GEEK SQUEAKS – Featuring Steps To Clean Your Flat Panel Monitor (and other screen devices)


[
FEATURED GEEK SQUEAK] – How To Clean Your Flat Panel Monitor – Most of the time when we decide to clean the monitor it is at a time when we are not really prepared to do it.  We’re sitting there and it is something obvious (like a smudge, a fingerprint, a bug etc.) that catches our attention and motivates us to to perform a cleaning. Ant

As a result of this, we end up using glass cleaner and paper towels, which is a big “NO, NO”…  Paper towels or any paper product for that matter contains micro-particles that can scratch the monitor; AND glass cleaners contain chemicals (such as ammonia, alcohol and phosphates) that can damage the optical coating.

5 Step Process:

  1. Turn “OFF” the monitor (actually turn “off” everything including the computer, etc. OR better yet unplug the monitor from its’ power source).
  2. If available, use a can of compressed air to remove any dust particles.  Believe it or not, dust particles can causing scratches.
  3. Use a lint free (microfiber) soft cloth, similar to what you use to clean eyeglasses with, to remove dust particles.
  4. If necessary dampen the cloth with “water” (recommend 50/50 distilled water and vinegar mix), and gently wipe the screen off.  Do Not use commercial cleaners, as they contain damaging chemicals; and, again do not use paper towels or tissues (can scratch the screen).
  5. Post a sign, “Touch my screen and you’re a goner!”  For some reason, some people have to be all “touchy feely” with monitors.  Flat panel screens are not designed to be touched (unless it is a touch screen monitor, tablet, smartphone, etc…).

    NOTE:
      These same steps can be used to clean devices that are designed to be touched (such as smartphones, tablets, touch screen monitors, etc…)

If your flat panel monitor is really dirty, there are commercial LCD, LED, Plasman monitor cleaning solutions and micro-fiber cloths available at most office supply stores.

[ COMMENTS ARE WELCOME – CLICK HERE ]


MORE GEEK SQUEAKS

[WINDOWS SOFTWARE] Tweetz is a Simple, Attractive and Efficient Desktop Twitter Client – Tweetz is a good option to consider if you don’t need power tools but want a clean and simple interface for Twitter… @Lifehacker

[SECURITY] Permanent Fix for Microsoft Word Zero-day Releasing Next Week – As Windows XP and Office 2003 check-in for their very last Patch Tuesday *ever* next week, Microsoft is also making available a fix for the zero-day flaw discovered just two weeks ago. As I reported in Vulnerability in All Versions of Microsoft Word Could Lead to Computer Takeover, the flaw is a serious one… @WindowsITPro

[WALLPAPER] Windows Crash – @Desktop Nexus

Windows Crash

[NEWS] Congress To Hold Hearing On ‘Cuban Twitter’Congress announced that it will hold hearings next week following revelations that a U.S. government agency secretly created a “Cuban Twitter” communications network, while Cuban officials condemned the program and asked the U.S. to cease “illegal” and “covert” operations on the island… @NBC News

[WINDOWS 8 NEWS] Microsoft to restore Start menu to Windows – Microsoft this week gave customers a bare-bones peek at the future of Windows, saying that the next iteration after Windows 8.1 Update will restore a Start menu and let users run “Metro” apps on the classic desktop… @ComputerWorld

[ANDROID APP] WebMD for Android – WebMD for Android helps you with your decision-making and health improvement efforts by providing mobile access 24/7 to mobile-optimized health information and decision-support tools including WebMD’s Symptom Checker, Drugs & Treatments, First Aid Information and Local Health Listings. WebMD the App also gives you access to first aid information without having to be connected wirelessly – critical if you don’t have Internet access in the time of need… @Google Play

[FEATURED WINDOWS COMPUTER] Lenovo IdeaCentre C560 23-Inch All-in-One Desktop@AMAZON

Lenovo IdeaCentre C560 23-Inch All-in-One Desktop

[FEATURED TECH SITE] TCAT Shelbyville – Technical Blog – The Tennessee College of Applied Technology creates blogs for all of the different classes at this higher education institution as part of an online learning center found on our homepage.  Through the cooperation of WordPress (They support educational institutions!) we created this blog to communicate with students.   This Technical Blog is for the Computer Information Technology class and whoever wants to read it… @TCAT Shelbyville

[HOW TO] Getting Started Tutorials For Windows 8.1 – You’re at the right place. Whether you’re brand new to Windows 8.1 or Windows  RT 8.1, or just want a refresher, these 10 tutorials will show you the basics… @Microsoft

[VIDEO] Skydiver Almost Struck By Meteorite@YouTube


Learn a byte at a time with Geek Squeaks’ — featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it… I just plain love tech!

Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

GEEK SQUEAKS – Featuring An Android App Lock and Privacy Protection Tool

[FEATURED GEEK SQUEAK] Lockdown Pro App Lock – Did you ever misplace your Android phone (or tablet) and suddenly dawns on you that all your personal and private information is at risk of possibly being compromised? We really do not think about this until it hits home and it happens.

Today I want to share with you an Android App, called Lockdown Pro App Lock; that is totally FREE, that is gaining in popularity, and  may someday save you from losing your personal information. The versatility of this app is amazing (especially for a FREE product).

Lockdown Pro App Lock

Features:

Lockdown Pro is the BEST app lock and privacy protect tool, it can lock any app, such as SMS, Gmail, Facebook, Whatsapp, SnapChat, Instagram, Viber, Line, Evernote, etc and special apps including Lock install/uninstall apps, Lock incoming calls, etc.

One-tap to lock Apps.

Auto lock new-install app.

Auto lock & unlock when you get in/out your setting locations.

Auto lock & unlock when connect/disconnect with wifi.

Active lock apps with a SMS

Three password modes: Pattern Lock, Classic Lock & Calculator Lock

Fake Error Message (Distract from unauthorized access.)

Random keyboard password

Time pin password (Ex: If the time is 13:12, your PIN will be 1312)

Themes store (so many beautiful themes for your choice)

Facility Security:

★ Prevent uninstall Lockdown Pro & clear the memory on some devices (Activate Device administrator)

Lock Deactive Device administrator

Hide Lockdown Pro icon (Remove Lockdown Pro icon on App Draw & Home screen)

[ COMMENTS ARE WELCOME – CLICK HERE ]


MORE GEEK SQUEAKS

[ANDROID] The 100 Best Android Apps of 2014 – As the deathgrip of winter finally slips and snow drops peak their blossoms above frozen ground, so too do the fresh Android apps emerge…@PCMag

[WEB APP] Redesigned start.me live – After almost two months of work behind the scenes the fully redesigned start.me site has gone live. For the coming few weeks, the design will run in beta-mode on www.start.meand the old design will stay available on www.startme.com during that time… @start.me: blog

[MICROSOFT OFFICE] Announcing Office 365 Personal: A new way to access Office 365! – Coming this Spring, Office 365 Personal is a new, great option for people interested in using Office 365.  It’s designed for an individual, allows for one PC or Mac and one tablet to be connected to the service and will be available for $69.99 USD/year or $6.99 USD/ month (ERP)1. We recognize that there are households of all shapes and sizes and we’re committed to delivering the right Office for everyone – whether that be one person or an entire household… @Office Blogs

[COMPUTERS & ACCESSORIES] Top 100 Best Sellers… See the top 100 in everything from tablets, to monitors, to desktops, etc…  @Amazon

[WINDOWS UTILITY] A free, awards winning software for exploration and management of System Internals – Useful tools which help you Keep Your System Under Control . With System Explorer You get also fast access to File Database which help you to determine unwanted processes or threats . System Explorer is translated into 29 languages and is available for download in installer and portable version… @SystemExplorer

[HOW TO] How Do I Know if my PC is Infected with Malware? – Unless the symptoms are obvious, you cannot know 100% for sure if your PC is infected or not. Here are some common Indicators of malware infections to help you decide if you need to have your PC tested or cleaned… @GEGeek

[SECURITY] Malwarebytes Launches version 2.0, Commits to Supporting Windows XP for LifeMalwarebytes, the maker of a popular, trusted, and effective solution for removing nasty bits of harmful code from PCs, has officially launched version 2.0. And, to ensure the christening makes significant noise, the company is also promising to support Windows XP for a lifetime… @WindowsITPro

[NOTEKEEPING] Lifehacker Faceoff: OneNote vs. Evernote -Now that Microsoft OneNote is free for Mac and Windows, the price and cross-platform barriers to this much beloved note-taking tool are gone. But how well does OneNote stack up to (the also awesome) Evernote… @Lifehacker

[WALLPAPER] Windows 8 Wallpaper Set 15… @Awesome Wallpapers

image


Learn a byte at a time with Geek Squeaks’ — featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it… I just plain love tech!

Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

GEEK SQUEAKS – Preorder The ASUS Chromebox – AND MORE

How would you like a computer that starts up in seconds, has integrated malware and virus protection, is low maintenance, takes up very little space, is perfect for mom and pop, can be easily used as your home entertainment system, is inexpensive, and MORE???????

This may sound like the perfect computer and maybe it is. In the very near future ASUS will be releasing the ASUS Chromebox that will meet the specs, as described above. This is not a Windows based computer. It is a Google Chrome OS based computer that just may be a game changer.

ASUS Chromebox

Features-at-a-Glance

  • 4th gen Intel processors deliver the best performance for Chrome OS
  • HDMI and DisplayPort for dual display support and up to 4k playback1
  • Lightweight, small form design that supports VESA mount
  • USB 3.0 ports to easily share data from USB drives and devices
  • Dual-band Wireless-N connectivity for streaming HD media and seamless web surfing
  • Instant boot up in seconds saves you time
  • Chrome OS for a simplified, secure web experience that syncs all your Chrome services instantly and lets you use apps offline

If you think about it, most of our computing experience these days is online (in the cloud, as they say). The days of computers, as we know it, may be coming to an end; especially as these cloud based devices continue to evolve. I ask myself; especially, being a computer user for over 25 years, would I be satisfied with something like the ASUS Chromebox as my only computing source? I really don’t know at this point, but my geek instincts is telling me that this just may be the perfect computer setup.

The ASUS Chromebox can be pre-ordered [HERE]…  From what I am gathering, pricing will be around $180…

[ COMMENTS ARE WELCOME – CLICK HERE ]


MORE GEEK SQUEAKS

[ANDROID] Sidebar Launcher Adds A Slide-Out Multitasking Panel To Android – Sidebar Launcher offers a quicker way to access different Android features and launch your favorite apps. It’s quite user-friendly and doesn’t seem to slow down older devices. You can launch it from anywhere by swiping in from the left edge of the screen. When opened, it presents you with several elements to add, including a time and date widget, quick settings like Wi-Fi and GPS, favorite apps, and other common settings. Each widget is called a ‘Card’, and you can add, remove and edit these on the fly… @ Addictive Tips

[HOW TO] Prevent access to Registry Editor in Windows 8 | 7 – In this post we will see how to disable, restrict or prevent access to Registry Editor or Registry Editing Tools using Group Policy Editor or by tweaking the Windows Registry in Windows 8 | 7… @The Windows Club

[WINDOWS] 3 Calculators Better Than The One in Windows – After trying out several different calculators, I rounded up three programs that in my opinion, are a tad better than the default Windows calculator… @Instant Fundas

[NEWS] Amazon Raises Prime Membership Fee to $99 a Year – The online retail giant on Thursday morning sent email to Prime members, informing them of a $20 price hike. This means the service will now set you back $99 a year, instead of $79. For existing members, the change will go into effect when your membership renews… @PCMag

[SECURITY] Adobe patches a critical flaw in Shockwave PlayerAdobe Systems released a new security update for Shockwave Player in order to fix a critical vulnerability that could allow attackers to remotely take control of affected systems. The vulnerability, identified as CVE-2014-0505, is the result of a memory corruption issue and can lead to arbitrary code execution. According to Adobe, the flaw was privately reported to the company and there are no reports of active exploits targeting it in the wild… @ComputerWorld

[ONLINE STORAGE] Save more with Google Drive – We’ve lowered the price of our monthly storage plans to $1.99 for 100GB (previously $4.99), $9.99 for 1TB (previously $49.99), and $99.99 for 10TB, with even more storage available if you need it… @Google Drive Blog

[WINDOWS 8] The BEST Start button and menu choices for Windows 8.1 – Seasoned Windows 8.x users might sneer at you for “going back to the old ways”, but there’s no question that if you use a keyboard and mouse and have limited interest in the Modern UI, a “real” Start button and menu can do wonders for your productivity. Here are our top 14 recommendations — free and paid… @BetaNews

[WALLPAPER] Super Colorful @Wallbase

Super Colorful


Learn a byte at a time with Geek Squeaks’ — featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it… I just plain love tech!

Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – November 4, 2013

Summary: FREE antivirus and anti-theft protection for your Android Phone and Tablet; A Dell laptop that reportedly smells like cat urine; Basic safety and protection tips for laptop owners; and, Amazon offering their Kindles’ 15 percent off the regular price (today only)…

Geek Squeaks’ features a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

[ COMMENTS ARE WELCOME – CLICK HERE ]


Protect Your Android™ Phone And Tablet With
avast! Mobile Security

I am very familiar with Avast on desktop computers and can tell you that it very good antivirus software. With the Android version, not only do you have the antivirus protection; you also have theft protection. I installed this on one of my tablets and have found that it does not bog down the tablet, as you would think…

image

avast! Mobile Security keeps your device safe from viruses, malware, and spyware.

It helps you locate your lost phone through our web-based phone locate feature.

Remote device lock and/or memory wipe in its advanced Anti-Theft component keep your data safe.

Handy tools like network meter, app manager, and even firewall (on rooted phones) give you complete control of your mobile phone.

GET IT HERE


New 6430u Smells Awful

I often will check out forums at the various computer makers. While on the Dell forums came across a topic where people are reporting an awful ammonia smell (similar to cat urine) being generated from the Dell 6430u laptop… I have to wonder how many cats were evicted from their homes over this?

image

The forum topic start off like this:

So a few weeks ago I got a new Lattitude 6430u for work.

The machine is great, but it smells as if it was assembled near a tomcats litter box.  It is truly awful!

It  seems to be coming from the keyboard.

Anybody got any advice on removing the smell??? READ MORE


Basic Tips to Keep Your Laptop Safe and Protected

@ Computer How To Guide

Peter Lee over at Computer How To Guide has a nice write-up on keeping our laptops safe (and protected) that serves as a good reminder…

image

…with the benefit of portability comes a range of risks that can all threaten the safety, security and performance of your computer. This simple guide will help you keep your laptop in tip-top condition… READ MORE


Today Only – 15% Off Any Kindle

Folks, if you are looking for a tablet, this is a great opportunity to grab one of the Kindles…

image

CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – October 21, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 –(WinPatrol 29 Now Available): WinPatrol provides real-time infiltration detection, as a first layer of defense on your PC. Scotty the dog lets you know when a change is about to take place to your computer, whether it is good or bad. Highly recommended and FREE (SEE BELOW);

Squeak #2 – (Learn How To Create A Windows 8.1 Recovery Drive): There is nothing more frustrating than when your computer won’t boot properly and you suspect major problems. This is where a recovery may be the solution (SEE BELOW);

Squeak #3 – (TeamViewer for Android): I am a big fan of TeamViewer and can attest to how well TeamViewer works from my tablet to control my desktop PC. I was even able to stream live TV from my desktop PC to the tablet; sound and all (SEE BELOW); and,

Squeak #4 – (The Kindle Fire HDX Is Now Shipping): The 7” version of the Kindle Fire HDX can now be had. Great deal on a very nice tablet computer (SEE BELOW);

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


WinPatrol

image

WinPatrol was the first program to use a behavioral approach to detect new changes due to infiltrations and Zero-Day attacks. WinPatrol continues to add unique features and remains the smallest, fastest system monitor of its kind. Install WinPatrol anytime you rebuild or purchase a new computer. A snapshot of critical system locations and resources is recorded so if anything changes you’ll know what changed and when… GET IT HERE


Windows 8.1 – Create A USB Recovery Drive

image

If you run into problems with your PC, a USB recovery drive can help you troubleshoot and fix those problems, even if your PC won’t start… LEARN MORE HERE


TeamViewer Remote Control – Android App

image

Mobile and flexible: remotely access computers from your android device! Easily support friends and family when they have computer problems – no matter where you are. You can also benefit from gaining access to your private home computer to edit documents or use particular software while you are on the road… GET IT HERE


Kindle Fire HDX 7″ Tablet – NOW SHIPPING

image

Kindle Fire HDX tablets are the first tablets to be powered by the 2.2 GHz quad-core Snapdragon 800 processor, making them the first to clock in at over 2 GHz. It provides 3x more processing power than the previous-generation Kindle Fire HD and, combined with 2GB of RAM, provides faster app launches, faster website load times, smoother multi-tasking, and better overall performance… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – October 9, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 – (A Portable Safe For Your Files and Passwords): I have been on the hunt lately for FREE software to protect the data on my flash drives and came across a winner, called Protectorian ToGo… Not only does Protectorian encrypt and protect your sensitive files, it also has a built in vault to store your passwords (SEE BELOW);

Squeak #2 – (Nexus 4 Specs vs. Nexus 5 Specs): I am in the market for an unlocked, reasonably priced smartphone… I am patiently waiting for the release of Google’s Nexus 5 smartphone or whatever the naming convention will be for this coming release. Google recently exhausted their inventory of the Nexus 4. To get a comparison of specs, DroidLife came across a leaked service manual for the Nexus 5 (SEE BELOW)…

Squeak #3 – (GEGeek On Speed Dial): Notice the tab at the top of the page labelled “GEGeek”… It is there for a reason (SEE BELOW); AND,

Squeak #4 – (Create and Manage Your Own Cloud Storage ): My birthday is around the corner and I think I found my gift. It is the Western Digital 3 TB My Cloud that would allow me to access my data from anywhere in the world (SEE BELOW)…

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


Protectorion ToGo – the portable safe for your files, folders and passwords!

No chance for hackers and data spies. Unencrypted data on stolen or lost devices are accessible to anyone who finds them. Protect your data and passwords on USB flash drives and external hard drives against misuse and data theft. It security made in Austria – fast, easy-to-use and free!

image

Encryption with AES 256 bit (including name encryption)
Unbreakable encryption using a randomly chosen 40-digit key
For USB flash drives and external hard drives
Integrated password protection and password security index
Access encrypted data and passwords from any Windows PC

GET IT HERE


Nexus 5 vs. Nexus 4 [Specs]

@ DROIDLIFE

Thanks to a leaked service manual for the upcoming LG Nexus 5 that arrived over the weekend, there really is very little we don’t know about the phone outside of a release date and price. Well, the name “Nexus 5″ is still not yet 100% confirmed, meaning Google could end up going “Nexus 4” again like they did with the 2013 Nexus 7. We continue to see references to both names here and there. But either way, we feel as if we have a pretty good grasp on all things new Nexus phone… READ MORE

image


GEGeek – PC Tech Reference

image

If you notice at the top of the site, I have a tab labelled “GEGeek”… In other words, I have GEGeek on speed dial and here is why:

If you are a person who wants to learn about information technology and computers OR you are the already working in the field, this site you must bookmark. It is the most elaborate and concise collection of the tech related info and tools out there.  Heck, while you are at it, download the Tech Toolkit while you are there which features over 250 tech related programs… GET THE TOOLKIT HERE


#1 Best Seller in Computer Network Attached Storage

image

With My Cloud, WD’s personal cloud storage, you can save everything in one place and access it from anywhere with blazing-fast performance. Get abundant storage without paying monthly fees. And with direct file uploads from your mobile devices, all your important data is safely stored at home on your personal cloud… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – October 8, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 – (A FREE Start Menu For Windows 8.1): I keep reading that Windows 8.1 will have a Start Menu; however, I also read that it is not the real Start Menu, as we know it. To help you with this, I encourage you to take a look at Classic Shell. The developers recently updated Classic Shell to make it fully compatible with Windows 8.1 (SEE BELOW);

Squeak #2 – (The 5 Links You Should Not Click): ABC has a nice write-up, that you should read to educate (and remind), on what to look for (and not do) to prevent a malware or ransomware attack to your computer… (SEE BELOW);

Squeak #3 – (Desktop Publishing In The Cloud): As cloud computing continues to move forward, I am seeing more and more complex applications being made available. LucidPress’ online desktop publisher is no exception (SEE BELOW); and,

Squeak #4 – (Easily add 9 USB 3.0 SuperSpeed ports to your PC ): In need of additional USB ports? Always go with a powered USB hub. Today I came across a 9-port hub that has built in surge protection and built in ports to charge your devices (SEE BELOW)…

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


Classic Shell Start Menu Updated (Version 4.0)

image

Classic Start Menu can replicate the start menus found in older versions of Windows from 95 to Windows 7. You have 3 styles to pick from – Classic, Two Columns, and Windows 7… GET IT HERE


The 5 Deadly Clicks: The Links You Should Never Touch

@ ABC News

image

Here’s a scary scenario. You’re innocently surfing the Web, maybe on an unfamiliar site, not paying close attention. Suddenly your computer screen fills with illegal pornographic images of minors. You try to navigate away, but a warning screen branded by the National Security Administration’s Internet Surveillance Program pops up with the message: “Your computer has been locked due to suspicion of illegal content downloading and distribution.”

You are then offered a sort of Hobson’s choice: Pay a fine immediately, or face prosecution for downloading child pornography… READ MORE


LucidPress – Online Print and Digital Publishing Software

image

Lucidpress is a design and layout app that enables anyone to create beautiful print and digital documents. Sign up free Try the demo Lucidpress in 60 seconds Perfect for print Create stunning documents in less time than ever before… GET IT HERE


Anker® USB 3.0 9-Port Hub + 5V 2.1A Charging Port with 12V 5A Power Adapter

image

Easily add 9 USB 3.0 SuperSpeed ports to your PC and enjoy data transfer rates of up to 5Gbps for faster sync times.

Additional charging port (2.1A) offers enough current to charge either a smartphone or a tablet at high speed. USB 3.0 ports supply 0.9A each.

Lightweight, “power-bar” design effectively saves space. Blue LED indicates normal operation.

Designed with a built-in surge protector to keep your devices safe. Supports hot swapping. No installation of drivers required for Windows XP / Vista / 7 / 8 or Mac OS X 10.2 and above.

 CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – October 7, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 – (FREE Software To Hide Files and Folders): When it comes to data security on my PC (and flashdrive); I am a firm believer that if you cannot see it, then it does not exist. I have been experimenting with Wise Folder Hider and I am impressed; especially with the portable version where you can hide the entire contents of the flash drive (SEE BELOW);

Squeak #2 – (Which CPU is faster or better?): We all like to comparison shop. Below you will find a site that will allow you to compare CPU’s with the ranking being performed in real time. Also a good site to teach you about CPUs (SEE BELOW);

Squeak #3 – (Lock Down Your Evernotes With 2-Step Verification): I currently use Gmail’s 2-step verification and welcome that Evernote has headed in the same direction.  If your Evernote data is important to you, then lock it down tightly with this feature (SEE BELOW); AND,

Squeak #4 – (A Tech Deal of The Day ): Heck of a deal on PNY flash memory, USB drives and smartphone batteries (SEE BELOW).

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


Hide Private Files, Photos, Videos And Other Personal Data From Your PC For FREE

Wise Folder Hider

image

Free of Charge – Wise Folder Hider is a completely freeware. It costs $0 for all users to use the functions, get newest updates and enjoy basic technical supports.

Easy to Hide Data – Only with a few simple clicks can you hide your private and sensitive data like docs, photos, videos, folders, etc.

Double Password Protection – Mechanism of Two-Tier-Passwords makes the hiding safe enough. One password to log in and the other one to hide and unhide the data.

Support Drag and Drop – You can simply drag and drop a file/folder into Wise Folder Hider. This feature is avaliable in Win8/7/Vista OS(only when UAC is disabled) and XP OS.

Flash Drive Hiding Supported (not External Hard Disk) – Wise Folder Hider can hide the entire Flash Drive as well as the folders and files in it.

GET FULL INSTALL HERE and GET PORTABLE VERSION HERE


CPUBoss

image

Compare CPU’s HERE…  Also, once you get to the site, be sure to check out SSDBoss!


Two-Step Verification Available to All Users

@ Evernote

image

Two-step verification, also known as two-factor authentication, adds an additional layer of security to the login process, requiring you to enter a special code from your phone, in addition to your regular username and password. The goal of this extra step is to combine something you know (your password) with something only you would have access to (your phone)… READ MORE


Tech Deal of the Day (Oct 7th Only)

image

Amazon has a heck of deal (today only) on PNY flash memory, USB drives and smartphone batteries… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – October 2, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 – (A Set Of Over 20 Software Utilities) – The number of optimization suites out there are numerous. Some you pay for; others are simply FREE. Today’s featured suite is Puran’s Utilities. You can download these FREE utilities individually or as a suite. Puran’s Utilities carries with it good ratings and reviews (SEE BELOW);

Squeak #2 – (Did you know that as PC Users we have a tendency to overlook the power supply?) –  Tips4PC has a great article up about choosing the right power supply. I know from my own personal experience that the power supply is a major component in our PC and is the most overlooked. The manufacturers, when they sell us a PC, often are guilty of this, as well; and, will sell us an underpowered unit (SEE BELOW);

Squeak #3 – (Google’s Good To Know Site): Many of us use the services and products that Google has developed. To help keep you safe and secure online, Google has created a “Good To Know” site that talks about security, privacy, identity theft, and how you can protect yourself (SEE BELOW); and,

Squeak #4 – (Microsoft Office As A Subscription): Many folks out there do not realize that you can purchase Microsoft Office as a yearly subscription (SEE BELOW)…

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


Puran Utilities

image

A set of more than 20 software utilities including but not limited to utilities that can help you get the best performance out of your computer. It also provides an automatic and a one click solution to keep your computer clean and error free… GET IT HERE


Choosing the Right Computer Power Supply

@ Tips4PC

image

Power supply is one of the most ignored parts of computers. The average computer user will discuss configuration details of main memory, RAM, motherboard etc before purchasing a new or used PC, but ignore the importance of having a good power supply… READ MORE


Good To Know –
A Guide To Staying Safe and Security Online

image

  • Explore quick tips and how-to’s that explain what you can do to stay safe and secure on the web.
  • Get advice from parents at Google and family safety experts on how to help your family safely surf the web.
  • Google works hard to protect you whenever you use the web.
  • What is a browser anyway? Find out how to chat online, search effectively and more.

MORE HERE


Microsoft Office 365 Home Premium 1yr Subscription

image

Office 365 Home Premium has all the Microsoft applications, plus cloud services. Just sign in and you can get to your Office files, applications, and settings when you are not at home.

The 2013 versions of familiar Office applications such as Word, Excel, and PowerPoint include new features that help you create, communicate and work efficiently from virtually anywhere… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – September 19, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 – (Online File Converter): Converting from one file format to another can be a challenge, but CloudConvert has you covered. CloudConvert supports 140 file formats and can send the converted file to your email, dropbox or google drive account (see below);

Squeak #2 – (Utility To Read Browser History): NirSoft has a nice little utility available that gives you the ability to read the browsing history from 4 different type of browsers (Internet Explorer, Mozilla Firefox, Google Chrome, and Safari). Great utility to have around to keep an eye on the kids (see below);

Squeak #3 – (How To Be Virus Free):  Dom over at Dom’s Computer & Tech Blog points out that he rarely has had to remove malware (or viruses) from his own personal computer. I really encourage you to invest a few minutes to check out what he has to say (see below); AND,

Squeak #4 – (Expand Your Home Network): Did you know it is possible to use the electrical wiring in your home to expand your home network? (see how below)…

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


Convert Anything To Anything

CloudConvert

image

CloudConvert supports the conversion between more than 100 different audio, video, document, ebook, archive, image, spreadsheet and presentation formats. You can specify advanced options for every conversion type. Check the supported formats for more details… CHECK IT OUT HERE


BrowsingHistoryView

image

BrowsingHistoryView is a utility that reads the history data of 4 different Web browsers (Internet Explorer, Mozilla Firefox, Google Chrome, and Safari) and displays the browsing history of all these Web browsers in one table… GET IT HERE


Never Get a Virus Again

@ Dom’s Tech & Computer Blog

image

…I rarely, if ever, have to remove viruses from any of my personal computers. I think that their are some distinct reasons for this. In this post, I am going to give you some of my personal tips so you never get a virus again READ MORE


Expand Your Home Network With A Powerline Adapter

image

TRENDnet Powerline 200 AV Nano Adapter Kit — uses an electrical outlet to create a secure high speed network. Connect the first adapter to your network and plug the second adapter into an outlet on your electrical system for instant high speed network access… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – August 29, 2013

A summary of Today’s Geek Squeaks:

Squeak #1: Bing Powered OCR (optical character resolution) is a new feature in SkyDrive that gives you the ability to extract text from photos. This is useful in the event you snap a photo of a document and you need to capture the text from that document for printing and/or saving to another format.  Very cool stuff (see below);

Squeak #2: Today I am featuring a portable app that I highly recommend.  It is called WinScanPDF; which gives you the ability to scan documents and convert them to the Adobe PDF format.  Very handy (see below);

Squeak #3: 404 Tech Support has pointed out something bad about the trial antivirus software that is installed on new computers. We are actually setting ourselves up for a fall once the trial expired. The article also explains, “how to” return the computer to the default state of using the antivirus software that is already installed (Microsoft Defender); AND,

Squeak #4: Here of late I have featured several bluetooth speakers. Today this one is from BOSE and it is awesome (good customer reviews)…

[ CLICK HERE TO LEAVE A COMMENT ]

Plan on seeing  a lot more of Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


NEW – Bing Powered OCR

image

Make your SkyDrive photos smarter by using OCR (optical character recognition) to extract the text from photos in your camera roll when you view them on SkyDrive.com… READ MORE


Scan Documents And Save Them On Your Computer
As A PDF

WinScan2PDF

image

Are you one of those who only occasionally has to send a signed document to someone by e-mail? So you don’t need a PDF printer driver or some other complex program. With WinScan2PDF it is no longer necessary! Simply save the scanned documents into PDF and save them to a file on your computer. The program is very simple to use… GET IT HERE


Antivirus trials on Windows 8 decreases its security

@ 404 Tech Support

image

Unfortunately, it seems PC manufacturers are compromising this native improvement in Windows 8 through bloatware. I have seen several clients computers recently that came with Windows 8. However, primarily HP notebooks, come with a Norton 360 antivirus 30-day trial installed on them. When the trial expires, the Norton AntiVirus stops updating its definitions. The longer this goes on, the more users are put at risk… READ MORE


The Most Compact Mobile Speaker From Bose
Easily Goes Where You Go

image

  • Advanced audio performance delivers a full-range listening experience
  • The most compact speaker from Bose easily goes where you go
  • Wirelessly connects to your Bluetooth device
  • Rechargeable battery plays up to 7 hours

MORE HERE

[ see customer reviews ]


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – August 8, 2013

A summary of Today’s Geek Squeaks‘:

  • Looking for an alternative to Adobe PDF? Give Foxit PDF a try. Available as a portable app;
  • A question that is often asked of me, is “Should I upgrade to Windows 8?”.  I found an answer to that question that mirrors my thoughts on this;
  • I know for fact, we do not take password protection seriously and open ourselves up to potential compromise of our data. Very cool infographic on this very topic at Mashable; AND,
  • Protect your iPhone investment with a cover that encloses the phone and protects it from an accident (which will eventually happen).

[ CLICK HERE TO LEAVE A COMMENT ]

Plan on seeing  a lot more of Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!


A FREE PORTABLE PDF Document Viewer and Creator

Foxit Reader Portable @ Portableapps.com

image

Foxit Reader is a small, lightning fast, and feature rich PDF viewer which allows you to open, view, sign, and print any PDF file… GET IT HERE


Should I upgrade to Windows 8?

@ Ask Leo

image

Should you upgrade? Well, that gets you my most common answer ever: It depends… READ MORE


Is Your Password Really Protecting You?

@ Mashable

image

To sum up fast facts on the dangerous state of digital security, Instant Checkmate created an infographic that shows how vulnerable most online users really are. Some highlights: A third of people use the same password for every site; and the weakest passwords (somewhat obviously) include “password” and “123456.”… READ MORE


Covers To Protect Your iPhone

image

I don’t know about you, I have dropped my smartphone more than once; AND, the only thing that saved it is the external cover.  I highly recommenced covering your iPhone to protect your investment… SEE HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – July 27, 2013

A summary of Today’s Geek Squeaks:

  • Protect yourself on the internet by using Sandboxie to run your web browser;
  • A good review from AnandTech on the NEW Nexus 7;
  • An Android app to help keep you slim and trim;
  • Learn to use VirtualBox to run more than one operating system on your computer; AND,
  • A Lenovo Ultrabook Computer that thinks it is a tablet.

Surf The Internet In A Sandbox of Safety With Sandboxie

image

Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.  Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially… GET IT HERE


Nexus 7 (2013) – Mini Review

The big new features update the Nexus 7 platform with inclusion of a 1.5 GHz Snapdragon S4 Pro (APQ8064) SoC, 1920×1200 display by JDI (Japan Display Inc), as well as 5 MP rear facing camera, 1.2 MP front facing camera, stereo speakers, dual band WiFI, wireless charging (Qi) and a thinner and lighter chassis… READ MORE


Gymprovise (Android) – An app to help you get and stay fit

image

“Up your motivation, improve your fitness, and stay on track with Gymprovise – a powerful, versatile, and flexible workout tracker for the Gym and outdoors, which gives you everything you need to plan, track, and review all your fitness activity… READ MORE


How To Install More Than 1 OS On A Single Partition
Using VirtualBox

image

VirtualBox is a freeware software that can emulate a virtual hard drive using some space on your real hard drive on some OS. The virtual hard drive on the VirtualBox system can then be used as a new computer itself and can be used to install and use any other OS that you can install on any normal hard drive… READ MORE


Lenovo IdeaPad Yoga 13 13.3-Inch Convertible Touchscreen Ultrabook

image

Yoga 13 combines the productivity of an Ultrabook™ with the touch experience of a tablet, taking full advantage of the Windows 8 functionality. The screen flips a full 360 degrees into four modes that make it easy to create, share, or consume content. Combine those with its long battery life, and the Yoga 13 provides ultimate versatility… READ MORE


Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Geek Squeaks’ of the Week – July 17, 2013

If you are a regular here at What’s On My PC, you are probably wondering what is going on with the blog. To put it bluntly, I have been going through blogger’s burnout and decided to try something different, using the Geek Squeaks’ theme that I have used in the past. I am hoping it is something you will enjoy and really get something out of. There is so much out there and this is one way to introduce you to other Tech Sites and at the same time share information with you in a beneficial way.

Todays Geek Squeaks’ features the following Squeaks’:

Find out how, step-by-step, to secure your wireless network; Use Web of Trust to find out what sites you can trust and what sites you cannot (I really endorse using this); See how you could possibly win $10000 for using Skype; Use TSR Watermark to apply watermarks to your images; and, for the last Squeak of the day; Expand Your Home Network With This HP Switch…

Plan on seeing  a lot more of Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!


How to Secure Your Wireless (Wi-Fi) Home Network

image

This article describes how you can secure your Wireless Network from hackers and you’ll also learn about free tools that people generally use to intercept your Wi-Fi signals… – READ MORE


Know Which Website To Trust

image

WOT works as a free add-on for your Internet browser and crowd sources ratings from a global community of millions of users, who rate and comment on websites based on their personal experiences. WOT is based on a patented system to make sure the ratings are reliable, accurate, and constantly updated. The user ratings are validated with other trusted third party information…— GET IT HERE


Microsoft offers $10,000 travel voucher for Skype
“Stay Together” story

image

If you can look past the irony of a Microsoft competition about connecting people all around the world open only to US residents, you could win a $10,000 United Airlines travel voucher for simply using Skype…—READ MORE


Easy, Fast and Fully Featured Batch Watermarking of Photos

image

Boost your income while protecting your intellectual rights – Easy, fast and fully featured batch watermarking of photos… – GET IT HERE

  • Easy to use, available in more than 28 languages
  • Get better protection and branding – use multiple watermarks
  • Be more creative – with unlimited possibilities using text, images or 3D watermarks.
  • Save time – batch watermark thousands of photos without user action.

Expand Your Home Network With The
HP Pro Curve 1810G-8 Switch

image

  • Provides reliable, plug-and-play Gigabit network connectivity
  • Provides additional network security capabilities
  • Improves energy efficiency, and expanded deployment flexibility
  • Consists of 8- and 24-port 10/100/1000 Web-managed switches

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Your Passwords Must Have Length and Complexity

What you know about password security is probably wrong, is the title of an article I came across at FierceCIO:TechWatch. It really caught my eye and I think it is important that I pass the most important part of this article on to you:

Passwords that are longer than eight characters are a must, and they should also involve a good mix of upper case characters, numbers and symbols. In addition, a level of randomness is required too, which automatically precludes any word or combination of words found in the dictionary – FierceCIO:TechWatch.

There are so many people that I know who use very simple passwords and do not ever change them. It is a hard sell to get them to change there way of thinking and to change their passwords. If anything, please use the advice given above for those accounts that are super important to you! If you don’t, you are postured for potential compromise of the account.

GEEK BONUS AREA

Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Slow Computer

Latest PS4 ad is fake

Tech Thoughts Daily Net News


Unlocked iPhones

image

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

A Self Contained Web Browser For Your Flash Drive

When I am on the internet on a public computer, it worries me that I may leave traces (or a digital footprint) behind that could potentially compromise my privacy and the access to my online accounts. To remedy this problem I resort to running my own web browser from my flash drive in the form of a portable app. I have tried numerous variations of these portable browser types and have found that there is still a potential for data leakage on the host machine and have found that these browsers have a tendency to slow down after a period of time.

Recently I came across another portable browser variation that is based on the Firefox platform, called Pale Moon, that is currently on my plate for testing.

Pale Moon

The portable version of  Pale Moon is supposed to be completely self contained where nothing is stored on the host computer (such as your bookmarks, passwords, downloads, etc). Pale Moon portable has been specifically designed to run on removable media (such as a flash drive) where high wear and slow read/write access is the nature of the beast. With Pale Moon portable there appears to be no active disk caching going on to keep this wear and tear to a minimum. This may slow actual web page loads, but I found it to be actually quite responsive.

The really good part about Pale Moon is that the Pale Moon project is really a custom-built and optimized Firefox-based browser for Windows. It has been optimized to make sure to get the most speed and efficiency out of your browser!  So, if you use Firefox, you will surely like Pale Moon.

This means that this browser, however extremely close to Firefox in the way it works, does not have all the functions that Firefox has. A few, carefully selected, features have been disabled that are not in high demand, and that do not interfere with the way web pages are displayed or function; all to maximize speed and efficiency of the browser. Please see the page with technical details to learn exactly what the browser supports, and what it doesn’t support. In short, if you need accessibility features or parental controls, then please visit the firefox homepage and get the official, non-optimized build.

GEEK BONUS AREA

Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Free Instant Messaging App For Windows 8: Ribbit Chat

Release The Kraken!

The Gold Karat Authenticator – the electronic gold and platinum tester

NotePal X2 – Creates Optimal Comfort For Laptop Users

NotePal X2

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

WinPatrol Remains The Smallest, Fastest System Monitor Of Its Kind

There are those occasions where I will rehash a FREE software product and WinPatrol is one of those occasions.  WinPatrol is a mainstay on my computers and is one of the first software products I install when setting up a new computer. It is a “must have” layer of protection that will compliment your other security software.

WinPatrol

After you install WinPatrol a snapshot of critical system locations and resources are recorded and you will find that a small Scotty dog shows up in the tray on the taskbar. This little dog is on patrol and will alert you if any changes occur to those critical system resources. The dog will even bark.

WinPatrol, in conjunction to constantly monitoring your system, also serves as a system utility that allows you to review the services and task that are running on your computer and the programs that automatically load in the background when your computer starts. There is a whole lot to this little dog, as you can see from the features below.

WinPatrol

Features of WinPatrol:

Detect and Review New Auto-Startup Programs
Alerted you to New Browser Add-Ons like BHO’s and Tool Bars
Alerts you to newly installed Window Services
Alerts you to creation of Scheduled Tasks
YesAlerts you and Locks Changes to File Type Associations
Alerts you to newly registered ActiveX components
Alerts you to changes in IE Home and Search pages
Alerts you to changes in the Windows HOST File
Lets you know if your AutoUpdate or UAC settings change
Add/Remove and Review Auto-Startup Programs
Automatically Disable Reoccuring Startup Programs
Delay Auto-Startup programs for quick bootup
Review and Remove unwanted Scheduled Tasks
Remove Unwanted Brower Add-Ons like BHO’s and Tool Bars
Review, Display and Kill Multiple Running Tasks with a single click
Review, Stop and Control Window Services
Manage and Automatically Remove Unwanted Cookies
Review and Edit your Windows HOST File
Review and Remove Hidden Files
Track Date/Time when programs are first detected on your system
Multiple System Report Options
Undocumented or HIDDEN Registry Startup Keys
Now Available FREE

GEEK BONUS AREA

Bookmarks4Techs

Frustrations With The Android Phone

How to Back Up Your PC

Site Speed | Visitors Love Speed!

A Mouse That Works In The Air

image

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Use Chameleon To Get Malwarebytes Anti-Malware Installed and Running To Remove Malicious Software

Experiencing a malware infection (malicious software infection) is likened to being locked in a cage with someone poking a stick at you. You try to grab the stick and it is just out of reach or you are not quick enough to stop the constant barrage of poking.

Most folks who get these infections are often at a loss and actually experience anxiety, fear, and anger… Your computer is working fine one minute, then suddenly you experience slowness and then the fake security software (scareware) starts popping up (that you don’t recognize) telling you that you have hundreds of infections and that you need to click a button to fix the problem.  Also, you most likely will be prompted to enter a credit card number to fix the problem.

Once a malware infection has started it will worsen to the point that it will disable access to the tools and security software that you need to detect, identify and possibly remove the infection. These infections will often impede or shutdown the normal operation of your web browser, preventing you from downloading the software that you need to remove the infection.

I highly recommend keeping, at all times, a FREE version Malwarebytes Anti-Malware on your computer and make it a habit to keep it up-to-date.  The FREE version does not provide real-time protection; however, by performing routine updates and routine scans is better than nothing.

Malwarebytes Anti-Malware Free utilizes Malwarebytes powerful technology to detect and remove all traces of malware including worms, trojans, rootkits, rogues, dialers, spyware and more.

As I stated, when the malware infection unleashes it will most likely cripple or shutdown the security software on your computer, including Malwarebytes Anti-Malware. The developers of Malwarebytes Anti-Malware, knowing this to be a problem, have come up with a solution called Chameleon.

Screenshot

Malwarebytes Chameleon Technologies will try to get Malwarebytes Anti-Malware installed (if not installed) and running when blocked by malicious programs. You may have to go to another computer to download Chameleon or if you get lucky, you may download it onto the infected computer from the website [HERE] .

Unzip the contents to a folder in a convenient location.

Follow the instructions in the included Chameleon CHM Help File or, if the help file will not open, simply try to run the files by double-clicking on them one by one until one of them remains open, then follow the onscreen instructions.  When you open the Chameleon CHM Help File, you will see twelve buttons.

Click on the first button and see if it runs. You’ll know it’s working if a black DOS window appears, slays the malicious programs and processes, and then starts Malwarebytes Anti-Malware.

Screenshot

If all goes well, Malwarebytes Anti-Malware will get your computer back to a workable state.

——————————————-

GEEK BONUS AREA

Freedom of Information or Criminals?

Remove Google search bar from Firefox

Can Tablets Take the Place of Teachers?

Logitech Wireless Mouse M325 with Designed-For-Web Scrolling

——————————————-

Bookmarks4Techs – Over 500 Listed Tech Sites

Bookmarks4Techs

Links To All Articles Ever Posted At What’s On My PC

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Second Testing Cycle In A Row – Microsoft Security Essentials Has Failed Certification As An Effective Security Application

The title of this post tells it all; AND, as a matter of fact it is a direct quote from Bill Mullins’ Weblog – Tech Thoughts where his article “Microsoft Security Essentials – Breaking Up Is Hard To Do – But, It’s Over; You’re Gone” quickly opened my sleepy eyes this morning.

Microsoft Security Essentials – Breaking Up Is Hard To Do – But, It’s Over; You’re Gone

I had been reading inklings here and there where Microsoft Security Essentials (also called Microsoft Defender on Windows 8) has been faltering here of late and I shrugged it off, thinking the software giant was on top of it; however, Bill’s article was the kick in the butt that I needed.

It is really concerning to me that my main level defense on my PC may be lacking and further concerning (and a lesson to be learned) that even the giant can have weaknesses.  As a matter of fact, I can remember many, many, many, many moon’s ago where Microsoft developed their own antivirus software and they eventually dropped the product. I sure hope that we are not heading in that direction again and history is going to repeat itself.

After reading Bill’s article, I have decided to take his advice and take a look at AVG AntiVirus Free 2013. When I was managing a network, years back, AVG was my antivirus (and anti-malware) software of choice; however, AVG even took a dip there for awhile; BUT, they are back in full tilt, as Bill’s article will highlight.

As blogger’s we can make a difference and I am sure once Microsoft starts to see these articles, we may see a change that will open the sleepy eyes of the giant.

——————————————-

GEEK BONUS AREA

US, EU To Share Cybercrime Data

Why Printed Books Will Never Die

Essential Wrist wear for Tech Lovers

Gold Box: New Deals. Every Day.

——————————————-

Bookmarks4Techs – Over 500 Listed Tech Sites

Bookmarks4Techs

List Of All Articles Ever Posted At What’s On My PC

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

A FREE Registry Backup Tool For Windows 8

Just talking about the Windows Registry can make the hair stand up on one’s neck; however, if you work in IT there is a high probability, at some point, you will need to dissect the registry to make a system configuration change or to repair a registry setting that has been targeted by malware.

To those who have no idea of what I am talking about; the best and simplest definition I could find to describe the Windows Registry, for those at home, was at WikipediA.

The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems.

Most folks at home are unaware of the registry and the method to edit the registry; which should only be performed by the skilled hands of a computer tech. To put the registry into perspective; ”mess up the registry and you mess up the operation of your computer”.

This is why backing up the registry should be part of your backup strategy. A program, that is FREE, I recently started to use for registry backups is called Registry Backup (go figure) by Tweaking.com .

Screenshot

Registry Backup

When I upgraded to Windows 8 I wanted to make sure I had a compatible registry backup program and Registry Backup was the surefire solution.  Note:  Registry Backup is compatible with Windows XP, 2003, Vista, 2008, 7 & 8 (32 & 64 Bit).

I recently started using this program for several primary reasons:

Registry Backup uses the Windows Volume Shadow Copy Service to backup your system registry, which allows for perfect backups of the registry files and profiles on your computer.

Registry Backup is a full scale backup and restore program that has the ability to restore a backup from safe mode.

Registry Backup has a built-in scheduling option that can perform unattended backups.

I particularly keep registry backups around in the event of a malware infection, which in today’s world of computer, the registry becomes a prime target.  Also, during those rare occasions where I do make registry edits, I feel more comfortable making the edits knowing my bacon is covered with Registry Backup.

 Registry BackupFeatures List:

  • The program is 100% free.
  • One click backup and restore.
  • Can restore from Windows Safe Mode.
  • Portable version can be ran from a thumb drive and keep backups of multiple systems.
  • Automatic cleanup of older backups.
  • Set and control scheduling options.
  • Can backup & restore all user profiles on the system, not just the ones that are currently loaded.
  • Control which registry files are backed up or restored.
  • Detailed logs are saved with each backup.
  • Multiple easy restore options.
  • Online videos showing how to use the program and how to use the different restore options.

——————————————-

GEEK BONUS AREA

How to Remove Ransomware

Advanced System Care 6 – Newbie Friendly (With a Little Help)

10 things you have to know to be computer literate

FEATURED TECH PRODUCT

TRENDnet 5-Port Unmanaged Gigabit GREENnet Switch

image

——————————————-

Bookmarks4Techs

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Use the Norton Removal Tool To Remove Norton Security Products

If you have any of the Symantec Norton security products installed, listed below in the screenshot, and you have reached a crossroad where you need to uninstall your Norton product, I highly recommend that use the Norton Removal Tool. This tool is not easy to find on the Symantec site, due that they want to keep you around and not lose you as a customer. The tool has the ability to scan your computer and remove just about any Norton product from 2003 to present.

NOTE:
  Due to the power of this removal tool, be doubly careful; especially if you have more than one of Symantec’s products installed. It is also important that if you are using this tool to remove a Norton product with intention of reinstalling it, that you capture (or write down) your product key.

Norton Removal Tool

Norton security products (by Symantec) are the makers of the best security products out there, but what typically occurs is that people who let their Norton subscription expire on their PCs will attempt to remove the product using the Windows add/remove uninstall process so that they can install another product. The Windows add/remove uninstall process will not, and I repeat, will not remove these products in there entirety; whereas the Norton Removal Tool will get the job done.

When you install security products such as these, due to their complexity, it is important that you check with the maker of the security product to determine if a removal tool is available.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE… Featured Software – Home Designer Suite 2012

How To Restore the Menu bar | Best Internet Security

Researchers Demonstrate Flaws In iPhone 4, 5 In Hacking Contest – Dark Reading

A Refresher in Upgrading Your iDevices to The Latest iOS Software

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Provide Real-Time FREE Protection For Your Home Or Small Business PC

If you are looking for a security software option, that is FREE; that is easy to understand and use; that uses minimal system resources; and is engineered by a company that we are all familiar with, then Microsoft Security Essentials is a good choice.

You will see me here on the blog pushing this software on a regular basis. It is a layer of defense that I have installed on all of my PCs; not because it is FREE, but because it does the job.

Microsoft Security Essentials

Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up-to-date so you can be assured your PC is protected by the latest technology.

Microsoft Security Essentials runs quietly and efficiently in the background so you’re free to use your Windows-based PC the way you want—without interruptions or long computer wait times.

Before installing Microsoft Security Essentials, we recommend that you uninstall other antivirus software already running on your PC. Running more than one antivirus program at the same time can potentially cause conflicts that affect PC performance.

** IMPORTANT **  –  When changing security software on your PC from one brand to another, it is very important that you completely uninstall the security software you intend to remove. The uninstaller built into windows will not cut it. I highly recommend you either visit the software maker’s site to get information to uninstall the product or use a third party uninstaller such as AppRemover.

The free AppRemover utility enables the thorough uninstallation of security applications like antivirus and antispyware from your computer. Remove computer stress. Simply, cleanly and effectively.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE… Featuring the NEW Norton Internet Security 2013

The New Myspace

Practical Tips to Help You Install a Motherboard

Internet Security:Microsoft Fighting The Good Fight

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Appears Microsoft Is Pushing Us Into An Online Leasing Option Starting With Microsoft Office 2013

Typically in the past, when you purchased the Microsoft Office Suite, you shelled out a one time allotment of money to purchase the suite, whether it be a standalone license or a multi-user license. Technically, in this purchasing scenario the end-user (or purchaser) became the sole owner of the license which enabled the owner to use the suite for as long as they desired. For example, I have a license for Microsoft Office 2003, that  I am still using. Since that release there has been Office 2007 and Office 2010. From the viewpoint of being a home based computer user it was too expensive for me to keep upgrading; plus, I figured I would continue to use it as long as Microsoft supported it. Oftentimes, people who cannot afford to purchase the newest versions of the Microsoft Office Suite will resort to using pirated (illegal) versions of the software.

image Well, this is all about to change…  With cloud computing being the current technology, Microsoft will be offering the home-based computer user a leasing option for Microsoft Office 2013 called Office 365 Home Premium. You will still have the option of purchasing the boxed standalone version of Office 2013, but the licensing options are being constrained in such a way that it is obvious which direction Microsoft wants us to go.

The leasing option for home-based computer users, in words you can understand, is simply this…  You will subscribe to the Microsoft Office 2013 – 365 Home Premium Program online by paying a annual fee of $99 for an account. That $99 will you give you access to Microsoft Office 2013 on up to 5 computers and or any other internet enabled device such as tablet PC. Windows 7 or 8 and an internet connection are required. Keep in mind, this is all playing into the upcoming release of Windows 8, which has been specifically engineered to run as a desktop OS or tablet OS.

To get us all onboard with this change, Microsoft is currently providing an opportunity where you can download (and try) a 60 day preview of the program. At (or near) the end of the 60 days you will be alerted (and prompted) to purchase the leasing option of the full-release version of Office 2013 – 365 Home Premium (which will or should be available).

The preview version gives you the opportunity to see what is coming with the full release, such as:

  • A personalized Office experience on up to 5 PCs or tablets.
  • Powerful new versions of Word, Excel, PowerPoint, Outlook, OneNote, Publisher, and Access.
  • Streaming full versions of Office applications with Office on Demand (PC running Windows 7 or 8 and Internet connection required).
  • If you’re also trying Windows 8 Release Preview, be sure to check out the OneNote Preview in the Windows Store. Keep your notes, pictures, voice memos, and web pages in one easy to access place so you have them when you need them.
  • Coming soon, with the full release of Office 365 Home Premium:
  • Talk to anyone using Skype, including 60 minutes of free international calls every month to landlines in over 40 countries and to cell phones in 7 countries. (Skype account required. Excludes special, premium and non-geographic numbers.)
  • Get an additional 20 GB of SkyDrive online storage for easy access and sharing of your documents.
  • Office for Mac

I can see pro’s and con’s to this new purchasing (or leasing) model.  What is your thinking on this?  To get the full scoop visit Microsoft’s Office 365 Home Premium site [ HERE ] .

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE… FEATURING Best Seller Medialink Wireless N Router

Design Tips and Practice for Non-Smartphone Mobile Hardware
(which still exist)

Facebook Security Quiz??

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Temporarily Fix A Serious Security Flaw In Internet Explorer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)

When I am informed that a browser security issue (or flaw) exists that is of large scale or is a zero-day vulnerability, I find it important to alert everyone; especially the readers of this blog. Let’s face it, we spend the majority of the time on our computers in our web browser.

imageThe security issue I am alerting you about involves Microsoft’s Internet Explorer and in my opinion is a very serious issue.  In the interim, until this issue is completely resolved, I am recommending that you download and install Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). The enhanced Mitigation Experience Toolkit (EMET) is designed to help prevent hackers from gaining access to your system. Currently there are no patches available to protect you from this security flaw.

Eric Romang, a researcher in Luxembourg, discovered the flaw in Internet Explorer on Friday, when his PC was infected by a piece of malicious software known as Poison Ivy that hackers use to steal data or take remote control of PCs.

The security flaw, which researchers say could allow hackers to take remote control of an infected PC, affects Internet Explorer browsers used by hundreds of millions of consumers and workers. Microsoft said it will advise customers on its website to install the security software as an interim measure, buying it time to fix the bug and release a new, more secure version of Internet Explorer. – [ source: NBCNews.com TECH]

Reportedly many of the anti-virus software makers are aware of this issue and have already updated their products to protect end-users against this bug; however, this alone may not be sufficient to protect you.  Best bet here with this is make sure your security software is up-to-date and to download and install the Enhanced Mitigation Experience Toolkit (EMET).

The toolkit includes several pseudo mitigation technologies aimed at disrupting current exploit techniques. These pseudo mitigations are not robust enough to stop future exploit techniques, but can help prevent users from being compromised by many of the exploits currently in use. The mitigations are also designed so that they can be easily updated as attackers start using new exploit techniques.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE… FEATURING OCZ ModXStream Pro 700W Power Supply

Where Computer Viruses Lurk

Connectify: Turning Your Windows 7 Laptop into a Wi-Fi Hotspot

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Scan For The Wireless Networks In Your Close Proximity and Display Extensive Information About Them

If your computer has a wireless network adapter and wireless network card driver that works with the built-in wireless support of Windows Vista/7/8/2008, then you need to take a look at WifiInfoView. All modern notebook computers and many of today’s desktop computer meet these wireless specs.

WifiInfoView

WifiInfoView is a portable software application that will give you the ability to scan for the wireless networks in your close proximity and display extensive information about them. Information such as: Network Name (SSID), MAC Address, PHY Type (802.11g or 802.11n), RSSI, Signal Quality, Frequency, Channel Number, Maximum Speed, Company Name, Router Model and Router Name (Only for routers that provides this information), and more…

Best part is this software is FREE from the reputable utility site NirSoft and is an excellent addition to any tech’s toolbox…

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE… FEATURING TechEBlog

Test your website in each browser

How to Format a Computer with a
Windows Vista Operating System Disc?

How to Download Torrents Directly on Android Using uTorrent App

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

A Multi-Tab Google Chrome Look For Windows Explorer

What do you get with you cross Google Chrome with Windows Explorer?  You get Clover

Clover

While working on my sister site, Bookmarks4Techs, I posted the site MakeUseOf (as a featured site) when I noticed they had posted the article Clover 2 Turns Windows Explorer Into Google Chrome [Windows], that caught my eye.

To give credit where credit is due, you need to take a trip to MakeUseOf to learn more about this Windows Explorer extension that will give Windows Explorer that Google Chrome feel (tabs and all).  In my testing Clover is a keeper… According to the article, to use Clover you will need to have Chrome installed.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE… FEATURING MakeUseOf

DoNotTrackPlus Gives The Boot To Nosy Internet Trackers

How to use your Wi-Fi securely

There’s nothing wrong with my computer!

Bad Websites Are Increasing

Tablets and Computer Screens Could Disrupt Sleep Patterns

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Hide, Lock and Protect Your Files With This Unique Software

Carrying files on a flash drive is an easy method of transporting files to and from the office; BUT, did you ever stop and think; what the consequences would be if you lost the drive. Would you be exposing sensitive files and data to someone that found the drive that ultimately could come back to haunt you? Portable flash drives are small and can very easily lost or misplaced.

There are numerous methods available to encrypt files but most of the those methods can be time consuming, still can expose or give hints to the nature of the file data, and in most instances cannot be fully used on other PC’s due to limited access rights. As always, prior to transporting data to/from your home PC to another site (e.g. work), make sure you have permission to do so (e.g. consult with your network administrator).

I have experimented with many software utilities that will encrypt data on a drive to deter and prevent exposure of the data. If you do not know what encryption is, do not let the term scare you.

encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. [ source: WikiPedia ]

An utility that I recently started to use and have been quite impressed with is called FREE SafeHouse Explorer.  FREE Safehouse Explorer is a FREE (never expires) product that is offered by a company called PCDynamics, Inc. to promote their other commercial products and to promote the importance of data privacy.

SafeHouse

FREE SafeHouse Explorer is initially installed on your PC, BUT there is a menu option in SafeHouse to copy the program to your flash drive or any external media. Once on your flash drive you will be prompted to create a volume storage area.  The volume storage area can be any size up to 2000 Gigabytes… In my case I have an 8 Gig flash drive and I created a 2 Gig volume area to store my sensitive files. Once your volume has been created, the actual program on the flash drive, called “SafeHouse Explorer” is the program that you use to move, copy, and delete files in the protected volume; thus, it makes no difference if you have administrative access rights on the PC or not. Basically, in summary, the  files that you intend on protecting are hidden inside this volume file that gives no hint of what the data may or could be. You can also backup these volume files; and to open them, you only need the “SafeHouse Explorer” program.  SafeHouse Explorer is very similar to Windows Explorer in appearance and operation. There are many features to this program, requires a minimal learning curve, and in the end I feel comfortable with the protection if offers in the event my drive is lost or stolen.

SafeHouse Explorer In Action

Main Features:

SafeHouse Explorer makes your secret files invisible and hides them from snoopers, intruders and anyone else who doesn’t have your permission to view them.

SafeHouse Explorer uses passwords and maximum-strength 256-bit advanced encryption to completely hide and defend your sensitive files, including photos, videos, spreadsheets, databases and just about any other kind of file that you might have.

SafeHouse Explorer can protect files residing on any drive, including memory sticks, external USB drives, network servers, CD/DVDs and even iPods. Supports U3 Smart Drives.

SafeHouse Explorer creates hidden private storage areas on your local hard drive or external media to hold your confidential files. Your files are completely invisible until you enter your password. After you enter your secret password, you access your files using SafeHouse Explorer’s familiar drag-and-drop Explorer-like interface.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE… FEATURING Today’s Best Selling External Hard Drives

Control your PC’s ‘loudness’ with Sound Lock

Choosing The Right Web Browser for Your PC

The GoFlex Satellite Mobile Wireless Storage Device

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Use Password Chameleon To Generate A Different Unique Password For Every Site You Use

If you are not using some form of software to manage the passwords to your online accounts, then this tells me you are using weak passwords; or you are using the same password for every account; or you are writing down the passwords somewhere. I can go with writing the passwords down, as long as you are using some level of security (like storing them in a locked area), but I will bet you are not doing this. When it comes to computer security and passwords, I have found it is human nature to not take the extra steps to make sure the accounts are protected and have also found that most people really do not understand the importance of it all.

Today, I came across a really unique website that really caught my attention, called Password Chameleon, that is very different than any password manager I ever experienced.  As a matter of fact, it does not get any easier than this.

Password Chameleon

With Password Chameleon you only need to remember one password and the domain name of the account you are accessing.

For example, to access my blog account whatsonmypc.wordpress.com, I enter my secret password (which actually can be easy), then the domain name, which is wordpress.com, then click on “Generate Password”

Password Chameleon

After I click on “Generate Password”, a strong password is then generated.

Password Chameleon

What is cool about Password Chameleon is if I forget the password,  I can go back to the Password Chameleon website, enter my secret password, the domain name, click on “Generate password” to retrieve the same password I created the first time. You can come back anytime to Password Chameleon to get the password. Where the beauty of this lies is that I can retrieve a password for my accounts from any internet enabled computer by simply visiting the Password Chameleon site.

Password Chameleon uses a technique called “hashing” to combine your secret password with the address of the site and produce your password.

  • Passwords are never saved.
  • There is no database of passwords that could be hacked.
  • Passwords are generated on your computer using JavaScript, so nothing is sent over the internet.
  • Password Chameleon uses SHA-1 encryption to generate each password.
  • Passwords are 10 character, 64-bit sequences.
  • Passwords do not contain easily confused characters, such as 0 and O.

I am now using Password Chameleon, in conjunction with my password management software, to generate and keep track of my passwords.

Password Chameleon is a very cool concept that I hope the developers continue to enhance even further. On a further note, you can also download a Password Chameleon app to your windows computer, windows phone, android devices, Google Chrome and Internet Explorer browsers which makes it even easier to manage those passwords.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products
and MORE…

Couch potato perfection: Netflix now offers
continuous playback for TV shows

Retailers may soon use tagged Facebook photos to identify you in stores

How to Become a Google Power Searcher

SanDisk Cruzer 32 GB USB Flash Drive

Bookmarks4Techs

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

A Small FREE Application For Keeping Securely Encrypted Notes

Looking for a way to store encrypted (password protected) notes?  If so, then take a look at fSekrit.

There is nothing fancy about fSekrit other than it is a program that is designed to store sensitive information in a text based note file.  For example, I use this program at work to store various login codes to a door security system which I am tasked with monitoring. Instead of trying to remember all of the codes, I simply entered them into fSekrit, set a password, and I’m good to go. I only have to remember the one password. This program has worked without fail for me and is so small it can be carried on your flash drive. As a matter of fact, it is only 50K+ in program size plus the size of your encrypted text.

The easiest way to learn and use fSekrit is to simply run fSekrit, enter some text and then hit the close button for the fSekrit window.  At this point you will be prompted to save your note to file.

fSekrit

The file name that you give it will be saved as an executable. For example, I saved the note as “Rick”…  When I saved the note I was then prompted to enter a passphrase (or password), then hit “OK” after the passphrase as been entered two times. As indicated, do not forget the password.

fSekrit

The next time I want to pull the note up called “Rick”, I simply click on the “Rick” file, enter my passphrase and voila’ my note is once again available for viewing and editing.

fSekrit is a small application for keeping securely encrypted notes. These notes are truly stand-alone; the editor program and your note are merged together into a tiny self-contained program file, bypassing the need to install a special application to view your data. This makes fSekrit ideal for keeping encrypted notes on, for example, USB flash drives.

fSekrit uses very strong encryption to ensure that your data is never at risk. Rather than using hocus-pocus home-brewed algorithms, fSekrit uses the standard, military grade, peer-reviewed AES/Rijndael in CBC mode, with a 256-bit keysize.

fSekrit runs across the entire windows range: 9x/NT/2K/XP/Vista/Win7, 32-bit as well as 64-bit x86 editions.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE…

How to Disable Office 2013 Start Screen

Beware Malware On Olympics-Related Apps

Pulse.me – News reimagined by Internet Explorer 10

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Is Your Computer Infected with the DNS Changer Malware?

If your computer is infected with the DNS Changer Malware, expect your internet connection to be down on Monday, July 9, 2012… I have been following this for quite some time and decided to post some information about the DNS Changer Malware, at the prompting of some very good friends of mine.  (mainly Gary S., Curtis M., Harry D. and Frank D.)…

DNS Changer Malware

What is the DNS Changer Malware?

BACKGROUND

  • Up to 64,000 U.S. computers could lose Internet service Monday due to malware that may have infected them more than a year ago. The malware was discovered when FBI agents prepared to take down a group of international hackers last year.
  • The malicious software has likely slowed the Web surfing of infected computers, as well as disabled anti-virus software. Most users are likely unaware that their system is infected.
  • Systems infected by the malware will lose their ability to go online, and users will have to call their service providers for help deleting the malware and reconnecting to the Internet.
  • The number of computers likely infected is more than 277,000 worldwide, down from about 360,000 in April. The FBI believes that about 64,000 are in the U.S., and 50 Fortune 500 companies are still infected.

[ CLICK HERE ]
to quickly determine if your computer is infected with the
DNS Changer Malware.

[ CLICK HERE ]
 Everything you need to know about the
DNS Changer Malware
This site will shut down at 12:01 a.m., EDT, Monday, July 9, 2012 

——————————————-

GEEK BONUS AREA

Today’s Technology News, Software, Apps, Wallpapers, Tech Products and MORE…

Free Online OCR Service Turns Image Files Into Text

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Terminate Known Malware Processes with RKill

Typically, when a malware infection occurs, it will become quite obvious to the end-user; especially, when the infection has propagated to the point that your security software has shutdown (will not run or update), internet access is crippled, Windows System Restore no longer functions and bogus security software has installed itself on your PC (just begging for your credit card number).

In the background, unbeknownst to the end-user many malware processes are in force making this all happen that work in concert with a registry that has been compromised. These processes are very difficult to diagnose and shut down, without the aid of special software to shutdown those processes and restore the registry to a manageable (or stable) state.  Once the processes are shutdown and the registry is stable, then the end user has a window of opportunity to use security software to remove the malware infection completely.

An application that I keep in my flash drive toolbox, for these unwanted occasions and to target those malware processes, is the utility called RKill.

RKill

RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then import a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools. When finished it will display a log file that shows the processes that were terminated while the program was running.

RKill will attempt to terminate the malware processes and make the registry stable enough so that you can clean your computer using security software, such as Malwarebytes Anti-Malware . After you run RKill do not restart your computer until the infection has been cleaned. Restarting the PC, after running RKill, will only result in the malware processes restarting.

——————————————-

GEEK BONUS AREA

Today’s Technology News, Software, Apps, Wallpapers, Tech Products and MORE… 6/12/12

The Internet and Homeland Security

15 Free Best Antivirus Apps For Android

Cisco-Linksys WRT54GL Wireless-G Broadband Router

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

Literally Hide Sensitive Files In A Picture

How many readers out there have ever heard of steganography?

Steganography is not a type of dinosaur: but is a form of security through obscurity. Steganography is often used in the tech world as an obscure way of  storing a file (or files) inside another file such as a picture. As a result, anyone looking at the picture has no idea the sensitive file exists. Mix this concept with encryption and you have very secure method to hide (and secure) sensitive files. The picture appears as it should appear, opens on the computer just like any other picture; and, the only clue given (to the trained eye) that something may be out of the ordinary is that the file size of the picture will appear larger due to the sensitive file being contained within. Pretty neat stuff if you think about it…

So how can you take advantage of steganography?

What got me going on this, is an article posted at I Love Free Software [click here] about a FREE steganography program called Our Secret. It is programs like Our Secret that incites me to find clever ways to use it. I encourage you to read the article at I Love Free Software — Hide files and Messages Inside Images with Our Secret – to get a more detailed walkthrough on using the program.

First off, Our Secret is pretty easy to use and I encourage you to give it a try. Straight from the horses mouth, Our Secret is this:

Our Secret enables you to hide and encrypt files within other files (called carrier files) such as pictures or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not look suspicious, so nobody even knows that there is any encrypted information. Typically Our Secret is a three to four step process (depending if you use a password).

Just select the desired ‘carrier file’ (which will hide the information), select what kind of information you want to hide, create a password, and push the ‘hide’ button. After you save the new file, you can erase the one you wanted to hide. The unhide process goes in the same way but vice versa.

Our Secret

One clever way that I found to use Our Secret was this…  I took three documents, used Our Secret to hide the three documents inside a picture. I then uploaded the picture to my box.com account and stored it in my pictures folder. Online, the picture opened just like any other picture; however, encapsulated inside that picture is my hidden document files.

Note: One thing I did not notice is that there is not a portable version of Our Secret which would really make this program handy; however, I did manage to break the program install down with Universal Extractor so that I can carry it on my flash drive. I do need to experiment further to see if this program writes to the registry to determine if it truly can be used as a portable app or not.

—————————————————–

GEEK BONUS AREA

Today’s Technology News, Software, Apps,
Wallpapers, and MORE… 5/9/12

To Much Time Online?

Microsoft Arc Touch Mouse

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

Maintain, Optimize, Protect and Care For Your PC with ToolWiz Care

Every once in awhile, being an explorer (and tester) of FREE software, I will come across something that really gets me excited; especially, if it involves maintaining or optimizing the PC to make it run more efficiently. There are numerous maintenance and optimization suites out there right now, but I never heard of ToolWiz Care.

ToolWiz Care

Folks, after putting this utility suite through its’ paces, I have to say I am very impressed, especially for a utility of this magnitude being only at the version one level of development. The developers of ToolWiz Care have went to great lengths to come up with a package that covers all of the bases — from security utilities to protect your PC (and data) to utilities to maintain (and optimize) your PC.  I am trying to find out if ToolWiz Care can be made portable.

Everytime I use this, I find something else. For example, before I list the key features; after you install ToolWiz Care a very attractive (non-obtrusive) toolbar will appear on your screen that gives you the date, time, day, CPU Usage, Memory Usage, upload/download network activity. Double click on the toolbar and you can perform a Google search in the box that appears. This utility even offers eye protection. Now these things is just the candy! Let’s get to the key features of what ToolWiz Care can really do to help protect your PC, maintain your PC, and optimize your PC. Believe me, if you give this whirl, you will find more than what I have listed below.

As with any utility such as this, and not to scare you away, have some knowledge of what you are doing. I can tell you, I ran every utility in ToolWiz Care and did not experience any issues. If anything, it performed as it claimed it would perform.  I am very impressed with this.

Time Freeze

Time Freeze Keeps your system safe and protect your computer from unwanted changes.  NOTE:  This puts your PC into a virtual mode.  I am now using this to test software.  I’ll put the PC into the Time Freeze mode, test the software, come out of Time Freeze and my PC will be back to the original state prior to testing the software.

 Eyes Care

Eyes Care Protects your eyes with scheduled warning.


 Virtual Safe

Virtual Safe Creates a virtual safe which works like a regular drive where you can store files. The files stored in it are encrypted and cannot be accessed without the right password.

 Game Booster

Game Booster Concentrates every system resource for gaming purpose. It temporarily shuts background processes and other unnecessary Windows services & cleans out the RAM.

Password Manager

Password Manager Helps you create secure passwords that are extremely difficult to crack or guess. Also it can help you to manage your password, account and other private information.

 Password Generator

Password Generato Creates highly secure passwords with upper and lower case letters, numbers and punctuation symbols.


 Duplicate File Finder

Duplicate File Finder Allows you to scan all duplicate files in specified path. You can remove some of them and free up your disk space.

 File Undelete

File Undelete Ensures recovery of data permanently deleted from the Recycle Bin or with the help of SHIFT + DELETE key.


 Disk Doctor

Disk Doctor Helps you to check your hard disk both in I/O accesss and file system and give you a full report for the checking.

 Disk Cleaner

Disk Cleaner Cleans your hard disk from temporary files like those in the system temporary folder and the Recycle Bin.


 Registry Cleaner

Registry Cleaner Makes the PC system more stable by cleaning out the bad Registry entries.

 Registry Backup and Restore

Registry Backup and Restore Helps you to backup or restore your Regidtry with a simple click


 Registry Defrager

Registry Defrager Rebuilds PC’s Registry, making the entire system run quicker and smoother.

 Privacy Cleaner

Privacy Cleaner Protects the user’s privacy by deleting all activity history and surfing traces.


 Fast Defrag

Fast Defrag De-fragments the hard drive with it’s smart engine, keep the PC running efficiently and prevent the formation of other fragmented files.

 Checkup Module

Checkup Module Provides a full report of user’s PC system and allows the user to fix all problems with one simple click.


 Startup Report

Boot Report Provides a easy to read report that shows the start-up time of user’s system. It offers a detailed list of the processes loaded since booting.  NOTE:  Will also alert you when something new was added to the startup group that you were unaware of.

 Startup Optimizer

Startup Optimizer Allows the user to disable or delay the loading of any startup entries. It also provides the users with suggestions of standard processes.

—————————————————–

GEEK BONUS AREA

FREE Today Only – NoteCalendar (Android App)

Deal of the Day – Netgear RangeMax N150 Wireless Router WPN824N – High Performing N150 Antenna Design

** Featured Tech Site – Pureinfotech  **

Tech Product of the Day – Western Digital My Passport Essential SE 1 TB USB 3.0 Portable External Hard Drive

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

A Great Way To Backup Those Sensitive Tax Files On Your Computer Off Site

I just read that it is becoming more and more difficult to locate the paper tax forms and that more and more people are filing their taxes electronically. As a result, the tax data is often stored on the computer for which the taxes were filed; often to be forgotten. This can really be a privacy (and identity) issue should the integrity of the computer be compromised or the computer ends up in other hands; which it eventually will at the end of its’ life cycle.

Each year when I complete my taxes, using an online tax service provider, I am always given option to save my completed forms to an Adobe PDF file. Typically, I encrypt those tax form files (and any other sensitive files) on my PC using a program called Axcrypt. I then copy the encrypted files to a flash drive that I have set aside to store nothing but sensitive documents, files, photos, etc…

Flash Drive

The reason I copy this data to a flash drive is that I then keep the flash drive in a safety deposit box (off site) where I can get to what is important to me in the event of a disastrous event (such as computer hard drive failure, house fire, flood, etc…).  As a matter of fact, if you have a scanner, scan your sensitive documents and save them to that flash drive. Again, as an additional layer of protection encrypt the files on the flash drive.

If you do not have a flash drive, get one. I went on the hunt (for you) and found (Today Only) a 32 GB SanDisk Cruzer Drive at Amazon for under $25 (as part of their Deal of the Day).  There are other flash drive options out there as well [CLICK HERE] .

—————————————————–

GEEK BONUS AREA

Bookmark This (#20) – TuneIn

Bookmarks4Techs News Clip – Introducing Chrome for Android

HOT HOT HOT – OneNote for Android is here —
get it now or live with regret
@ BetaNews

HOT HOT HOT – Spot Fake Facebook Profiles + More
@ Tech-for Everyone

Gold Box: New Deals. Every Day.

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

Three Ways to Securely Wipe Files from Your PC

TuneUp Blog What’s On My PC welcomes the following Guest Article, “Three Ways to Securely Wipe Files from Your PC” by Christoph Laumann, President & Managing Director, TuneUp.

The TuneUp blog is written by a team made up of certified Microsoft experts, authors, and editors from major computer magazines. The people behind this blog also head up one of the most successful tuning suites around, called  TuneUp Utilities.

Three Ways to Securely Wipe Files from Your PC

If you’re one of the many people who upgraded their PCs this holiday season, you’ll likely want to donate or dispose your old ones. However, it’s important to securely wipe critical files that contain personal or sensitive information from your computer before doing so. Windows alone cannot wipe data. Even if sensitive files are deleted using the Recycle Bin, they can easily be restored using various data recovery programs. Here are three simple steps to help you ensure your files are wiped once and for all.

Step 1: Delete Volume Shadow Copies.

Windows creates Volume Shadow Copies of system files and some of your personal data (i.e. files residing in C:\Users\Username). Normally, it’s a great way to restore previous versions of files that may be accidentally deleted. Unfortunately, it’s also a potential liability as these files can be restored.

On a PC soon to be decommissioned, you’ll want to get rid of these Volume Shadow Copies by right-clicking on “Computer” and selecting “Properties”. Go to “System Protection”, select your system drive and click on “Delete”. This will delete all of the previous versions of files kept by Windows.

But beware! The next time your PC is idle, these Volume Shadow Copies will be recreated. If you’re in the habit of safely deleting files, you might just want to turn them off altogether by clicking on “Turn off system protection”. Be careful doing this because it will not only disable the previous version restoration feature—it also disables System Restore and can affect some backup tools (such as Macrium and Paragon) which rely on Volume Shadow Copies.

Step 2: Safely delete files.

To safely destroy data, we’ve created a wiping mechanism called TuneUp Shredder. It uses several algorithms that comply with data security standards and render files unrecoverable.

Here’s how TuneUp Shredder works:

  1. Grab the trial version of TuneUp Utilities 2012. This will add a new context menu item (TuneUp Shredder) to your Windows explorer. Simply right-click on the folder or file you’re trying to securely wipe from your machine, and select this menu item.
  2. Next, choose your algorithm. Keep in mind that it is next to impossible to recover the data, even with the “Fast delete” option, since you’ll essentially be overwriting it. However, if you want to be absolutely sure that this data is rendered irreparable, go with one of the more advanced methods.
  1. Hit “Yes” to delete the file.

Step 3: Completely wipe a drive.

If you’re going to donate your PC, it’s wise to perform a complete wipe of the entire hard disk. In the past, I’ve used and recommend either Active@ KillDisk 5.5 (the Pro version creates a bootable KillDisk USB key that you can use to destroy the data) or Darik’s Boot And Nuke. These tools overwrite your entire hard disk with zeroes or multiple writes of different characters (much like TuneUp Shredder).

Now, while this works well on mechanical hard disks, you’re out of luck if you have an SSD. SSDs’ data gets written and deleted in a very scattered fashion, and neither the user nor the operating system has control over where the actual data is stored—it’s all done by the SSD controller. This whitepaperproves that while some data can be destroyed (either by using some of the built-in mechanisms or third-party tools), in many cases, the data was still intact.

The only SSDs that can be safely wiped are those that include the ATA Secure Erase command. If it does, the Kingston Red Tech Blog provides detailed steps on how to perform a secure wipe of the hard disk using HDDErase (which issues the ATA Secure Erase command to your SSD firmware). If your drive doesn’t support this mechanism, you should try to fully encrypt your hard disk and delete the encryption key. Windows’ own BitLocker (available in higher Windows Vista and 7 editions) is one possible way. If all fails, physically destroy the drive—pure brute force or some pyrotechnics might do the trick.

For additional tips and tricks on securely wiping files from your PC and maintaining system performance, I invite you to visit the TuneUp Blog about Windows.

—————————————————–

GEEK BONUS AREA

Just In – Deals at TigerDirect

Bookmark This (#19) – Sumatra PDF

FREE Today Only – Math Training for Kids (Android App)

A Best Seller at Amazon – HP 2711x 27-Inch LED Monitor

Bookmark This (#18) – TSR Watermark

Hot Hot Hot – The Dangers of Geotagging @ TTC Shelbyville

Gold Box: New Deals. Every Day.

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

A BIG Welcome to Select Real Security Featuring a Malware Removal Guide

The most enjoyable parts of being a tech blogger is the people that you meet and what you will learn from them. I often tell young people that if you want to learn about tech and keep up with tech, go to the bloggers.

Recently the webmaster at a site, called Select Real Security, contacted me and asked if I would possibly do a review on the portion of the site called, Malware Removal Guide. Typically, being who I am and what I am about, I always oblige; especially if the content is of good quality and serves a purpose.

What I found, after reviewing the Malware Removal Guide, is that I wanted Select Real Security on my blogroll. This site is awesome in that it contains over 100 links to useful security related resources that include articles and guides on virus and malware prevention.

Navigation and layout of the site makes it easy, even for those who are unfamiliar with security terms, software, etc… You can tell that the webmaster of the site has put a great deal of time in putting this all together. It is a “go to” site for security related resources.

Select Real Security

In the end, both What’s On My PC and Bookmarks4Techs shook hands with Select Real Security to make it a permanent connection. Select Real Security’s Malware Removal Guide has also made the Bookmark This Collection (which is growing daily) at Bookmarks4Techs.

So, take a moment to welcome Select Real Security to the What’s On My PC blogroll…

—————————————————–

GEEK BONUS AREA

Great Customer Review on the
Belkin N600 Wireless Dual-Band N+ Router

FREE Today Only – Draw(er) Pro (Android App)

Bookmark This (#17) – Awesome Wallpapers

A Desktop Replacement – Toshiba Qosmio X775-Q7272 17.3-Inch Gaming Laptop

Bookmark This (#16) – Microsoft Security Essentials

Gold Box: New Deals. Every Day.

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

Windows Repair (All In One) – A Tool for the Tech Toolbox

Have you every found yourself in a jam where you have cleaned a PC from one of those rogue malware infections (AKA: scareware) only to discover that the infection, and even the cleaning process itself, caused corruption to the Windows registry and files (that control Internet Explorer, Windows Update, Firewall, etc.). My most recent experience was exactly that. I cleaned the machine only to find that the Firewall had been corrupted.

If this has occurred to you and you ran out of options, visit Tweaking.com and download their Windows Repair (All In One). As a matter of fact if you are in the position of cleaning malware from PC’s on a frequent basis, I suggest you keep Windows Repair (All In One) in your tech toolbox.

Windows Repair is an all-in-one repair tool to help fix a large majority of known Windows problems including registry errors and file permissions as well as issues with Internet Explorer, Windows Update, Windows Firewall and more. Malware and installed programs can modify your default settings. With Tweaking.com – Windows Repair you can restore Windows original settings.

I do recommend that you have some knowledge of cleaning malware from a PC before using this program; AND, that you follow the 4-step process that is built into this program before you initiate the repair process (see video).

Tweaking.com – Windows Repair can do the following:

Reset Registry Permissions
Reset File Permissions
Register System Files
Repair WMI
Repair Windows Firewall
Repair Internet Explorer
Repair MDAC & MS Jet
Repair Hosts File
Remove Policies Set By Infections
Repair Icons
Repair Winsock & DNS Cache
Remove Temp Files
Repair Proxy Settings
Unhide Non System Files
Repair Windows Updates
Repair CD/DVD Missing/Not Working
and more…

—————————————————–

GEEK BONUS AREA

Bookmark This (#10) – WindowsPager

FREE Today Only – Glow Tic Tac Toe (Android App)

Tech Product of the Day – The NEW Panasonic Lumix
DMC-ZS20 Digital Camera

HOT – Behind the Scenes of Google Chrome:
Optimizing and Troubleshooting

Gold Box: New Deals. Every Day.

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

All-In-One Protection for iPad, iPhone, Android Tablets, and Android Smartphones.

Being a Toshiba Thrive Tablet owner, with the Android OS, one of my main concerns is malware. Basically, everything I have explored (in terms of security software), I have little confidence in, or it slows down the tablet to a crawl, or it sucks the life out the battery. You have to keep in mind, these tablet devices (and smartphones) are really in the beginning cycle of life and that the antivirus, antispyware and antimalware protection being offered for these devices are also in the beginning cycle of life. As a result, the potential threat of an infection, in my opinion, is high. Let’s face it, these devices are designed to be cloud (or web) based and in today’s world the viral threats we are exposed to are predominantly also web based. In essence, click on a bad link and your tablet (or smartphone) could go south real quick. Then on the flip side of all of this, I have found on the internet that threats to the Android OS is virtually impossible (which to me any OS platform is susceptible). The incentive for attackers to take advantage of all of these shortcomings is on the rise. In the meantime I continue to educate myself to what is necessary and what is not.

Another factor here with tablets and smartphones is that the amount of personal information being stored on these devices is phenomenal. Lose the tablet (or smartphone) and bye, bye personal information and access to all your online accounts. Most people, including myself, due to the lack of a “typical” keyboard, and for the matter of convenience, will have our tablets (or smartphones) set to automatically remember our passwords so that we do not have to type them in (one reason to have the device locked and password protected).

During my search for some type of protection on my Toshiba, I came across an app called Lookout Mobile Security that claims to provide protection for malware, including trojans, worms, spyware and other suspicious software; and, claims to scan all apps, including inner directories and files – and also scans devices for any files that are capable of being executed on the particular device.

Lookout

Lookout Mobile Security is available as a paid app or a FREE app that has limited functionality. From what I am seeing on my Android (Toshiba Thrive) tablet is that the Lookout FREE version is giving me a Security Protection feature, a Backup feature and a Missing Device feature.

The Security feature, as mentioned before, claims to provide protection for malware, including trojans, worms, spyware and other suspicious software.

The Backup feature allows you to backup your contacts, call history and pictures to a myLookout.com account. (This feature I opted out on).

The Missing Device feature is a really cool feature that can be used locate your device, on a Google Map, from a myLookout.com account. I tested this feature out and it located my tablet within a couple of minutes. I was then sent an email with a Google map that displayed the location of my Toshiba Thrive (plus the longitude and latitude). You can even remotely activate an alarm on the device from the account. If you upgrade to the Premium paid version, once you locate your missing device, you can remotely, over the web, wipe the data from it.

image

So far, with more testing ahead, Lookout Mobile Security has been tablet friendly with no noticeable degradation in performance. I am still watching the battery levels to determine if it is taking away from the battery life during a session of using the tablet.

I still have more testing to perform with this; however, I thought I would throw all of this out there in chance it may help someone else out there who owns an iPhone, iPad, Android Tablet or Android Smartphone.

—————————————————–

GEEK BONUS AREA

Featured Tech Site of the Day–I Love Free Software

A Multimedia Powerhouse – The ASUS N53SV-DH72 15.6-Inch Full HD Versatile Entertainment Laptop

HOT – How To Repair the Windows Recycle bin
@ Tech-for Everyone

HOT – Factory Reset for many devices
@ TTC Shelbyville

HOT – Take Your Modified Application Installer And Shove It!
@ Bill Mullins’ Weblog – Tech Thoughts

Gold Box: New Deals. Every Day.

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

FREE Software to “Hard Wipe” and Permanently Erase Data on Hard Drives and Portable Media

The day will come when you will replace your tech toys; and, when I say tech toys I am talking about your desktop computer, notebook, smartphone, flash drive, tablet, etc…  When that time comes it will become necessary to erase the data (personal files, pictures, music, etc…) from those toys. Failure to “permanently” erase the data or sanitize the media source, in these devices, can easily result in your privacy being compromised.  Simply deleting files, by normal means, will not cut it.

You are probably thinking I suffer from paranoia, and that it is next to impossible to retrieve files from media after the files have been deleted.  I can tell you from experience, by using recovery software that it is easily obtainable on the internet, I have retrieved deleted files from hard drives (even dead hard drives) and have been especially successful in retrieving files from the non-moving type of drives and media such as flash drives, camera cards, SSD drives and even smartphones. Yes, even smartphones…  If it can be connected to a PC and shows up as drive, the data can be recovered even after you have deleted it.

There are numerous popular software options available that you can use to sanitize a drive; however, I found a new kid on the block called Hardwipe that I am currently keeping an eye on.  As a matter of fact Hardwipe is in active development, but has already become a worthy contender in my book.

 image

Hardwipe can be used as  standalone application from the Windows Start Menu or you can use it from within Windows Explorer by right-clicking on file system items and selecting the appropriate Hardwipe menu command. The developers of Hardwipe aspire to become a  leading data sanitization software solution. See their White Paper on Data Sanitization, Recovery & Security

Hardwipe lets you do the following:

  • Easily wipe entire drives and portable devices.
  • Wipe individual files or clean empty drive space of remanent data.
  • Right-click within Windows Explorer for Hardwipe commands.

Features also include:

  • Efficient — Hardwipe is fast in comparison other data wiping software.
  • Intelligent use of disk cache allows your computer to remain responsive during lengthy disk operations.
  • Automatic computer shutdown when wiping is complete.
  • Supports all major data wiping schemes, including: GOST R 50739-95, DOD 5220.22-M, Schneier & Gutmann.

—————————————————–

GEEK BONUS AREA

Kindle Fire How-To Guide

Advanced System Care – Over 130 Million Users

Featured Tech Product – Sennheiser RS120 926 MHz Wireless RF Headphones with Charging Cradle

Featured Tech Site of the Day – Paul’s Home Computing Blog

Gold Box: New Deals. Every Day.

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’ (#69) – A Mini USB Drive, WOT Protection, Popular iPhone Apps and a 1TB Swiss Knife

Featured Tech Product of the Day – HP v165w
16 GB USB 2.0 Flash Drive

16 GB USB 2.0 Flash Drive

—————————————————–

Way To Go WOT! – Now Protecting 30 Million Users
@ Bill Mullin’s Weblog – Tech Thoughts

Way To Go WOT! – Now Protecting 30 Million Users

—————————————————–

Some of the Most Popular iPhone Apps
@ Scoroncocolo

Some of the Most Popular iPhone Apps

—————————————————–

Swiss Knife with 1 TB USB Flash Drive
@ Plato On-Line

Swiss Knife with 1 TB USB Flash Drive

—————————————————–

Computers & Accessories Index

LARGEST COLLECTION –  Bookmarked Tech Sites

MORE Geek Squeaks

SHOP @ Bookmarks4Techs Amazon Store

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

Update Microsoft Windows Without An Internet Connection

There are still folks out there that I know personally that are on a dialup internet connection and not by choice. Broadband service just is not there and any mention of using a 3G, 4G or satellite connection is too expensive and besides those services can be sketchy at best, depending on the location and the environment.

What these folks run into, and I’m working with someone on this now, is that due to the dialup speeds in these remote locations not even being up to standard (due to poor telephone lines), downloading the Windows updates that they need for their PC’s ends up being nothing but pure process of drudgery. Think about it, if you are already on a slow dialup connection and you have your updates set to auto update, when those weekly auto updates kick in,  the connection speed slows down that much further. Couple that with other security software updates and general software updates and I think you can see what I mean about a pure process of drudgery.

To workaround this problem and get the Windows updates, I use a program called WSUS Offline Update. You will need to find someone with a broadband connection who is willing to use WSUS Offline Update software on their PC and willing to download the updates for you. You will also need to know what operating system you are using (i.e. Windows XP, Windows Vista, or Windows 7).

With WSUS Offline Update there are two components to the software. One is the “Generator” interface that you use to select the what language and Operating system you need the updates for.  You can even tell the “Generator” to copy the updates to a flash drive; which, you can then use to update the target computer.

image

When downloading the updates, a command console window (see below) will appear and you will see the software going to work to pull down the updates. Do not be alarmed if the first time you perform this process that it takes a long time (even on a broadband connection).  A long time can be an hour to several hours, but you have to do what you have to do.

WSUS Windows Update - Console Window

The second component built into WSUS Offline Update is the “Installer” that you use on the target computer.  To start up the installer look for the file “Updateinstaller.exe”, double click on it and the “Installer” interface will initiate with various selections to help you through the update process.

WSUS Windows Update - Installer

There are other options out there to download the Windows Updates; however, I have found the WSUS Offline Update utility to be the winner.

—————————————————–

GEEK BONUS AREA

Hot Tech Site of the Day – File Forum

Bookmarks4Techs Category Cloud

Rii Mini Wireless Keyboard (Built-in TouchPad/Laser Pointer)

image

Gold Box: New Deals. Every Day.

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

An Online Lightning Fast Virus Scanner

To add another tool to your arsenal in the fight against malware, be sure to visit BitDefender’s QuickScan.

BitDefender’s QuickScan

BitDefender’s QuickScan is an online tool which uses a technology they call .in-the-cloud. scanning technology which is capable of detecting active malware in less than a minute.

BitDefender’s QuickScan

The benefit of this technology is that the scanner uses online scanning engines that only uses a fraction of system resources needed to perform the scan; PLUS,the entire database of signature updates, etc… is maintained online by BitDefender.

One thing I do want to point out here and this is important:

BitDefender’s QuickScan is a tool that is designed to “detect” malware that is already existent on your PC, which is already active in memory or present in files that are run at system startup. In other words this tool is used, as a second opinion, to determine if your system is infected or you have suspicion that your system is infected.  It is not designed to provide real-time protection; but, again it is another tool to add to that arsenal in the fight against malware.  Thank you BitDefender for helping keep us safe…

—————————————————–

GEEK BONUS AREA

Feature Articles

Extend the Range of Your Wireless Network

Daylight Savings Time Ends – It’s That Semi-Annual “Clean Your Computer” Time Again

Gorilla Glass | Kewel Desktop Clock (with weather) | More

Start your career in Nursing

Amazon’s FREE Android App of the Day

Amazon App of the Day

Get a great paid app for free every day

—————————————————–

Bookmark and Share

Bookmarks4Techs

[ CLICK HERE TO LEAVE A COMMENT ]

[GEEK SQUEAKS’] – Super HP Monitor, Restore Icons, FREE PC Protection, Awesome Wallpapers, and Questionable Password Strength

HP 2311x 23-Inch LED Monitor
My Main Monitor – Full HD 1920 X 1080 resolution

image

DesktopOK 2.69
Save and restore the positions of icons.

image

Big Geek Daddy
Free PC Protection

image

Awesome Wallpapers
Nature Wallpaper Set 49

image

AskBillFirst
Maybe My Password Isn’t As Strong As I Thought It Was

image

——————————————-

Deal of the Day
image

Best Sellers in Electronics
image

Computers & Accessories Index

Over 600 Bookmarked Tech Sites

MORE Geek Squeaks

——————————————-

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

[DID YOU KNOW?] You Can Check A Suspicious Website for Malware In Your Browser

If you open up your web browser and type the following in the address bar;

http://www.google.com/safebrowsing/diagnostic?site=

AND, after the “equals sign” type the web address of any site, that site will be checked against Google’s updated lists of suspected phishing and malware pages. It is a handy and quick way to help verify your suspicions of a potentially bad site.

This is all part of Google’s Safe Browsing Service.  The goal of this service is to:

  • Warn users before clicking on links that appear in your site when they lead to malware-infected pages.
  • Prevent users from posting links to known phishing pages from your site.
  • Check a list of pages againest Google’s lists of suspected phishing and malware pages.

For example if you wanted to get a report on What’s On My PC, you would type the following in your browser’s address bar and hit enter.

 http://www.google.com/safebrowsing/diagnostic?site=whatsonmypc.wordpress.com

You will then get the following diagnostic report from Google:

Safe Browsing

Diagnostic page for whatsonmypc.wordpress.com

What is the current listing status for whatsonmypc.wordpress.com?

This site is not currently listed as suspicious.

What happened when Google visited this site?

Of the 3 pages we tested on the site over the past 90 days, 0 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2011-09-09, and suspicious content was never found on this site within the past 90 days.This site was hosted on 3 network(s) including AS13768 (PEER1), AS16805 (LAYER3), AS22576 (LAYER3).

Has this site acted as an intermediary resulting in further distribution of malware?

Over the past 90 days, whatsonmypc.wordpress.com did not appear to function as an intermediary for the infection of any sites.

Has this site hosted malware?

No, this site has not hosted malicious software over the past 90 days.

——————————————-

[CLICK HERE]
Gold Box: New Deals. Every Day.

Best Sellers in Electronics
image

Computers & Accessories Index

Over 600 Bookmarked Tech Sites

——————————————-

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Looking For That Default Router Password

When you purchase a router it is best security practices to change the administrator password to the router. The administrator password is the password that allows you to open the web-based setup, in your web browser (such as Internet Explorer, Firefox, and Chrome), so that you can make configuration changes (such as setting up and securing a wireless network). If you do make the password change, make sure you record and store that password in a safe place.

Typically, and in almost every instance I have experienced, most people never change the administrator password to the router and let it remain as the same password, as set by the factory. You may think this is enough to prevent unauthorized access; however, the factory set (default) password for nearly every type and model of router out there can be easily acquired on the internet.

What I have experienced with folks is that when they do experience router issues and need to access their router they are at a loss and they themselves do not know what the default admin password is. In this instance I usually go to the manufacturer’s website to locate the default password settings.  This can be quite time consuming…

Today, I will show you a website, called routerpasswords.com to demonstrate two things:

One, to demonstrate how readily available passwords to routers can be acquired, which is more the reason to lock down your router with your own password; AND,

Secondly to give you a quick access method to acquire a router’s password in the event you forgot what the default password was or you are a tech and need the password to troubleshoot a system.

RouterPasswords.com

RouterPasswords.com provides quick access for technicians to default passwords used on routers, default web logins, CCTV systems and other electronic devices.

RouterPasswords.com is the largest free online database of default router passwords. The database is maintained by the online community and constantly updated by visitors like yourself submitting new passwords.

——————————————-

[CLICK HERE]
Gold Box: New Deals. Every Day.

Computers & Accessories Index

Over 600 Bookmarked Tech Sites

——————————————-

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Sandbox Security Software for Windows

Did you ever wish you could browse the internet and not have to worry about malicious software or content attacking your system? OR Did you ever wish you could test a program without it causing changes to your computer? There is a way and it works very well. It is called Sandboxie

Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.

Sandboxie

Once you install Sandboxie, you can run or test your programs in an isolated space, called a sandbox, which prevents the programs from making altering changes to your computer and/or to the data in your computer. Any changes that are made are kept inside the sandbox. I have been following and using “Sandboxie” for several years, and I primarily use it to run my browser in. For example, you can run your browser (i.e. Internet Explorer, Opera, Chrome, Firefox) in a sandbox and not worry about malicious software (i.e. trojans, spyware, hijackers, etc…) causing harm to your computer. Any malicious software that is downloaded, is downloaded into the sandbox which is an isolated area away from the main operation of the PC.

In the event your computer becomes a victim of malicious content, the malicious content is trapped in the sandbox. At that point, you simply discard the contents of the sandbox and start over. If you are interested in trying this software out, I suggest you jump over to the Sandboxie web site and thoroughly read the “Help” and “FAQ”sections. This is good stuff; especially, if you ride the internet hard or you like to test software.

Benefits of the Isolated Sandbox (as described by the developer)

Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.

Enhanced Privacy: Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don’t leak into Windows.

Secure E-mail: Viruses and other malicious software that might be hiding in your email can’t break out of the sandbox and can’t infect your real system.

Windows Stays Lean: Prevent wear-and-tear in Windows by installing software into an isolated sandbox.

StumbleIt

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Easily Create Complex Passwords the Microsoft Way

I noticed on the Microsoft Privacy & Safety Site, a step-by-step (easy) method for creating complex passwords. I started using this method and now find myself using it all of the time. I suggest you bookmark or print out this method. It may look like there is a lot to it; however, it actually is quite easy to do.

image

Step 1: Start with a sentence or two (about 10 words total). Think of something meaningful to you.

Example: My cat is named Bucket. She is a fat cat.

Step 2: Turn your sentences into a row of letters. Use the first letter of each word.

Example: mcinbsiafc

Step 3: Add complexity. Make only the letters in the first half of the alphabet uppercase.

Example: MCInBsIAFC

Step 4: Add length with numbers. Put two numbers that are meaningful to you between the two sentences.

Example: MCInB19sIAFC

Step 5: Add length with punctuation. Put a punctuation mark at the beginning.

Example: ?MCInB19sIAFC

Step 6: Add length with symbols. Put a symbol at the end.

Example: ?MCInB19sIAFC*

Now test the strength of your Password [HERE] at the Microsoft Safety & Security site.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Beware of Sending Money in the Name of Love

If you are looking for love using the online dating and social services, BEWARE! The cybercriminal, posing as your Romeo or Juliet, may in fact be in it for the money.

Online Dating

According the to Federal Trade Commission, scammers, using fake and very convincing profiles, will often use these services to lure those seeking companionship to send them money. This is accomplished by gaining the trust of the online love interest by using the mystique of the internet and getting into the psyche of the person. Let’s face it, when we’re in love, we are gullible and will believe anything.

Typically a warning sign is simply this: If the communication with an online love interest turns toward the subject of “MONEY”, then BEWARE.

What the FTC says  to look out for…

  • If the online lover wants to leave the dating site immediately and use personal e-mail or IM accounts, then BEWARE. The intent here is to  manipulate you further in a more private and personal cyber setting.
  • In the online lover claims instant feelings of love, then BEWARE.
  • If the online lover claims to be from the United States but currently overseas, then BEWARE.
  • If the online lover claims to be planning to visit, but is unable to do so because of a tragic event, then BEWARE.
  • If the online lover starts asking for money to pay for travel, visas or other travel documents, medication, a child or other relative’s hospital bills, recovery from a temporary financial setback, or expenses while a big business deal comes through, then BEWARE.

These scammers will work it as long as it takes. As a matter of fact, it is not uncommon for these criminal cyber lovers to have more than one person on the hook at a time. So, BEWARE of that online Romeo or Juliet and in the event the urgency for MONEY crops up, cut the relationship off and report it to the Federal Trade Commission at www.ftc.gov/complaint or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Surf Safely with Web of Trust

A tool (or browser add-on) that I use on my PC’s, in addition to my normal security software, to help protect me when I am browsing the internet, is no other than Web of Trust (also referred to as “WOT”).

If you use Internet Explorer, Firefox, Chrome, Safari or Opera I highly recommend this installation. What it does is protect you from visiting web sites, when performing searches, that may be harmful by using a visual “traffic light simulated”  alert system.  If you see red (potential danger lurks ahead), if you see yellow (use caution) and green (go for it). In other words it is a visual rating system that is engineered to heighten your awareness of what sites are good and what sites could be bad. WOT shows the reputation of a website in terms of four components: Trustworthiness, Vendor reliability, Privacy, Child safety. I install this on any PC that I get my hands on.

I encourage you to watch the video below to see how it works and how you benefit from using the Web of Trust .

Web of Trust Video

You are probably wondering, “Who provides the ratings for all of these websites? AND “If this is a rating system, could not someone manipulate the ratings?”.

WOT’s unique tools are powered by our global community of millions of trustworthy users who have rated millions of websites based on their experiences. All websites’ reputation ratings in WOT are based on ratings from our users. WOT also uses information from numerous trusted sources, such as phishing and malware blacklists, to provide the WOT community with real time information.

When someone first hears about the concept behind WOT, their first objection is that someone could easily spam the system with tons of ratings and rate down their competitors or otherwise manipulate reputations, but that’s not true. In order to keep ratings more reliable, the system tracks each user’s rating behavior before deciding how much it trusts the user. WOT applies sophisticated algorithms to detect and eliminate any manipulation of reputation.

Like any security software there can be what is called “false positives”; however, from my experience this add-on tool is VERY ACCURATE and is a must for the everyday computer user.  You can learn more about the Web of Trust by clicking [ HERE ] .

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]

Powered by WordPress.com.

Up ↑