All posts by remotehelpexpert

The New Malware Epidemic – Cause and Cure

Is it me, or are there more and more computers getting infected with malware these days? Being under the impression that this is the case, I set out to research a bit on that.

It seems like the DIY kits for creating malware have recently gone down in price and made more user friendly. It has gone down to the level where new and inexperienced cybercrimals can create malware even when their computer skill level is barely enough to download music or a movie from the internet. That’s a scary thought.

The creation and selling of these DIY kits has emerged as a business, and according to Marc Rossi, manager of research and development at Symantec “It’s possible that the people creating and selling these kits may be the same groups already profiting from cybercrime, and they could see this as yet another revenue stream.”

Indeed, newbie cybercrooks and veterans alike are using DIY kits to carry out phishing campaigns at an accelerated rate, security researchers say. They’ve been blasting out fake e-mail messages crafted to look like official notices from UPS, FedEx or the IRS; or account updates from Vonage, Facebook or Microsoft Outlook; or medical alerts about the H1N1 flu virus.

The faked messages invariably ask the recipient to click on a Web link; doing so infects the PC with a banking Trojan, a malicious program designed to steal financial account logons. Often, the PC also gets turned into a “bot”: The attacker silently takes control and uses it to send out more phishing e-mail.

What to do? Follow the advice in this article, and get all the protection layers in place in your computer(s), paying special attention to the good emailing and web surfing habits.

Let me know if you need help doing it or reviewing your security level.

Phishing

the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Phishing, also referred to as brand spoofing or carding, is a variation on “fishing,” the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

Computer Basics – What’s Inside a Computer? GPU

GPU = Graphics Processing Unit. Inside a computer, minding its own little business, we find the GPU. A microprocessor like the CPU, it is different in that it specializes in processing data related to the rendering of graphics (video) in a computer. It can be embedded in the motherboard, or in a dedicated graphics card plugged into one of the buses as an extension card. Generally speaking, a GPU in a dedicated graphics card has more power than one embedded in the motherboard.

Even though it seems that the term dedicated is synonym with a GPU being in an extension card instead of embedded in the motherboard, the factor that actually defines it as dedicated is whether or not it uses the general random access memory (sharing it with the CPU), or if it has its own dedicated memory. That also defines its power.

At the moment of this writing, over 90% of personal computers use integrated graphics solutions, since it is more cost effective and only a small portion of the users demand more than what integrated graphics can offer. Chief amongst those included in the remaining 10% are avid computer games users (gamers), and those who run  graphically intensive programs such as computer-aided design (CAD) programs.

So there you have it, another piece in the computer puzzle, the GPU.

Computer Basics – What’s Inside a Computer? Ports

Having covered the Motherboard, CPU and Memory as basic components of a computer, let’s see what else is in there.

Ports. For the purpose of the physical parts of a computer (also known as hardware) a port is a specialized outlet physically attached to the motherboard, whether directly or through a bus. What’s a bus? This you don’t want to miss 🙂 .

In the electric field, generally speaking a bus is a connection between multiple electrical devices. In a computer, the term was originally derived from the electric definition. In general terms, it means a collection of wires through which data is transmitted from one part of a computer to another. If you’ve seen the insides of a computer, you might have noticed what seems to be a card that plugs perpendicularly into a slot in the motherboard. The slot in the motherboard is the bus. The card can be a graphics card (handles the video needs of your computer and is what the monitor is connected to), perhaps a network card (to connect to the network at your place and to the internet), even the RAM, and so forth.

So back to the original subject, a port can be connected directly into the motherboard (integrated) or through a card connected to a bus that is attached to the motherboard.

You’ve seen plenty of different kinds of ports. Your mouse and keyboard connect to a port in the back of the computer (called PS/2). Your computer speakers connect to an audio port, and as mentioned before your computer monitor is connected to the graphics port in your computer. Printers connect to a port in the back of your computer called parallel port. More about parallel port in a moment.

There is one last type of port that deserves special mention, as it has become widely used in recent years. Many of you have probably heard the acronym USB when talking about a computer connection, or perhaps a cable. “My iPod connects to my laptop though a USB cable”, or “I have a flash drive that connects to any USB port in my computer”. But how many people know what USB stands for, and more importantly, how many people know what it means? well, you’re about to become one of the lucky ones who are in the know.

Having defined bus above pays off now, since USB stands for Universal Serial Bus. Universal because when created back in the 1990’s it was meant to replace all the different types of connections between a computer and external devices.  Serial because, when talking about ports, it refers to a type that allows data transfer to occur one bit at a time, as opposed to parallel, where simultaneous streams of data can flow concurrently from a port (parallel ports were mostly used for connecting printers to computers and now have, for the most part, become outdated and replaced with USB ports, or sometimes network – Ethernet – ports).

In conclusion, the computer  produces a flow of outgoing data to some external devices and receive input from others, all connected together through ports,  which when properly operating form an harmonious system that becomes more than the sum of its parts – a synergy.

Computer Basics – What’s Inside a Computer? Memory

Now that we have the base for the computer (motherboard) and the brain of the operation (CPU) covered, let’s see what else is inside a computer.

Memory. In the broad sense of the word, it includes all devices that deal with data storage. In its most used meaning, it refers to the primary storage, a fast but temporary type of data storage that the computer uses to store data from programs currently running in your computer and so forth. It can be accessed in any order regardless of its physical location within its circuits. Hence its name: Random Access Memory or RAM.

Secondary storage is also referred to as mass storage. In its most common form, it can be the computer’s hard disk drive, or its compact disk (CD) or digital video disk (DVD) drive. It can store bigger amounts of data than the primary storage, but the data access and transfer times are much slower.

Smart readers will have noticed that these two forms of data storage are complementary, i.e. one has speed but low capacity, and the other capacity but slow speed. This is why they both exist in a computer. All the programs, all the files, documents, pictures, videos, etc. are stored in the secondary data storage device. As needed, the CPU calls for certain data needed for the execution of a program and the data gets transferred into the primary data storage device, where it’s readily available for immediate use without slowing down the computer due to slow access times. Generally speaking, once the computer is done with the data in the primary storage device, it flushes it from it, and writes anything that needs to be kept for future use to the secondary data storage device.

The above oversimplified cycle is, in a nutshell, what the computer is doing when operating. The computer CPU operates on data – it gets the data from the mass storage device and stores it temporarily in the faster storage device – it uses the data to perform its calculations and execute programs – it writes to the mass storage device the results of its calculations and programs execution that need to be stored for future use.

There is only one other thing the computer does, and that is sending data to other devices. That will be the subject of the next few articles.

Computer Basics – What’s Inside a Computer? CPU

Having covered the basic for the computer internals, the motherboard, let’s see what’s attached to it. Let’s start with the CPU. CPU = Central Processing Unit. Also known simply as the processor, it is the part of the computer responsible for the actual execution of your programs, the brain of the operation if you will. Every time you press Enter to execute a command or start a program, every time you click on a link or an email to open them, and so forth, it is the CPU that executes those commands. Inside your computer, if you were to locate it, it’d look like a square-shaped, black, flat component attached to the motherboard; It will – surprisingly – be located in a somewhat central position within it. While that description may fit more than one component in your motherboard, generally speaking the CPU will be the largest one.

Since it is so common to read about a computer’s processing power and speed when looking at specifications, it is worthwhile to take a closer look at what it means and how it is measured. When talking about a computer’s processing power/speed, one is, generally speaking, talking about the CPU. I grazed in one my earlier articles the concept of computer speed. Let’s go a little deeper into it.

The basic concept is, the CPU’s power is measured by how many instructions it can carry out per time unit. The more instructions it can execute by, let’s say, 1 second, the more powerful it is. Related to this, although potentially deceiving, is the CPU’s clock speed rate. The what? the CPU’s clock speed rate. Simply put, it is the number of cycles per second (measured in Hertz, abbreviated Hz) in which the CPU operates. The more cycles per second, the less time an individual instruction should take to execute.

So, the next time you see anywhere, whether in a computer ad or in your screen when looking at your computer specifications, “CPU @ 2.4 GHz”, you will know they are talking about the CPU clock speed rate (2.4 GigaHertz, 1 giga = 1,000,000,000, so 2,400,000,000 cycles per second).

There you have it. The CPU.

Computer Basics – What’s Inside a Computer? Motherboard

This is the first in a series of articles about the parts inside a computer. And what better part to start with than the motherboard, also called main board or system board (logic board for Apple computers). In the context of computers, if you ever see the term mobo being used, that is what is referring to (motherboard).

So what is a motherboard anyways? If you’ve ever seen the inside of many electronic devices, computers included, you’ve probably seen a thin plastic-looking green (although it can also be blue and red) board with copper color lines running through it. That is a printed circuit board. Thanks to our friend Eisler, it has been used in radios, TVs, etc., since the 1950’s. In computers, a motherboard is the main printed circuit board, to which normally all the other components inside a computer are attached, one way or another, thus populating it. All the other components that will be covered in future articles on this series are parts attached to it.

So what does it do? It provides electric connectivity to the various other parts of a computer. Think of it as a city, with streets that take you from one destination to another (or watch the movie Tron and you will see a perfect animated illustration for it). Obviously it also provides other components mechanical support (holds all other parts together).

That’s pretty much it. Perhaps the most basic and fundamental part inside a computer, the motherboard.

The Newest Facebook Malware Threat

A new computer worm, Koobface.GQ has been detected as trying to spread through Facebook. What is a worm? it’s a type of malicious software that propagates by self-replication. In this case, the Koobface.GQ’s main aim is to spread itself via the social network Facebook and affect as many computers as possible. It displays a message on screen requiring users to enter some characters in order to avoid a computer restart. Only computers with Windows XP/2003 and earlier operating systems are potentially affected.

It publishes a link to a video in the affected user’s Facebook main site, which will be shared to all their contacts. If the link is followed, a website similar to YouTube’s (actually YuoTube) is displayed. If run, it will display a message asking for some characters to be entered in a field, to prevent the computer from shutting down within 3 minutes. After the 3 minutes have gone by, the computer will not be restarted, but if the characters are not typed, the message will not disappear and the computer will be blocked until users enter the characters.

What to do? make sure you have a good and up-to-date (important) virus scanner, and perform a full scan. If you need help with this or any other malware threat, feel free to contact me.

And make sure you keep good web surfing and emailing habits at all times.

But in any case, if infected, don’t neglect it. If you do, you might be opening a can of… well, them.

VoIP Communication

First of all, what the blazes is VOIP? other than a funny sounding word, it’s an acronym that stands for Voice Over Internet Protocol, an alternate method of voice communication similar in function to traditional phones, but instead of using normal telephone lines, uses an internet connection to allow for audio communications.

There are several levels of operation with this type of audio communication. In the first and most basic one, you have two computers, both with a high speed internet connection, and a program that handles the communication between them. Skype is one of the main and most known programs to do that. Others exist as well such as ooVoo, and it’s even embedded in some IM (Instant Messaging) programs. One additional advantage of these programs, even at this level is that they also allow for videoconferencing, so you can have audio and video, and in some cases, even multiple videoconferencing with several people at the same time. This of course requires a higher speed connection than what it requires to just make plain audio calls.

The next level is where you are able to  actually also call a normal landline or cell phone from your computer. For a small fee, Skype allows you to do that. You cannot however receive phone calls on your computer, you can only make outgoing calls. This setup is good when you have a phone that you use to receive phone calls and you want to keep it free for incoming calls.

The last level is where you can also make outgoing calls from your computer, or sometimes just through a device hooked to your internet connection. Vonage is an example of a VOIP service that doesn’t depend on a computer to operate, just needs the small device and a phone. Others, like MagicJack, require a phone connected to your computer. If you use Skype at this level, you can use your computer without any other devices (if your computer has a microphone) or simply by plugging a headset to your computer.

Cost is a factor when deciding which of these to choose. As far as I know, MagicJack offers the best bang for the buck.  $39.95 plus shipping and handling includes the phone to connect to your computer and one year of free local and long distance calling to the United States, Canada, Puerto Rico and the US Virgin Islands. You can purchase an additional year of service for $19.95. While Skype might offer a similar cost plan, their “unlimited” calling is not really unlimited and there is a ceiling as to how many phone calls you can make in a day.

This emerging method of telecommunication is here to stay and will only get bigger. More and more people are considering as an alternative to traditional phone services and migrating to it.

Protecting Your Data

Who are you willing to allow access to your password protected email address/online bank account/computer log-in, etc?

Recently I got an email from a contact of mine, telling me a story about how she had to go to another country to visit an ill cousin and now needs to help pay for some medical bills but don’t have enough money on her and can she borrow some from me?

It looked suspicious so I contacted the person and asked her if she had sent that email. Turns out of course she didn’t. So it came down to a hacked password in her email account. It was not possible to recover that email address as the hacker had changed the password, and reset the secret question and answer to be able to reset the password!

If you run into such situation where your email address has been hacked, here’s what I suggest you do, in this sequence:

1. First of all, if you have used the hacked password for anything else (which many people do), change those immediately, following the guidelines for powerful password creation below.

2. Try to change the password in your hacked email. Depending on the provider, there is usually a link for “forgotten password” in the login page. Use it and follow the instructions.

3. If you can’t change the password because the hacker already changed the secret question or alternate email address, see if  there is a validation page alternative like Hotmail has here.

4. Send an email to all your contacts letting them know about the hacking, so they are alert to any spoof emails coming from that address. If you were not able to recover your hacked email address account, send the email from a different one.

When you create a password, follow these guidelines:

a) DON’T use your name, date of birth, social security number, zip code, area code, or any combination of those in it.

b) DON’T use a word that can be found in a dictionary

c) DO use a combination of uppercase AND lowercase characters

d) DO include at least one number in it

e) DO include at least one special character in it (!@#$%^&*)

The reason for the above is there are programs that will automatically try to guess a password using a dictionary and other data that can easily be found in your computer. This is what is known as a “brute force attack“. Such an attack can be very effective, IF you violate the above guidelines.

Finally, it is recommended that you DO change your passwords periodically. I know people who literally have had the same password for everything for over a decade!

The above simple guidelines should keep your password-protected accounts/data much more secure. Don’t underestimate the power of a good password.