in marketing heaven: users let their guards down within the internet's virtual walls and ads are served up to complement their fickle mental states.


Read the full story at http://www.engadget.com/2012/06/13/microsoft-patent-application-could-match-online-moods-with-emoti/

Websites for businesses

Allot of us own our own business. with all the stuff that takes up my time  I have found that my web design skills are not update. I was looking at my brothers website for his church www.newlifegg.com for Nelife Church Naples and he told me that I found out that Lifeway Designs had made it for them So I went to them and worked with there design team to make my new website. to the team at Lifeway I would like to say thanks and great job.

Great place to get braces

Recently I injured my hip and knee and had to get a Knee Brace found a great place to get them online so visit Return to Fitness http://return2fitness.net/.

Tuesday, June 12, 2012

New company website

DNF Computing

$15 Windows 8 upgrades available from Microsoft through January 2013

If you buy a computer between Jun 2, 2012 and Jan 2013 with Windows 7 on it you qualify to purchase a Windows 8 upgrade for $15. some companies may just bundle this with there new computer so keep your eye open when buying your next computer.

The Worst Passwords of 2011


Are you using any of these password if so change the best password contains upper case and lower case letter, numbers (two or more non repeated) and a special Character (~!@#$%^*+=)

1. password
2. 123456
3. 12345678
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. baseball
12. 111111
13. iloveyou
14. master
15. sunshine
16. ashley
17. bailey
18. passw0rd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football

Seagate Backup Plus hard drive

I think this is a great new backup the backup software provided with this drive will allow you to back up your computer plus your galleries from Flickr and Facebook accounts. For more information click here

VIA Technologies' $49 Android barebones PC available for pre-order, ships in July

For more Information Click Here

Monday, March 26, 2012

Get you Place in the Cloud

After a suggestion from I recently signed up for BOX at http://www.box.com/personal/ this is a nice storage location that allows for online collaboration. so take a look and see if you like it.

Thursday, March 15, 2012

Review of Windows 8 Customer preview

Well I tried it on netbook and have to say my netbook was not up to the task it ran very sluggish it took longer to load and caused to browser to time out sometimes. I have an AOL email account and was not able to access it via a browser I figure this is a compatibility issue and will be resolved before the release. my strongest advise for windows 8 has been out for a few months and make sure your system has twice the capability of what is recommended my Microsoft or buy a system that has been designed from the ground up to use Windows 8.  So in finish I don't plan to upgrade my computers to windows 8 at this time. I will look into it after it has been out for a few months and see if it is a good choice for me then.

Monday, March 5, 2012

Giving Windows 8 a try

I downloaded and Installed Windows 8 on my netbook I like it but do feel that it is better suited for a computer with a touch screen. If you run it in desktop it take a little getting use to but from my initial exposure to windows 8 it does seem to have some promise I think I am going to try it on one of my tuffbooks and see how it works there

Tuesday, February 28, 2012

a computer in your pocket

The Cotton Candy is a USB stick sized compute device allows users a single, secure point of access to all personal cloud services and apps through their favorite operating system, while delivering a consistent experience on any screen.  Check them out at http://www.fxitech.com/products/

do not track feature coming soon

Last week, the White House announced a new Internet privacy agreement with the companies serving nearly 90 percent of "online behavioral advertisements," theoretically forcing the likes of Google, Yahoo, Microsoft, and AOL to stop monitoring the Web-surfing habits of users who click a "Do Not Track" button on their browsers


read the full story at


http://arstechnica.com/tech-policy/news/2012/02/can-do-not-track-tame-the-webs-cookie-monsters.ars

Windows 8 live updates


Join us for Microsoft's Windows 8 press conference tomorrow at 9:30am EST!



http://www.engadget.com/2012/02/29/live-from-microsofts-windows-8-press-event-at-mobile-world-cong/

see you there

Saturday, February 25, 2012

Cable, Cables and more Cables.

With the fasting changing world of technology we are always in need of a cable of one type or another but which do you buy. I have had people ask me do I by the $40 gold connector thick HDMI cable or is it ok to use the $25 one? Well let me tell you what the Techs I know do we go to monoprice.com and buy the $4 cable and in most cases they work fine. I've only seen one case where a person needed the gold connector, heavy shielding cable, the person's power meter was on the outside of the wall directly behind the TV. so if you need a cable of any type check mono cable first.

power management

Question from Cathi Getter McLaughlin on Facebook " o.k smart guy why does my pc lap top go off if i don,t use it for about 2minutes if i walk away say to answer the phoine or whatever when i get back i have to sign agian. please help lv"

Answer:  This is an easy one. Its caused by your power management settings you can find instructions to change the settings at http://technet.microsoft.com/en-us/library/cc785751(v=ws.10).aspx

Friday, February 24, 2012

Ask a tech

Do you have a question about computers, tablets, smartphone or Smart TV drop me a message at gray.forest1968@gmail.com or comment on this post  and I will post the questions and answers .

Wednesday, February 22, 2012

Virtual Machine

OK this is a little advance but I'm going to put it out there. Recently I learned about Virtual Machines. This is a really cool tool. It allows you to to run another operating system within your current OS. So basically you can run Linux from your windows desktop . this is a great way to try Linux for the first time if you want to.So how do you do this? download and install VMplayer at https://www.vmware.com/support/pubs/player_pubs.html.  If your running windows 7 visit here to do it. http://www.howtogeek.com/56158/beginner-how-to-create-a-virtual-machine-in-windows-7-using-virtual-pc/ good luck and enjoy...


Friday, February 10, 2012

Chrome Web Store

Have you seen this?? I just discovered it today get apps and addon for Google Chrome just like you would your android phone at Chrome web store. Its got allot of free apps for Google chrome lots of fun

Wednesday, February 8, 2012

Raspberry Pi's $35 Linux computer on track to launch later this month

that right a $35 Linux computer to be release check them out at http://www.raspberrypi.org/ they sound interesting and I think this is a great way to try Linux. Keep an eye open they are coming soon.

Windows 8 consumer preview

Are you wondering what windows 8 is like well you wont have to wait long the Windows 8 Consumer Preview will be available for download on February 29. Check here regularly I will update you and have links when they come.

Tuesday, February 7, 2012

Another reason not to use norton


Symantec offered hackers $50k to delete stolen code in alleged "sting" read at http://arstechnica.com/tech-policy/news/2012/02/symantec-offered-hackers-50k-to-delete-stolen-code-in-alleged-sting.ars

Web Browsers

You have allot of choices out there on web browsers Firefox, Google Chrome, IE, and Safari. are the most common If your using a windows based computer it cam with Internet explorer (IE). a few weeks ago I read an article that compared the security of the different web browsers and it rated Chrome the best. Well I have tried all of them and they all have pros and cons and in the end I chose Chrome so let me tell you about the rest. Ill start with Firefox it rated the lowest in the security rating and has a know memory leak. Next IE because of the way IE intergrades with windows it makes it harder to correct any type of problems when they occur. Google chrome hides allot of its features so it takes awhile to get use to. So my suggestion is  keep IE up to date as a backup and use Google chrome.

Wednesday, January 25, 2012

Video Cards

For most people the on board video is enough for everyday usage but sometimes you need something more for playing high end games or doing graphic editing and movie producing. Which video card is best for you really depends on you and your budget I suggest you get the best you can afford some features to look at when shopping are 3D, memory the faster the better, crossfire or the ability to work 2 video cards together. Allot of the times when you upgrade your video card it may require you to upgrade your power supply and add a couple extra fans to the case if you can. 

Tuesday, January 24, 2012

Linus whats the hype?

Allot of people by a computer and run the operating system that come with it. But there are other options out there and some are free and easy to use. Linux Ubuntu is one of them. I have an older computer that was designed to run XP and I wanted to do something different so I loaded Ubuntu on it to give it a try.I found it was a big improvement over the version of Red Hat I tried so many years ago. It was easy to install ran real smooth and detected and installed all the right drivers for the computer. Installing application was as easy as looking through an app store like interface and install the apps you want for free. so if you have an older computer and are at least a little computer savvy give Ubuntu at try down load it at www.umbutu.com

Thursday, January 19, 2012

Hard drives SSD and platter drives

There are allot of options now with hard disk drives( HDD ) now you have to decide between sizes, brands, connection type, and Now Solid State drives (SSD), hybrid drives and platter drives. So where do you start? Well ideally  you would want a SSD for your Operating system and most often used programs. What size SSD depends on what programs you use most often but I would start with about a 120gb. The problem with SSD's a 120gb start at about $130 and go up from there, when you include the cost of a data drive 2TB at about $100. the next option is a hybrid HDD this a standard HDD with with 64mb cache built in this is a performance increase  over  standard HDD but it cost almost as much as the SSD option so I would suggest a standard HDD if you cant afford the SSD option. as far as brands go I recommend Seagate for HDD's and Intel for SSD's.

Computer Hardware - Processors

So I have worked in the computer industry for many years and when I was doing something else I still made it a habit to keep up with whats going on in the computer world. When your looking into buying or building a new computer the most important part is the processor. in my opinion bigger and faster is better. When your shopping go for the best processor you can afford currently I recommend the Intel i5 and Intel i7. Other parts are easier to upgrade in the future than the processor.check out the full line of Intel 2nd gen processors I am quite impressed by them at www.intel.com

Tuesday, January 17, 2012

Understanding Open Source Software: What It Is and How to Find It



Open source software (OSS) represents a revolutionary approach to developing and distributing software, characterized by collaboration, transparency, and accessibility. This article provides a comprehensive overview of what open source software is, its benefits, and practical guidance on how to find reliable open source programs.

What is Open Source Software?

Definition

Open source software is software with source code that anyone can inspect, modify, and enhance. "Source code" is the part of software that most computer users don't ever see; it's the code computer programmers manipulate to change how a piece of software—a "program" or "application"—works. Programmers who have access to a computer program's source code can improve that program by adding features to it or fixing parts that don't always work correctly.

Key Characteristics

Accessibility: The source code is available to the public for use and modification.

Freedom: Users have the freedom to modify and distribute their versions of the program. There are generally few restrictions on how the software can be used.

Community: Development is often driven by an active community which collaborates on projects.

Transparency: With open access to the source code, users can verify the security and stability of the software themselves.

Licensing

Open source licenses affect how the software can be used, modified, and shared. Common licenses include the GNU General Public License (GPL), Apache License, and MIT License, each with its specific conditions and freedoms.

Benefits of Open Source Software
Cost: Most open source software is free to use, reducing the cost barriers for individuals and businesses.

Flexibility and Freedom: Users can modify the software to meet their specific needs.

Security: With many eyes scrutinizing the code, security vulnerabilities are more likely to be discovered and fixed quickly.

Quality: Collaborative input from a diverse range of developers can enhance the quality and innovation of the software.

Support: Strong community support and extensive documentation can help in troubleshooting and improving the software.

How to Find Open Source Software
1. Official Directories

GitHub: Perhaps the largest and most popular host of source code, GitHub offers countless open source projects.

SourceForge: One of the early platforms for open source projects, providing a variety of tools and hosting services.

GitLab: Similar to GitHub, but with integrated CI/CD tools, making it ideal for DevOps.

2. Specific Open Source Software Websites

Apache Software Foundation: Hosts a variety of enterprise-grade projects under the Apache License.
The Linux Foundation: Provides a home for Linux and many other high-impact open source projects.

3. Search Engines

Regular search engines can also be used to find open source software. Simply including "open source" in your search query can lead to relevant results.

4. Social Media and Forums

Online communities like Reddit’s r/opensource or specialized forums such as Stack Exchange can provide recommendations and reviews from actual users.

5. Open Source Software Lists and Reviews

Websites like Open Source For You or FOSSBytes regularly publish articles, lists, and reviews of open source software.

Conclusion
Open source software offers numerous advantages from cost savings to enhanced security and community support. Whether you are a developer looking to contribute to a project, or a business seeking flexible software solutions, or even a student eager to learn coding, the open world of OSS offers limitless opportunities. With the resources outlined above, finding and utilizing open source software has never been easier. Embrace the open source movement and discover how transformative it can be for your personal or organizational software needs.

Office for Free...

So you want to do excel, word and power point but don't have the extra cash to by buy Microsoft Office so what do you do? well take a look at Open Office its a great open source program that does most of the same things for free. There is also LibreOffice another open source office solution. Enjoy and have fun.

Cool Tools

Now for some of the cool tools I use to get around forgotten password virus infections and computer that will not boot into windows properly. first check out Hiren's boot CD you'll have to find this one on your own.  if you dont know how to use it dont download it. Now here is something everyone can use Advanced System Care.

Monday, January 16, 2012

a couple recent scams

There are a couple of scams going around the newest one I have seen is where someone call you claiming to be from Microsoft and tell you you have problems with your computer. they then have you download and install logmein software so they can access your computer. the pull up an error log ans show you all the problems that your computer has and then they try to get you to pay them to fix the problems. No the first problem is that in all my days of owning a computer Microsoft has never called me. The next thing is you don't know the person on the other end of the line so why would you want to give them access to your computer. My best piece of advice I can give you is if you don't know who the person is and you didn't call them its not a good ideal to let them access your computer. and don't give them your credit card information.

The second scam is a virus that looks like an anti-virus the best way to identify this is to know which AV software you are running and if you get prompted by any other program claiming to have found a a worm, Trojan or virus on your computer and requiring you to purchase a piece of software to remove then you are infected. at the following link you will find instructions for removing it http://www.howtogeek.com/howto/8693/how-to-remove-antivirus-live-and-other-roguefake-antivirus-malware/ I suggest you have your tools together before the problem occurs so you will know that to do and be able to do it.

What is malware?

Malwareshort for malicious software, is software (or script or code) designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems. It is a general term used to describe any kind of software or code specifically designed to exploit a computer, or the data it contains, without consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software.Malware includes computer viruseswormstrojan horsesspyware, dishonest adware, most rootkits, and other malicious programs. Most of your comon AV software will pick up viruses, worms and trojans. For spyware and adware you need another tool a few I recomend to do the job are Malwarebytes and super anti spyware and Ad-Aware Free Internet Security.

Sunday, January 15, 2012

Viruses

Viruses are an ever growing risk and with the internet now they can infect everything from your computer to your smart phone. and the old saying that apples don't get viruses isn't true anymore. So often I run into people that have an anti-virus(AV) program installed in there computer and they still get a virus. Why is this? because the people writing the viruses are smart and when they write a virus they are trying to make something that can get by the AV software. The goal of creating a virus is to infect as many computer as possible so the two AV software's they often target the big two AV programs Norton and McAfee. So how do you protect yourself. The first thing you need to do is use some common sense when your on the internet. when your AV software warns you of a virus listen to it, be aware of what your downloading and where you are downloading it form, read the URL in the address bar makes sure your at the right site. Don't open attachments from anybody unless you know who sent it and you were expecting to receive it.  Keep your software up to date this is more than just your AV program, it includes your OS, flash player, java and any all other programs.

Saturday, January 14, 2012

Bloatware

I know the first question is what is bloatware? Well bloatware is all that "free" software that the computer manufactures install on your computer before you get it that makes your new computer run just as slow as the one you just replaced. So you start up the new computer and it takes 10 min to startup and 50% of your processor is in use before you even go to your first web page.  So how do you get rid of it, that a little tuffer. you'll want to go into MSCONFIG just type msconfig in the search windows off of the start menu then go to the setup tab and start disabling all the stuff you don't need. If you not sure what you can do with out do them one at a time restart the computer and make sure everything works. this will take a little longer but it will work and remember when you disable this stuff it doesn't remove the program it just stops it from starting up evertime you turn your computer on.

System Security

Most computer come with an Internet Security Suite and the 2 most popular are Norton and McAfee. If you have one of these uninstall it.. I know what your about to say "but I have 6 months of use of it for free" so what, what you have 6 months of headaches, poor performance, and maybe virus protect if your lucky. so we are back to my instructions uninstall it. then go out and get some good anti-virus, some anti malware and be done with it. you can get them all in one in Microsoft security essentials  or you can go with AVG and Malwarebytes. Always remember more isn't better don't go installing more than one Anti-virus program.

Friday, January 13, 2012

Update and Backup

So you got that new computer at home and are ready to go surfing the Internet but first there are some very important things you need to do. The first step is to update windows and then back up. Microsoft makes it simple and easy if you didn't tell the computer to update automatically visit Microsoft's page on updates at http://windows.Microsoft.com/en-US/windows/help/windows-update this process could take some time to do so you might want to have a good movie to watch while you wait. Might I suggest you go geek and watch Pirates of Silicon Valley. Don't just run the update once and think your done. It may need to run and restart several times. the next thing to do is make a backup and recovery disks. Yes that's right no longer are the computer manufactures including recovery disk you have to make your own. you should find instructions for doing this in your manual. I suggest that you use a USB flash drive (32gb). Now for the backup solutions. there are several ways you can create a backup. every thing from cloud drives to an external HD which solution is best for you depends on what type of work you do on your computer. If you do really important work that you  need to back up everyday you may want to look into an online data storage solution. 

New computer

So often I have run into people that have just bought a new computer and they don't know where to start or what to do to get the computer up and working properly.  there are three areas that you should first address before you start having fun with your new computer.

1. Update and backup.
2. System security.
3. getting rid of bloatware.