Friday, July 14, 2006

Computer Security Primer 101

Practical and invaluable steps to secure your computer today.

1. Change your Windows settings so that you can see the true file extensions. For example, on Windows machines, open Windows Explorer. Under the View menu, select Options. Select "Display the Full MS-DOS path in the title bar." You can also get to this by clicking on My Computer, then View, then Options, then the View tab.
Never click on a file that ends in .exe or .pif or .vbs as these are files that launch programs. Even MS Word .doc files can be programmed to harm your computer, so while you do not need to be paranoid, you do need to be vigilant. Never open a file attachments from people you don't know, or where the email somehow seems strange. Your intuition is probably correct.
2. Create a phony contact record within your email address book. If a worm virus gets onto your computer, it typically heads straight for your email address book. It then replicates itself and sends itself to everyone in your address book, thus sending infected emails to all your friends and associates. Use that fact to alert yourself when/if a virus slips past your anti-virus precautions!
First, open your address book and click on "new contact." In the window where you would enter a FIRST name, type in: 000_ (three zeroes followed by an underscore, which is located next to your zero key). In the box where it prompts you to enter the new email address, type: If your program tells you this is not a valid address just say 'yes' to add it, or click OK.
Here's what you've done and why it works: the "name" 000_ will be placed at the top of your address book as entry #1. This will be where the worm will start in an effort to send itself to all your friends. But when it tries to send itself to 000_ it will be undeliverable because of the phony email address you entered. If the first attempt fails (which it will because of the phony address), the worm goes no further and your friends will not be infected.
Here's the second great advantage of this method: if an email cannot be delivered, you will be notified of this, because you will receive a MAILER DAEMON in your Inbox. So, if you ever get an email telling you that an email addressed to could not be delivered, you know right away that a worm has infected your system. You can then take steps to get rid of it!
3. Choose an Internet Service Provider (ISP) that offers virus filtering on all email. This means that your ISP should be able to catch and delete messages that have viruses or worms attached to them. Most ISPs will then send notice to you that the email did not get through because of the attachment. For a list of ISPs who provide specialized add-ons such as anti-spam and anti-virus filtering services, go to
4. Educate other people within your company and/or household how to scan for viruses on the computer. Teach children how to spot suspicious email attachments.
5. Get in the real habit of backing up data. If you have had virus infections in the past, chances are that your backup disks are also infected and need to be scanned for viruses. Better be safe than sorry!
6. Pay attention to your computer. If it starts to act strangely, or does not function in the normal manner, there is a good chance that your computer has become infected with a virus. STOP your work, and investigate it before it gets any worse. Run your virus scan. If you can't find the virus and know you have recent virus dat files ... contact your computer repair/maintenance company to see if they can help you.
7. STOP FORWARDING 'WARNING' EMAILS! There are billions of emails floating around in cyberspace warning of gloom, doom and falling skies. They usually tell the recipient to forward the email to everyone you know. The vast majority of these email alerts are a hoax.
Here is why these are often just as harmful as a virus:
A. After reading a so-called warning email, the recipient may delete legitimate files from their computer. These could be files that actually secure the computer.
B. Repeated, false alarms desensitize the public to the problem of viruses. Cry wolf too many times, and when the real thing comes along, no one knows until the wolf is onto dessert.
C. False alarms cause an overflow of traffic to websites like Microsoft, Symantec, and McAfee. You can check out the legitimacy of a virus by going to and looking up the suspected virus. It will say HOAX if it is not real. This is a great resource for virus information.
8. If you are using Windows XP. Always make sure to have the latest version of the operating system. Even years after it has been released, software testers, engineers and hackers continue to find security flaws within the XP operating system. Microsoft has set up a program in which it will release fixes, or patches, to XP. You can set your computer to either look for updates automatically (highly recommended) or you can check for updates manually. To verify and/or change your settings, look for 'Windows Updates' from your Start button.

ADD TO:, Digg, Technorati, Blinklist, Furl, Newsvine,
Posted by Lone Bird Studio Ltd. @ 11:03 AM

Thursday, July 13, 2006

Spyware 101

Spyware is any software placed on a computer without the user’s knowledge or permission for the purpose of employing the user’s Internet connection to collect information. Most of it is downloaded unwittingly with”free” ad supported software programs. Some of the most notorious are Gator’s eWallet, Netsonic, and GoZilla.
The primary purpose of most of these programs is to send information back to the “mothership” that sent them out to track surfing habits of a user. This information may be sold to commercial interests or it is used to prove to advertisers that their ads are being viewed and that they should pay for the “views” recorded. In short, most of it is benign, except that it is using your bandwidth to transmit information while you are trying to use your connection, too. An effect is slowing your computing and connection.
Some spyware is more malignant. It may cause you to receive targeted ads or pop up ads. It may be used for identity theft in the worst cases. Occasionally, it is the source of computer crashes, because it conflicts with normal programs.
There are software programs designed to detect and remove spyware. For there effective use they have to be used routinely and frequently. They have to be kept up to date so that they can recognize new spyware that is introduced almost daily. No single anti-Spyware program detects and removes all known Spyware, so it is appropriate to use more than one.
One of the best is Ad Aware 7.0. It is available as a free download and can be found easily using Google. Running this once or twice a week will find the malware deposited on your hard drive and remove it more effectively than you can by using Control Panel’s Add/Remove Programs or by trying to track it down manually in the Registry.
Some removers can also eliminate key loggers, some Trojan horse viruses, and browser hijackers. SpywareBlaster is a special program that filters out Spyware before it ever gets onto your hard drive. All of the others are used to root out malware that has already been placed onto your PC. To be effect, its list of current Spyware has to be updated at least weekly.
Computer Guys Live is currently offering a special online spyware scan and removal. If security is important to you, we also recommend downloading and installing Trend Micro's spyware remover. Just visit us at for complete spyware removal and protection.

ADD TO:, Digg, Technorati, Blinklist, Furl, Newsvine,
Posted by Lone Bird Studio Ltd. @ 4:53 AM

Important Links

Wireless Troubleshooting

We have taken the questions out of your wireless configuration. Our step-by-step guide to wireless troubleshooting is invaluable if you are having wireless connection problems.

Many More Tech Tips

Read Head Tech Chris Kaminski's Tech Tips for the computer user! This valuable info is provided as a free service from us to you.

Immediate Computer Help

We are here to help!Contact Us online at Or Call our toll free number 1-866-300-8181.