Tuesday, December 29, 2009

It's been a while...

...since my last post, but I'm going to try and crank this blog back up again, so here goes...

* News of the Week:

On December 27th, Fast Company put out their Top 10 "Gadgets of the Decade".

Here's the list -

2000 - USB Flash drive (When these first came out the limit was 256MB. Ten years later, the largest that I've seen is by Kingston. One can enjoy 256GB of storage...just don't lose it or your out $900.)

2001 - iPod. (The iPod touch is my personal favorite. Wireless Web access and video storage are just two of the benefits.)

2002 - Dyson vacuum cleaner (I have one - thanks to my wife. I didn't even know how to use the accessories when we first got it. Three years later I'm a pro...not sure if that's a good or bad thing.)

2003 - DVR (Couch potatoes might argue it's the greatest invention of all time)

2004 - Motorola's RAZR cell phone (It made you want to buy a new cell phone just so you could look cool. Who cares whether you could hear the person on the other end or not. However, the evolution of new smartphones quickly diminished the RAZR's popularity.)

2005 - GPS Devices (I now have all the local and regional DQ's plotted. Blizzard anyone?)

2006 - Intel Powered Macbooks - (Nice move Apple, nice move...err, I mean Steve Jobs. More history)

2007 - iPhone, Wii, and Flip camera - (Okay, so I've been wanting the iPhone for a while now, but can't get buy-in from the boss/wife. The Wii was addicting for about three weeks until I got tennis elbow and I just picked up the Flip as a Christmas present for my wife. I've uploaded around half a GB of videos to the Web and she hasn't used it yet...hmmm.

2008 - Netbooks (Personally, I think these are great but are very target market specific. It all comes down to what you are going to use them for.)

2009 - e-readers (I think e-readers, along with the use of Audio books will continue to grow in popularity)

Here's the article:
Gadgets of the Decade

The following items are not in the article, but here's what I think will be hot in 2010:

2010 - Tablet/touch screen laptops, USB 3.0 devices, Solid state hard drives (SSD) will continue to replace spinning drives, 4G phones with the potential to transfer data up to 100 Mbps, and of course, something new from Google. (I would say Google Wave, but that's more of a Web app than a gadget).


* Tool of the Week

DNS Benchmark from Steve Gibson


In a nutshell the DNS Benchmark tool will tell you which DNS (domain name system) currently transfers data the fastest to your machine.

Quick overview of DNS - In it's most basic form this is the process that translates Web site names to IP addresses, (i.e. www.pcworld.com to 70.42.185.10) thus allowing a Web server to connect you to the requested site.

If you are primarily concerned about internet connection speed - then try out this tool before opting to change to OpenDNS, Google Public DNS, UltraDNS, or some other service. I've used DNS Benchmark and the results were interesting. My current ISP, Insight, was actually the fastest to return DNS queries. However, I'm still going to move to OpenDNS very soon as their response times were a close second. The other side of this decision is security (which is another topic altogether), and OpenDNS allows for tighter filtering, site blocking, white/blacklisting, etc.

However, I'd still recommend trying out Steve Gibson's DNS Benchmark. It's a very lightweight utility that you download, but do not need to "install" in order for it to function.

A note about Steve Gibson - In my opinion Steve is one of the brightest minds in the technology industry. In terms of internet security, there is no one better in the world. Many years ago, he put Bill Gates in his place in front of a very large audience. Bill was actually speechless. I'll share that story or audio version later.

Steve runs the very popular Security Now podcasts, is the creater of the Spinrite disk recovery software and has built various other unique programs including ShieldsUp - which tests your ports for vulnerabilities. Visit his site when you get a chance: GRC

If your interested here's a random article I just picked up on Steve. Steve Gibson article

Final Note: In the spirit of competition, namebench will perform a similar evaluation of DNS benchmarking across multiple providers. However, my recommendation would be to use Steve Gibson's DNS Benchmark utility.


* Web site of the Week (WoW)

The WoW is more of a movie recommendation. You probably guessed it already... it's AVATAR. This film takes the technology used from Lord of the Rings and pushes it to a whole new level. Avatar has set the bar for future 3-D film making. Also check out the AVATAR Trailer.


Later.

Thursday, February 12, 2009

Website of the Week #14

This week I promised to discuss the notion behind Keyloggers. So let’s get right to it…

Q: What is a keylogger and what can it do?

A: A keylogger is quite simply malware, which most often masks itself via a trojan. Keyloggers capture keystrokes – yes everything that you type it can capture. Some keyloggers are also able to take print screens or "screenshots" of whatever you’re doing. Therefore they not only have a record of your keystrokes, but they also can see what site you are logging into.

Many antivirus companies have developed virtual keyboards to help thwart keylogging technology. However, a well written keylogger can still capture virtual keyboard mouse clicks as well as where exactly on your screen you clicked the mouse.

Keyloggers are used mostly to capture bank account information – for obvious reasons. They send information back to a remote server via a backdoor they’ve opened up in your system. The best methods to prevent this type of malware is to keep your OS regularly patched and update/run your AV software at least once a week.


News of the Week:

Kaspersky’s Black Eye

A group of Romanian hackers used a SQL injection vulnerability to gain access to a Kaspersky site operated within the United States. Kaspersky Labs is a very prominent antivirus company that has been a rising star in the security field over the past several years.

Kaspersky is claiming that the attack did not compromise any data. Reports are suggesting that if the hackers had been slightly more advanced they could have had access to around 2,500 email addresses and product activation codes.

In the end, this is simply a black-eye for Kaspersky Labs. It’s unfortunate that this took place. Kaspersky is a well respected organization and I tend to visit their site quite often for general information. I’m just glad my information isn’t in their database.


New administration = new computers? I would hope so!

Reports are coming through saying that from the time that Obama’s staff entered the White House they suffered from tech downgrades. On the campaign trail, Obama’s team was a “Mac shop”. However, once they entered the Whitehouse they found 6 year old Windows PCs laying around everywhere. One Obama spokesperson characterized the situation as “going from an Xbox to an Atari.”

MSNBC also reported that the White House did approve the use of Gmail accounts and personal cell phones for WH staffers. As far as Wi-Fi goes…word is there’s a strong possibility that pre-approved encrypted wireless will be allowed. In the meantime, Obama continues to use his NSA encryption approved Blackberry. If this doesn’t give every hacker on the planet incentive nothing does. Obama’s tech security risks


Man accused of trying to kill girlfriend with WiiMote.

"But honey…it was only a cookie."

Wii as a deadly weapon



Kindle 2.0

Amazon’s Kindle 2.0 has been released and they are taking orders. Also, here is a PCMag.com article on it if you’re interested.

iWoz

The ‘Woz’ to be on dancing with the stars. Yes, I’m referring to Steve Wozniak --- the Man who basically created the first Apple computer. Woz is also known as… “The other Steve Jobs”, “Apples other co-founder”, and “iWoz”, which he’s titled a book after. Let’s just hope he can dance half as well as he can program. Here’s a link if you’re curious to know more.



Skype 4.0 comes out of beta

I’m still on v3.8 only because the “check for updates” option within the app won’t auto-upgrade the code. Disappointing…because now I’ll have to go directly to the site and download the updates. I know, it’s a minor inconvenience, but I tend take a minimalist approach when it comes to upgrading. Here is a cnet review if you’re interested in learning more.


Gadget of the Week:

Star Trek Communicator using VoIP

If I could only convince my wife that this is worth the price...


Tip of the Week:

Hakin9 IT Security Magazine - This site actually offers free pdf downloads (email registration required)...and I must say the level of detail they outline is quite cool. Some of the downloads contain network topologies that provide robust visual representations of the subject matter. Coincidentally, I was in Barnes and Noble last weekend and saw this magazine on the rack. If memory serves, it was priced around $14.99. My take on all this...just go online and find some articles that interest you for free...why pay 15 bucks?

Idea of the Week:

How would you like to live on the water? I mean literally “live on the water.” A former Google software engineer seems to think he’s come up with a solution.

Cool Web tool of the week

Calculate a websites value: http://www.stimator.com/
And yes...Packets and Ports is valued at $47.00. I wonder if they would consider rounding up and making it an even $50?


Video of the Week:

Joaquin Phoenix on Letterman

If you haven’t seen this yet it’s pretty weird. Watch the 3rd clip titled “The full magilla!”


And Finally the...


Website of the Week:

Maybe you could try this on Valentines Day (Oh, by the way…I hope your not afraid of heights)
Dinner in the Sky














Next Weeks Topic: Gadgets Galore!

Saturday, February 7, 2009

Hacker Ticketing

News reports have stated that hackers are now merging the physical and virtual together to plant malware on user machines. I'll explain this a little further...

Basically, a victim comes back to their parked car to find an official looking parking ticket on the windshield. Apparently, the ticket states that if they visit a certain website they will have access to view footage of the violation from Closed Caption TV (CCTV) footage...which most parts of the U.S. only have in limited use. Once they visit the website, the Vundo Trojan installs itself and tells them they should also download a fake scanner to help remove 'other' bad programs that this site so dutifully discovered.

Their "stop at nothing" attitudes never cease to amaze me. I'm forced to shake my head in disgust at this latest scam.

Thursday, February 5, 2009

iPod storage grows

Storage these days continues to grow larger and cheaper by the minute. Remember the 64GB thumb drive I discussed? (Issue #10)

So I ask you...is there such a thing as too much storage? Well, perhaps not when it comes to an iPod. For roughly $300 bones you can upgrade - yes upgrade - your iPod 5G with a 240GB hard drive. It consists of 1.8-Inch PATA hard drive from Toshiba. Or...if you're trying to cut back during these tough economic times, you can opt for a 120GB drive that will set you back around $180.

Music and pictures shouldn't really be a concern here. It all boils down to how many hours of video you want to keep on your device.

IT Layoff DB

Computerworld is maintaining an IT Layoff database that is tracking major tech companies and their struggles during this harsh economic time.


"Who Is" URLs

Here are a couple of "Who Is" sites that will help you capture a few more details about a web site or IP.

http://whois.domaintools.com/

http://www.whoishostingthis.com/

Monday, February 2, 2009

Website of the Week #13

Last week, I mentioned that I’d be discussing both Rootkits and Keyloggers in this issue. However, due to the unexpected size of the Rootkit Q&A, I’m going to defer the keylogger topic to next week. With that being said, let’s jump right into it!


Q. What is a rootkit and can I purchase one at the local Wal-Mart?
A. I seriously doubt that you’d be able to purchase one at your local Wal-Mart. However, if you’re not careful, you can certainly pick one up for “free” over the World Wide Web.

First, let’s be clear that rootkits are designed for malicious intent. They are a form of malware – which is a broad term that describes Trojans, Viruses, Worms, Ad-Ware, Spyware and the like. Typically, a rootkit takes the form of a Trojan. In its simplest form a Trojan is a malicious program that masks itself as something else in order to get you load it onto your system. You’ve probably heard of the Windows Anti-Spyware 2009 program that’s been corrupting computers for the past several months. This is actually a Trojan. It tells you that it found X number of spyware programs on your machine and if you download the program, it will wipe away all of your problems…how nice. Actually, Malwarebytes (a free anti-malware program) was one of the first and easiest ways to remove this Trojan from a computer. http://www.malwarebytes.org/

Okay, now back on topic…

Next, let’s discuss what the term “Root” actually means. Back during the dawn of the personal computing the term “root” was used to identify the highest level of administrative access within the UNIX operating system. When I say “administrative access” I’m referring to a user that has maximum privileges throughout the entire operating system. The reason that I bring up UNIX is because it was one of the first (early) widely used operating systems (pre-Windows era). In fact, UNIX beat the Windows OS to the internet by over a decade.

Therefore, when a hacker wanted to gain access to a UNIX machine it was difficult for them to install a file and run a procedure without being easily noticed. In order to escape detection they had to become stealthier and become totally invisible to the administrator or user of the to-be compromised machine. The process of gaining access with full administrative privileges is called “getting root”. Thus, rootkit technology is a stealthy or hidden process that runs “under the radar”.

To translate this into Windows terms…a rootkit sinks deep within the OS and adds malicious code to registry entries, .dlls, system files and so forth. There are many rootkits that even if you knew their file name and searched for it - you would not be able to find it. More on this later…

Q. How would I suspect that a rootkit might be installed on my computer?
A. Immediate changes in your computers behavior patterns would be one cause for alarm. A couple examples might include:


• You start seeing CPU spikes and are unable to identify the process that’s responsible

• The fan on your computer runs so often you no longer rely on your furnace to keep warm during the winter

• Your computer becomes slower than it already is (I know – this a daily occurrence for many of us) This could mean that your CPU, RAM, and bandwidth is getting “shared” by an intruder

• You suddenly begin to see pop-up/warning messages from your outbound firewall stating that an unknown program is attempting to access the internet (depending on your firewall, you may/may not be alerted)

• The send/receive lights on your router or modem start flashing like the 4th of July and you aren’t causing it

• Law enforcement arrives at your front door with a warrant and mentions something about investigating you as a Spammer


Q. What is a rootkit actually capable of doing to my system?

A. Many rootkits install a backdoor daemon, which is a program that runs under someone else’s control. This backdoor creates an opening (opens a port) allowing the hacker to take control of the computer whenever you have connectivity. Once inside your system, they have access to everything you do and more. Many times they’ll load other “helper” programs to catch your keystrokes (such as a keylogger) or send information back to their server surrounding what bank sites your hitting, etc.

In a nutshell…once a rootkit is installed on your computer the only limit lies in the imagination of the hacker. One thing to note is that there are several variations of a rootkit and each program has its own unique purpose.


Q. How can I protect myself from rootkits?
A. Basically, there are two ways: Common sense computing and software. (And sometimes doing both might not matter). I’ll explain what I mean about both in the list below:


• Keeping your OS updated with current patches. Microsoft now updates and runs their Malicious Software Removal Tool (MSRT) http://tinyurl.com/5lyxe during Patch Tuesday that searches for rootkits on your machine. This is done behind the scenes after you install the updates. You must then restart your computer for the scan to begin. No manual intervention is required by the user and this only runs once per update. You will not even be able to tell that this processes is running – but it is.

• Using antivirus software on a regular basis. Note: AV software has been losing the battle with rootkits mostly because the malware identification logic is based mostly on ‘signatures’ and heuristics. A rootkit might mask itself as a ‘normal’ system file and the AV software will skip right over it.

• Using a software firewall, preferably one that has strong ‘outbound’ protection (Vista is OK, XP not so good – try something like Comodo). The reason you want good outbound protection is to keep malicious programs from ‘calling home.’ A rootkit is only effective when it’s able to send the information that its captured back to the hacker.

• Stay behind a router to stealth your IP and you will also benefit from the routers hardware firewall.

• If you’re really concerned about malware you can use Host Intrusion Protection System (HIPS) software – I’ll be talking more about this in a future issue.

• Browse the Web using Sandboxie www.sandboxie.com/ (see issue #8). Out of all the programs that I’ve ever used – this is my personal favorite security tool for browsing.

• Don’t open any attachments from senders that you don’t know (this is where the common sense piece comes into play)

• Copy and paste hyperlink/URLs (from emails) into your browser versus clicking the stand alone link

• Be cautious when you’re on social engineering sites like Facebook, twitter, MySpace etc. Due to the massive number of users, malware writers love to “test” new code on these sites.

• Most major antivirus companies have some level of rootkit detection included in their software. However, it might not always be “on” by default, so check and make sure the settings are properly configured properly before running it.
• Don’t save any important passwords in your browser’s cache, i.e. bank account passwords ‘n such

• Use Secunia’s PSI application (free) to keep other 3rd party apps up to date. http://secunia.com/vulnerability_scanning/ (I highly recommend this!)

• Be cautious when downloading free applications from unfamiliar sites – many of these programs carry rootkits along with them


Q. Couldn’t I spot the rootkit process in the Windows Task Manager Utility or find it by doing a search?

A. Great question, but the answer is no. You typically won’t see a well written rootkit in Task Manager. Even if you downloaded a more robust tool such as Process Explorer (from Sysinternals) it still wouldn’t show up.

http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx

As I stated earlier, the MO of a rootkit is to remain stealthed/cloaked so that it can perform the evil bidding of its creator.

Also, since a rootkit compromises the operating system kernel, it can intercept the search response coming back to you and essentially “skips” the rootkit file name that you’re searching for. Therefore, you would never be able to find it by using the Windows search feature.

More on how it works –
A rootkit digs deep down into the operating system level and creates its own running process at that level. Ultimately, it alters how the OS behaves and can even mask itself as valid program. Some rootkits are so deeply embedded within the OS that if you do happen to remove them, it could break other critical pieces of functionality and you might be forced to completely reinstall Windows.


Q. What’s the easiest and quickest way for me to see if I have a rootkit installed? I don’t want to spend a lot of time on this, so I’m looking for the simplest path.

A1. Download Avira's free anti-virus application.
http://tinyurl.com/8m2cc8

Avira provides you with as much protection as any other software product on the market today.

A2. Use Rootkit Revealer from Sysinternals
http://technet.microsoft.com/en-us/sysinternals/bb897445.aspx

One of the reasons that Rootkit Revealer is so effective is that is actually uses rootkit technology. “It takes a rootkit to find a rootkit.”

Rootkit Revealer is a free tool and is only around 230KB in size. The link above also provides a page full of rootkit information. The only downside to this application is that once the scan finishes, you might not be able to immediately tell if a rootkit has been installed. (might take some 'Googling' to research the returned results).

There are numerous other rootkit detection software options on the Web, but to keep it simple, free, and most importantly effective…go with Avira.

Comments from Mark Russinovich's blog at technet.com


“Rootkits are cloaking technologies that hide files, Registry keys, and other system objects from diagnostic and security software, and they are usually employed by malware attempting to keep their implementation hidden.”


I think this is about as far as I want to take the topic of rootkits – at least for now. The bottom line is that since rootkits are so difficult to detect and they open up a backdoor into your system, they are probably one of the worst pieces of malware that you can get on your computer.



News of the Week:


AVG notes:
200,000-300,000 NEW sites (per day) are hosting malicious code
http://tinyurl.com/cp8959

100-0 basketball victory…and the winning coach gets FIRED!

http://tinyurl.com/bjf2tc

White House email crash

http://tinyurl.com/bwodrd

Internet tops 1 billion users
In December 2008, more than one billion people used the internet. That's according to comScore an internet marketing research company. China represented the largest online audience with 180 million users, followed by the United States and Japan. No word on how many of those users were on compromised machines.


Microsoft delays release of SP2 for Vista

Microsoft will deliver a Release Candidate of Windows Vista Service Pack 2 in March and not in February. Also, Microsoft will send the service pack build to OEM (original equipment manufacturers) and retailers only in the second quarter of 2009 and not in April.

Update---Additional details on the Microsoft layoffs
Microsoft is planning to reduce its workforce by 5 percent over the next eighteen months, starting with a reduction in force of 1,400 by the end of Jan. But the roughly 5,000 jobs are far less than the 15,000 job cuts rumored prior to the announcement over a week ago.

What isn’t being mentioned is the rate of employee growth in recent years. Since 2005, Microsoft has grown its staff more than 12 percent each year. In fact, Microsoft plans to continue hiring in what it considers strategically important areas.
Other changes announced are pay freezes, reduction in the contractor force of up to 15 percent, delayed construction projects, and budget cuts in a number of “discretionary” areas.


Tip of the Week:


Create RSS feed for any website
http://feedity.com/



Gadget of the Week:


USB 3.0
The specs for USB 3.0 are officially been complete. This now paves the way for manufacturers to begin building and releasing these devices. Some new features include:

• Greater data transfer rates – 480Mbps was the ceiling for USB 2.0, however; 3.0 will support transfer speeds up to 4.8Gbps (10 times faster than 2.0) Quite impressive I must admit.
• Backward compatible with USB 2.0
• Simultaneous read/write capability
• Power management – allowing devices to sleep, idle, suspend, etc.
• It will also include larger cables that are capable of carrying more power. Translation: your iPod, cell phone, or whatever else you charge won’t take as long to power up!
• Look for devices to be released in early 2010



Free Tool of the Week:

Ad-Aware

Ad-Aware celebrates 10 years of Malware protection. Get the free anniversary edition as they are boasting the following numbers:

• Uses 74% less memory than Ad-Aware 2008.
• Uses nearly 60% fewer resources than the previous version, and considerably less than each competitor product tested, including AVG, Kaspersky, Norton, and PC Tools.
• Scans 36 MB per second – faster than each competitor product tested, and over 4 times faster than AVG’s.

Okay, so I’m sure that most of you have heard of this tool and many you have probably used it at some point. Personally, I’ve been running Ad-Aware for over a year and it has always been a resource bear. My CPU use would shoot through the roof whenever I’d run a scan. After trying out the newest version I was quite impressed. My “Smart Scanning” run time decreased from 28 to 10 minutes. CPU use was never higher than 7% and I hardly could tell it was running. Overall, I’m much happier with Lavasoft’s new version and feel comfortable recommending it as a free Anti-Spyware tool.

http://www.lavasoft.com/products/ad_aware_free.php



Random Facts of the Week: (for your next Trivial Pursuit game)

Did you know?

• The current land speed record for a manned rocket car is 763 mph
• The current land speed record for an unmanned rocket sled (on rails) is 6,453 mph or Mach 8.5
• During re-entry back into the Earth’s atmosphere the Space Shuttle reaches speeds up to 17,500 mph. This makes it the fastest manned vehicle in the world.



Videos of the Week:

Rufus the slingshot master!

http://tinyurl.com/8zw72l

The secret megalopolis of the ants
(the farm was abandoned)
It starts off a little slow, but it gets much better after about 1 minute in.
http://tinyurl.com/9fbtkk

Bushisms
Regardless of whether you love him or hate him…‘W’ has assembled some “pretty darn good” Bushisms that will entertain the YouTube generation for years to come.
http://tinyurl.com/7dfvy5




And finally the…

Website of the Week:


Sitonomy – The Anatomy of a website.
Tells you what underlying technologies are used on each site.
http://www.sitonomy.com/

Monday, January 19, 2009

Website of the Week # 12

I’m going to kick things off this week with some Q&A.


Q: It takes my Windows pc a long time to startup. Is there any way to speed up this process?

A: Yes. One of the first things I’d look at is the Windows System Configuration Utility. To access it click: start > run > type msconfig > choose the startup tab. This shows you all of the programs that are set to auto start when you booting Windows. In all honesty, you only need to have a few of these checked, but it will vary from machine to machine (it’s also based on the types of programs that you use). Windows is notorious for enabling a boatload of unessential programs when you first get a new machine. Also, nearly every time you download a new program it will add an entry into the Windows Registry enabling the program to run during startup.


Q: What is the purpose of having a program auto start?

A: Programs that auto start are actually running ‘in the background’ of Windows. The idea is that since they are already running, they will appear more quickly when called upon. Therefore, these programs are loaded during startup. Also, since you have a finite amount of RAM and CPU, your performance will suffer from having too many startup programs running in parallel. And yes, while these programs are running “behind the scenes,” they are using RAM, CPU, and draining the battery you’re not on AC power.


Q: How do I know which programs should be turned off during startup?

A: Since I’m not a big fan of Microsoft’s System Configuration Utility (because you can’t make heads or tails out of which processes do what). Here are some options to help you translate the startup programs:


  1. Go to http://www.processlibrary.com/directory/files/tpshocks/ and type in the file name to see if their database holds a description and recommendation for the .exe.

  1. Check Paul Collins’ site (aka Pacman) http://www.sysinfo.org/startuplist.php

  1. Or you can download Autoruns from Sysinternals (now owned by Microsoft) http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx


Autoruns is free software which easily allows you to modify your startup programs and provides numerous other options and system information. It provides you with a short description, the publisher, path, and with a quick right click (choose Search Online), it will auto query your default search engine with the process name.


Q: I’ve turned off several of my startup programs and I’m still experiencing slow boot times…are there any other options to consider?

A: Yes, there are a few other options to explore. In no particular order here are 2 options.


Option 1: Check the amount of RAM that you have on your Win XP computer. Right click My Computer > Properties. The System Properties window will come up and by default, it should place you within the General tab. Look toward the bottom right hand corner of the window and you will see the number of MB or GB that your computer is using. Forget what the minimum system requirements say…at minimum a Windows XP laptop should be running with at least 1.0 GB of RAM. Anything less will slowly eat away at system performance as well as your sanity. For most of us using the 32-bit platform our RAM limitation is 4 GB. This of course is PC dependent, so don’t think that every machine can utilize 4 GB of RAM. RAM allowance will vary by manufacturer, product line, and model.


To check the amount, type, and # of RAM slots that your machine can use go to the Crucial website and use their system scanner tool to get the details. It’s safe and it’s free. Crucial is also my company of choice when I’m in the market for some additional RAM.

www.crucial.com


Option 2: You could also look at the startup sequence within the BIOS (you must access the BIOS before booting Windows). The acronym BIOS stands for Basic Input/Output System and it is essentially firmware used during booting a system. Basically, you’d want to know if you had inadvertently changed the boot sequence from Hard Disk to DVD or something else. If you’ve never tinkered with the BIOS then this probably isn’t a problem. I won’t get into the details of this now, but feel free to Google it if you’re interested in learning more about the BIOS.


Q: Since we’re on the subject of RAM…what if I require more than 4 GB of RAM?

A: If you legitimately need more than 4 GB of RAM or you are just scaling for the future then I would check into purchasing a 64-bit computer. Compared to 32-bit, a 64-bit is theoretically 8 times faster than a 32-bit. The 64-bit platform is also capable of leveraging up to 128 GB of RAM. Normally…and I use the word cautiously, you would only need more than 4 GB of RAM if your were a super-user doing any of the following activities:

  1. Using multiple heavy apps that need to be up and running simultaneously and you need to switch back and forth between them frequently
  2. Doing heavy multi-media editing
  3. Heavy online gaming


Q: What makes a 64-bit computer so much faster than 32-bit? I thought RAM was used to store short-term memory?

A: You are correct in the fact that RAM is used to store temporary memory. However, 32 and 64-bit refers to the way the CPU handles and allocates data. By storing running processes in RAM rather than on the hard disk, this increases the machines overall multi-tasking capabilities because of the increase of the capacity of the CPU register. Since a 64-bit register is “deeper” than a 32-bit, it allows operations that calculate larger amounts of data to be processed more concurrently vs. having to “wait their turn.” The major advantage in 64-bit computing lies within the amount of memory or data that it’s able to utilize (think internal bandwidth) versus actual processor speed.


Other tidbits:

  • The computing industry began shifting from 16-bit to 32-bit PCs back around the time that Windows 95 was coming out
  • Windows currently has both 32 and 64-bit versions of Vista available
  • The last time I checked - the percent of 64-bit Windows users was around 20% and rising
  • Many of the specials that went on during Black Friday included 64-bit PCs that were on sale. One particular HP that was on sale came with 16 GB of RAM pre-installed.
  • 64-bit apps can run 32-bit apps…and… some 32-bit apps can run on 64-bit OS’s, but I wouldn’t’ recommend it. If you wanted to have a small chance at the latter working you would (at minimum) need to have your drivers upgraded to be 64-bit compatible.



Tools of the Week:



Revo Uninstaller

Never use the Windows Add/Remove Programs feature again. Revo digs deeper into your system to remove not only left over registry settings but .dlls as well. It will remove all traces of just about any application. This is one of my favorite programs.

http://www.revouninstaller.com/


Backpackit

Ever wanted to build your own intranet? Here’s a cool little product for a small business user. I recommend watching the video tutorial to get a feel for what features it provides.

http://www.backpackit.com/


Gadgets of the Week:


Gesture-Controlled TV: Remember the movie “Minority Report?”

http://tinyurl.com/89mzc3

http://tinyurl.com/97oha5


Custom built computers by Puget Systems

Decrease the heat output of your hardware by submerging it in mineral oil. Be sure to check out the video.

http://www.pugetsystems.com/submerged.php


EzVision Video Eyewear

http://www.gadgets-reviews.com/index.php?id=579&page=post

http://shopping.aol.com/ezvision-video-eyewear/31197957#

http://tinyurl.com/7n9cba


Video of the Week:


Condition 1 weather in Antarctica

http://videos.komando.com/2009/01/15/condition-1-weather/


News of the Week:


Apple's Steve Jobs takes a leave of absence.

http://tinyurl.com/8rtwgo


Website of the Week:


Sysinternals

The Sysinternals site is a large assortment of tools that will help you manage and troubleshoot your OS and applications. The tools are developed by Mark Russinovich and were so well built that Microsoft offered to buy them in 2006. Mark agreed and is now an employee of Microsoft. I’m currently using 3 of these tools on a daily basis.

http://technet.microsoft.com/en-us/sysinternals/default.aspx


Next Week:

Rootkits and Keyloggers


Wednesday, January 14, 2009

Website of the Week #11

Free Download of the Week:

Stickies
This is a nice little app that allows you to store and managed virtual sticky notes on your machine. It will keep you organized by putting together lists, alerts, and reminders. I use it myself and have already found it to be quite useful.
A couple of items to note on this:
1. If you decide to install it, I'd recommend disabling the global hook option (asks you during the install), basically it's a keyboard shortcut. The reason is that some Antivirus and Host Intrusion/Detection apps often see these types of "hooks" as being malicious, so it's not worth having this enabled.
2. Typing in brackets, [ ] before each listed item will allow you to use the checkbox feature. Example: [] Remember to sync client and personal calendars. Double clicking the box adds/removes a check mark.
Cool Gadget of the Week:

Autonet mobile
Surf the web while in your car. Umm, passengers only, of course.
Overpriced item of the week:

Lenovo dual-display laptop
Would you like to expand the width of your laptop monitor by 10 inches? For a mere $3,700 you can do just that!
News of the week:

Virus authors planted malicious code on Paris Hilton's website last week. Following the attack, surfers visiting the ParisHilton.com site were prompted to install an "update" via a dialogue box. Whether they accepted this update or decided to "cancel" it, a download of a malicious executable was initiated. Paris Hilton's response to this incident was probably something along the lines of ..."That's not hot."


Microsoft's patch Tuesday occurred on 1.13.09. The 3 updates were to the Server Message Block protocol or (SMB). This protocol mostly impacts how client apps read/write to servers within a networked environment. Two of the vulnerabilities surrounded the way the SMB protocol handles SMB packets, which could potentially allow an attacker to trigger a buffer overflow. The other vulnerability removed the condition where an attacker could attempt a Denial of Service (Dos) attack. As a workaround, users can block TCP ports 139 and 445 within the firewall. However, this can affect a number of applications and services, including file and print sharing and the fax service. My advice...just download the update.


There are rumors that Microsoft might be making some job cutbacks this month - their first in 30 years. Here's a piece of the story if you're interested.
Fake LinkedIn profiles hosting malware links
If you happen to run across the profile of celebrity on LinkedIn, chances are its not them (I really don't think that Brad Pitt needs any "networking" help). Recently, cybercriminals have been building fake profiles on many social networking sites, including LinkedIn. It's ok to look, but just don't click on any links (within a profile) unless you know the person. Users who clicked on some of those links were sent directly to sites hosting malicious software.

Wi-Fi News:

Wi-Fi on school buses.
Okay people, how did Alabama beat everyone else to the punch on this?
Get ready for wireless power to charge your accessories.
MSNBC.com video. Look for devices available during the Spring of 2009.
3 companies leading the way toward wireless power innovation.
ecoupled
Powercast
WiPower
Website of the Week:

Sybex
Hands down one of the best (if not the best) publisher of computer books on the planet. You'll want to bookmark this one.

Wednesday, January 7, 2009

Website of the Week #10

This weeks topic surrounds online or virtual storage options for home users. Therefore, I'll kick things off by answering some Q&A before diving any deeper into it.

Q. What's the benefit of storing my files online?
A. It primarily depends upon how important the data is to you. Each person must identify their own risk factor. In other words - if you lost the information how would it impact your life?

Some benefits include:

-Many web sites offer free storage (space limitations apply)
-Protects your data in the event of a HD crash, theft, fire, or any natural disaster etc.
-You might not have the physical space anywhere else to store your data
-Might be cheaper than purchasing an external hard drive
-Impossible to misplace (such as a flash drive), although you will need to remember your password
-You don't have to be on any specific computer or in any specific location to access your files

Q. What types of information are people storing online?
A. Photos, videos, audios, resumes, tax info, insurance info, sensitive emails, and tons of other misc. junk they just don't want to keep on their hard drives.

Q. What are some alternate storage options?
A. List below...

1. Flash/thumb drives - Small and compact, yet easy to misplace if you're not careful. Storage for these has increased dramatically over the past two years. There are now flash drives capable of storing up to 64GB. Example follows:
If you want a state of the art encrypted flash drive my recommendation is Iron Key.
2. External drives - Either powered by USD or outlet plug-in, these devices allow for greater storage capacity. Storage capacity range is typically between 120GB to 2TB.

3. Hard drive docking station - Allows you to hot swap physical hard drives by placing them into a device that will read the drive. I've provided examples of two products in the links below.
4. CD or DVD (read/read-write, etc.)

Q. How safe and secure are these online storage sites?
A. This is a multiple part answer with many shades of gray.
1. First and foremost - it's impossible to know for sure who has access to your online data. You must assume it can be breached/accessed by any employee from the host site...or from the outside for that matter. (I'm not saying this would happen, but this is the line of thought that you should be considering).
2. Consider storing critical information on a site that offers SSL encryption (Secure Sockets Layer) of at least 128 bits. Note: Many sites will make you pay for encryption.
3. One option is to encrypt a file (example: .zip) and place your data in the file, then place the encrypted file on the site. This provides you with an additional layer of protection, but is obviously less convenient. Anytime you add security, the take-away is convenience.
4. You should always have an additional backup option. For example, you might have files on your computer, another backup copy on an external drive, and also one online.
5. Remember - the host site is a business and businesses can go under (or change their model). If they go under, you do not want to be at risk for not being able to recover your data, so be careful when picking a host site. One example of a site that no longer will be hosting files is http://www.blogger.com/redir.aspx?C=55b0caa2458e479d943836c064a4934e&URL=http%3a%2f%2fwww.xdrive.com%2f luckily for news users, they've provided notification.
6. Also, the digital certificate should be reviewed to help legitimize the security level of the site. (this can be done by double-clicking the padlock at the bottom of a secure log-in/page and viewing the certificate). A digital certificate is issued to sites/companies by a Certificate Authority (CA) - an example is VeriSign. This is basically a level of trust certificate that is supposed to validate that the site is who they say they are and can be trusted. However, not all digital certificates are created equal. This is a topic for another day and I'll dive deeper into it in a future issue.
Personally, I haven't settled on a long-term host site just yet, but here is a short list of a few that I'm considering. Once I make my final decision, I'll let you know.

http://www.blogger.com/redir.aspx?C=55b0caa2458e479d943836c064a4934e&URL=http%3a%2f%2fdrop.io%2f (has limitations, but it also has a Firefox add-on which is convenient for me)

Movie pick of the week: Fanboys
Just watch the clip below and judge for yourself...
Optional site of the week:
Want another option if you're not get your stuff sold on Craigslist or eBay? Try HP's tradeup site and they'll give you an online quote. Shipping expense is on your dime. It doesn't have to be an HP product, but one word of caution, the quotes seem to be a little lower than I'd prefer to see. It's just another option that's out there.
News of the week:

Tetris anyone?
According to researchers at Oxford University, playing the popular, classic puzzle game Tetris after a traumatic experience could significantly reduce emotional scars. Apparently Tetris—which requires serious brain power on your part blocks your brain from storing those bad memories. The catch: It needs to be played immediately following the traumatic event, so break out your old Game Boys and stick 'em in your backpack.

iTunes drops copy protection

The three largest music labels will allow Apple to offer music downloads free of copy-protection. In exchange for the DRM-free tracks, Apple will reportedly allow labels to push three tiers of pricing. Older songs from the archives will be 69 cents, songs that are newer and "midline" (i.e. not big hits) will retain the familiar 99 cent mark, and newer, bigger hits will fetch $1.29. FYI - If you're ever looking for free tech podcast recommendations from iTunes let me know and I'll send you a handful of options.


Tech Tip of the week:

Are you in the market for a new cordless phone? Consider a phone that uses DECT 6.0 (Digital Enhanced Cordless Telecommunications). It's basically a new protocol that's designed to avoid interference with other wireless devices such as routers, baby monitors, etc.

http://www.blogger.com/redir.aspx?C=55b0caa2458e479d943836c064a4934e&URL=http%3a%2f%2ftinyurl.com%2f9g5hp8 Wikipedia

http://www.blogger.com/redir.aspx?C=55b0caa2458e479d943836c064a4934e&URL=http%3a%2f%2ftinyurl.com%2f8hba6s Engadget article

http://www.blogger.com/redir.aspx?C=55b0caa2458e479d943836c064a4934e&URL=http%3a%2f%2fen.wikipedia.org%2fwiki%2fDECT eZine article


Workaround of the week:

If you ever have any trouble sending .exe files through email (some services block .exe from being sent as attachments) you can work around this by changing the file extension to .txt. Just tell the person on the other end to change the file type back to .exe and voila.


Website of the week:

This isn't a tech site, but one could get lost with in all of the information and archives that it provides.

http://www.blogger.com/redir.aspx?C=55b0caa2458e479d943836c064a4934e&URL=http%3a%2f%2fwww.historybuff.com%2f