All posts by remotehelpexpert

Computer Basics – The Two Basic and Most Commonly Misunderstood Computer Terms

The first one is “byte”. We’ve all seen it. “Transmission speed: 500 Kilobytes per second”. “Storage capacity: 500 Gigabytes”. Or perhaps “Oh yeah? Mega-byte me!” 🙂

So what is a byte, in terms of computers and telecommunications? The simplest answer: A unit of information. It consists of 8 of the most basic units of information: The bit. Why 8 and not 7 or 9? That’s irrelevant to the scope of this article, so we’ll leave that at that.

OK So what the hell is a bit then? the term is a contraction of BInary digiT. Or maybe Binary digIT. Anyways, “binary” refers to the numerical system, based on 2 and only 2 possible values: 0 and 1, or false and true, yes and no, on and off, positive and negative, yin and yang… you get the idea. “Digit” is a symbol that represents a number. 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 are, in current Western culture, the ten digits.

So a bit can only have two possible values: 0 or 1. That sort of explains the idea that computers can only think in terms of numbers. And only two numbers at that. No matter what you see your computer doing, whether you are composing an email, watching a video, reading this, all the computer is doing is thinking “0, 1, 0, 1, 1, 0, 0, 1, 0, 0, 1, 1” and so forth.

Getting a headache from so much significance? For a graphic representation of a bit, watch the movie TRON. Or, for fast forwarding to the good part, watch this video clip of the TRON scene where the bit is introduced: http://www.youtube.com/watch?v=_fGujzulsas

Have fun!

Recently Seen Fake Antiviruses

As I’ve mentioned before, rogue security/maintenance programs are programs that pretend to perform a valuable function, while in fact being malicious in nature. These kind of programs have been in the rise lately, so I wanted to give you a list of the latest names different rogue programs have been showing under. This is not a complete list but includes the main ones seen in the wild:

  • Windows AntiHazard Helper
  • Windows AntiHazard Center
  • Windows Process Director
  • Windows Guardian Angel
  • Windows Software Keeper
  • Windows Problems Stopper
  • Windows Health Keeper
  • Windows No-Risk Center
  • Windows Antihazard Solution
  • Windows Risk Minimizer
  • Windows Managing System
  • Windows Safety Tweaker
  • Windows Tools Patch
  • Best Virus Protection

The most common infection method is by visiting a malicious website or a non-malicious website that has been subverted to infect its visitors.

Removal procedure for these infection vary from one to the other, but generally speaking, if you see one of the above programs, 1) Know that whatever alert it might prompt you with is false and should be ignored, and 2) If you don’t know how to remove it yourself, contact an expert who can help you. Some of these are tricky and have a specific sequence of steps in order to remove them successfully without damaging your computer.

This Month in Computer Updates

Microsoft will release this coming Tuesday the 13th, on its usual schedule (second Tuesday of every month), the monthly updates for its different software products. The batch will contain 6 updates, one of which has the highest severity rating – critical – belonging to the Windows operating system.

Last week Adobe released an update for Adobe Flash player. This latest version, 11.1.102.62, patches vulnerabilities that, if exploited, could allow an attacker to take control of the affected system.

Last week as well Google released Chrome 17.0.963.65, to address multiple vulnerabilities in the web browser. Notice that Flash in Chrome is embedded in the browser, so to bring Flash to its latest version all you have to do is update Chrome to the latest version.

Computers with their software up to date are the least likely to be affected by malicious attacks.

March 8th, AKA the End of the Internet

I always wanted to write a headline newspaper style. Seriously though, I’ve seen some news agencies and other doomsday style people write headings like this for this subject. Several people have asked me about this, so here are the facts:

1. There was an FBI operation called Operation Ghost Click that, back in November, took control of certain servers that were being used by a gang of cyber-criminals as Control and Command servers. This means malware was created that made the infected computers look for these servers when looking for the address of certain websites, and re-directing them to malicious ones. If your computer was infected, it was subject to this re-direction problem.

2. Those malicious servers, now in control of the FBI, have been kept running these last 3 months to avoid the infected computers, or computers affected by the infection, from being unable to access websites. But the servers are scheduled to be shut down on March 8.

3. if your computer is infected with the malicious software that makes it a slave of those servers, or if the settings changed by the malicious software are not corrected, the affected computers will lose internet connectivity when those servers are shut down.

That’s the basic story.

What to Do

Any good antivirus scan should detect the presence of the malicious software, called DNSChanger and labeled a Trojan (DNS: Domain Name System. See this article from last year if you’re interested in knowing what that is).

Even if the Trojan is removed, certain settings in your computer might still be crooked. Avira offers a repair tool for it. Click on this link to download it: Avira DNS Repair-Tool. Download it and run it to correct changed settings or simply to verify that your computer’s DNS settings have not been messed with.

If you need help with this, contact a computer professional.

Recent Important Updates

This past Tuesday, as it’s done every second Tuesday of the month, Microsoft released its monthly updates, 9 of them. You can go to www.windowsupdate.com to download and install the latest updates, if your computer is not set to download and install updates automatically.

Adobe just released a patch for the latest known zero-day exploit: http://www.adobe.com/go/getflashplayer

Google Chrome version 17.0.963.56 was just released. Clicking on the wrench icon on the upper right of a browser window and selecting “About Google Chrome” will confirm you have the latest version or download and install it.

The Mozilla corporation released Firefox 10.0.1 to fix a security vulnerability: http://www.mozilla.org/products/download.html?product=firefox-10.0.1&os=win&lang=en-US

It is always recommended to keep computers up to date in their software patches, to avoid security risks that might end up in infected computers.

Symantec pcAnywhere Security Recommendation

In my last article, a few days ago, I covered Symantec’s network being hacked back in 2006. One of Symantec’s products, pcAnywhere, was included in the list of programs which had its source code stolen.

In the most recent development of this story, now Symantec has released a technical white paper on the subject where it states “At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks”.

If  you have pcAnywhere installed in your computer, I recommend you disable or uninstall it altogether to avoid the possibility of it being used as an attack vector to your computer(s). Contact me if you need help with that.

 

Symantec (Norton) Network Hacked in 2006

The security software giant acknowledged last week that hackers had broken into its network when they stole source code of some of the company’s software.

At first, two weeks ago, Symantec spokesman Cris Paden stated a hacker made off with source code of Symantec Endpoint Protection 11.0 and Symantec Antivirus 10.2, back in 2006. Cris otherwise downplayed the seriousness of the theft.

A few days later, however, Paden issued a revised statement, saying source code of Norton Antivirus Corporate Edition, Norton Internet Security, Norton Utilities, Norton GoBack and pcAnywhere, had been stolen.

Having stolen the source code for these products means hackers, malware creators and other scum of society can create malware that exploits vulnerabilities in Symantec’s software, thus making it easier to render the antivirus useless during a malware infection, or in the case of pcAnywhere (a remote access suite that Symantec sells), opening the door for unauthorized remote access to computers with pcAnywhere installed on it.

In the specific case of pcAnywhere, the hacker who is believed to be responsible for the source code steal announced a few days ago the code was being released to the “blackhat” community for free-for-all exploiting.

I personally don’t recommend Symantec products, and haven’t for a long time. But with these developments I’d really suggest to stay away or move away from Symantec products.

Big Month of Bug Fixes in Windows

On the second Tuesday of the month, as usual, monthly Windows updates are being published. So that’s this coming Tuesday the 10th, at approximately 1 pm EST.

For being the first updates of the year, this batch is relatively bulky. Worth mentioning among the 7 security updates being released on Tuesday that patch 8 security bugs, is one labeled “security feature bypass”, a label never used before by Microsoft.

If you have automatic updates turned on, the only user intervention needed is a possible computer restart after the updates have been installed.

If you don’t have automatic updates turned on, it behooves you to get any and all outstanding Windows updates installed, including the ones being released this coming Tuesday. Software updates comprise an essential element in any sound computer security strategy.

Useful Keyboard Shortcuts in Windows 7

Keyboard shortcuts in Windows have existed since, well, keyboards and Windows have. But did you know these shortcuts, specific to Windows 7?

Definition: Win: Windows Key: The key to the left of your space bar with the Windows symbol on it.

Definition: Taskbar: The bar on the bottom of your screen that show the Start button, clock, etc.

1. Ctrl+Shift+N to Create a New Folder

You can use Ctrl+Shift+N to quickly create a new folder in Windows or anywhere on your computer where a folder can be created.

2. Win+Up/Down/Left/Right for Moving the Active Window

If you intend to quickly move the active window to make space for other programs, you could do that by using the Win key and one of the arrow keys. Each arrow key would move the window in the direction it is meant to. Note that using the left arrow key on the active window will make it occupy the left half of the screen. Windows key and right arrow key will return it to the middle, one more and will make it occupy the right side of the screen. Windows key and down arrow will return it to the earlier position, another down will minimize it. From the original position Windows key and up arrow will make the window full screen. Experiment to get the hang of it.

3. Win+1, Win+2… and so on for Opening Taskbar Programs

Want to quickly open a program that’s pinned to your Windows 7 taskbar? You can press the Win key and the number corresponding to the location of the program on the taskbar.

4. Win+Pause helps you check System Properties

Need to take a quick look at what’s the processor model you are using, or may be check the device manager, or advanced system settings? You could use Win+pause key combination to open the system properties window.

 

This is not a complete list of Windows 7 shortcuts; It’s just a few ones that might prove useful in your daily dealings with your Windows 7 based computer.