20071127

Nature Wallpapers

I found some sweet wallpapers for your machines. Thank me later :)
http://blogs.msdn.com/mswanson/articles/wallpaper.aspx

20071004

Elaborate Morphing Trojan - The Storm

Good Morning! It was at least until I read an article about a threat called "Storm". Originally from early this year it seems it's creators have been able to re-engineer it, only better (or worse from another view). This is a silent trojan/worm style infection and as of today there really isn't an anti-virus that can stop it. It's estimated there are close to 25 million+ infected computers throughout the world. It doesn't damage your system but instead joins your system to a network of other infected machines**. This infection also 'sleeps' until it's ready to be used, then once it's finished it goes back to sleep sometimes as a different program***. It rarely causes any strain on your system, instead it does the opposite. It wants your system to be healthy so it can replicate itself to other machines.
What to do.
This goes right back "to if you don't know who it's from don't open it or follow a link inside the email".
Update your anti-virus, your operating system,and get a hardware (AKA a router) and software firewall.
Turn off your broadband connection when you're not using it.
Avoid peer-to-peer programs.

Do your best to protect yourself and others from these kinds of threats. If there's one there's bound to be another sometime soon.


One biggy precaution I like to recommend is occasionally rebuild your system. If you have the ability and your system is backed up on a regular basis (please please please back up your system!) take out the rebuild discs from your computer manufacturer and throw them in. Your system will be wiped clean of everything and you'll basically have a brand new machine. Remember the software you installed after you bought the computer will be gone and you'll have to reinstall it.****


** Why would someone want to infect your system and millions more? One explanation is to build a 'botnet' to attack another computer. Think of it this way. If you're talking to one person it's easy to handle. Another comes in and you're good to go. Maybe even three or four (although I'm going to have to be rude to the fourth guy). Now imagine 10 million people all talking to you at once. You're head would explode. Same basic reasoning behind a botnet attack. The server will shutdown and stop responding costing the company millions. OR even more devious. Those 10 million machines could be used to attack a firewall encryption for a defense grid.

*** A different program? A polymorphic trojan can change it's own programming to appear as another program. Using this system it can appear different to an anti-virus or anti-spyware program.

**** Kind of advanced but you could rebuild your system, reinstall all the software, then make a ghost copy of it. This will make things a lot easier the next time you're rebuilding.

20070829

Geek Squad Weak Mod

I'm doing some work at a clients house when one of their sons asks if I could hook his PSP to the family network. I've never messed with a PSP but I figured if it's wireless it should be the same basic principle as other wireless gear. His mother told me Geek Squad told him they would come out and and connect it to the network.....for $80! I was waiting for one of the systems to reboot so I grabbed hold and went to town. First the Geeks set up the wireless network with security (which was a good idea) but (bad idea) it was 64bit WEP. Sixty......four......double you ee pee. First mistake. Second, the password into the network they set up was in the top ten worst passwords you can use. Now trying to give the Squad some credit I checked the router security to see if 64 was the peak of its protection. No. WPA2. So instead of using a highly encrypted safe scheme Geek Squad decided to use the easiest password with the lightest encryption. Why they even chose to filter the MACs I'll never know. Oh and they broadcast the SSID. Nice. So remember:
Strong password (you don't write down)
WEP Encryption
Turn off broadcasting the SSID
Filter MACS
Turn it off when not using it.

20070719

June/July Computer Tips

How to use Microsoft Outlook's Out of Office feature without being on an Exchange Server (Outlook 2000-2007 only)

I was recently asked by a business client how they could use the Microsoft Office Out of Office Assistant without being on an Exchange Server.

This will show you how to use Outlook (sorry, not Outlook Express) to give an automated response to show people that although you got the email you're not in the office or available to answer it.

If you're using Word as your email editor; or using HTML or Rich Text this will not work. You have to use plain text.

Make a Template

Open a new blank email and write your message with any info you want included.

"Hello and thank you for your email. I am currently out of the office and won't be returning until I regain my sanity"

Don't address it. Click on the File menu within the email and choose Save As. When the Save As box appears, use the dropdown menu at the bottom that says Save as type and choose Outlook Template (*.oft).

Don't change the defualt location. It needs to be saved there so you can select it from the Templates library.

Name and save the template. Close the email message and click no when Outlook asks if you want to save the mail.

Make the Rule So It Automatically Replies To Everyone

Go to the tools and select Rules Wizard (or Rules and Alerts in 2007). Click on New the first step asks what conditions you want to set for this rule, just leave everything unchecked and click on Next. Outlook will then give you a message that tells you this rule will be applied to all mail you receive. Click Yes.

In Outlook 2002 and Up, the first step of the Rules Wizard asks if you want to base this rule on an existing rule or start with a new rule. Tell it to start with a new blank rule.

Look through the list of choices and check the one that says Reply with a specific template. Click on the underlined words in the bottom pane. Use the dropdown box at the top to select User Templates. In the box below you will see your template. Select it and click on Open. The rule is setup to reply to everyone with this template.


Free Storage (AMD Streamload)

25 gigs of free storage you can access anywhere within the reach of a computer?
Email extremely large attachments to other users? Is it secure? Sort of. Encrypted? No. Do they guarantee? no - it's free folks. All you need is a valid email address. Goto:

20070606

May Computer Tip Archive - Graydentech.com

Security -
Have trouble remembering all those passwords? (you shouldn't have just one) I found an excellent program that will let you create, store, and encrypt your passwords in one file. All you'll have to do is remember one password to unlock it. The program is called KeePass and you can download it here:
KeePass.
Web -
Did you know that Internet Explorer 7 comes with alternative search options? You can search websites like Target, Amazon, Wal Mart, eBay, and many more right from the search box to the right of the adress bar.

Locate the upside triangle just to the right of the search box. Click and go to "Find more providers.....". This will take you to Microsoft and you'll see all the search options available. Just click the link you want and accept the provider. Then when you want to search the website type your text and click the triangle again and select the site you want to use.

Alternatively you can go tohttp://www.microsoft.com/windows/ie/searchguide/en-en/default.mspx?dcsref=http://runonce.msn.com/runonce2.aspxand select them manually.

20070521

Smile Hammock



--

Fred
http://solutions.segerhouse.net


"May your glass be ever full. May the roof over your head be always strong. And may you be in heaven half an hour before the devil knows you're dead."

GraydenTech's Fan Box

GraydenTech on Facebook