Saturday, December 25, 2004

Computer Rage

Raging Against the Machines

Computer Rage - How Not To Destroy Your New High-Tech Gifts

At least 10 percent of high-tech gifts this holiday season may fall victim to "computer rage" - acts of uncontrolled frustration by their owners - estimates University of Maryland professor Kent Norman, a cognitive psychologist who directs the Laboratory for Automation Psychology and Decision Processes.

To help keep these new gifts intact, Norman recommends that users find unconventional ways to let off some steam on old computer equipment, such as barbequing a computer mouse, cleaning a computer in a carwash or chopping a keyboard in half.

"When people sink three grand into a new plasma TV and something goes wrong, sometimes a killer instinct takes over," says Norman. "The anger may simply boil over when your spouse says, 'you spent all that money and now you can't get it to work?' That's when you've got to make sure people or the expensive equipment don't get hurt."

Norman's research focuses on making technology user-friendly. He argues that overly complex computers, cell phones, gadgets and software have created a rising tide of frustration. "People who design technology are playing hide and seek with us," he says. "It took me months before I stumbled across the control to turn off the ringer on my cell phone. I have a real love-hate relationship with machines that aren't always smart enough to do exactly what you want."

For the past three years, Norman has conducted an informal online survey of technology frustration and rage (http://lap.umd.edu/surveys/computer_rage). Nearly 20 percent of respondents admitted dropping a computer to the floor in anger, almost 40 percent mutilating a CD-ROM, and more than 80 percent cursing out loud at a machine. Roughly speaking, he says, it all adds up to a 10 percent risk of serious damage to new high-tech equipment.

Norman recommends early interventions to keep frustration from getting out of hand. The trick, he says, is to do it safely, economically and with a sense of humor. "When you walk into my laboratory you'll see a severed video camera mounted on the wall and a computer mouse lying helpless in a mouse trap," he cautions.

But his main tools are videos designed to release computer rage vicariously. With tongue in cheek and power tools in hand, the videos feature destructive acts against obsolete computer equipment. In one scene, he marinates a computer mouse before barbequing it. In others, he burns an old computer with a blowtorch and demonstrates the safe way to smash a monitor. A disclaimer advises: "All of the computers and computer equipment shown in various states of mutilation were either dead on arrival, obsolete, or really deserving punishment."

Norman says the videos also serve as a how-to guide for relieving technology frustration. The lessons are available free online ( http://lap.umd.edu/computer_rage/). To master the techniques, he suggests practicing on old computers before disposing of them.

"If you expect to get a high-tech gift for the holidays, it's best to find a way to vent frustration early," Norman says. "But remember, safety first. Always wear your safety goggles and select your targets wisely."

Friday, November 19, 2004

5 Ways to Block Pop Ups

5 Ways to Block Pop Ups...
Advertisers are constantly looking for any way to draw attention to their products. Although typical banner ads are still used heavily, they now seem to be almost invisible to the average web surfer. Pop ups and other intrusive types of advertising are now used to thrust an ad in your face that you have no choice but to at least acknowledge. Regardless of the nature of the ad, pop ups are a nuisance, and there are now many options available for keeping them off of your computer screen all together.

1. Internet Explorer on Windows XP with Service Pack 2
This summer’s release of Service Pack 2 for Windows XP brought about a few significant changes to the operating system. One of the most noticeable was the addition of a pop up blocker to Internet Explorer.

The pop up blocker is integrated into the browser and can be customized by browsing to the “Tools” tab at the top of the program. Like many pop up blocker applications, personal preferences can be set to allow/block pop ups from certain sites, as well as providing customization for how the user is alerted to the fact that a pop up has been blocked.

For those using Windows XP, upgrading to Service Pack 2 is an excellent idea for your system’s security as a whole, but specifically for the additional convenience of an integrated pop up blocker. For those with a Microsoft operating system other than XP, sorry, this is not available for you.

2. Alternative Web Browsers
There are other choices for web browsers available, and many have included a pop up blocker long before Microsoft decided to include one with Internet Explorer.

The Mozilla Firefox browser version 1.0 was officially released on November 9th. This browser has already received a great deal of acclaim and has become quite popular as an alternative to Internet Explorer.
Firefox is a highly customizable web browsing application that includes an effective pop up blocker, tabbed browsing, and many other features not found in Internet Explorer.

Crazy Browser is another option that was released in 2002, which is not as much an alternative browser, as it is a skin for Internet Explorer. In order for Crazy Browser to run, a system must have Internet Explorer 5 (or greater) installed, as well as Windows 95 (or greater) installed as the operating system. The Crazy Browser application then takes the base functionality of Internet Explorer and adds features similar to Firefox, such as the pop up blocker and tabbed browsing.

3. Browser Tool Bars
A growing trend is for websites to offer a downloadable toolbar for use with Internet Explorer. Many of these toolbars offer unique features intended to enhance the user’s web browsing experience in different ways, but they generally also include a pop up blocker. Although there are toolbars available from dozens of websites, Google, MSN, and Yahoo are some of the more reputable names with one available.

The installation of these toolbars is quick and easy, and the most difficult part may be reading the fine print in the license agreements.

Although these toolbars may do an excellent job blocking pop ups, they may also be retrieving data on your web surfing / search habits. If you feel a toolbar may be the right solution for you, stick with one from a trusted name, and just be sure to read the fine print.

4. Pop Up Blocker Software
Stand alone pop up blocking software is available from dozens, if not hundreds, of different sources. With various interfaces, and prices ranging from free to $30 (and higher), choosing one can be a difficult task. Many of the programs that are not available for free do come with a free trial download, so you can at least get a sense of whether the program is right for you before committing. Some of the options in this category include STOPzilla, Secure IE, Zero Popup and Pop Swatter, to name a few.

The main drawback to this type of pop up blocking solution is that you now have another independent application running on your computer. Although they
are generally not resource intensive, why run a program
to do something that can be handled by one that is already running anyway? Additionally, with so many reliable solutions available to eliminate pop ups for free,
spending money on one is hard to justify.

Along with a dedicated pop up blocker, another recommended tact for eliminating pop-ups is eliminating spyware on your computer system. Some pop-up programs use accompanying spyware to target pop ups specifically to you and your web surfing habits. An excellent, free program for eliminating spyware of all type is Spybot Search & Destroy.

5. Internet Access Software from Select ISPs
Some ISPs (Internet Service Providers) now incorporate a pop up blocker with the software they provide to subscribers for accessing the internet. Earthlink, Optimum Online, and AOL are just a few of the larger providers that add value to their packages by adding a pop up blocker. Bundling this functionality with the ISPs base software definitely makes things easy for the subscriber, as there may be no need to find one elsewhere.

In general, these blockers are effective, but are not the most feature rich and may have limited options for customization by the end user. One draw back with ISP provided pop up blockers is that some only work with their service. So, if you ever switch to a new provider, you’ll need to be prepared to switch to a new pop up blocker
as well.

Sunday, November 14, 2004

How to smash a home computer!

How to smash a home computer!!

An executive who froze his broken hard disk thinking it would be fixed has topped a list of the weirdest computer mishaps.

it's a bad idea to leave your laptop on top of your car

Although computer malfunctions remain the most common cause of file loss, data recovery experts say human behaviour still is to blame in many cases.

They say that no matter how effective technology is at rescuing files, users should take more time to back-up and protect important files.

The list of the top 10 global data disasters was compiled by recovery company Ontrack.

Human error, including 'computer rage', seems to be a growing problem Adrian Palmer, Ontrack Data Recovery Careless - and preventable - mistakes that result in data loss range from reckless file maintenance practices to episodes of pure rage towards a computer.

This last category includes the case of a man who became so mad with his malfunctioning laptop that he threw it in the lavatory and flushed a couple of times.

"Data can disappear as a result of natural disaster, system fault or computer virus, but human error, including 'computer rage', seems to be a growing problem," said Adrian Palmer, managing director of Ontrack Data Recovery.

OH NO, MY FILES!

One user put his hard drive in a freezer, after reading on the internet that this can fix malfunctioning hardware When tidying up his computer folders, one user inadvertently deleted the ones he meant to keep. He only realised he'd made the mistake after emptying the recycle bin and defragging the hard drive While a large office was being constructed, a steel beam fell on a laptop that contained the plans for the building. A female user placed her laptop on top of her car while getting in. Forgetting about the laptop, it slid off the roof and she then reversed straight over it as she set off Source: Ontrack Data Recovery "Nevertheless, victims soon calm down when they realise the damage they've done and come to us with pleas for help to retrieve their valuable information."

A far more common situation is when a computer virus strikes and leads to precious files being corrupted or deleted entirely.

Mr Palmer recalled the case of a couple who had hundreds of pictures of their baby's first three months on their computer, but managed to reformat the hard drive and erase all the precious memories.

"Data can be recovered from computers, servers and even memory cards used in digital devices in most cases," said Mr Palmer.

"However, individuals and companies can avoid the hassle and stress this can cause by backing up data on a regular basis."

http://news.bbc.co.uk/1/hi/technology/4003733.stm

latest version of the MyDoom internet worm

Unlike its predecessors, the latest version of the MyDoom internet worm does not hide inside email attachments. Instead, it infects computers by tricking their users into clicking a website link located in the text of an email. Once the user clicks the link, he/she is sent to a website that immediately injects MyDoom into the computer by means of a newly discovered hole in Microsoft’s Internet Explorer browser.

Some of these malicious emails appear to come from legitimate websites. The most common example of this is an email claiming to be from PayPal, which is the online payment system associated with eBay. The text of the email typically says:

"Congratulations! PayPal has successfully charged $175 to your credit card. Your order tracking number is A866DEC0, and your item will be shipped within three business days. To see details please click this link."

Another type of sinister email contains the following text:

"Hi! I am looking for new friends. My name is Jane, I am from Miami, FL. See my homepage with my weblog and last webcam photos! See you!"

To prevent infection, ignore all email links sent to you via email. If you are uncertain as to whether or not a particular company needs to speak with you concerning a legitimate business matter, then simply telephone the company or visit its central website to access your account safely and securely.

As a reminder, the best way to ensure the privacy of the files, credit card numbers, financial statements, and other sensitive data stored on your computer is to patch the holes in Windows, use a trusted antivirus program, and use a software or hardware firewall

Friday, November 12, 2004

Google Desktop Search

Your grandma already uses Linux on the desktop, ever hear of Google?

To download Google Desktop Search: to Search your own computer

go to Google and enter Google Desktop Search

Saturday, October 30, 2004

virus that disguises itself as a joke is spreading

Joke e-mail virus tricks users


A virus that disguises itself as a joke is spreading
rapidly across the net.

Anti-virus firms are issuing high-level warnings about
the new version of the Bagle e-mail program that seems
to be catching a lot of people out.

The Windows virus grabs e-mail addresses from
Microsoft Outlook and uses its own mail sending
software to spread itself to new victims.

When it infects a machine, the Bagle variant turns off
security measures that usually protect PCs.

Spreading fast

The new variant is called Bagle.AT, Bagle.BB and
Bagle.AU and the attachment bearing the virus code is
labelled as either "joke" or "price".


BAGLE SUBJECT LINES
Re:,
Re: Hello
Re: Hi
Re: Thank you!
Re: Thanks :)
The body of the virus usually contains nothing but a
smiley or emoticon.

The virus can strike computers running Windows 95, 98,
ME, NT, 2000 and XP.

Users will be infected if they open the attachment
that travels with the e-mail.

As well as plundering Microsoft Outlook for e-mail
addresses to send itself to, Bagle.AT also tries to
turn off the firewall and security centre services on
Windows XP machines.

BBC News Online has received five warnings about the
virus from security companies. Finnish company
F-Secure gave the virus its second highest threat
level.

"We've had several reports all over the world," said
Mikko Hypponen, director of anti-virus research for
F-Secure.

Security firm Network Box said that it stopped more
than 30,000 copies an hour of the virus as the
outbreak reached a peak.

Black Spider said it had stopped more than 1 million
copies of Bagle.AT since the outbreak began at 0630
BST (0530 GMT).

Anti-virus firms urged users to be wary of unexpected
e-mail messages bearing attachments and to update
their software to ensure they are protected against
the latest threats.

http://news.bbc.co.uk/2/hi/technology/3965721.stm

Wednesday, October 13, 2004

Microsoft has discovered 21 new security vulnerabilities

MICROSOFT RELEASES UNPRECEDENTED NUMBER OF SECURITY PATCHES

Problem: Microsoft has discovered 21 new security vulnerabilities in its software products, most notably the Windows operating system.

Solution: Download the latest security patches for all versions of Windows by turning on the "Automatic Update" feature within Windows or by manually downloading the patches from http://windowsupdate.microsoft.com

October 13, 2004
Microsoft has just released an extraordinary number of security updates designed to patch holes and flaws in its software products. Several of these critical updates are applicable to all versions of Windows. Failure to install these patches could result in a computer becoming hijacked by an internet intruder when that computer visits certain websites.

Almost all of these security updates were included in the recently-released "Service Pack 2" for Windows XP. Therefore users of Windows XP who have installed Service Pack 2 only need to install two of the new patches released yesterday. Additionally Microsoft has instructed users of its Microsoft Office software (which contains Microsoft Word, Excel, PowerPoint, Access, etc.) to download security patches for the Office programs. To do this, please visit the Office Update website at http://office.microsoft.com and look for the words in the upper-right side of the website that say "Check for updates."

Thursday, October 07, 2004

Microsoft security chief uses Mozilla Firefox



Mozilla Firefox is a much better and much more secure browser than Internet Explorer. After all, even Microsoft's security program manager seems to think so.

http://www.wired.com/wired/archive/12.09/view.html?pg=3


http://www.mozilla.org/

Sunday, September 19, 2004

"There are two types of people. Those who have lost data, and those who will."

"There are two types of people. Those who have lost data, and those who will."

If you have an unexpected power-surge, it will fry and fuse the electrics on the motherboard. You can still retrieve your data, but it will be very expensive."

Keeping your backup separate from your machine is much more sensible. Your average home DVD-writer can now store almost 5GB on a single disc. If you need more space then tapes, external hard drives and shareware which chops up large files into manageable chunks are all there to help. If you want to be even more secure, you can pay for your data to be taken off-site entirely. It's called online backup, and you send your data across the net to a remote site - leaving it safe until you might need it.

"If you back up your entire hard disc, it will take up a huge amount of space. It's much more efficient to just back up your work - not all your applications and your system. Presumably you would still know where all your installers were for your software and opertaing system, so you can go back to them to replace them."

Try configuring each of your pieces of software to save your work in one umbrella folder - it's exactly what Windows' 'My Documents' folder was made for. In fact, you don't even need to backup all your work every time.

Taking regular full backups won't generally be necessary, since most of your files won't change much during their lifetime. An incremental backup takes one full copy of the filing system, and then only records the changes that you make.

Because of this, subsequent backups run a lot quicker. You'll find most backup programs have this incremental option. With storage becoming ever cheaper, backing up is becoming easier. Choose what's best for you and get into a routine.http://www.bbcworld.com/

Thursday, September 16, 2004

more bugs in Microsoft operating systems and applications

Software bug raises spectre of 'JPEG of death'

Flawed software code used by numerous Microsoft applications to render images mean that a specially constructed image file could hijack a computer or spread a virus.

Ten years ago the idea of an image infecting a computer was the subject of a hoax email. But what was once a myth is now a genuine threat after Microsoft disclosed a flaw in the image processing code used in a range of its software programs on Tuesday.

Some experts blame the new threat on shoddy programming. "In a properly coded world, a graphic should not be able to infect your computer," says Graham Cluley, senior researcher with the UK-based anti-virus firm Sophos. "It should be impossible."


Crafty programmer

A number of Microsoft operating systems and applications contain the relevant bug, including Windows XP, Windows Server 2003 and Office XP, as well as many smaller applications. Microsoft has released downloadable fixes for affected software, available from the Microsoft TechNet site here.

The affected code has a so-called "buffer overrun" flaw. The buffer is a protected part of the computer memory, but flaws can mean that excessive input data can overrun into unprotected parts of a memory. A crafty programmer can use such a flaw to execute unauthorised code on a computer, potentially providing themselves with a point of entry in order to take complete control.

http://www.microsoft.com/technet/security/bulletin/MS04-028.mspx

Sunday, September 12, 2004

put off installing Service Pack 2

put off installing Service Pack 2 to make sure any big problems with SP2 come to light first.

SP2 Fights Worms, Has Bugs

washingtonpost.com

At Microsoft's Web site, the company lists about 40 software programs that may be hampered when Service Pack 2 is installed and 50 that don't seem to be compatible at all




Tuesday, August 24, 2004

Security risks swell for Microsoft’s Explorer:

Why is Internet Explorer unsafe

http://browsehappy.com/why/

USA Today, Security risks swell for Microsoft’s Explorer:

Using Microsoft’s Internet Explorer Web browser to surf the Internet has become a marked risk — even with the latest security patches installed.

Friday, August 06, 2004

turn your PC off during T-storms and lightning!

Lightning jolts teen working on computer
COUNCIL BLUFFS, Iowa -- A teenager working on his computer was jolted by a lightning strike that hit his family's home.

Mike Bergeron, 15, of Council Bluffs was in the basement of the home about 9:30 p.m. on Tuesday when lightning struck the roof of the house, traveled through the electrical lines to the computer and shocked him.

Linda Bergeron said the impact of the jolt sent her son flying about 5 feet backward. His sister was heading downstairs at the time and heard him fall.

"He was unconscious when she found him," Linda Bergeron said.

She said her son spent time in cardiac care at the hospital. He was released Wednesday morning but is going through outpatient care.


Thursday, July 22, 2004

Sunday, July 11, 2004

Why I'm Staying Away From Internet Explorer :use firefox instead

Why I'm Staying Away From Internet Explorer The browser's endless security woes make it dangerous to use FREE firefox http://www.mozilla.org/products/firefox/releases/0.9.html

In late June network security experts saw one of their worst fears realized. Attackers exploited a pair of known but unpatched flaws in Microsoft's (MSFT ) Web server and Internet Explorer browser to compromise seemingly safe Web sites. People who browsed the sites using Windows computers -- without downloading anything -- were infected with malicious code. I've been increasingly concerned about IE's endless security problems, and this episode has convinced me that the program is simply too dangerous for routine use.

Fortunately, you are not stuck with IE as your default browser. For several weeks I have been testing three alternatives: Mozilla 1.7 and Firefox, both free from Mozilla.org, and Opera 7.5 from Norway's Opera Software, which costs $39 if you want an ad-free version. All include useful features, such as pop-up blockers, that are lacking in the current version of IE. Mozilla is based on code written by Netscape Communications (TWX ), but I would avoid its poorly maintained cousin, Netscape 7.1. Firefox, officially still a test version, is a clean design and fast, while Opera offers tons of features. But the chief virtue of these browsers is that the they don't share IE's vulnerabilities.

Changing your default browser is simple. Most browsers will ask, when you open them the first time, if you want them to be the default. And if you're running the latest version of Windows XP, Service Pack 1, there's an application on the Start menu called Set Program Access and Defaults that makes switching painless.

FOR ALL OF ITS PROBLEMS, Internet Explorer isn't easy to give up. Some handy add-ons, such as the Google Toolbar, work only with IE. The Windows Update service requires it, and many corporations have developed custom IE-based applications. The travel-and-entertainment reporting system used by BusinessWeek, for example, works only with the Microsoft browser. So even if you default to another browser, you may still need IE from time to time.

Because IE will remain an inescapable fact of life, I hope Microsoft succeeds in its current effort to come up with a secure version. Later this summer the company will release Windows XP Service Pack 2, a major overhaul of Windows that focuses almost entirely on improving security. One component of SP2, as it is known, is a reworked browser that may make a big difference -- but it will be many months before we know for sure.

The biggest security problem in IE -- one that has plagued Microsoft and its customers for at least four years and is at the heart of the recent exploit -- is a flaw that lets a Web site trick the browser into running an alien program in violation of its own security settings. In effect, an unknown program on a Web site is treated as though it were a trusted program on your computer. Compromised Web sites can covertly install programs ranging from nuisances that cause ad pop-ups to real threats that record your keystrokes to steal passwords and account information.

Instead of making one more attempt to plug the hole, SP2 drastically restricts IE's ability to run any program without the explicit permission of the user. So even if the hole is still there, says Windows product manager Greg Sullivan, taking advantage of it "will be like breaking into jail." The hostile application would be blocked from doing any harm. This shouldn't cause problems during most browser use, but some custom corporate applications may fail. Other features of the new IE include changes that make it tougher for scammers to make phony bank Web sites look authentic. There will also a long-overdue pop-up blocker.

In theory, the approach Microsoft is taking should solve the security problem. But we won't really know until the bad guys have a chance to bang on SP2 for a while. For the time being, wherever possible, I'm staying away from IE. http://www.businessweek.com/magazine/content/04_28/b3891053_mz006.htm

Thursday, July 08, 2004

Scotland Yard and Botnets

Scotland Yard and the case of the rent-a-zombies

URL: http://zdnet.com.com/2100-1105-5260154.html

Vast networks of home computers are being rented out without their owners' knowledge to spammers, fraudsters and digital saboteurs, security experts said on Wednesday.

The terminals have been infected by a computer virus, turning them into "zombies"--slaves to the commands of a malicious and unseen controller. Connect them all up, and the result is a powerful network of zombie PCs that security experts call a "botnet."

The programming crooks--often teenage bedroom hackers--are hiring out these networks to anyone who wants to commit Internet mischief.

"Small groups of young people creating a resource out of a 10,000- to 30,000-strong computer network are renting them out to anybody who has the money," a source in Scotland Yard's computer crime unit told Reuters.

There may be millions of such PCs around the world doing the bidding of crime gangs, experts say, and they can be rented for as little as $100 per hour.

By marshaling the muscle of a few thousand computers, a spammer can send a burst of e-mail messages to sell all manner of products in the name of unsuspecting computer users.

Fraudsters known as "phishers" use the networks both to send deceiving messages and host authentic-looking bank Web sites designed to steal financial details, authorities said.

A more sinister use of botnets is sabotage, police say. A fear is growing that a botnet could be used to take down a major data network or prominent Web sites.

"You're talking about serious firepower," the source said.

'Hitmen' PCs Botnets have grown in number and ferocity since last summer, when a volley of digital contagions first hit the Internet, seeking to put unsuspecting home PCs under the command of a single programmer.

The hackers' task has been made easier by the growth in the number of homes connected to broadband--an essential prerequisite for a zombie.

A few months after these viruses first appeared, security experts and police noticed online discussion areas where blocs of virus-infected computers were on offer for those in the market for an army of "hitmen" terminals.

The commandeered machines were first rented out to spammers.

"The preferred method of spamming is now via botnets, and there's a lot of money to be made in hiring them out," said Mark Sunner, chief technology officer at security company MessageLabs.

Lately, botnets have been aimed at crippling Web sites. The ammunition in this case can be bought for a few thousand dollars, experts and investigators say.

"It's denial-of-service for hire," Steve Linford, founder of antispam organization Spamhaus Project, said in reference to a type of digital attack capable of crippling a company's network.

"If you want to take out a big site, you can rent a Russian botnet. When it is aimed at your computer there's nothing you can do," Linford said.

Police in Western Europe have had some luck dismantling a few networks and have made some arrests. But the racket runs deep, investigators say, extending from the United States to Western Europe and perhaps to Eastern European crime syndicates.

The list of botnet victims grows weekly. It includes a host of gambling Web sites and WorldPay, the online payment processing service owned by the Royal Bank of Scotland.

The investigative trail so far has led to computer-savvy teens looking to sell time on their army of commandeered PCs to spammers and fraudsters at the highest bid. Further up the chain, the trail runs cold.

"We think a big part of the operation--the virus-writing and the buying and selling of PC proxies--is kids," said Mikko Hypponen, antivirus research director at Finnish data security company F-Secure.

"We think crime groups are involved as well--but they seem to be using these kids as child labor."

Story Copyright © 2004 Reuters Limited. All rights reserved.


Monday, July 05, 2004

new worm - critical warning

Symantec is reporting the mail servers of various popular email services such as Hotmail and Yahoo to be bogged down with a new worn, code-named Evaman.

The security firm, Symantec, has given this worm a critical warning and states that this worm could be as as dangerous as the MyDoom virus.

Evaman occupies a false email address, sends itself to PC users as an attachment, and once the attachment is opened, the system turns into a host system to send out more emails with the same malicious code.

The headings are common to the ones users encounter everyday in their inbox - "Failed Transaction" or "Delivery Failure". This worm has the potential to take control over Windows 95, 98, ME, 2000, XP, NT, and Windows Server 2003.

According to some reports, it sometimes opens a common text file and selects a SMTP mail server from the already embedded list.

If for some reason Evaman can't connect to servers via its embedded list, it goes to a particular registery key in the system to connect. It then logs onto email.people.yahoo.com, searches for public email addresses, takes the information, and continues to spread.

Symantec reacted quickly on the threat and released a new patch, which is available on their website.

Sunday, July 04, 2004

DVD Recorder Prices Expected to Plunge  

Devices will be as much as 50 percent cheaper later this year,

he average selling price of DVD recorders is expected to fall by as much as 50 percent later this year as Taiwanese shipments of DVD recorders increase sharply, a government-backed market research firm in Taipei says.

Advertisement

Taiwanese hardware makers excel at producing large volumes of IT hardware products at low cost. The ability to produce large volumes of IT products at low cost has made Taiwanese hardware makers the production leaders of many hardware components and devices, such as laptop computers. And Taiwanese companies will take a larger share of the market for DVD recorders as prices fall, Market Intelligence Center (MIC) says in a statement.

MIC is part of Taiwan's Institute of Information Industry, a government-backed think tank set up to support the development of the country's IT industry.

On the Increase

Taiwanese companies, including BenQ and LiteOn Technology, shipped around 1 million DVD recorders--including DVD+RW drives, DVD-RW drives, and DVD-RAM drives--worth $220 million during the first half of 2004, MIC says.

That's up twenty-fold from shipments of close to 50,000 units worth $14 million during the same period last year, MIC says.

By comparison, Taiwanese companies shipped 700,000 DVD recorders worth $140 million during the second half of last year, MIC says.

Looking ahead, Taiwanese companies could ship up to 2 million DVD recorders during the second half of this year, bringing the total number of DVD recorders shipped this year to 3 million units, MIC says.

Shipments of DVD recorders from Taiwanese companies have been boosted by growing sales in the North American and European markets and reflects an improved ability of Taiwanese companies to source key components, MIC says.

Supply and Demand

MIC says a drop in the price of key components, including DVD loaders and MPEG-2 decoder chips, will cause the average selling price of DVD recorders to fall by nearly 50 percent during the second half of this year. Combined with consumer interest in global sporting events, such as the 2004 Olympic Games in Athens, this price drop will spur demand higher for DVD recorders, it says.

Based on MIC's numbers for the shipments and value of Taiwanese-made DVD recorders, the average selling price for Taiwanese-made recorders was approximately $220 during the first half of the year. That represents a reduction of 22 percent compared with an average selling price of around $280 one year ago but an increase of 10 percent when compared with the average selling price of $200 during the second half of 2003.

Japanese companies are currently the world's largest producer of DVD recorders, accounting for around 50 percent of shipments during 2003, MIC says. European companies accounted for 10 percent of shipments while South Korean and Chinese companies each accounted for between 6 percent to 8 percent of shipments last year.

MIC did not specify what percentage of shipments came from Taiwanese companies, but says Taiwanese companies could account for 25 percent of shipments in 2004, making them the second-largest supplier of DVD recorders.

Friday, July 02, 2004

Using virus-prone IE ‘like playing the lottery'

New York — It's been a bad week for many users of Microsoft Corp.'s nearly ubiquitous Internet Explorer browser.

A pair of virus attacks exploiting its vulnerabilities has led security experts to recommend that Web surfers consider such alternatives as Mozilla and Opera.

Continuing to use Internet Explorer is “like playing the lottery,” said Johannes Ullrich, chief technology officer of the non-profit SANS Internet Security Centre.

The respected research centre is among security groups recommending other browsers as long as a key vulnerability in IE remains unfixed, leaving it capable of running malicious code that's been hidden at a number of popular Web sites.

Switching browsers may cause problems, but less so than following Microsoft's temporary prescription of cranking up security settings, which may cripple the ability to access multimedia content or fill out Web forms, Mr. Ullrich said.

Last week, a computer virus designed to steal valuable information as Web users typed it into their computers — passwords and the like — spread through a new technique that converted popular Web sites into virus transmitters.

And this week, researchers discovered another password-stealing program hidden behind pop-up ads.

Microsoft was still working to fix a lingering vulnerability from last week's virus, and while a repair for the flaw enabling this week's Trojan infection was issued in April, many users had yet to patch their systems.

IE is a frequent target for hacking because of its popularity; WebSideStory Inc. says 95 per cent of surfers use it globally. The browser is closely integrated with Microsoft's Windows operating system and Outlook e-mail program, creating more room for programming error and making solutions more difficult.

Though many of IE's functions are not unique, IE tends to be more permissive in running code — flexibility that helps Web developers create fancy features but allows hackers to more easily find weaknesses.

A major Windows XP upgrade, known as a service pack, is due out this summer and would plugs some holes in IE. Last week's outbreak would not have occurred had those software plugs been installed, said Gary Schare, a Microsoft security director.

Microsoft also is developing a specific fix for the new vulnerability, but Mr. Schare said testing takes time. He called it premature for independent security experts to recommend that people explore alternatives.

Even if those recommendations were heeded, it's highly unlikely Microsoft could be unseated as top dog in the browser business. After all, IE comes with Windows computers. The Justice Department, after initially suing to force Microsoft to uncouple the browser from its operating systems, later backed down.

Many users don't care enough or know how to find other browsers, most of which are free or ad-supported. Opera Software ASA, which offers the No. 3 browser for Windows, saw no significant change in downloads this week.

“It's not that consumers are so loyal to Microsoft, but more they are apathetic,” said Geoff Johnston, an analyst with WebSideStory, which tracks browser usage. “With it, there really is a cost to switching.”

Users who install alternatives will find that some Web sites simply won't work. Movielink LLC says its on-line movies need technology specific to IE, and America Online Inc. shuns its own Mozilla-based Netscape browsers for new conferencing tools.

Browser-integrated toolbars from search leader Google Inc. and others are only available for Internet Explorer.

Many sites work on alternatives but display items incorrectly, often because developers fail to test on them.

“All they know is it looks good to them ... on their own browser, and their own browser is most probably Internet Explorer,” said Jakob Nielsen, a Web design expert with Nielsen Norman Group.

Ken Godskind, vice-president of marketing at the Internet monitoring firm AlertSite, uses the Mozilla browser partly because of security concerns, but he accepts having to run IE now and then.

“Rarely are you going to go someplace where you're going to avoid Microsoft technology,” he said.

But sites have gotten better about designing for other browsers, said Porter Glendinning, an Internet consultant who promotes adherence to Web standards. Until recently, he said, banking applications rarely worked on anything else.

And leading Web application developers, including Opera, Apple Computer Inc. and Macromedia Inc., are collaborating on better plug-in technology to rival Microsoft's.

Opera's Christen Krogh said users would get the same functionality no matter their browser.

Tuesday, June 29, 2004

Pop-up program reads keystrokes, steals passwords

Security researchers have discovered a malicious program that installs itself through a pop-up ad and can read keystrokes and steal passwords when victims visit any of nearly 50 targeted banking sites.

The targeted sites include major financial institutions, such as Citibank, Barclays Bank and Deutsche Bank, researcher Marcus Sachs said Tuesday.

"If (the program) recognizes that you are on one of those sites, it does keystroke logging," said Sachs, director of the Internet Storm Center, a site that monitors network threats. Even though all financial sites use encryption built into the browser to protect log-in data, the Trojan horse program can capture the information before it gets encrypted by the browser software. "The browser does not encrypt data between your keyboard and computer. It's encrypting it (when it goes) out onto the Web."

Sachs said the Trojan horse was first discovered on the computer of "an employee at a major dot-com." The victim apparently picked up the program from a malicious pop-up ad that used a flaw in Internet Explorer's helper server to install itself on the user's PC. In this case, because of the computer's security settings, the installation failed. Microsoft said IE users should raise the security settings to high until the company issues a patch.

Researchers at the Internet Storm Center studied the Trojan horse file, called "img1big.gif," which was provided by the dot-com. Working through the weekend, the security experts reverse-engineered the program and discovered that it targeted a long list of banks and attempted to steal the account information of those institutions' customers.

The program points to a recent trend in computer viruses and remote-access Trojan horse, or RAT, programs: Attackers are increasingly after money. In April, security experts warned that 'bot networks'--large networks of zombified home PCs--are a greater threat than high-profile worms such as Sasser and MSBlast, because they could be used to steal financial information or to send untraceable spam.

"In the past, the most common way to collect financial information was through fraud like the Nigerian e-mail scam," said Oliver Friedrichs, senior manager in antivirus company Symantec's security response center. Friedrichs said that in the past few months, Symantec analysts have studied threats similar to the current Trojan horse.

Because it carries a .gif file extension, the Trojan horse appears to be a graphic in a compressed format commonly found on the Internet. In reality, it's two programs: a browser helper file that surreptitiously captures usernames and passwords; and a "file dropper" that installs the keyword logger on the victim's computer.

The first file attempts to run itself by using an old Internet Explorer flaw, and the second file uses a feature of most major browsers, known as helper files, to intercept data, Sachs said.

"Before data goes through your browser, it can be processed by a helper file," he said. "What makes this one really clever is that (it takes) advantage of the ability in all browsers to use helper files and defeat the encryption."

Once the Trojan horse captures financial information, it encrypts the data by using a program hosted on an Internet server and sends the data back to the attackers, who appear to be in South America, Sachs said.

Security experts have stressed the vulnerability of Microsoft's Internet Explorer recently, following public warnings of vulnerabilities in the browser that could enable attackers to install malicious programs. Those flaws have not yet been fixed by Microsoft.

An attack that had used a vulnerability to turn some Web sites into points of digital infection was nipped in the bud Friday, when Internet engineers managed to shut down a Russian server that had been the source of malicious code. Compromised Web sites are still attempting to infect Web surfers' PCs by referring them to the server in Russia, but that computer can no longer be reached.

While the latest program is installed on Windows computers using a known vulnerability, the helper file hack exploits a feature, not a flaw, and could work with most major browsers, Sachs said.

"Sometimes, there's not much difference between a feature and a flaw,"

Saturday, June 26, 2004

New Virus May Steal PC Data

New Virus May Steal Data
A mysterious Internet virus being spread Friday by hundreds and possibly thousands of infected websites may be aimed at stealing credit card and other valuable information, security experts warned.

The infection appears to take advantage of three separate flaws with Microsoft products. Microsoft said software updates to fix two of them had been released in April, but the third flaw was newly discovered and had no patch to fix it yet.



Experts said the infection, detected by Microsoft on Thursday, was unusually broad but wasn't substantially interfering with Internet traffic.

Security technicians at Microsoft and elsewhere worked Friday to pin down how the infection spreads across websites. It appears to target at least one recent version of Internet Information Server, Microsoft's software for operating websites.

The infection makes subtle changes to the site so visitors get a piece of code that's designed to retrieve from a Russian website software that records a person's keystrokes and can send data back, experts say. Such software "Trojan horses" are routinely used to fish for credit card numbers, bank accounts, passwords and the like.

Now that the code is out, other hackers are likely to adapt it to distribute software for spamming and for launching broad Internet attacks against popular sites, said Alfred Huger, senior director of engineering at Symantec Corp.

"Users should be aware that any website, even those that may be trusted by the user, may be affected by this activity and thus contain potentially malicious code," the U.S. Computer Emergency Readiness Team warned in an Internet alert.

Stephen Toulouse, a security program manager at Microsoft, recommended that computer owners obtain the latest security updates for Microsoft products and their antivirus and firewall programs.

Because one flaw has yet to be fixed, he said, users should also turn up security settings on Microsoft's Internet Explorer browsers to the highest levels.

Security experts noted that users can avoid the exploit by using alternative browsers such as Mozilla and Opera. Users could also turn off the Javascript feature on their Microsoft browsers, though doing so cripples functions on some sites.

The infection does not affect Macintosh versions of Internet Explorer.

Friday, June 25, 2004

New attack hitting Web users through major sites

Internet users may unwittingly be downloading malicious code

The attack affects only users running Microsoft Corp.'s Windows operating system and Internet Explorer browser


Internet users visiting some of the most popular sites on the Web may unwittingly be downloading malicious code that compromises their computers and sets up a relay network for a future onslaught of spam, a security services company warned Thursday.



NetSec Inc., which provides managed security services for large businesses and government agencies, began detecting suspicious traffic on several of its customers' networks on Thursday morning, said Chief Technology Officer Brent Houlahan.

Examining firewall logs and other data points on those networks, NetSec found that when users visit certain popular Web sites -- including an online auction, a search engine and a comparison shopping site -- they unwittingly download a piece of malicious JavaScript code attached to an image or graphics file on the site.

Without the user's knowledge, the code connects their PC to one of two IP (Internet Protocol) addresses in North America and Russia. From those systems they unknowingly download a piece of malicious code that appears to install a keystroke reader and probably some other malicious code on the computer, Houlahan said.

The code may be gathering the addresses of Web sites visited by affected users and the passwords used to access them. In addition, the IP address in Russia is a known source of spam, and the code may be creating a network of infected machines that could be used to relay spam across the Internet at some later date,

U.S. warns of large-scale virus attack

U.S. warns of large-scale virus attack

Chicago — U.S. government and industry experts warned late Thursday of a mysterious, large-scale Internet attack against thousands of popular websites.

The virus-like infection tries to implant hacker software onto the computers of all website visitors.

Industry experts and the Homeland Security Department were studying the infection to determine how it spreads across websites and find adequate defences against it.

"Users should be aware that any website, even those that may be trusted by the user, may be affected by this activity and thus contain potentially malicious code," the government warned in one Internet alert.

The mysterious infection appeared to target at least one recent version of software by Microsoft Corp. to operate websites, called its Internet Information Server, popular among businesses and organizations.

A spokesman for Microsoft declined comment immediately.

Experts said the attack's effects were unusually broad but weren't substantially interfering with Internet traffic.

"While this is significant, it has no impact on the operation of the Internet," said Marcus Sachs, who helps run the industry's Internet Storm Centre in Bethesda, Md.

Experts urgently recommended consumers and corporate employees update antivirus software on their computers, since the latest versions can immunize visitors to infected websites.

The infected websites attempt to implant on visitors' computers hacker software that allows others to use their computers to surreptitiously route Internet spam e-mails.

Thursday, May 06, 2004

CDs May be Less Immortal than We Thought

CDs May be Less Immortal than We Thought
http://www.cnn.com/TECH/


"CD rot" Dos:
1. Handle discs by the outer edge or the center hole.
2.Use a felt-tip permanent marker to mark the label side of a CD.
3. Keep discs clean. Wipe with cotton fabric in a straight line from the center of the disc toward the outer edge.
4. Return discs to their plastic cases immediately after use.
5. Store discs upright (book style) in their cases.
6. Store discs in a cool, dry, dark place with clean air.
7. Open a recordable disc package only when you are ready to record.
8. Check the disc surface before recording.

Manufacturers cite lifespans up to 100 years, but without a standardized test, it's very hard to evaluate their claims, Byers says. The worst part is that manufacturers frequently change the materials and manufacturing methods without notifying users.

"When you go to a store and buy a DVD-R, and this goes for CD-R as well, you really don't know what you're getting," he says. "If you buy a particular brand of disc, and then get the same disc and brand six months later, it can be very different."

This renders the frequently heard advice to buy name-brand discs for maximum longevity fairly moot, he says.

DVDs are a bit tougher than CDs in the sense that the data layer (or layers -- some discs have two) is sandwiched in the middle of the disc between two layers of plastic. But this structure causes problems of its own, especially in early DVDs. The glue that holds the layers together can lose its grip, making the disc unreadable at least in parts.

Users that bend a DVD to remove it from a hard-gripping case are practically begging for this problem, because flexing the disc puts strain on the glue.

Rewriteable CDs and DVDs, as opposed to write-once discs, should not be used for long-term storage because they contain a heat-sensitive layer that decays much faster than the metal layers of other discs.

For maximum longevity, discs should be stored vertically and only be handled by the edges. Don't stick labels on them, and in the case of write-once CDs, don't write on them with anything but soft water-based or alcohol-based markers.

Symantec Worm removal tool

he W32.Sasser family of worms can run on (but not infect) Windows 95/98/Me computers. Although these operating systems cannot be infected, they can still be used to infect vulnerable systems that they are able to connect to.

Symantec Security Response has developed a removal tool to clean the infections of W32.Sasser.B . You can download the removal tool from the Symantec Web site at:

http://www.symantec.com/techsupp/vURL.cgi/sctyrsp5

Friday, April 30, 2004

I have set up this blog as an aid for my Aplus PC & Mac Computer Support Technician services

D. Garcia CompTIA A+ PC Technician

Apple Macintosh-PC Technician

Voice: (441) 238-1777

P.O.Box SN 280
Southampton SN BX

Bermuda

E-Mail: dg@ibl.bm

or
jazzbo54@yahoo.com

or

PcMac.Technitian@gmail.com

web site:

http://pcmactech.01.free.bm/