From Gizmodo: These 22 Malware-Riddled Android Apps Might Be Draining Your Phone’s Battery

Malware is finding its’ way on people’s Android devices through apps that are downloaded from the Google Play Store. Google does a pretty good job of tracking these apps down, but sometimes it is to late and the app has already made its mark. Many of these apps had strong reviews. The battery draw occurs due to the app being on a constant run time of reporting back with information and possible grabs of your data.

On Thursday, anti-virus provider Sophos published a report describing its discovery of 22 Android apps that contained a variety of malware the company has named “Andr/Clickr-ad.” The apps come from a variety of small developers, and Sophos said that Google removed them from its Play store at the end of November. One of the offending apps, Sparkle Flashlight, had been downloaded more than a million times and many of them had strong reviews, according to Sophos.

Read More @ Gizmodo

How To Scan Your Computer For Malware With Google Chrome

This is an interesting tidbit about Google Chrome’s ability to scan your Windows-based computer for malware. I tested this on a Google Chromebook and it would not launch; but, never the less, this is great. I encourage you to read and learn more about this by clicking on the source link below.

Google Chrome might be the most secure web browser around. What’s more, Chrome can actually make your whole computer more secure.

Open Chrome (or open a new tab if Chrome is already running) and type the following in to the address bar at the top: chrome://settings/cleanup.

Here’s what you should see when you do that:

Source: How To Scan Your Computer For Malware With Google Chrome

Crystal Security – A cloud-based system that detects and removes malicious programs (malware)…

Crystal Security, a cloud-based system that detects and removes malicious programs (malware), is new to me. I am currently testing the portable version and so far the interface part looks great (user friendly). The detection engine, from I am can tell, is based on data gathered from millions of participating users systems around the world to help defend against the very latest viruses and malware attacks.

Due to not being familiar with Crystal Security, at this point, I will continue to test and use it solely as a troubleshooting application to inform when the possibility of malware exists. If you are familiar with Crystal Security, I would like to hear your experience with this. I do like the idea that there is a portable (no install) option.

I do recommend that you know what you are doing when using applications, such as this; so as not to cause accidental havoc to your PC.


SOURCE: Crystal Security

Microsoft Patches MS-Word Exploit That Spreads Malware

On the same day Microsoft officially began rolling out the Creators Update for Windows 10, they were also rolling out a patch for a zero-day exploit (that spreads malware) for all current Microsoft Office versions used on every Windows operating system (including the latest Office 2016 running on Windows 10). If you are running Microsoft Office at home, make sure you have installed the patch. To learn more, click on the source link below…

All versions of Office on all versions of Windows are vulnerable to this zero-day that spreads malware, so make sure you patch quickly

Source: Microsoft patches Word zero-day booby-trap exploit – Naked Security

How To Check If Your Google Account Has Been Breached by “Gooligan”

Gooligan is a new malware campaign that has been engineered to infect Android phones by stealing your Google Account Credentials. Anyone who owns a device running Android 4 and 5 that includes Android Jelly Bean, KitKat, and Lollipop — is most at risk  The infection typically occurs via Gooligan infected apps or links in phishing email messages. Once infected, attackers are able to gain access to your sensitive information from Google apps, like Gmail, Drive, Photos, etc… Once attackers hack into the device, they’re buying apps on the Google Play store and writing reviews posing as the phone’s owners. To get the skinny on Googligan please read this article, “More Than 1 Million Google Accounts Breached by Gooligan” at a site called Checkpoint.

To determine if your account has been compromised, go to Checkpoint’s “Gooligan Checker” and enter your Gmail address…

Googligan

Malware Called “DressCode” Found In Android Apps

If you think you are immune from malware in Android Apps; “Think Again”…

“Researchers from Check Point discovered malware they’re calling DressCode in 40 Google Play store apps and more than 400 apps listed in third-party app stores”…

“Once installed on the device, DressCode initiates communication with its command and control server,”

READ MORE @ BGR

The following video also explains how DressCode works:

NEW Web Of Trust (WOT) Safe Browsing Tool For Your Android Devices

If you are an Android smartphone or tablet user; and, you use the Google Chrome browser (or the native Android Browser), you may want to take a look at (and install) the mobile version of Web of Trust. I currently use the PC version of Web of Trust on all of my computers to help me determine which sites are reputable and which sites are not.

   WOT Mobile Security- screenshot

Against what types of online threats can WOT protect you?

Malware & Viruses – Avoid visiting websites that host malicious software, such as viruses, spyware, and adware that can steal your information and spread to other devices.

Phishing – Turn back from malicious links in fake emails, websites and text messages that are designed to fool you into giving away personal information.

Scams – Users ratings warn you when you visit a site that may host any type of fraud designed to steal money or personal information.

Spyware – WOT can warn you when a site has been reported to host spyware, which collects your personal information without your knowledge.

Malwarebytes’ Junkware Removal Tool

… and, MORE GREAT GEEK SQUEAK STUFF (#2016-018)

Malwarebytes has a junkware removal tool that I was unaware about that will aggressively perform the following tasks:

  • Removes adware that spawn popup ads, such as Conduit
  • Uninstalls unwanted toolbars and browser helper objects, including the Ask and Babylon toolbars
  • Removes potentially unwanted programs (PUPs)
  • Cleans up traces left behind by PUPs

I am a big user of the Malwarebyte products and decided to give this tool a test run. To run the tool, simply download and run it. A command-line window will open up that will prompt you to hit a key on your keyboard to launch the program.  If you have any browser windows open, they will automatically be closed. In the end I found that the tool is pretty aggressive in its’ cleaning to the point it actually removed one of my Chrome browser extensions that I use on a regular basis.  With that being said, I recommend you make a note of what extensions you have. If you are in a situation where you find your PC running slow and suspect an infection, you may want to run this tool.

Malwarebytes Junkware Removal Tool

———————————————————

MORE GREAT GEEK SQUEAK STUFF

Free Alternative to Office365 Called Open365I Love Free Software has a great article about LibreOffice’s new alternative to Office365 called Open365. After reading the article I went ahead and opened an account (for FREE) at Open365  (which appears to be in beta). Once I opened the account, client software was downloaded to my PC; which, I opted to not install. Instead, I went directly to the cloud-based version of Open365. First impression, not bad…  Will be keeping an eye on this.

Open365

Open365

———————————————————

ZOTAC ZBOX E series Mini PC
with Intel Core i5 4200U, dual-core, 1.6 GHz, Turbo up to 2.6 GHz Barebone System

ZOTAC ZBOX E series Mini PC

———————————————————

Easy Screen Capture MP3 Direct Cut

 Remove QuickTime Windows 10 Interruption

———————————————————

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment

Microsoft Edge Browser To Get Extensions Support — and MORE GREAT GEEK SQUEAK STUFF (#2016-012)

Microsoft Edge Browser To Get Extensions Support – If you use Google Chrome or Firefox, then you are familiar with browser extensions that extend the functionality of the browser. Microsoft recently announced that they have shipped the first preview release of Microsoft Edge with extensions support to Windows Insiders. Microsoft Edge is the browser that we see in Windows 10. To us at home, we will not see this just yet. I am also reading in various places where Microsoft is working on a tool that will let developers port Chrome extensions to Microsoft Edge… READ MORE

Microsoft Edge

———————————————————

Crush Malware With Malwarebytes Anti-Malware – I have featured the FREE version of Malwarebytes Anti-Malware in the past and thought this would be a good time to once again promote this “must have” security software. One thing to point out at the start is that the FREE version of Malwarebytes is only a scanning utility and does not provide real-time protection. You can get the real-time protection by purchasing the commercial version of their software. Don’t let this deter you from downloading the FREE version. I use the FREE version and make a habit to manually download the updates and perform routine scans of my computer.

Malwarebytes Anti-Malware

Malwarebytyes Anti-Malware

 ———————————————————

Launch Your Windows Desktop Like An iPad – How would you like to double click on your Windows desktop and a program (or shortcut) launcher appears that allows you to customize and launch your favorite programs, apps, files, folders or web URLs? If so, you need to take a look at PaperPlane. I have always loved program launchers and this one is no exception. PaperPlane Smart Launch is a free launcher program (shortcut manager) which enables you to launch your desktop like an iPad. If you are familiar with Mac OS Launchpad, you could say that it’s a better Launchpad just for your Windows. It enables you to quickly access your most used apps, open a recent file, visit a website URL, play your favorite game, or open any shortcut etc, in one place.

PaperPlane

PaperPlane

 ———————————————————

A Best Seller Portable Hard Drive – Looking for a way to safeguard your personal files? The WD 2TB Black My Passport Ultra Portable External Hard Drive (w/USB 3.0) may be the solution you are looking for. I currently use a similar Western Digital portable drive to backup my personal files that I then transport and store offsite (away from my home) — READ MORE

WD 2TB Black My Passport Ultra Portable External Hard Drive

WD 2TB Black My Passport Ultra Portable External Hard Drive

———————————————————

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment

TODAY ONLY – Save Over 60% on Norton Security (For 5 Devices)

Amazon’s Deal of the Day, for Thursday, June 25, 2015 has Norton Security (for 5 Devices) at 63% off the regular price. The deal remains in effect until 11:59 pm (PT) on Thursday. You can install this on up to 5 devices (PC’s, Macs’, Smartphones and Tablets). After you make the purchase you are provided a key code that will allow you to redeem the product online.

Norton Security

The new Norton Security simply gives you the best of Norton for the many ways you connect with your PCs, Macs, smartphones and tablets. Get comprehensive protection that’s specialized to secure your favorite devices. Stay safe wherever you go with proactive web protection, mobile device location, advanced privacy technology and more. It’s one solution for the different ways you connect.

____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the Day Leave A Comment

Microsoft’s Malware Center Flags The Older Versions Of The “Ask Toolbar” As Malware

I have been on numerous computers over the years and the Ask Toolbar always seems to find a way (usually through trickery) to install itself on people’s computers. Well, there is some good news and it is from Microsoft…

Microsoft recently flagged the older versions of the Ask Toolbar and is officially considering it malware. As a matter of fact, to validate this point, Windows Defender for Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista have been engineered to detect the older versions of the Ask Toolbar and remove it.

I don’t know if a lesson has been learned here or not, by the makers of the Ask Toolbar; but, Microsoft’s Malware Protection Center states, “The latest version of this application is not detected by our objective criteria, and is not considered unwanted software”… So, what I get from this is that the new version is ok and the old version is not.

The older version, that I have personally seen on many computers, will hijack your browser and restrict or limit your control over your search provider. I have to wonder if Microsoft became aggressive with this due to the Ask Toolbar, in essence, messing with Microsoft’s own search engine (called Bing).

Either way, I recommend that you avoid installing it (or any toolbar) and be careful when installing any software that allows other third party software to piggy back its’ way onto your computer (see example below of how the Ask Toolbar is along for the ride when Java is updated and installed — unless you uncheck it).

Ask Toolbar with Java

Also, I am not a real advocate of Microsoft Defender and Microsoft Security Essentials. Both, at present, are not rated very well. You may want to consider Malwarebytes Anti-Malware Premium … I prefer the premium version (which has full time scanning) over the free version (which does not have full-time scanning).

 ____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection –

Deal of the Day Leave A Comment

Terminate Known Malware Processes With RKill – Then Run Your Security Software

Did you ever wrestle with a Malware infection, think you have the PC cleaned; but, when you reboot the PC it comes back with a vengeance? This is where you need to have the utility by BleepingComputer.com, called RKill in your toolbox.

What RKill does is that it will attempt to terminate known malware processes.  It does not delete any files and only stops the malware processes from temporarily occurring, giving you that window of opportunity to run your security software (such as Malwarebytes Anti-Malware). To learn, in detail, what RKill does and and what it doesn’t — click here

Below is what RKill looks like running, in a console screen. That console screen will continue to run until it RKill has finished. Once finished, the box will close and a log will be displayed showing all of the processes that were terminated by RKill and while RKill was running.

RKill

RKill just kills 32-bit and 64-bit malware processes and scans the registry for entries that would not allow you to run various legitimate programs. When scanning the Registry, Rkill will search for malicious Image File Execution Objects, DisallowRuns entries, executable hijacks, and policies that restrict your use of various Windows utilities. When changing Windows Registry entries it will create a backup of these entries and save them in the rkill folder on your desktop. Each registry backup will contain a time stamp so that the backups are not overwritten on subsequent runs of Rkill. For a list of changes in Rkill, please see the change log at the bottom of this post.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Leave A Comment

A Free AppRemover Utility To Uninstall Antivirus and Security Software, Public File Sharing Applications, Toolbars and MORE

AppRemover is a must have utility to have around if you decide to swap out your antivirus or malware software on your computer.

It is important to know that security software installs, such as antivirus and malware software, are very complex in nature; and, if not uninstalled properly can wreak havoc to a PC. Typically, most developers of Security software will provide an uninstaller that you can download from their site; however, most people do not know or think about that. An easy option for removal of security type software is AppRemover.

AppRemover

AppRemover supports the removal of a boat load of applications – see here…  AppRemover is a standalone (portable) application that you simply download and run. You can download AppRemover – from here.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Leave A Comment

Be Ready For When The Cybercriminal That Misrepresents Microsoft Calls You

I want to start off this post by stating something I tell people, especially the elderly, who came from a generation that trusted other people.

“If you receive an unsolicited telephone call, whether it be a charity, a politician, an alarm company, your grandson is locked up in a jail in Canada, etc… where the caller is wanting money, PLEASE disconnect the call”.

What I am finding is once you get hooked by these calls you are placed on a call list that is sold to others AND the calls will perpetuate into more calls. It is like getting spammed by telephone and it gets so bad that you do not know what is real and what is not. My general rule of thumb is, when I get a phone call at my house and there is a delay of 3 seconds, GUESS WHAT? You just got disconnected.

 

One of my favorite blogging sites is TCAT Shelbyville – Technical Blog. Recently they posted an article (that I reblogged) titled, “No, you are not a Microsoft employee, no I don’t have a virus and by the way, you are definitely talking to the wrong people” that really hit home with me personally. I actually know several people, including members of my immediate family, where this fraudulent activity occurred.

The fraudulent activity I refer to is where a person (usually with a foreign accent) will randomly call you and tell you that they are a Microsoft Tech and will offer to fix your computer problems or sell you a software license. They will convince you into taking over your computer remotely and then they will go to work attempting one or all of the following:

  • Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software.
  • Convince you to visit legitimate websites (like http://www.ammyy.com) to download software that will allow them to take control of your computer remotely and adjust settings to leave your computer vulnerable.
  • Request credit card information so they can bill you for phony services.
  • Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there

After reading the TCAT-Shelbyville article, I started wondering if Microsoft is aware that they are being misrepresented in this manner. What I discovered is that they do know and actually have a page up on their Safety & Security Site that focuses specifically on this matter. I strongly encourage you to visit Microsoft and read, “Avoid Tech Support Phone Scams” where you will learn the following:

  • Telephone tech support scams: What you need to know
  • How to protect yourself from telephone tech support scams
  • What to do if you already gave information to a tech support person
  • Will Microsoft ever call me?

How to report this crime:

The CyberCriminals that initiate these calls know that most people will not report the crime. I suggest that if you are victim of a call such as this, especially if you find your credit card has been compromised, that you report the matter to the local authorities and contact your credit card company immediately to be issued another card.

Microsoft also encourages you to contact them, as well:

Whenever you receive a phone call or see a pop-up window on your PC and feel uncertain whether it is from someone at Microsoft, don’t take the risk. Reach out directly to one of their technical support experts dedicated to helping you at the Microsoft Answer Desk. Or you can simply call Microsoft at 1-800-426-9400 or one of their customer service phone numbers for people located around the world.

Report phone scams 

In the United States, use the FTC Complaint Assistant form.

In Canada, the Canadian Anti-Fraud Centre can provide support.

In the United Kingdom, you can report fraud as well as unsolicited calls.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Comment

Malware Herd Protection For Your PC

What is that old saying, “there is strength in numbers?”… Malware is the leading cause to computer problems today that is also criminal in nature. What I have discovered over the years that no single anti-malware or anti-virus program can give you protection 100 percent of the time.

This is where the cloud sourced program called herdProtect can help, as your second line of defense against malware, by providing strength in numbers. herdProtect utilizes a ‘herd’ of multiple online anti-malware engines (68 engines to be exact) to guarantee the widest coverage and the earliest possible detection. As a second line of defense anti-malware solution, herdProtect is designed to run with any existing anti-virus program already installed on a user’s PC. herdProtect is a free service to help user’s find and remove malicious software; and, is an excellent resource to run, after an infection, when you think you have a computer cleaned of malware using your own anti-malware software. herdProtect is available as a full windows install or can be downloaded and run as a portable app.

herdProtect - Anti-Malware

The herdProtect scanning engine works by monitoring the active objects (processes, modules, drivers, etc.) on a user’s PC as well as the hundreds of auto-start execution points (ASEPs). As new objects such as processes become active in the system, herdProtect will use a secured network tunnel to scan the object for malware against the engines of the top 68 anti-malware scanners. By scanning in the cloud all processor intensive activities are performed independent of the user’s PC. Depending on the aggregate results of the scan, the user can then take the appropriate actions and keep their PC free from any known malware threats.

 

GEEK SQUEAKS – Use Windows 8.1’s Quick Access Menu To Shutdown Windows

What gets me about Windows 8 and 8.1 is that you have to go on an Easter egg hunt to find the most basic of functions that we commonly use in Windows. I really think Microsoft has a lost sight of what the end user’s needs are and have never heard of the K.I.S.S. (keep it simple stupid).

For example, anyone who has not experienced Windows 8 or 8.1 will immediately discover that they cannot easily find a shutdown button in order to turn the computer “off”. Recently I set up a Windows 8 box for my parents and I ended up creating a shutdown button on the taskbar so that they would not have to go digging for this function. To the home based end user, these sort of things can be a challenge.

For others out there, in an effort to help you out…  If you have upgraded to Windows 8.1, the easiest way to get to the Shutdown or Signout options, is to right mouse click on the Start Button which is located in the bottom left corner of the screen (or on the very left side of the task bar at the bottom of the screen). If you are not seeing the Start Button, hover your mouse pointer in the bottom left corner and the button will appear.  When the button appears, right mouse click on the Start Menu button and a menu will pop up.  This is called the Quick Access Menu.

Quick Access Menu

One the menu pops up you will see an option for Shutdown or Sign Out; and, if you hover your mouse pointer over that option another menu will appear to the side giving you the ability to Sign Out, Sleep, Shut Down or Restart.

This may sound like a lot, but once you accomplish this feat it will become second nature; PLUS, the bonus to this you will know how to get to many other features in Windows via the Quick Access Menu such as the Control Panel, Task Manager, File Explorer, etc…

[ COMMENTS ARE WELCOME – CLICK HERE ]


MORE GEEK SQUEAKS
FROM AROUND THE NET

[NEWS] Tech Thoughts Daily Net News – March 5, 2014 – 10 Things You Need to Know About Digital Security;  FreedomPop Announces A Fully-Encrypted Smartphone For $10 A Month;  Identity Fraud: It’s Here to Stay;  How to use Chrome’s coming voice search feature today;  5 New Uses for Chromecast;  Free: Tweaking.com – Windows Repair;  Chromebooks are a revolution in Easy;  RadioShack To Close 1,100 Stores;  Apple faces website blacklist in ‘misleading’ warranty claims;  VPN Users ‘Pirating’ Netflix Scare TV Networks;  Google Fixes Nearly 20 Bugs in Chrome 33… @Bill Mullins’ Weblog – Tech Thoughts

[WINDOWS] Free PC cleaner & Privacy Tool – PrivaZer a privacy tool and PC cleaner. It’s free and easy… @PrivaZer

[HARDWARE] WD My Passport Ultra 2TB Portable External Hard Drive USB 3.0 with Auto and Cloud Backup – My Passport Ultra portable hard drive features WD SmartWare Pro backup software that lets you back up to the drive itself or use Dropbox to back up to the cloud. Move files quickly with the blazing speed of USB 3.0 connectivity. Keep your data private with password protection and hardware encryption… @AMAZON

[ANDROID] USA Today – The nation’s news from USA TODAY is accessible 24/7 on your Android phone or tablet. Staying informed has never been this quick, easy or enjoyable… @Google Play

[NEWS] Porn Dethroned as Top Source of Mobile Malware – Pornography is no longer the leading source of malware on mobile devices, according to a new study. The non-honor now goes to Web-based ads, according to Blue Coat, a security firm that analyzed data from more than 75 million global users for a report it released Wednesday… @NBC News

[WALLPAPER] – CATERHAM CT03 RENAULT @wallpaperfusion

CATERHAM CT03 RENAULT

[VIDEO]Jerry Seinfeld Analyzes Modern-Day Parenting

Jerry Seinfeld Analyzes Modern-Day Parenting

Learn a byte at a time with Geek Squeaks’ — featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it… I just plain love tech!

Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – October 27, 2013

Featuring: Cometdocs, the online document management system, now has a desktop app available; Is the October 31st release of the Nexus 5, a trick or a treat?; What to do if you are infected by Cryptolocker and how to prevent the infection; and, The Xbox One Console, a product that will be in high demand…

Geek Squeaks’ features a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

[ COMMENTS ARE WELCOME – CLICK HERE ]


Convert Files Quickly and Easily By Using Cometdocs
From Your Desktop

Cometdocs is an online document management system where you can convert your PDF files to Word, Excel, Powerpoint and more. You can also convert various formats to PDF. Cometdocs allows you to store and share your documents, online, for FREE. Recently Cometdocs released this desktop application where you can complete various file conversions, from your desktop, without having to go to the Cometdocs site.

image

With one right click on a document, you are presented with the file conversion options for that document type. Once you have chosen your conversion, the file will be automatically converted and download to your computer in a matter of moments… GET IT HERE


Nexus 5 expected to debut October 31 in the US – TechSpot

TRICK OR TREAT?: have been following the announcements leading to the development and release of Google’s Nexus 5 smartphone. According to TechSpot, we can expect the release on October 31st…

image

The anticipation and excitement surrounding the upcoming Nexus 5 smartphone and Android 4.4 Kitkat software update have reached a feverish pace, especially when you consider the phone briefly appeared on the Google Play store last week. And if the latest rumors prove to be true, consumers won’t have to wait much longer for the device as the latest suggests it will launch on October 31 in the US… READ MORE


Cryptolocker: How to avoid getting infected
and what to do if you are

@ ComputerWorld

I know I posted information yesterday about Cryptolocker, but this is extremely important. If you become victim of Cryptolocker, you are at high odds of losing your personal files. I have never seen anything like this and I feel, the more I let people know, the better. If you see the below graphic show up on your PC displaying that your personal files are encrypted, you have been nailed!

image

Cryptolocker comes in the door through social engineering. Usually the virus payload hides in an attachment to a phishing message, one purporting to be from a business copier like Xerox that is delivering a PDF of a scanned image, from a major delivery service like UPS orFedEx offering tracking information or from a bank letter confirming a wire or money transfer… READ MORE


This Product Is Not Guaranteed At Release Date of November 22, 2013 Due To High Demand

Xbox One Console – Standard Edition

I love it when I see a new product that is in such demand, you most likely don’t have a shot at it, until months after its’ release.

image

Introducing Xbox One. Where the best games, multiplayer, and your favorite movies, music, sports and live TV come togeather in one place. Xbox One games look and feel incredibly real, with cinematic gameplay that rivals Hollywood. Watch TV or chat with friends on Skype while you play, and keep on playing while smarter matchmaking happens behind the scenes. With Xbox One, you can snap two things side-by-side on your TV, and switch from one to another instantly. Cloud-powered and built for the digital age, Xbox One is designed to keep getting better over time… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – October 26, 2013

Featuring: What you need to know about Cryptolocker Ransomware; WinX DVD Ripper Platinum Halloween Edition Giveaway; Microsoft’s two-factor logon authentication process; and, An external hard drive that is built to withstand abuse…

Geek Squeaks’ features a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

[ COMMENTS ARE WELCOME – CLICK HERE ]


Cryptolocker Ransomware: What You Need To Know

@ Malwarebytes

Cryptolocker Ransomware is the first type of malware that I have ever seen where, once on your system, it will look for file extensions to files that you commonly use and will encrypt them so that you cannot access them (unless you have the private decryption key). In essence, your files are held hostage and you can only get them back by paying $300 for the decryption key.

image

Cryptolocker will encrypt users’ files using asymmetric encryption, which requires both a public and private key.

The public key is used to encrypt and verify data, while private key is used for decryption, each the inverse of the other… READ MORE


Giveaway! WinX DVD Ripper Platinum Halloween Edition

WinX DVD Ripper typically sells for $59.99…  You can get it now, for FREE, until November 4th.

image

Enjoy any DVD movies on portable players as you wish on Halloween!

No.1 fast DVD ripper with the best image sound effects in the World.

Rip any DVDs to iPhone(5S/5C), iPad, Android(HTC, Samsung, Kindle Fire), WP8, Surface, etc.

Convert DVD to play with media players in AVI, MP4, FLV, WMV, MKV, M2TS, MPEG, etc.

Clone DVD to ISO image/Folder and copy full title/main content of DVD to MPEG-2 file.

GET IT HERE


Keep your Microsoft account safer with two-factor authentication

@ PCWorld

PCWorld has a nice article about using two-factor authentication with your Microsoft accounts.  I highly recommend a person to use this; not only with your Microsoft accounts, but with your Google accounts, as well…

image

If you use Microsoft services like SkyDrive, Outlook.com webmail, or Xbox Live, you have a Microsoft account. If you have a Microsoft account, you might use it to store personal information that you wouldn’t want hackers to be able to get at. You know, credit cards and tax returns and such. Turning on two-factor authentication can help keep would-be data thieves out, and your secrets secret… READ MORE


Silicon Power SP Rugged Armor A30 1TB Shockproof 2.5-Inch USB 3.0 External Portable Hard Drive

In today’s world of electronics, it is a plus when you can find devices that provide shockproof protection.

image

The Armor A30 simply provides the best all-around protection in an amazingly tough and durable enclosure. It offers military-grade shockproof protection by including a shock-resistant silica gel from the internal structure to the exterior which adds an extra shield to withstand shocks and crushes… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – October 8, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 – (A FREE Start Menu For Windows 8.1): I keep reading that Windows 8.1 will have a Start Menu; however, I also read that it is not the real Start Menu, as we know it. To help you with this, I encourage you to take a look at Classic Shell. The developers recently updated Classic Shell to make it fully compatible with Windows 8.1 (SEE BELOW);

Squeak #2 – (The 5 Links You Should Not Click): ABC has a nice write-up, that you should read to educate (and remind), on what to look for (and not do) to prevent a malware or ransomware attack to your computer… (SEE BELOW);

Squeak #3 – (Desktop Publishing In The Cloud): As cloud computing continues to move forward, I am seeing more and more complex applications being made available. LucidPress’ online desktop publisher is no exception (SEE BELOW); and,

Squeak #4 – (Easily add 9 USB 3.0 SuperSpeed ports to your PC ): In need of additional USB ports? Always go with a powered USB hub. Today I came across a 9-port hub that has built in surge protection and built in ports to charge your devices (SEE BELOW)…

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


Classic Shell Start Menu Updated (Version 4.0)

image

Classic Start Menu can replicate the start menus found in older versions of Windows from 95 to Windows 7. You have 3 styles to pick from – Classic, Two Columns, and Windows 7… GET IT HERE


The 5 Deadly Clicks: The Links You Should Never Touch

@ ABC News

image

Here’s a scary scenario. You’re innocently surfing the Web, maybe on an unfamiliar site, not paying close attention. Suddenly your computer screen fills with illegal pornographic images of minors. You try to navigate away, but a warning screen branded by the National Security Administration’s Internet Surveillance Program pops up with the message: “Your computer has been locked due to suspicion of illegal content downloading and distribution.”

You are then offered a sort of Hobson’s choice: Pay a fine immediately, or face prosecution for downloading child pornography… READ MORE


LucidPress – Online Print and Digital Publishing Software

image

Lucidpress is a design and layout app that enables anyone to create beautiful print and digital documents. Sign up free Try the demo Lucidpress in 60 seconds Perfect for print Create stunning documents in less time than ever before… GET IT HERE


Anker® USB 3.0 9-Port Hub + 5V 2.1A Charging Port with 12V 5A Power Adapter

image

Easily add 9 USB 3.0 SuperSpeed ports to your PC and enjoy data transfer rates of up to 5Gbps for faster sync times.

Additional charging port (2.1A) offers enough current to charge either a smartphone or a tablet at high speed. USB 3.0 ports supply 0.9A each.

Lightweight, “power-bar” design effectively saves space. Blue LED indicates normal operation.

Designed with a built-in surge protector to keep your devices safe. Supports hot swapping. No installation of drivers required for Windows XP / Vista / 7 / 8 or Mac OS X 10.2 and above.

 CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Anti-Virus Uninstall Tools

The same security software that we use to protect our computers can be more troublesome than a virus when the time comes to uninstalling the software. Security software products are very comprehensive in design; and as a result often require special uninstallers to fully remove them from your computer. I encourage you to visit TCAT Shelbyville to get to one of the most comprehensive lists (by ESET) I have seen to help you uninstall anti-virus software. I cannot emphasize this enough. If you decide to remove any anti-virus or anti-malware software from your computer, ALWAYS CHECK WITH THE SOFTWARE DEVELOPER, to determine if there are any special utilities to remove the software.  Also, on the ESET site, you will also find a link listing malware removal tools that may be helpful in the event you suspect a malware infection.


Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

TCAT Shelbyville - Technical Blog

Here’s one of the most comprehensive Anti-Virus removal tools (dozens) from ESET.   List of Removal Tools

View original post

Scareware: Beware New Approach

To my readers, this article from a fellow blogger is most important. Have you ever heard of SCAREWARE??? I bet many of you have experienced it and had no idea what the tech term for it was called. As a matter of fact, it would be interesting to know if you ever been a victim of scareware. If so, let us know via the comments below. I would love to hear your story.

_________________________________________________________

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

_________________________________________________________

Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

What’s In The Bag Today???

Malwarebytes Antimalware

Paul's Internet Security Blog

Security Danger SignScareware, aka fake antivirus, as you may know, is a form of malware usually obtained from a malicious Internet website, that displays ominous warning messages on your PC that states you have been infected with malware. It usually runs a fake malware scan and warns that it has found a very dangerous malware that it will remove for a price. In many cases, the computer is locked up during this process and

View original post 269 more words

Control Your Computer’s Sound Volume and Balance From the System Tray

Many of us depend on controlling the sound volume on our computers by adjusting the knob on the speakers themselves or through a dedicated controller on the keyboard.

Today, I want to share with you a small utility, called SimpleSndVol, that installs an icon in the system tray where you can, with minimal effort, manage the sound volume and balance to your speakers. Simply click on the icon and the following interface pops up with sliders that you can move around to make volume and balance adjustments.

SimpleSndVol

What I especially like about SimpleSndVol, is that you can hover the mouse pointer over the icon and use the mousewheel to raise or lower the volume; plus, by performing a middle click will cause the sound to mute.

If you right mouse click on the SimpleSndVol tray icon, you will presented with a menu where you can open various system sound controller utilities on your computer (such as the volume mixer, sound applet and volume control options), the SimpleSndVol settings, and an IconSet that give you the ability to change the tray icon. My favorite icon is the one labelled “Triangl [Update]”. There are also some optional hotkey functions built-in if you prefer controlling the sound volume through the keyboard.

  SimpleSndVol

All-in-All, SimpleSndVol is one of my favorite sound utilities that is a work in progress that works nicely on Windows XP/7 and 8.

GEEK BONUS AREA

6 Coolest Notebook-Tablet Hybrids for 2013

Security Defender

Holiline Displays A Ticker Of Reminder Alerts
In Windows Taskbar

The Ultimate Digital Emergency Radio

Bookmarks4Techs – Over 500 Listed Tech Sites

Bookmarks4Techs

Links To All Articles Ever Posted At What’s On My PC

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Use Amazon’s Full Store Directory For The Twelve Days of Christmas

AmazonWe are now in the midst of the 12 Days of Christmas and if you are like me, I have a tendency to procrastinate and/or I am at a total loss when it comes to gifting.  An option that I use when it gets’ close to Christmas is Amazon.com, which is one of the largest online retailers. Being the geekster that I am, I am a regular visitor to their computer and electronics section to see what is new and to wish for my next purchase.  I especially like, that due to their size, you get numerous reviews on products from customers.

As a result of the size of Amazon, it is often difficult to get to the place you want to be. What many people do not know is that Amazon has a main store directory [ CLICK HERE ] that is a great launching point.

Click To See Store Directory

mx3DCB8

——————————————-

GEEK BONUS AREA

Nature Wallpaper Set 61

Lawnmower DUI

WordPress infected with javascript malware – FIX

ASUS VivoBook S400CA-DH51T 14.1-Inch Touch Ultrabook

Be Sure To Visit The NEW Bookmarks4Techs.com

Bookmarks4Techs

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Watch FREE Movies and TV Shows On Your Android Phone or Tablet

With tablet computers (and smartphones) projected to be the hot item again this year, today’s post is pointed toward those who have an android tablet or those who are wishing for one for Christmas.

One of the neat things with tablet computers (and smartphones) is that you can do just about anything with them; even stream videos, movies, TV etc… to the devices. The problem is that most services that stream movies and TV require a paid subscription.

Today I want to share with you, a cloud based  (TV and Movie) service called Crackle that gives you the ability to watch full-length Hollywood movies & TV shows on your tablet or phone (and computer) — Free and on demand. What you are going to find at Crackle is not the latest and greatest, but you will find content that is pretty darn good for being FREE.

Crackle

* Watch full-length Hollywood movies and TV series
* FREE to download app, FREE to watch
* Unlimited, on demand viewing
* New movies and TV episodes added monthly
* Genres including: action, anime, comedy, crime, horror, thriller, sci-fi and anime
* Optimized for both phones and tablets
* Browse Movies, TV, Originals, Collections and Genres
* Build and manage your Watchlist for viewing on the app or online at Crackle.com.
* Stream HQ video via 3G, 4G or Wi-Fi
* App works in US, Canada, UK and Australia

Note:  You can get Crackle on your desktop or notebook computer at the main site [ here ].

——————————————-

GEEK BONUS AREA

Bookmarks4Techs Was Assassinated, But Has Been Resurrected Here (in a new format)

Ghosts From Thanksgivings Past

The Best Portable Solar Charger – Recharge iPhone 6X faster than any ordinary chargers

How to Remove Win 7 Antivirus Pro 2013, Win 7 Antispyware Pro 2013 (Uninstall Guide)

Bookmarks4Techs

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

A Small FREE Application For Keeping Securely Encrypted Notes

Looking for a way to store encrypted (password protected) notes?  If so, then take a look at fSekrit.

There is nothing fancy about fSekrit other than it is a program that is designed to store sensitive information in a text based note file.  For example, I use this program at work to store various login codes to a door security system which I am tasked with monitoring. Instead of trying to remember all of the codes, I simply entered them into fSekrit, set a password, and I’m good to go. I only have to remember the one password. This program has worked without fail for me and is so small it can be carried on your flash drive. As a matter of fact, it is only 50K+ in program size plus the size of your encrypted text.

The easiest way to learn and use fSekrit is to simply run fSekrit, enter some text and then hit the close button for the fSekrit window.  At this point you will be prompted to save your note to file.

fSekrit

The file name that you give it will be saved as an executable. For example, I saved the note as “Rick”…  When I saved the note I was then prompted to enter a passphrase (or password), then hit “OK” after the passphrase as been entered two times. As indicated, do not forget the password.

fSekrit

The next time I want to pull the note up called “Rick”, I simply click on the “Rick” file, enter my passphrase and voila’ my note is once again available for viewing and editing.

fSekrit is a small application for keeping securely encrypted notes. These notes are truly stand-alone; the editor program and your note are merged together into a tiny self-contained program file, bypassing the need to install a special application to view your data. This makes fSekrit ideal for keeping encrypted notes on, for example, USB flash drives.

fSekrit uses very strong encryption to ensure that your data is never at risk. Rather than using hocus-pocus home-brewed algorithms, fSekrit uses the standard, military grade, peer-reviewed AES/Rijndael in CBC mode, with a 256-bit keysize.

fSekrit runs across the entire windows range: 9x/NT/2K/XP/Vista/Win7, 32-bit as well as 64-bit x86 editions.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE…

How to Disable Office 2013 Start Screen

Beware Malware On Olympics-Related Apps

Pulse.me – News reimagined by Internet Explorer 10

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Is Your Computer Infected with the DNS Changer Malware?

If your computer is infected with the DNS Changer Malware, expect your internet connection to be down on Monday, July 9, 2012… I have been following this for quite some time and decided to post some information about the DNS Changer Malware, at the prompting of some very good friends of mine.  (mainly Gary S., Curtis M., Harry D. and Frank D.)…

DNS Changer Malware

What is the DNS Changer Malware?

BACKGROUND

  • Up to 64,000 U.S. computers could lose Internet service Monday due to malware that may have infected them more than a year ago. The malware was discovered when FBI agents prepared to take down a group of international hackers last year.
  • The malicious software has likely slowed the Web surfing of infected computers, as well as disabled anti-virus software. Most users are likely unaware that their system is infected.
  • Systems infected by the malware will lose their ability to go online, and users will have to call their service providers for help deleting the malware and reconnecting to the Internet.
  • The number of computers likely infected is more than 277,000 worldwide, down from about 360,000 in April. The FBI believes that about 64,000 are in the U.S., and 50 Fortune 500 companies are still infected.

[ CLICK HERE ]
to quickly determine if your computer is infected with the
DNS Changer Malware.

[ CLICK HERE ]
 Everything you need to know about the
DNS Changer Malware
This site will shut down at 12:01 a.m., EDT, Monday, July 9, 2012 

——————————————-

GEEK BONUS AREA

Today’s Technology News, Software, Apps, Wallpapers, Tech Products and MORE…

Free Online OCR Service Turns Image Files Into Text

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

NEW Version of Microsoft Security Essentials

I am often asked; “What security software do I use for my main layer of protection? My answer is, “Microsoft Security Essentials”…

Microsoft Security Essentials provides real-time protection for your home or small business PC that guards against viruses, spyware, and other malicious software.

Microsoft Security Essentials

I currently have Microsoft Security Essentials installed on all of my PCs and it has yet to let me down; HOWEVER, as with any security software (no matter which one you install), you have to install “common sense” alongside it.

What prompted me to write about Microsoft Security Essentials is that Version 4.0, which has been in beta since late 2011, has been officially released.  According to one of my information sources (CNet), the released version “is part of the standard product update release cycle. This service update contains product enhancements to improve performance and user experience. We have improved on Microsoft Security Essentials’ Automatic Remediation, which will automatically quarantine highly harmful threats without prompting the user to take action as well as minor bug fixes in set up, malware remediation and other areas.”

If you are looking for a security software option, that is FREE; that is easy to understand and use; that uses minimal system resources; and is engineered by a company that we are all familiar with, then Microsoft Security Essentials is a good choice.

Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up-to-date so you can be assured your PC is protected by the latest technology.

Microsoft Security Essentials runs quietly and efficiently in the background so you’re free to use your Windows-based PC the way you want—without interruptions or long computer wait times.

Before installing Microsoft Security Essentials, we recommend that you uninstall other antivirus software already running on your PC. Running more than one antivirus program at the same time can potentially cause conflicts that affect PC performance.

** IMPORTANT **  —  When changing security software on your PC from one brand to another, it is very important that you completely uninstall the security software you intend to remove. The uninstaller built into windows will not cut it. I highly recommend you either visit the software maker’s site to get information to uninstall the product or use a third party uninstaller such as AppRemover.

The free AppRemover utility enables the thorough uninstallation of security applications like antivirus and antispyware from your computer. Remove computer stress. Simply, cleanly and effectively.

—————————————————–

GEEK BONUS AREA

Featured Best Sellers – Video Graphic Cards – 4/25/2012

Featured Software – 4/25/12

Technology News – 4/25/12

Blank DVDs (100 Pk Spindle)

Changes Coming To SkyDrive – Act Now

Google offering Google Drive with 5gb of online storage

Would you spot this skimmer on an ATM?

New Device allows Deaf-Blind to Text Messages

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks (#74) – Malwarebytes, Kindle Fire, Save Gmail Messages to PDF, Encrypt Notes In Evernote, and All You Need Is MS-Office Starter Edition

Malwarebytes Anti-Malware Free

Malwarebytes Anti-Malware Free utilizes Malwarebytes powerful technology to detect and remove all traces of malware including worms, trojans, rootkits, rogues, dialers, spyware and more… READ MORE

Malwarebytes Anti-Malware Free

Kindle Fire

“The Kindle Fire is a 7-inch tablet that links seamlessly with Amazon’s impressive collection of digital music, video, magazine, and book services in one easy-to-use package. It boasts a great Web browser, and its curated Android app store includes most of the big must-have apps (such as Netflix, Pandora, and Hulu). The Fire has an ultra-affordable price tag, and the screen quality is exceptional for the price.” – CNET…  READ MORE

Kindle Fire

Save Gmail Messages Into PDF File (how to)
@AKS Geek Live

There are many software available to save your email, messages, page into PDF file but what you do if you’re using restrictive account or using shared computer where you can’t install any software? Here is a simple method which lets you save your Gmail messages as PDF file or Word document…  READ MORE

Save Gmail Messages Into PDF File

Encrypt and Password Protect Text Notes in Evernote
@ Lost In Technology

To encrypt your text notes on Evernote, you will have to install the desktop application. The web and the mobile based applications do not provide the feature as of now. If you already have the desktop version of Evernote installed on your computer, launch the application. If you don’t have it installed, download and install it. It makes it very easy to take down notes as compared to the web-based application and has many interesting features… READ MORE

Encrypt and Password Protect Text Notes in Evernote

Don’t buy Microsoft Office when you buy a new computer @ Help Me Rick

Despite what big box store sales people try to sell you, don’t buy a copy of Microsoft Office. On all new commercial computers today, manufacturers install a trial version of Microsoft Office AND a copy of Microsoft Office Starter Edition.

Microsoft Office Starter Edition does NOT expire and is every bit as functional as its costly brethren. The Starter editions includes only Word and Excel… READ MORE

Don’t buy Microsoft Office when you buy a new computer

—————————————————–

MORE Geek Squeaks

Bookmarks4Techs
(500+ Tech Sites)

The Bookmark This Collection

Bookmarks4Techs Storefront

Deal
of the Day

Technology News

Featured Software

Android Apps

Featured Wallpaper

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

Windows Repair (All In One) – A Tool for the Tech Toolbox

Have you every found yourself in a jam where you have cleaned a PC from one of those rogue malware infections (AKA: scareware) only to discover that the infection, and even the cleaning process itself, caused corruption to the Windows registry and files (that control Internet Explorer, Windows Update, Firewall, etc.). My most recent experience was exactly that. I cleaned the machine only to find that the Firewall had been corrupted.

If this has occurred to you and you ran out of options, visit Tweaking.com and download their Windows Repair (All In One). As a matter of fact if you are in the position of cleaning malware from PC’s on a frequent basis, I suggest you keep Windows Repair (All In One) in your tech toolbox.

Windows Repair is an all-in-one repair tool to help fix a large majority of known Windows problems including registry errors and file permissions as well as issues with Internet Explorer, Windows Update, Windows Firewall and more. Malware and installed programs can modify your default settings. With Tweaking.com – Windows Repair you can restore Windows original settings.

I do recommend that you have some knowledge of cleaning malware from a PC before using this program; AND, that you follow the 4-step process that is built into this program before you initiate the repair process (see video).

Tweaking.com – Windows Repair can do the following:

Reset Registry Permissions
Reset File Permissions
Register System Files
Repair WMI
Repair Windows Firewall
Repair Internet Explorer
Repair MDAC & MS Jet
Repair Hosts File
Remove Policies Set By Infections
Repair Icons
Repair Winsock & DNS Cache
Remove Temp Files
Repair Proxy Settings
Unhide Non System Files
Repair Windows Updates
Repair CD/DVD Missing/Not Working
and more…

—————————————————–

GEEK BONUS AREA

Bookmark This (#10) – WindowsPager

FREE Today Only – Glow Tic Tac Toe (Android App)

Tech Product of the Day – The NEW Panasonic Lumix
DMC-ZS20 Digital Camera

HOT – Behind the Scenes of Google Chrome:
Optimizing and Troubleshooting

Gold Box: New Deals. Every Day.

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

[DID YOU KNOW?] You Can Check A Suspicious Website for Malware In Your Browser

If you open up your web browser and type the following in the address bar;

http://www.google.com/safebrowsing/diagnostic?site=

AND, after the “equals sign” type the web address of any site, that site will be checked against Google’s updated lists of suspected phishing and malware pages. It is a handy and quick way to help verify your suspicions of a potentially bad site.

This is all part of Google’s Safe Browsing Service.  The goal of this service is to:

  • Warn users before clicking on links that appear in your site when they lead to malware-infected pages.
  • Prevent users from posting links to known phishing pages from your site.
  • Check a list of pages againest Google’s lists of suspected phishing and malware pages.

For example if you wanted to get a report on What’s On My PC, you would type the following in your browser’s address bar and hit enter.

 http://www.google.com/safebrowsing/diagnostic?site=whatsonmypc.wordpress.com

You will then get the following diagnostic report from Google:

Safe Browsing

Diagnostic page for whatsonmypc.wordpress.com

What is the current listing status for whatsonmypc.wordpress.com?

This site is not currently listed as suspicious.

What happened when Google visited this site?

Of the 3 pages we tested on the site over the past 90 days, 0 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2011-09-09, and suspicious content was never found on this site within the past 90 days.This site was hosted on 3 network(s) including AS13768 (PEER1), AS16805 (LAYER3), AS22576 (LAYER3).

Has this site acted as an intermediary resulting in further distribution of malware?

Over the past 90 days, whatsonmypc.wordpress.com did not appear to function as an intermediary for the infection of any sites.

Has this site hosted malware?

No, this site has not hosted malicious software over the past 90 days.

——————————————-

[CLICK HERE]
Gold Box: New Deals. Every Day.

Best Sellers in Electronics
image

Computers & Accessories Index

Over 600 Bookmarked Tech Sites

——————————————-

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Get Rid of Boot Malware with Microsoft’s System Sweeper

Guest Article By:

Tibor Schiemann,
President and Managing Partner,
TuneUp

TuneUp

Have you ever booted up your PC only to get a black screen? When this happens, something’s clearly wrong, so you’ve probably tried a number of steps to get your PC running again. But what should you do if those solutions don’t help? Try using Microsoft’s System Sweeper to get rid of the malware that’s messed with your system’s boot files.

Microsoft's System Sweeper

System Sweeper is a boot-up recovery tool that performs an offline scan on an infected PC to identify and remove rootkits and other advanced malware—without booting into Windows. You can also use System Sweeper if you cannot install or start your antivirus solution, or if the installed solution can’t detect or remove malware on your machine. Based on Microsoft Security Essentials, System Sweeper should get PCs back on track; however, it’s important to remember that System Sweeper is not a replacement for an antivirus solution that provides ongoing protection.

Let’s take a look at how to run System Sweeper when you cannot start your PC and quickly get rid of malware.

Step 1: Download System Sweeper. Go to Microsoft Connect to obtain the beta version of the program. Make sure to choose the right version (32-bit or 64-bit) depending on what your infected system is running. The supported web browsers are Internet Explorer 6 or higher, or Mozilla Firefox 2 or higher.

Step 2: Create a bootable recovery CD or USB thumb drive. System Sweeper can be installed on both a CD and on USB flash memory. You should first get a blank CD or a reformatted USB thumb drive with at least 250 MB of space. Then, go to your Downloads folders, and run the “mssstool32” or “mssstool64” files depending on which architecture you have. System Sweeper will download the latest antivirus signature files onto the disk, and then burn them onto either the bootable CD or USB thumb drive.

You should then insert the CD or plug the USB key into the computer you’re trying to clean up, and make sure to boot from the CD/DVD drive or the USB port. To do that, go to the BIOS of the machine by pressing DELETE, F2, F12 or another special key repeatedly right when the PC is turned on. Then, go to its boot section, make sure that the “Boot Priority” is set to either CDROM (DVD) or USB, and restart the PC.

Step 3: Use System Sweeper. Your PC should ask you to “Press any key to boot from CD or DVD”—follow this advice and wait until the recovery environment is loaded. Once System Sweeper appears on the screen, hit “Start full scan” to scan all of the hard disks for viruses and malware.

Once you’ve completed these steps, you can let System Sweeper run its course, but keep in mind that it might take a while depending on the amount of data. It will be worth the wait to enjoy a clean and bootable PC again.

——————————————-

Deal of the Day @ Amazon.com

Computers & Accessories Index

Over 600 Bookmarked Tech Sites

——————————————-

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Windows Stability Center is a Rogue Anti-Spyware Program

If you are seeing the Windows Stability Center (see below) on your PC, then you are victim of malware attack that is trying to trick you into buying the full version of the program to remove bogus system threats. Do not fall for this scam and read further for removal instructions. If you are seeing this, your computer is infected.

Windows Stability Center

The reason I am bringing this to your attention is that this past week the the so-called LizaMoon “SQL injection attack” began that redirects users by exploiting web site programming errors and poorly written website code and scripts. In other words at the redirected site, users will see a warning dialog that they had been infected with malware and a link to download a fake antivirus. I know none of this makes sense to you, but a massive internet attack has occurred that is trying to scare computer users into visiting a bogus antivirus site that has infected more than an half million websites and continues to spread, according to the Internet security firm websense. [Sources: USAToday, eWeek ].  As of this writing, many of the anti-virus and anti-malware programs are not set to detect or remove this infection.

Now the magical question.  How do you remove this? I researched this issue and found removal instructions [ HERE ] .  Appears Malwarebytes Antimalware will be required to remove this pest.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Detect Suspicious System Behaviors with HiJack Hunter

HiJack Hunter is very impressive computer technician type tool that is designed to comprehensively scan, gather data and generate a log file about your computer that may be helpful when you experience suspicious system behavior. This tool is for purely for someone that has comprehensive knowledge of the workings of the Windows operating system and the ability to scan a log file for problems (and know what they are looking for).

A powerful part of HiJack Hunter is the ability to restore all system parameters that are commonly hijacked by spyware and trojans.  It is quite possible with this utility to restore (back to norma)l  the task manager, regedit, cmd, userinit registry key, system restore, safe mode, IE settings, and IE urls. You can also manage hosts files, registry startup entries and boot files with HiJack Hunter.

HiJack Hunter

Here is a sampling of what areas HiJack Hunter will scan and other features:

Generic System Information
Running Processes
Loaded Modules
TCP Connections
Registry Startups
Startup Folders
TCPIP Nameservers
Internet Explorer Settings
Programs allowed in Windows Firewall
Ports allowed in Windows Firewall
Windows Hijacks
Winlogon Notify
ShellExecuteHooks
SharedTaskScheduler
Shell Open Commands
Browser Helper Objects (BHOs)
Wallpaper
Executables in Temp folder
Executables in suspicious folders
Files created 7, 15 and 30 days ago
Hidden files in suspicious folders
Executables in Internet Explorer Folder
Drivers -> FSFilter Anti-Virus
Drivers
Services
Custom files listing
Custom Registry Keys and Values Dump
Exclude Microsoft System Files
Multilingual
HOSTS File Manager
Windows Tools
CLSID List
Restorer
Restore Safe Mode
Restore System Hijacks
Restore Startup Hijacks
Restore IE URLs
Restore IE Hijacks
Reduce memory usage
Exclusion List
Startup files manager
Boot Files manager
Work in background
Kernel Mode Info
Ring3 API Hooks

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeak (#106): Your Computer May Be Infected and You May Not Even Know It

imageI noticed today on the TTC Shelbyville site an article titled, “There’s Nothing Wrong With My Computer” that was an attention grabber and is worthy of a Geek Squeak. The article is a good description of how “most people” think there is nothing wrong with their computer, until a computer tech performs a security scan of the computer (using up-to-date security software) only to find that the computer is poisoned with malware. In this case, based on the picture illustrations in the article, the PC was infected and appeared that it had not been defragged (or maintained); probably never.

The meat of the article are the steps that are taken AND recommended (portable) software to use to clean the computer of the infection. I encourage you to take a look at these steps to get an idea what is involved with “trying” to clean a PC that has been poisoned by malware. I have assisted people with cleaning up malware infections and it is a very time consuming process. I can tell you this, if you take your PC to a shop for have a malware infection removed, do not be shocked when you get a bill of $150 or more. Personally, if it was my own PC, I would probably do a reformat and reinstall of the OS.

My point with this article is to “heighten your awareness” and to encourage you to keep your computer running smoothly by keeping your security software up to date and to perform periodic FULL scans. I find many people buy PC’s with the baited short term subscriptions to Norton and McAfee and then let the subscription expire leaving there computer at high risk for infection.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’ of the Week (#77)

If you have a yearning to learn about information technology and computers, then be sure to check out the weekly roundup of Geek Squeaks’. The article links you see below are articles and information provided by the sites (and blogs) that are associated with the What’s On My PC blogroll.

Geek Squeaks'

Tech-for Everyone
Software License Giveaway Drawing: SPAMFighter Pro

Laptops Review Central
The many features of Toshiba Folio 100

Paul’s Home Computing Blog
Wanted: Cyber Warriors

TuneUp Blog about Windows
Finally, Smooth HD Playback on Slower PCs and Netbooks

Lifehacker
Remains of the Day: How Good Software Makes Us “Stupid

Rarst.net
How to find high quality images of stuff

Free PC Security
Malicious Sites September 13

Mister Reiner
Firefox vulnerabilities give me the creeps!

Gadgetsholic
WebOS 2.0 Screenshot Pictures Leaked

Bookmarks4Techs
Kindle Wireless Reading Device

Canadian Tech Blogger
How To: Adding Liquid Cooling To A PC

thePC Security
Free Software Update Software – Secunia PSI 2 BETA

Right On Technology
Google Instant Search
Introduced, Real-Time Results While You Type

Bill Mullins’ Weblog – Tech Thoughts
WOT (Web of Trust) – Is It The Most Important Browser Security Add-on You Need To Install?

EvilFantasy’s Blog
Flash Cookie Cleaners

Plato On-Line
73% of Americans Hit By CyberCrime

Faster PC! Clean! Clean!
How to Remover RegistryClever

RGdot
Simple Freeware: Screenshoter And Easy Image Modifier

AKSGEEK Live
Samsung Galaxy Apollo Coming Soon to Telus

Malware Removal Instructions
Remove dating.clicksearch.in (Uninstall Guide)

Chicago Mac/PC Support
Google’s New Scary Security Warning (via Meredith L. Eaton)

I Love Free Software
Create DVD Cover Create CD Cover with UnderCoverXP

Netbook Freeware
The Big Bad Launcher: Simple and Easy to Use
Launcher For Your Netbook

Worthy Tips
Canon PowerShot SD4500IS
available Shooting Modes and Photo Effects

404 Tech Support
Google Maps Instant, YouTube Instant, and YouTube Time Machine

I Want Ice Water
Tokyo in Time Lapse (via Metousiosis)

TTC Shelbyville
Free Sessions for Girl Scout Leaders and Girl Scouts

Snakebytez
Burn Blu-Ray and HD-DVDs with CDBurnerXP

Awesome Wallpapers
Windows Se7en Wallpaper Set 31 (Nature)

Laptop Computer Reviews
What Needs to Stop

What’s On My PC
Is magicJack’s VoIP For You

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Removing Norton Security Scan and Lessons Learned

Hey Rick there’s this Norton Security Scan thing that’s dug in like a tick and can’t get rid of it… My computer is running dog slow!

Norton Security Scan

This was a recent subject to an email I received. Of course, my first thought and instinct as a techie, was malware…

The Good… I started researching Norton Security Scan and from what I found is that Norton Security Scan is a free legitimate app (by Symantec) that provides on-demand scanning and removal or repair of viruses, spyware and other malware. The virus definitions are updated when your computer is connected to the internet.  Ok, that did not sound too bad.

The bad… Further research indicates that Norton Security Scan has a tendency to piggyback onto your PC via other software installs (such as Adobe Shockwave Player). From what I am reading you can opt out installing Norton Security Scan, via these other software installs, but through (in my opinion) trickery the check box to opt out is already checked. Most computer users will not know the difference; therefore, they continue the install of the app and Norton Security Scan comes along for the ride.  As a result, Norton Security Scan runs alongside your other installed security software and the end result is slow PC (and the potential for problems).

The bad… Once on your PC, this app really does dig in like a tick, is very difficult to remove through normal uninstall channels, will keep coming back; AND from what I am reading will use scare tactics to encourage you to buy other Symantec security products. Hmmmm… Sounds like the tactics used in a malware scareware attack…

A Possible Solution… Getting back to the problem at hand with removing Norton Security Scan… I emailed the person back and had them run the latest version of the Norton Removal Tool and the report I received back was that “I believe we got it…”. This tool is engineered to remove various Norton products and hooks from your PC. During my research, I did find instances where registry edits and manual deletion of files/folders associated with Norton Security Scan may also be required.

Lessons Learned…

First Lesson: During any software install make sure you read everything closely during the installation steps to ensure you are installing only what you want to install. Being a seasoned software installer and tester, I have been finding more and more instances, during installation routines, where other second party apps are being installed and coming along for the ride. Sometimes the “opt out” for these apps are cleverly camouflaged.

Second Lesson: Any security apps that you have installed and you decide to uninstall them, make sure you visit the software products site to determine the removal process. Security apps, when installed (such as antivirus, antispyware, antimalware), are very complex and often require special tools to take them off of your PC. The normal uninstall process, built into Windows, typically will not do a thorough job.

StumbleIt

jaanix post to jaanix

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’ of the Week (#58)

If you have an obsession for information technology and computers, then I encourage you to become a regular subscriber of the sites listed below.  To whet your appetite, What’s On My PC randomly selects each week recent articles that have been composed by the authors who are members of the What’s On My PC blogroll.

image

Bill Mullin’s Weblog – Tech Thoughts
Be Sure to Visit this SUPER TECH BLOG and Congratulate Bill
for surpassing the 2 Million mark in visits

Internet Security Blog
Malware Infection Economy – Top Selling Products
and Services in Malware Business

Canadian Tech Blogger
Apple Sells Over 1 Million iPads

Mrintech
Best Free Portable Apps Suite with 280+ Apps

TuneUp Blog about Windows
PC Optimization: The Green Way

Technogran’s Tittle Tattle
WordPress.com versus Blogger.com 3

Worthy Tips
Will you pay to watch Youtube video? You should soon

Netbook Freeware
PeaZip: Best Free Compression Tool for Netbook

I Love Free Software
3 Chrome Extensions for Downloading Files from Rapidshare

404 Tech Support
SparkChess – Quality, Free Chess Online

TTC Shelbyville
1.5 million stolen Facebook accounts up for grabs

Snakebytez
PDF OCR – OCR PDF Document to Editable Text

Free PC Security
Malicious Sites May 4

Tech-for Everyone
Click, click, fixed!

Rarst.net
Best and worst computing advice you know?

Lifehacker
Disable Google Chrome’s Location-Aware Browsing

Crazy World
of G HTC Incredible

thePC Security
Top 10 Spamming Country – No, China is Not There

Right On Technology
HP Buys Palm, Hints at WebOS Slate

411-Spyware.com
How to Remove AKM Anitivirus 2010 Pro

Carol’s Vault
Chillout Saturday : DJ River’s “Blue Room” album

Plato Press
Comodo Backup

What’s On My PC
Secure USB Flash Drive

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]

Know How to Spot Badware (Malware)

I recently had a conversation with a friend, who was new to computers, and he commenced explaining to me how he was suddenly interrupted during a computer session by Microsoft Security Essentials 2010 and was requested to provide his credit card number to unlock the full version. He further explained that his computer was not functioning properly, so he proceeded to make the purchase for the unlocked version. Upon hearing this, I had to regrettably tell him that his computer was infected with malware (a virus) and that he had been robbed and to contact his credit card company immediately. His jaw dropped and said, “you are kidding me, right?”. First off, my friend was wrong in telling me that it was “Microsoft” Security Essentials 2010″, when in fact it was the rogue (fake) malware package called “Security Essentials 2010”.

image

Folks, know your (legitimate) software on your computer and how to spot the badware (malware). Yes, Microsoft does make a package called Microsoft Security Essentials (without the 2010 attached to the name) which is a very good security product designed to protect you from malware, viruses, spyware, etc… HOWEVER, it is totally free and they will never ask for your credit card number. As a matter of fact, any appearance of persistent unknown security alerts (or software) that suddenly appear on your computer (that looks real) and prompts you to make payment to fix a problem is the first clue that your PC is infected. These fake security programs will intentionally render your PC useless, cause data loss and oftentimes is very difficult to remove.

Today, what I would like you to do is learn how to spot the badware and one of the best places to do that is at 411-Spyware.com.

image

The author of 411-Spyware.com (Kristopher Dukes) has compiled quite a collection, with pictures and all, of FAKE security products that are engineered to instill fear, cause havoc and steal from you. Not only does she provide you with the visual experience, she also provides removal instructions and suggested software to assist with the removal process. The one thing I want you to look at with some of these, is the complexity of the removal process, which literally can take a computer tech hours to resolve; with the worse case scenario being a complete system restore.

Most likely, in the scenario that I provided that involved a friend, I’m going to go out on a limb here and say he was porn surfing… If you porn surf, pirate software, do peer2peer sharing and go click happy on any link that comes your way; then be forewarned, you will become a cybercrime victim, just like my friend.

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’ of the Week (#44)

Welcome to the 44th round of Geek Squeaks’.  If you have a passion for information technology and computers, then you are at the right place.  Geek Squeaks’ is a weekly roundup of links to articles produced by bloggers (and site owners) associated with the What’s On My PC blogroll community.  I encourage you to pay a special visit to each of these sites to support their incredible work…

image

Tech-for Everyone
What is Mobsync?

thePC Security
HDD Password Removal –
Crack, Clear, Unlock, Reset a Locked Hard Disk

Lifehacker
Seems Like Everyone’s Getting Faster Internet but the U.S.

Rarst.net
Colorjive.com – online image editor to paint walls

AskBillFirst
Microsoft urges Windows XP users to ditch old Flash version

Free PC Security
Malicious Sites January 19

Snakebytez
Create a System Restore Point in 1-click with Quick Restore Maker

TTC Shelbyville
Online Network Tools

I Love Free Software
RegKey Backup – Free Software to Registry Backup

Worthy Tips
Download ‘Your Guide to Windows 7′ EBook

Mrintech
Help Haiti People: Donate Online or via Text

Canadian Tech Blogger
Firefox 3.6 RC2 Out

AKS-Feel The Change
What’s My Computer Doing?

Carol’s Vault
PDF Password Remover – remove your PDF’s restrictions

411-Spyware.com
How to Remove Win Security 360

Plato On-Line
World Netizen’s Day

Bill Mullins’ Weblog – Tech Thoughts
Safe, Secure Browsing, with Free WOT Browser Add-on

Big Geek Daddy
How to Control Startup Programs

Computer Maintenance
How To Set Windows Automatic Update

Technogran’s Tittle Tattle
Windows Live Mail Wave4, it’s all looking good!

TuneUp Blog
Get More Privacy! How to Remove Personal Information from Files

Internet Security Blog
Auto Lock Computer Screen With USB – Free Download

Geeked Up
6 Important Steps on How to Maximize Firefox Screen Space

Technize
Find Your Files Faster with Windows 7

Whats On My PC
The Ultimate Clock for your Windows Desktop

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’ of the Week (#42)

It is unbelievable, especially the older we get, just how fast a week seemingly passes by; but, one thing I look forward to each week is Geek Squeaks’.

Geek Squeaks’ is a compilation of articles, created within the past 7 days, by the members (bloggers) associated with the What’s On My PC blogroll (at the right side of the blog). If computers and information technology is in your blood, then these sites (or blogs) are the ones to follow.

image

Bill Mullins’ Weblog – Tech Thoughts
FreeFixer – A Free, Powerful Anti-Malware Tool

Plato On-Line
Facebook vs. Suicide Machine

411-Spyware.com
How to Remove Antivirus PC 2009

AKS-Feel The Change
Merge two or more PDF files

thePC Security
Freeware PC Security Software Download – Rising PC Doctor

Crazy World of G
You Have Wave

Lifehacker
Memorize Makes Virtual Flashcards and More [Flashcards]

Rarst.net
SuggestRSS.com – finds sites like those in your feeds

Sugarloaf Tech
Remote wipe your BlackBerry without BES

Tech-for Everyone
How To Make Word Open A Normal Blank Page*

AskBillFirst
Those Green Doublelined Words on a Web Page

Free PC Security
Online Armor Free Firewall V4

TuneUp Blog
Survey: Replace Rather Than Clean Up a PC?

Computer Maintenance
Data Backup

Canadian Tech Blogger
IE Usage Down, Chrome Surpasses Safari

Mrintech
Free ASCII Art Designer Software for your PC!

Worthy Tips
Idea To Convert Your Photo To Hand Draw Sketch On Your Desktop

Technize
3 Ways To Test Your LCD Monitor For Defective Pixels

I Love Free Software
WeBuzz.IM – Use Gtalk, Yahoo, ICQ, AIM from Browser

TTC Shelbyville
Repair Internet Explorer

Carputers News and Computer Tips
Learn how to research online…

Snakebytez
Easily and Safely Optimize Vista
by Disabling Unnecessary Windows Vista Services

Freeware Pharmacy
MCE Buddy

What’s On My PC
FREE Online Virus and Malware Scanners

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’ of the Week (#40)

If you have an obsession for information technology and computers, then you need to follow these blogs.  Listed is this weeks Geek Squeaks’; a sampling of articles (from the past 7 days) from the bloggers that are on the What’s On My PC blogroll. Talk about a great community of bloggers; none like it around!

image

411-Spyware.com
How to Remove Antivirus Live

Plato On-line
How and Why Twitter is Addictive

Evil Fantasy’s Blog
The Ultimate Geek TaskForce!

Bill Mullins’ Weblog – Tech Thoughts
Infected by Scareware? Get Your Wallet Out!

Snakebytez
IEHistoryView : Track websites
recently visited in Internet Explorer

Carputers News and Computer Tips
IBM Lotus Symphony goes portable…

TTC Shelbyville
Duplicate Your Hard Drive

The Abbey Rose
Security Applications

I Love Free Software
Sweet Little Piano: Play Piano on your Computer

Technize
Remotely Control Your Phone from Computer

Worthy Tips
Download 30+ Free MP3 From Amazon in This Christmas

Mrintech
Import Contacts to Yahoo! Mail from Google Account

Freeware Elite
Symbols, Accents, Weird punctuation –
Do you know how to type them?

Canadian Tech Blogger
Google DNS vs OpenDNS

Technogran’s Tittle Tattle
Talking about the new Bing Bar

TuneUp Blog
Disabling Dr. Watson: Does It Really Improve Performance?

Carol’s Vault
5 websites to find your perfect Christmas recipes

Free PC Security
K9 Web Protection Free

AskBillFirst
Is It Disk or Disc?

Tech-for Everyone
How To Remove FinallyFast (PC SpeedScan Pro, Performance Center, Active Speed, etc.)

Sugarloaf Tech
Trouble upgrading to AVG 9.0 Free Edition

Rarst.net
SimpleDesktops.com – minimalistic wallpapers collection

Lifehacker
Chrome Extensions Gallery Officially Opens [Chrome Extensions]

Crazy World of G
Free Rip

Computer Too Slow
How to Diagnose Keyboard Problems

thePC Security
Free MP3 Manager Software Download | Music File Management

What’s On My PC
Trusting the IT Guy

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’ of the Week (#39)

Geek Squeaks’ is a weekly roundup of articles from the What’s On My PC blogroll community. This community is a compilation of over 40 blogs that share a common interest in bringing the latest in information technology to your desktop. If you have an interest in information technology, these blogs are the places to visit.

image

thePC Security
Using Portable Web Browsers for Internet Security

Computer Too Slow
Windows Device Manager Explained

Crazy World of G
Burn It

Lifehacker
Do You Really Need More Than 4GB of RAM?

Rarst.net
UltraVNC – free solution for encrypted remote access

Tech-for Everyone
5 Tools to Prevent Laptop-Related Injuries and Eye Strain

AskBillFirst
Never forget to back up your files ever again.
Now it’s easy and automatic

Free PC Security
Malicious Sites – December Additions

AKS-Feel The Change
Manage USB Devices with USB Manager

Carol’s Vault
Can’t install WordPress plugins and themes via dashboard

411-Spyware.com
How to Remove RESpyWare

Plato On-Line
The Most Important Technological Artifact (200 B.C.)

GEEKed Up
Ensure Privacy When Using Google Chrome

Evilfantasy’s Blog
Explore as Administrator PowerToy

Bill Mullins’ Weblog – Tech Thoughts
SUPERAntiSpyware Free Edition – Knocks Malware DEAD!

TTC Shelbyville
Stop and Encrypt Your Flashdrives

The Abbey Rose
How’s Your Password?

I Love Free Software
OnlineFamily: Manage and Monitor Online Activities of Kids

Technize
Make Windows 7 Super Fast

Mrintech
How to Convert Any Photo into a Sketch?

Freeware Elite
Get to know updated websites real quick with Changedetection.com

Canadian Tech Blogger
CNET Top 5 Most Popular Products for December

Computer Maintenance
Windows Malware Remover tools and techniques

TuneUp Blog
Speed Up Games on Your Windows XP, Vista or 7 System (Part Three)

Freeware Pharmacy
WinMerge

What’s On My PC
Past Versions of Geek Squeaks’ of the Week

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]

Facebook Users – Beware of Email Malware

Don’t let your guard down… Many of my acquaintances are subscribers to the popular social magnet site of Facebook.  Also, many of my acquaintances are honest people who want to believe that the internet is a safe place and often forget the “rules of the road”.

If you are a Facebook user and you receive an email that the password  on your Facebook account has been reset and your new password is attached, do not fall for the old trick of opening the attachment. This email is a form of spam email with a zip file attachment that contains an executable; that, when launched (clicked on), will infect your PC with malware (trojan) . [Source: Avira Techblog]

image

Remember the “rules of the road”:

Do not open email, let alone attachments, that you even have the slightest doubt. Trust me, if the doubt is there, it is most likely fake and contains malware.

Avoid unsolicited email messages; especially those with attachments or those with unsolicited links.

Always have up-to-date anti-virus, malware, and spyware software installed on your PC.

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’ of the Week (#34)

image We are in the midst of the fall season and Geek Squeaks’ is going strong.  If you are a person who has a love for information technology, computers, and software; then Geek Squeaks’ are for you. Each week What’s On My PC… randomly selects an article posted by the blog authors (within the past 7 days) who are connected to the What’s On My PC… blogroll community. If you have not visited these blogs, I encourage you to do so. This week’s roundup is reflected below.

Bill Mullins’ Weblog – Tech Thoughts
Hard Drive Cloning is Easy with Free Easeus Disk Copy

Right On Technology
Top Black Friday Ad Sites 2009

Evilfantasy’s Blog
Resizeable Textarea add-on for Firefox

Plato On-Line
Multitasking Might Cause Brain Damage

Teck~Line Lounge
Free Easy To Use Portable Start Menu For Your USB Drive

411-Spyware.com
How to Remove ShieldSafeness

Carol’s Vault
8 FPS characters on multiple challanges. Very funny!

AKS-Feel The Change
Microsoft Baseline Security Analyzer

Free PC Security
Malicious Sites October 27

AskBillFirst
What Can The Wheel On My Mouse Be Used For?

Tech-for Everyone
Troubleshooting Stop Errors In Vista

Sugarloaf Tech
Java Update Available – should I install it?

Rarst.net
PDFCreator – virtual printer to create documents

Lifehacker
Google Voice Offers Voicemail
Without a New Number [Google Voice]

Crazy World of G
Welcome to Frickintardistan

Computer Too Slow
How To Format a Hard Drive

Tune Up Blog
A Step-by-Step Guide: How to Clean Install Windows 7

Computer Maintenance
Diagnose Hard Drive Failure | Troubleshoot Hard Disk Problems

Technogran’s Tittle Tattle
Windows 7, these are a few of my favourite things

Freeware Elite
Gridy: a great active window manager by Sector Seven

Technize
How To Log On To Your Windows User Account If You Forget Your Password Or If Your Password Expires

I Love Free Software
How to Draw in Your Computer with your Pen

The Abbey Rose
Memory Lane

TTC Shelbyville
Microsoft Assessment and Planning Toolkit – MAP 4.0

Tux in the Midwest
Drupal Notes – My Project

Snakebytez
Monitor UPS status with UPS Assistant

What’s On My PC…
Get the Last FREE version of FastStone Capture

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’ of the Week (#32)

They say there are hidden treasures in those blogs and the treasures in these blogs are are no exception. The blog articles listed below are articles from the blogs (sites) that are listed on the “What’s On My PC…” blogroll community. If you are looking for that treasure, then look no further; the information that is conveyed and presented in these articles are true gems of professionalism.

image

Carol’s Vault
The President’s new cross: a Nobel prize for Peace

Right On Technology
T-Mobile Project Dark to Offer $50 Unlimited Plan

Bill Mullins’ Weblog – Tech Thoughts
Be Safe – Write Down Your Passwords

Evilfantasy’s Blog
Preview a TinyURL

Is You GEEKed Up
Up Do You Tweet on Twitter?

Plato On-Line
Bladeless Fan and Spider-Pill-Camera

Teck~Line
Now You Can Publicize Your Post To Twitter

411-Spyware.com
How to Remove Antivirus

AKS-Feel The Change
Check Whether your Email Account Phished or Not

TuneUp Blog
Speed Up Games on Your XP or Vista System (Part One)

Snakebytez
Manage your Passwords with KeePass Password Safe

Tux in the Midwest
Drupal Notes – Terminology

Piyada’s World
A simple tool to disable write access on your USB thumb drive

TTC Shelbyville
Free Video Converter

The Abbey Rose
Tech Airlines©

Technize
Get All Windows & Office Updates on A DVD

Mrintech
How to Create Polaroid Photos Online?

Tecnogran’s Tittle Tattle
Live Photo Gallery v Google Picasa

thePC Security
Scan or Check Websites for Malware – 4 Free Tools

Computer Too Slow
Diagnose Windows Freezing

Lifehacker
CrimeReports Maps Out Local Crimes [Crime]

Rarst.net
HijackThis – unofficial standard for startup entries log

Scoroncocolo Tech Pages
Anyone Can View Saved Passwords on Your Computer

Tech-for Everyone
IE 8 – Protecting Your Privacy Online

AskBillFirst
Setting a Default Program to Open a File

Free PC Security
Microsoft Update Fake Emails

What’s On My PC…
A “FREE” way to inventory your movie collection…

StumbleIt

jaanix post to jaanix

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

20 FREE Lifetime License for SUPERAntiSpyware Professional Giveaway on August 24th

Be sure to visit Bill Mullin’s Weblog – Tech Thoughts for a chance at receiving a FREE LIFETIME registration code for a leading antispyware product called SUPERAntiSpyware. To enter the contest to win one of the lifetime licenses, simply add a comment at the end of the article that Bill has posted [ HERE ] . Bill currently has available (20)-twenty registration codes that can be used to activate the Professional version of SUPERAntiSpyware. On August 24, 2009, all comments will be added to an online List Randomizer, and the first 20 names that come up, in random order, will win a free lifetime registration code. Even if you do not win, you will have had the opportunity to visit one of the top blogging sites on the internet – Bill Mullins’ Weblog – Tech Thoughts

StumbleIt

jaanix post to jaanix

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

An Example of How CyberCrooks Will Use Michael Jackson

1clipsm A “What’s On My PC… Web  Clip!

Michael Jackson spam spreads, malware attacks likely

Star’s death brings crooks out of the woodwork, expect scam deluge, says Sophos

June 26, 2009 –By Greg Keizer

Computerworld – Within hours of the death of pop star Michael Jackson, spam trading on his demise hit in-boxes, a security firm said today as it warned that more junk mail was in the offing.

Just eight hours after news broke about Jackson, Abingdon, England-based Sophos PLC started tracking the first wave of Jackson spam, which used a subject line of “Confidential — Michael Jackson.” The spam wasn’t pitching a product or leading users to a phishing or malware Web site. Instead it was trying to dupe users into replying to the message in order to collect e-mail addresses and verify them as legitimate.

[ Source: Computerworld ]

Computerworld

StumbleIt

jaanix post to jaanix

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Powered by WordPress.com.

Up ↑