Wednesday, December 25, 2013

Merry Christmas


My prayers for a blessed Christmas

and my best wishes for a happy, healthy 

and successful 2014.

Saturday, December 7, 2013

Passwords - Again --- Updated 12/09/2013

I got this email from a customer:
. . . I heard on the news today that Google is one of many companies whose computers were recently hacked and that passwords were obtained.  I don’t use Google mail on my computer but rather Windows mail. However, in order to have access to Play Store apps, I had to open a Google account on my Samsung smartphone and that password is the same as my computer password. I just closed my Google account on my smartphone. Should I change my password on my computer and if so, how do I do that? I use that same password extensively for other applications. . .
Here is my reply:

You raise a heck of a lot of important questions in your text. Because the issues you are touching on IMHO are very important I will try to reply to every single part separately and interspersed in your text.
I heard on the news today that Google is one of many companies whose computers were recently hacked and that passwords were obtained.
A good example of uninformed sensationalist reporting. What literally ALL halfway decent companies stores are NOT passwords but encrypted passwords. That is technically and for hacking purposes a BIG difference.
I don’t use Google mail on my computer but rather Windows mail.
IMHO using ANY Microsoft email program puts your computer at a far greater risk that the stolen Passwords do. "only" two million passwords from together three companies were stolen; these affected companies together have many hundreds of millions of users. That makes the percentage of compromised passwords VERY small.

There were no reports on how these passwords got in the wrong hands. I have no information on this either but I suspect that some gang of miscreants had a well working virus program on many computers world wide and that virus program copied the passwords. Now THAT would be bad because the virus program would get the real and not yet encrypted passwords directly from the keyboard when they are typed.

Update 12/09.1023: I just read that it was actually 154 million accounts that got compromised. Now That's a different thing now.
 However, in order to have access to Play Store apps, I had to open a Google account on my Samsung smartphone and that password is the same as my computer password.
1. Exactly what do you mean with "computer password"? The one you type to log on to your Windows account or one that you use on any web site? The former is no problem, just change it locally on your computer. The latter poses possibly a risk.

2. Using the same password on more than one service is always a risk and should be avoided.
I just closed my Google account on my smartphone.
That does not eliminate risks from stolen passwords.
 Should I change my password on my computer and if so, how do I do that?
That depends on what exactly the password is used for that you mention. If it is for your local user account then google the name of your operating system and change the password; google something like "windows 7 change user password". You will get many pages with descriptions of how to do that.
I use that same password extensively for other applications. . .
That definitely is about the biggest mistake you can make. Please read the following articles on my blog for lots of background information:

    Passwords too simple and what to do about it.
    Hacked Passwords deals mainly with email issues.
    Passwords that are NOT a password
    Passwords the Latest


Especially the last article above has all the nitty gritty. Follow the link in "The article I read is here ".  There you find all the technical background you could possibly want.

Update 12/09.2013: Hackers often like to publish their discoveries, and the databases of hacked, stolen passwords were uploaded for all to see.  This allowed the people behind a rather useful website to create a searchable copy of the list, so that you can check whether your details appear on a list of some 154 million stolen online accounts and email addresses.

To find out whether your details do indeed appear on any of those stolen lists, just head to http://www.haveibeenpwned.com/ and type in your email address on the home page.  If that address is among any of the lists of stolen accounts, you'll be warned straight away.

Above two paragraphs are a literal copy from here.

I hope this long reply helps in addition to giving you a lot of information and confusion. Please keep asking.

As usual I welcome comments and suggestions right here in the blog. Thank you in advance.

Stay safe!

Thursday, December 5, 2013

Virus Check BEFORE Download


I assume that you know about Virustotal (VT). If you still don't now than I am at a loss of words- which rarely if ever happens to me. But enough of my puny attempts on being funny.

With VT you can check any reasonably sized file (up to 64MB) that already is stored on your computer for viruses. What if you want to check a file for viruses before you actually download it?

If you use a web browser other than Internet Explorer you could install an extension.
  • In Mozilla Firefox you can install the VTzilla extension.
  • In Google Chrome  you can install the VTchromizer extension.
  • In Opera you can install the VTopera extension. 
Thesae extensions make it possible to right click on a download link before you start the download. In the context meny that opens you will see an entry like shown here; the example was taken from VTzilla in Firefox:
VT will upload and test the file in it's usual manner and presto you have a good idea whether the file in question is "clean".

If you feel challenged by the idea to install an extension in Firefox don't despair, I can do that remotely. 

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.


Sunday, December 1, 2013

2013 12 02 WTKM Talking Points (Dec 2nd 2013)


An epidemic
of a new kind of malware; see:
       PuPs - No Virus But just as Nasty  and
       How Malware Gets Installed 
       These malwares increasingly embed Bitcoin mining into toolbars, toolbar helpers and
       search agents.

New zero-day hole in IE (all versions).

Many more scam phone calls claiming computer infections.
       Microsoft (and MS affiliates) do not know about us!
Do not let them work on your computer!
Do not give them any credit card information!

I have seen one case where these crooks used a known company name (iWon) to install PuPs (see above); they probably get money for every installation that they do.
The guys who did this one were not even good at it!



Fake Skype voicemail alert: Email comes packed with a variant of notorious ZeuS banking Trojan.
Messages typically come with subject line “You received a new message from Skype voicemail service”; it contains a copyright notice and a disingenuous warning that "Skype staff will NEVER ask you for your password via email".
The purpose of this email is to get you to download and open the attached 'voicemail' file; this then installs the Zeus trojan. 

Crypto Locker virus: Maintain regular backups of data, keep backups separate from computer.
CL encryption is essentially uncrackable (except by the NSA?).
CL infects all current versions of Windows, XP through 8.
If you are somewhat technically adept and/or have someone on your computer you can't fully trust and you want protection from CL then considerCryptoPrevent.
Protecting your computer from CL is easy with best practices (aka common sense).

Windows 8.1 rolled out Oct 17. NOT via Automatic Update, rather you have to go to the MS store!
 This forces you to use a Microsoft account!

Updating from 8 to 8.1
      BIG download (> 311MB)
. More details here (Oct. 2013)
      Too big for comfort on standard DSL connections.


New Windows 8 computer?
Don't use a Microsoft account! (privacy vs. convenience)
More info: What Exactly is a Microsoft Account
Either way MS tracks all searches, local & internet. (NO to Bing)
Turn off Smart Search
Use Classic Shell (free) or Start8 ($5) to start into desktop.
Install VLC media player (MS removed Media Player!)
Win XP? Your risk of virus infection is SIX times higher that with Win 8 - NOW.

Unpatched XP SP3 vulnerability with older versions of Adobe Reader than 11.0.04. XP users with the latest versions of Adobe Reader (11.0.4 and up) are immune. UPGRADE Adobe Reader.

Facebook is reportedly testing to track cursor movement (silently track a user's actions); tracks how individual visitors respond to ads for better targeting advertising!

Adobe's servers hacked. 38 million user names and passwords plus source code stolen.

Please listen to WTKM on 104.9FM, Monday, Dec. 2nd from 10:00AM to 11:00AM.

Monday, November 18, 2013

Warning - W A R N I N G - Warning


On October 23rd 2013 I wrote about a really, really bad new virus called CryptoLocker.

Back then, only three and a half weeks ago, CryptoLocker was an acute danger mainly in the UK, parts of continental Europe and in some Asian countries.

This has changed dramatically. Computer users in the USA get hit with this virus increasingly often. Since a few days I receive about five emails every day that offer me "free money" or pre approved credit cards "ready to be shipped" my way. Would I ever click on a link in such an email? Would I ever be tempted to open one of the attachments? You bet not!

A free(!) protection method is available but it will interfere to some degree with normal computer operation. When this happens the computer user needs a certain amount of technical know-how to correctly diagnose the reason for the interruption and the to create an exception; this has to happen every time when it happens. If you can do that you should look at CryptoPrevent.

For everybody else I shout as loud as I can:
Disconnect your external backup drive when the backup is done!
If you don't disconnect the backup drive your backup files will be encrypted as well! They are totally useless once encrypted.

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.



Tuesday, November 12, 2013

Updating to Windows 8.1?


Updating from Windows 8 to 8.1?

The update process is quite daunting and time consuming as I described in this article about the tricks Microsoft uses.

So far at least this update is not mandatory. It brings IMHO only minor cosmetic changes and contains nothing that my customers don't already have; point in question here is a Start button and a decent desktop.

Additionally I have read quite a few reports of sometimes major problems with this update. These problems do not only pop up on older computers that do not have features in their processor that only recently became common.

I have read as well of problems on brand new computers that were bought with Windows 8 installed by the manufacturer.

My conclusion: There is no technical need to upgrade. For the time being I recommend to hold off.

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.


Saturday, November 2, 2013

2013 11 04 WTKM Talking Points (Nov 4th 2013)


An epidemic of a new kind of malware; see:
       PuPs - No Virus But just as Nasty  and
       How Malware Gets Installed

Many more scam phone calls claiming computer infections.
Microsoft (and MS affiliates) do not know about us!
Do not let them work on your computer!
Do not give them any credit card information!

Six customers in three weeks; two "fell" for the scam!

Windows 8.1 rolled out Oct 17. So far NOT via Automatic Update!

New Windows 8 computer? 
Don't use Microsoft account! (privacy vs. convenience)
More info: What Exactly is a Microsoft Account
Either way MS tracks all searches, local & internet. (NO to Bing)
Turn off Smart Search
Use Classic Shell (free) or Start8 ($5) to start into desktop.
Install VLC media player (MS removed Media Player!)
Updating from 8 to 8.1:
BIG download (> 311MB)
More details here (Oct. 2013)
Too big for standard DSL connections


Win XP? Your risk of virus infection is SIX times higher that of Win 8 - NOW. 

Facebook is reportedly testing to track cursor movement (silently track a user's actions); tracks how individual visitors respond to ads for better targeting advertising!
 

India: Named ransomware capital of Asia Pacific; online crime costs the country (estimate)
$4bn in 2012, according to Symantec.
Average cost per victim $207; below worldwide average of $298.
See my blog about Crypto Locker.

Adobe's servers hacked. 38 million usernames and passwords plus source code stolen.

Please listen to WTKM on 104.9FM, Monday, Nov. 4th from 10:00AM to 11:00AM.

Wednesday, October 30, 2013

Windows 8: What the Rest of the World Thinks


Recently on a Microsoft run web site and Windows 8 blog I ran across a reply to an article written by a Dutch IT consultant.

It summarizes what I have glanced from many, many similar comments I have read. I have modified some language and grammar quirks and fixed some misspelled words to convey the meaning correctly and in correct English.
Yes  it's true; Microsoft wants us to massively migrate to Microsoft based cloud based services. But in my country that will not happen as Microsoft wants it, especially   because these "virtual cloud services" are to 85% physically located within the USA.  
That is for most foreign people simply unacceptable. It's not only for reasons like privacy, piracy, taxes, company secrets - there is also a difference in mind-sets.
What if our sensitive data sits there in a physical data center somewhere in the US of A, and 'shit' really starts happening, like for instance war, wide spread diseases, natural disaster, terrorism attack, you name it -  anything could happen anywhere.
Foreigners don't trust CIA/FBI/NSA that much, we learned from the past months.
My customers are saying..., even refusing, to migrate their financial and sensitive business data to somewhere in the 'Microsoft' or even  the 'Amazon cloud'; abroad, unknown where it really is, in a far away foreign country, and nobody knows, or even checks what is happening to their data. It may be leaked to the NSA, via a built-in back door when Micro$oft sold this opportunity to the NSA/US-Government.
 No, sorry, not with us!  We aren't like that!
We even don't come close to this kind of behavior.
Yes, people in other countries don't trust their sensitive data into American hands; they approach privacy questions with a totally different mind set.

Maybe Microsoft's management better begin to acknowledge that not everybody will follow to where they, Microsoft and others, want to lead us?

What may be good for Microsoft may not be that good for the other 310+ million Americans. And what may be "good for Microsoft's America" may not be that good for the other 95% of the world population. 

In my opinion this is NOT a technical problem, it is an ethical problem. There are just too many of us who check their ethics and morals at the entrance of the office building before they begin their daily jobs.

No, it's not government agencies or organizations or companies that "do the wrong thing"; all these entities are run by people that collectively make questionable decisions.

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.



Monday, October 28, 2013

How Malware Gets Installed


You hear from me that your computer got infected with malware, especially PuPs, and you ask:
"How did that stuff get on my computer? I did not download or install it".
Sorry, but in most cases you did give permission to install that garbage alongside some legitimate install or update. You did not do it consciously, you got duped or tricked into allowing the installation. See this article for just one all too common example.

These tricks can have many different shapes and forms. They all are designed to trick or fool us into allowing the garbage to get installed alongside a legitimate program or update. User beware!

One of the more and more common forms is a legitimate install or update that asks something along the lines of

  • Default (or Express) install (recommended)
  • Custom install (for experienced users)
No matter whether you consider yourself to be experienced or not, if you click Default (which always is pre-selected!) or just click on the Next button you likely get PuPs installed. By now even software from well known names does that! Just as an example: Oracle's Java and Adobe Reader are bundled with PuPs; most downloads from well known download portals are by now loaded with PuPs. Why is that happening?

Simple answer: Money! The authors of PuPs pay for their stuff being bundled with legitimate software. There is a lot of money to be made from advertising!

Distributing viruses is illegal, distributing "search helpers"  or tool bars is not!

My advice: When you have to choose between Default and Custom installs always(!) click Custom; it is the only way to check for PuPs because so far at least they are being offered with some sort of a choice to decline or skip them.

If you are in doubt take a screen shot of the window(s) that sparked your suspicion, postpone the install and ask me in an email about it; don't forget to attach the screen shot please.

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.

Wednesday, October 23, 2013

Beware the Tricks When Updating to Windows 8.1


Oct. 26, 2013 Important Update: Please pay attention to the text after #6 and #7 below.

Just to have it done I decided today to update a customer's system from Windows 8 to 8.1. A few things caught my attention:

Depending in the speed of your internet connection and on the speed with which Microsoft delivers the download brace yourself for anything between 15 minutes and one to three hours - just for the download.

The installation speed will depend mainly an how fast your computer is and how fast or slow your disk drive is; it will take anything from 20 minutes to an hour or even more.

Microsoft came up with new tricks to get you to set up a Microsoft Account. BEWARE! I simply left the fields for name, email address and so on empty and clicked Next. Totally not intuitive but I got the old local account back. See below after #6.

The last of the preparation screens brought the surprise with the following six questions, all with ON (that is Yes, do it) preselected, quoted literally but emphasis added by yours truly:
  1. Use Bing to get search suggestions ad web results in Windows Search, and let Microsoft use my search history, location, and some account info to personalize my experiences
     
  2. In Internet Explorer, use page prediction to pre-load pages, which sends my browsing history to Microsoft
     
  3. Let apps use my name and account picture
     
  4. Let apps use my advertising ID for experiences across apps
     
  5. Let Windows and apps request my location from the Windows Location Platform
     
  6. Get better protection from malware by sending info and files to Microsoft Active Protection Service when Windows Defender is turned on.
Do I need to talk about the obvious privacy issues with points 1 through 5? I hope not...Needless to say, I set all switches for questions 1 through 5 to OFF.

Point #6 makes sense, we all need better malware protection. But at this point in an upgrade I would appreciate to have at least some sort of "What is that?" available to learn what info is reported to Microsoft. But no luck here, there is nothing of this kind.

By now I have updated two machines from Windows 8 to 8.1.

The first machine I updated was an OEM installation; this means that Windows 8 was installed and licensed by the manufacturer and delivered with the computer. The system was set up to work with a local account.

The second machine I updated was my own laptop that I always have with me on customer visits; it runs a retail copy of Windows 8, that is a copy I bought myself from Microsoft in the early days of Windows 8. This machine was set up to work with a local account as well.
 
To my surprise the second machine showed during the initial setup of Windows 8.1 two more windows. At that stage of operation I did not yet have a screen shot program available so I need to try to describe these windows verbally.

The first of these additional windows asked without any explanation for my email address, name and other IMHO personal information. I did not supply any information but "took the plunge" and just clicked Next.

The second screen then gave in small, easy to overlook lettering the option to "Continue with your local account". That was what I did and the machine works beautifully.

The text after #6 IMHO shows two things:
  • Microsoft becomes ever more ruthless and blatant in trying to lure us into using a so called Microsoft Account. IMHO this is arm twisting!
     
  • There is a functional difference between updating an OEM version and and a retail version of Windows 8. This is in opposition of what Microsoft people say in their company blogs.
If you have a metered internet connection with a cap on the volume of data per month then numbers 1, 2, 4, 5 and 6 increase the risk of going over the data limit; and that gets expensaive really fast.

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.
  

Warning: Old Fiend With New Muscle


In the title I say "old fiend" and it is an old adversary in new clothes and with significantly more muscle. 

Instead of repeating the background story please first head over to my September 2012 article and come back here after you have read it.

So what's new?  Besides the new name, Crypto Locker, a couple of major improvements have been made to that nasty piece of maliciuos software:
  • The encryption is now "NSA grade", meaning there is no way out! Your data files most likely will remain lost!
     
  • The ransom has been raised in some variants of this malware  to close to $1000.
     
  • Now even files on other than the system drive C: will be encrypted. That renders restore partitions useless.
  • Is your backup disk permanently connected to the computer? Then the files on this drive get encrypted as well and all your backups are totally useless!
     
  • Now even files on network connected other computers can get encrypted.
     
  • Many victims that actually did pay the ransom got a decryption key that did not work! Their files remained inaccessible and were totally lost.
     
  • To pay ransom in some instances credit card information was given to the obviously wrong people; credit cards got maxed out in minutes! That is much more trouble than the loss of years of pictures, emails and other files!
     
  • Many attempts to save files turned out to be more expensive than a brand new computer would have been, Even with a new computer your files remain lost!
So far, and that may change soon, CryptoLocker 
  • arrives on victims computers in an email from an arbitrary sender they often don't know.
     
  • arrives on victims computers as an email attachment; this requires the victim to explicitly execute the attachment, that is double click on it and eventually even ignore the warning from Windows about running a downloaded program.
     
  • arrives on victims computers after the victim clicked on a link in an email without first checking the link and it's real target.
You say you don't do either of these arguably fairly dumb and dangerous things? Good for you! Are you 100% certain that everybody who eventually uses your computer is as careful, as attentive and as cautious? Think about your sweet teenage granddaughter, your kid's friends, visitors and so on.


You ask why your anti virus program did not catch the bad program? Simply because this form of CryptoLocker is new. It requires time and quite some effort to design detection methods and find secure ways to neutralize these modern and very sophisticated threats.

As of this writing we all are unprotected and need to use due diligence. Always wear your common sense hat!

The only currently known "protection" against damage by CryptoLocker is to have a recent image backup of your system drive and/or to have a set of restore DVDs that were created when the system was still functioning correctly.

If you need to use either of the aforementioned a System Repair disk is required. Did you already create one?

If you need help to set up a sensible backup routine and/or to create the disks mentioned above please contact me. You find a useable email address in the left sidebar at the end of the text titled "Welcome".

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.
 


Thursday, October 17, 2013

How To Buy A New Computer


Microsoft will drop the very last vestiges of support for Windows XP on April 8th, 2014. These computers have to be replaced by then!

I found an interesting article written by Microsoft's Director for Trustworthy Computing. You could read that rather tedious article or just settle for this quote:
As for the security mitigations that Windows XP Service Pack 3 has, they were state of the art when they were developed many years ago. But we can see from data published in the Microsoft Security Intelligence Report that the security mitigations built into Windows XP are no longer sufficient to blunt many of the modern day attacks we currently see. The data we have on malware infection rates for Windows operating systems indicates that the infection rate for Windows XP is significantly higher than those for modern day operating systems like Windows 7 and Windows 8.
To me that says loud and clear: Abandon Windows XP as fast as you possibly can!

Although Windows Vista was released seven years after XP I find many Vista machines from the early days of Vista that are mis-configured, mostly with way too little RAM (main memory) and technical limitations that would not allow to expand RAM beyond 2GB. I strongly recommend to upgrade these machines as well.

What new computer should I buy?

One of the first questions I often get asked is “Mac or PC?”. My reply is always the same: A MAC is almost always three to four times as expensive as a technically comparable PC. Plus you buy yourself into a very well maintained “gated community”. Any additional software for example will be more expensive and in the MAC world you find a much, much more limited selection of good free programs.

Those of my customers that switch to a MAC usually have compelling individual requirements and reasons. They accept the steep learning curve and the higher cost.

And opposite to common perception MACs do know viruses and are just as susceptible to browser based attacks and hijacks as PCs are.

There may be a difference in quality of the components; for my customers that is rarely an issue. I hardly ever recommend a rock bottom priced computer and decent average quality is available at very reasonable prices.

Where to buy the new computer?

I hesitate to write it down but many, many of my customers admit freely that they are not enough tech-savvy to go to a computer store; I recommend to simply avoid the risk of being sold much more than is really needed.

I offer to assist in selecting a suitable computer at a reasonable price. Buy it on-line at one of the larger, dependable and trustworthy dealers. Sometimes we find deals that seem to good t be true.

All-In-One, Desktop or Laptop? 

The one big difference that I always point my customers to is the text size on the screen. The nature of the beast dictates that things on a laptop screen are smaller than on a decent monitor. For people “up there” in age and/or with eye issues (like your's truly) this should be the major factor in that decision.

If on the other side you travel a lot or if you live for several month “down south” then a laptop may be the better solution because of the easier transportation.

All computers are built with mass production techniques. It is always a remote possibility to get a “lemon”, that one piece out of thousands that causes trouble.

All-In-One

This kind of computer has really “come of age” lately. A few weeks ago I bought a new computer for my wife, an All-In-One with a gorgeous 23 inch screen, 1TB disk drive, a fast 3Ghz dual core processor, built-in wireless and webcam. Needless to mention that she loves it.

The biggest advantage from the housewife's viewpoint is that there is only one cable going into the back of the machine!

Desktop with monitor, keyboard and mouse

If you already have a nice flat screen monitor and prefer a desktop computer, by all means just get another one. Very reasonably equipped standard computers cost between $300 and $500.

Beware of some sales rep talking you into a system with a touch screen. Do you know how heavy the hand gets when you stretch your arm out for only two minutes?

Touch screens are okay on tablets and phones; I don't see their usefulness in a classic computer environment; as usual, your views may differ.

Touch screen monitors are (so far at least) clearly more expensive than conventional flat screen monitors. It is a new technology that has had no time to mature yet.

As far as brands go: My reservations towards Dell and HP are well known; I just can not recommend to buy from companies that have deliberately lied to their customers (Dell) or still install at best questionable software.(HP, Sony and Samsung for example).

During the last two or three years I have recommended many Gateway desktop computers. Gateway (the brand!) is owned by Acer.

Laptop

Screen size is always measured in the diagonal! I recommend at least a 15.6” screen; laptops with 17” screens are clearly heavier than their 15.6” cousins.

The only brand I recommend is Lenovo. Their laptop computers are designed in the tradition of IBM laptops from long gone times. They are mostly just a tad better than the competition.

How much Memory?

Memory, main memory or RAM denotes the computer's internal work space. The more main memory the computer has the more programs can work at the same time.

For normal household usage 4GB of main memory (RAM) in a Windows 7 or 8 machine has proven to be enough, no matter was the sales rep at the store told you.

If you use any CAD/CAM software or Adobe Photoshop or if you edit videos then you want 6 or 8GB of RAM or even more. Most heavy duty users know that and buy accordingly.

What processor?

My typical home use customer will not experience lots of differences between an AMD and an Intel processor (CPU). If you actually really do create your own family movies you want an Intel i7 or i5 as fast as your budget allows. For everybody else the speed of the processor is more important than who made it.

Dual core processors are the standard now. Here a warning: When the store clerk sings the praises of an AMD quad core CPU he/she dupes you. AMD quad core means that you get two CPUs and two graphics processors in one chip. Marketing at it's best...

Laptops have thermal limitations; there just is not enough space in a laptop to create sufficient air flow to cool a fast CPU. Laptops in a reasonable price range tend to top off at 2.5 Ghz.

Desktop and all-in-one computers usually do not have the stringent air flow limitations of laptops Thar is why I recommend the faster CPU within reasonable limits and budget constraints.

In my experience a desktop with an Intel i3 3.4 Ghz CPU is faster than the same computer with a more expensive i5 with only 2.3 Ghz.

I see cheap desktop computers with 1.4 Ghz CPUs being offered. In every day usage you may only occasionally experience some sluggishness. But when Microsoft gives us a big update Tuesday the 1.4 Ghz computer may easily need 45 minutes to finish the updates versus five to eight minutes for the 3.4 Ghz machine. 

What about hard drive size?

The hard drive, the internal disk drive with moving platters supplies the storage space where the operating system, all programs and all data files are stored.

Modern computers offer typically from 320GB to 1 TB of storage space which definitely is enough for household usage. Only if you or your teenager download full length movies you can fill up these large drives.

Windows 8 or Windows 7?

You can try to find a Windows 7 computer but it will be $100 to $150 more expensive than the technically same machine with Windows 8.

If you buy Windows 8 you will likely want me to adjust a few settings to run the computer in desktop mode, just as you have been used to since 1995. I would love to help you “taming” Windows 8.

Do you have your software ready?

If you are replacing an older Windows XP system you may have an old version of Microsoft Office that originally came with computer. These licenses are tied to the machine they came on, they “die” with the computer.

Even if you still have the installation disks for MS Office XP or MS Office 2003 I strongly recommend NOT to install them on new systems. They are by now as hard to keep secure as Windows XP has become hard to keep safe..

One of the main reasons for new software versions is security against attacks by viruses and so on.

Remember: It is NOT possible to safely transfer programs directly from an old to a new computer, even if there is software claiming to do just that. Programs have to be installed on the new machine and that is only possible if you have your install disks and eventually required license or product keys at hand.

If you only want to create or edit Microsoft Word or Excel files I recommend Libre Office, a very good product developed out of the original Open Office.

If you use any other "old" software you have to check with it's manufacturer that it is suited to run on a computer with Windows 7 or Windows 8 Desktop Mode.

Where to Buy?

Naturally you can go to any store that sells computers. Just keep in mind that their prices need to pay for the brick and mortar buildings and the sales people there.

Most brick and mortar stores do not service a computer you buy from them, they usually send it to the manufacturer for repairs; then they charge you what the manufacturer billed them plus a margin for their efforts.

All too often the sales “representatives” are nothing more than high school or college students that “know about computers”.

TIPS!
  • If you have wireless in your house, get a computer with wireless already installed in both laptop (standard) and your desktop where it is not yet standard, but worth getting!
  • Buy an extended warranty only if you buy a a business computer; your business needs to be running and usually can't afford longer computer down time. Some of these extra warranties come with guaranteed same day or next day assistance.
  • For obvious reasons I recommend NOT to buy from a rental center!
  • Stay within your budget; temptations are plentiful!
Set it up

Certainly you can set up a new computer yourself.

With Windows 8 Microsoft has elevated “arm twisting” to a whole new level, IMHO at least! You definitely should NOT ever use a so called Microsoft account! Read this for more background information.

If you feel more comfortable to have the computer set up by a professional correctly and with added safety features then please read this article about my Set Up job, I would be glad to help.

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.





Thursday, October 3, 2013

2013 10 07 WTKM Talking Points (Oct 7th 2013)

As you may know on the first Monday of every month I am "guest of honor" for computer questions in a live call-in talk show on our local radio station WTKM on FM 104.9 out of Hartford, Wisconsin.

I have decided to publish my Talking Points for the show here on my blog so that interested listeners can easily follow links to other websites with much more detailed information than can be explained on air.

Windows 8.1 rolls out Oct 17.

New Windows 8 computer?
I use and set up "local account"
ONLY!
Don't use Microsoft account! (privacy vs. convenience)
More info: What Exactly is a Microsoft Account
Either way MS tracks all searches, local & internet. (NO to Bing)
Turn off Smart Search
Use Classic Shell (free) or Start8 ($5)
Install VLC media player (MS removed Media Player!)
Recent Windows Update problems:Mostly caused by pre existing registry corruption. Quote:
On Windows 7 . . .  Registry cleaners might be at fault.
Those utilities were helpful with Windows XP, but they might
easily cause more problems than they fix in Windows 7 (or Win8).
Micro$oft had to re-issue updates from Sept. 9th.

Instead of registry cleaners run sfc /scannow as administrator. See MS Support article 929833 for instructions on SFC and other advanced troubleshooting tips.

Can't boot your game disk (CD or DVD) on your brand new Windows 8 computer?
Thank Micro$oft's and
UEFI's Secure Boot. For details on the difference between
BIOS and UEFI see this article:
The pitfalls of Windows 8′s Secure Boot   

Windows 8 lures the user into MS accounts and into MS cloud services.

The rest of the world and Windows 8:
Yes  it's true; Microsoft wants us to massively migrate to Microsoft based cloud services. But in my country that will not happen as Microsoft wants it, especially   because these "virtual cloud services" are to 85% physically located within the USA.  
That is for most foreign people simply unacceptable. It's not only for reasons like privacy, piracy, taxes, company secrets - there is also a difference in mind-sets.
What if our sensitive data sits there in a physical data center somewhere in the US of A, and bad things really start happening, like for instance war, wide spread diseases, natural disaster, terrorism attack, you name it -  anything could happen anywhere.
Foreigners don't trust CIA/FBI/NSA that much, we learned from the past months.
My customers are saying..., even refusing, to migrate their financial and sensitive business data to somewhere in the 'Microsoft' or even  the 'Amazon cloud'; abroad, unknown where it really is, in a far away foreign country, and nobody knows, or even checks what is happening to their data. It may be leaked to the NSA, via a built-in back door when Micro$oft sold this opportunity to the NSA/US-Government.
 No, sorry, not with us!  We aren't like that!
We even don't come close to this kind of behavior.
Java needs to be kept up to date! As of Sept.15th 2013 it is version 7.0.40 
Adobe Flash and Adobe Reader need to be kept up to date! Even businesses fail to do this!
Still running Windows XP?
Time to buy a new computer!
(with very few exceptions only!)
New, massiveky exploited flaw in Internet Explorer! Don't use IE!
Adobe's computer systems have been hit by numerous "sophisticated attacks"; information of 2.9 million customers compromised, the source code of Adobe products accessed.
End of "WTKM Talking Points for October 7th 2013".

As usual I welcome suggestions and comments right here in the blog.  
Click here for a categorized Table Of Contents.

Wednesday, September 18, 2013

PUPs - No Virus But Just As Nasty


Updated Oct. 27th, 2013

The latest and fast growing trend of cyber crime against the unsuspecting user of a Windows PC is a new breed of malware, so called PuP programs (Potentially Unwanted Program).

These programs technically are not viruses; that is why anti virus programs don't find them - although there are some special programs for geeks and technicians that can clean this stuff from your computer.

You can easily check your computer for at least a few the most commonly encountered names.
  1. Open the Control Panel
  2. Set "View by" in the right top corner to Small Icons and 
  3. Open Programs and Features
You find names of PuPs that I have encountered in this list. Warning: The list is long, by it's very nature incomplete and it keeps growing almost every week. Please be aware that spelling, capitalization, prepended or appended numbers or syllables and inserted or omitted spaces are common and still denote the "main offender" as worthy of removal.

The somewhat good news: Many of these pieces of trouble can be uninstalled, that is removed, from right there in the Programs and Features window where you just found them.

The really BAD news: Even if you uninstall them successfully there will be leftovers in web browsers and other important locations in the operating system.; especially Google Chrome seems to be likely to retain some of that. These leftover entries can be numerous, affect functioning of web browser(s) and significantly hamper the computer; they can only be removed with some specially written very detail oriented clean-up programs.

Well, you know who can help, don't you?

Please remember: Toolbars are forbidden, no matter who promises what, no matter how tempting the name and no matter who made the tool bar! If you find any toolbars remove them right away.

If you find folders with names from random letters or numbers like for example:
         pgmfkblbflahhponhjmkcnpjinenhlnc
you have a clear indicator of malicious software. You know who can help, don't you?

If you wonder how all this stuff got on the computer then please read the explanation  here.

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.



Tuesday, September 17, 2013

PUPs - The List


This is the list of PuPs that I have encountered; it is not comprehensive and it is growing almost daily...

Update February 12th 2014: This list now is 313 entries long and the malware programmers create new names every day. Keeping this list up-to-date has become increasingly time consuming and I will in the future add only well descriptive new names. 

This list makes sense only as part of this article on PuPs.


1clickdownload
24x7 Help
adawaretb
AdpeakProxy
Advanced System Protector
alotToolbar
ammyy
Amonetize
Anti-phishing Domain Advisor
aol toolbar
apn
apnupdater
AppGraffitti
Application Updater
Ask Search
Ask Toolbar
Ask Web Search
ask.com
AskPartnerCoBrandingTool
AskPartnerNetwork
AskSearch
AudioToAudioToolBar
AVG SafeGuard toolbar
AVG Security Toolbar
avg-sitesafety-plugin
AvgToolbar
AVS4You
Babylon
BabylonToolbar
Backupstack
BatBrowse
BearShare
bearshare applications
BearShareMediaBar
bearsharemusicboxtoolbar
BigFiah Games
BingBar
BitGuard
Blekko
blekko toolbars
blekkotb
Body Media Sync
boost_interprocess
Browser Helper Objects
Browser Manager
browserconnection
BrowserMngr
browsersafeguard
Buzzdock
BuzzdockTease
caphyon
chatsessionplugin
ChromeHelper
ChromeHelper
Claro / iSearch
CleanUp
Common Files\spigot
CommunityToolbar
Conduit
conduitsearchscopes
contextmenunotifier
CouponPrinter
coupons
Coupons Amazing
cr_installer
crossrider.com
CrossriderApp
custominternetsecurityimpl
datacontrol
DataMngr
DealPly
DealPlyLive
Default_Page_URL
defaulttab
defaulttabbrowser
DefaultTabSearch
DefineExt
Delta
Delta Search
DeskBarEnabler
Distromatic
Dogpile
driver robot
driver-soft
DriverCure
DriverUpdate
DropDownDeals
DynConIE
EasyCopyND
eBay.lnk
escort
eSupport.com
Extreme Flash Player
F3PopularScreenSavers
Facemoods 
Fast Free Converter
feedmanager
file scout
File Type Helper
Findgala
FirefoxHelper
FirefoxHelper
FirstRowSportApp.com
firstsearch
Fkash Player Pro
FLEXnet
FocusInteractive
Free Offers from Freeze.com
Free Ride Games
Freecause
FreeRIP
Freeze.com
FromDocToPDF
Funmoods
funwebproducts
GamePlayLab
genericasktoolbar
Globasearch
GreatArcadeHits
HiDefMedia
Highlightly
historykillerscheduler
HotspotShield
I Want This
Ibryte
ibrytedesktop
IBUpdaterService
iecookiesmanager
IeHelper
IeHelper
iLivid
iLividIEHelper
ilividsetupv1.exe
Iminent
Inbox
inbox toolbar
InstallCore
InstallIQ
InstallServices64\
InternetHelper3.6
InternetUpdater
InternetUpdaterService
ironsource
isafe
iwon
LaunchApp
LCTaskAssistant
LessTabs
Level Quality Watcher
LinkSicle
LyricSing
MapIt
MapsGalaxy
mediabar
MetaStream
metastreamctl
MixiDJ
Mobogenie
MocaFlix
Music Toolbar
my-web-search
mybabylon
MyBabylontb
MyPC Backup
MyScrapNook
Mysearchdial
MyWebSearch
mywebsearch bar
OnlineMapFinder
OpenCandy
optimizer pro
OptimizerPro
ParetoLogic
pc cleaners
PC Health Kit
PC Health Kit
Pc Performar
pc speed maximizer
pchealthboost
pcpro
pdfforge
PerformerSoft
PIP
playbryte
PlayFizz
priam
priam_bho
pricegong
pricesparrow
Privitize
Prod.cap
Protector
protector_dll
protectorbho
pseudotransparentplugin
QwixLinx
RadioBeta
radiorage
Re-Markable
RebateGiant
RebateInformer
Recipehub
RegClean Pro
Registry Mechanic
ReMarkIt
roboot
roboot64
RoyAlCoupon
savesenselive
SaveValet
ScorpionSaver
ScreenSaverInstaller
scripthelper
Search Bar
Search Page
SearchAssistant
SearchPlzBar
SearchProtect
searchprovidermanager
SearchQmMdiaBar
Searchqu
Searchqu Toolbar
SearchquMediaBar
SearchScope
SearchSettings
SearchYa
SecondStepInstaller
selectrebates
SevereWeatherAlerts
shop to win
Shopping
shopping sidekick
shoppingbho
ShopToWin
shopwithshelly
Site Ranker
SmartBar
Snap Do
SocialBit
SocialPrivacy
Softonic
SoftonicDownloader
software assist
Software Update Utility
solid savings
Sparktrust
SpeedAnalysis
speeddial
SpeedMaxpc
speedupmypc
SpeedyPC
spigot
SPUpdater
Start Page
StartNow Toolbar
StartSearch
StatusWinks
Strongvault
supreme savings
Swag Bucks
SwiftBrowse
Systweak
Tarma installer
tbcommonutils
tbdownloadmanager
tbhelper
TelevisionFanatic
thirdpartyinstaller
TidyNetwork
toolbar
Toolbar Cleaner
toolbar3
toolbarbroker
TotalRecipeSearch
Translate Genius
Trymedia
Uniblue
URLSearchHooks
utorrentcontrol
V9
ValueApps
Video downloader
VideoDownloadConverter
videodownloadconverter search scope monitor
ViewpointMediaPlayer
viprotocol
VirtualBee
visi_coupon
VisualBee
vProt
w3i
Wajam
WajamUpdater
Weather_Notifications
WeatherBlink
WeatherNetwork
Web Assistant
web-search
WebCake
WebSteroids
WeCareReminder
WeDownloadMgr
Wheather Alerts
WhiteSmoke
wincert
Wincore MediaBar
WinPcap
wiseconvert
WordOv
YahooPartnerToolbar
Yontoo
yontooieclient
Zoom_Downloader
Zugo
---------------- End of List

As usual I welcome suggestions and comments right here in the blog.

Click here for a categorized Table Of Contents.