<$BlogRSDUrl$>

Friday, October 29, 2004

Them Fight'en Word, Friend 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.





MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Don't want to have to tell the NY Times everything about you just to read a news item someone email ya, well 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.



Go to http://bugmenot.com and they'll gave you what you need to get your new and not have to tell any website all about yourself. And go to their sister site, http://www.nearlyfreespeech.net/

MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Monday, October 25, 2004

Anti-spyware programs can prevent stolen keystrokes 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.

By J.D. Biersdorfer, New York Times

Advertisement

Q:I make banking transactions online and would like to know if spyware capable of transmitting keystrokes can obtain my password, giving others access to my account. A. Spyware, sneaky programs that can invade your computer with or without your direct knowledge, includes a category of programs called keystroke loggers that can record each character you type and transmit that information to someone else on the Internet. This makes it possible for someone to learn passwords and other information. Key-logging programs are often sold as surveillance tools for parents and corporations, to keep track of what goes on at a computer. But the programs -- which can also invade your system as part of a mass e-mail infection -- are also being used to invade privacy and steal personal data. If you regularly do business over the Internet, you may want to consider installing security software and keeping your operating system up to date. One of the biggest dangers of the Internet these days is known as the blended threat, in which two annoyances are bundled as one. An example is junk e-mail with a virus or worm attachment that contains a keystroke-logging program. To combat blended threats, you often need a blended defense. Antivirus programs are not typically designed to stop spyware from installing itself, but they can often detect malicious attachments. Many Internet security suites, like those maintained by Symantec, McAfee and Trend Micro, sell antivirus software alongside firewall and privacy control programs. Some suites, like McAfee Internet Security Suite 2005 and Trend Micro PC-cillin Internet Security 2005, include spyware detection and removal tools. Links to some of the better-known, well-reviewed programs available for removing keystroke loggers, including SpyCop and Webroot Spy-Sweeper, are at www.spywareinfo.com/downloads.php Firewall and privacy protection programs are available for Macintosh computers, which are generally less vulnerable to the perils of the Internet than Windows machines. Two options are Symantec's Norton Internet Security for Macintosh and Intego's Internet Security Barrier.

Q. Is there a backup program included with Windows XP Home Edition?

A. Microsoft includes a program with Windows XP Home Edition called Backup, but it is not part of the default installation of the operating system. You can usually install it from the Windows XP system CD that came with your computer or that you used to upgrade your PC to Windows XP from an older version of Windows.

To find and install the Backup program, insert your Windows XP CD-ROM into the computer. Go to My Computer and double-click on the icon for the CD. Open a folder on the disc named VALUEADD. Then go to MSFT to NTBACKUP. Double-click on the Ntbackup.msi file in that folder to start the wizard that installs the Backup program on your computer.

The system recovery discs provided by some manufacturers may not include the VALUEADD folder and other files found on Windows XP system discs from Microsoft. If you do not have this folder on the discs that came with your computer, contact its manufacturer to see if the software is available.

Q. What is an SSH connection?

A. SSH stands for Secure Shell. It is a way to log on to another computer remotely. University computer networks, text-based bulletin board systems and electronic card catalogs at some libraries are a few of the places where this type of remote access is still available.

Secure Shell is often used now to make connections of the older Telnet programs. SSH is considered much more secure than Telnet because it encrypts passwords and data being sent across the Internet. There are SSH programs available for most computer systems, including Windows, Macintosh, Unix and OS/2.

Secure Shell was originally developed by SSH Communications Security ( www.ssh.com There is a Frequently Asked Questions site for Secure Shell at www.employees.org/TILDEsatch/ssh/faq



MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Sunday, October 24, 2004

OK, so you downloaded firefox but you miss you Yahoo companion, well I got good news 


"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.



http://www.firefoxtoolbar.com/yahoo A Yahoo toolbar for ya in firefox. Happier now?


MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Knowage is Power; learn about Earhquakes, Volcanos & big winds 



"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.


Know about Earthquakes, Hurricanes, Tornados, and Volcanos;

http://www.nationalgeographic.com/forcesofnature/


MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Google Phishing Holes Found. Google a dangers place for users. 



"Facts do not cease to exist because they are ignored."-- Aldous Huxley

As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.


Two Google site vulnerabilities that could be used to mount phishing attacks have been reported, says the Internet search giant. It already has fixed one, and expects to patch the second shortly.


One flaw would allow hackers using JavaScript to change Google site content. This would give potential attackers the power to alter the look of the Google search results page or manipulate search data.


A second, similar, vulnerability was reported by UK security firm Netcraft, based on the work of a British computer scientist, Jim Ley.


Building a Spoof


Ley demonstrated on his personal site how the JavaScript vulnerability could be manipulated by constructing a believable credit-card submission form.


The fake form, which uses the Google logo and fonts, claims that Google soon will become a subscription-only service, but that users can take advantage of a special deal to obtain searches for a reduced rate.


The introduction of the Google Desktop deepens the threat posed by the vulnerability, since it could allow an attacker to search a user's computer for passwords or fool a user by including the content of local files.


Safe and Secure


Despite the potential danger that these Google holes present, Ley told NewsFactor that the company's site is not unusual in having security issues.


"Every online site has security problems; it's unrealistic to assume there's none," Ley said. "I don't think Google is particularly worse than others in this."


Google's flaw is similar to phishing holes reported by other sites, which could be exploited in much the same manner. Such reports are becoming familiar fixtures on security sites like Symantec (Nasdaq: SYMC - news), Secunia and F-Secure.


Response Time


One of the differences with Google's situation, according to Ley, was the company's sluggishness in first responding to his findings.


He originally discovered the scripting vulnerability more than two years ago, but only got automated responses to his e-mails about the flaw, Ley said.


Because of this, and subsequent correspondence from Google, Ley is not convinced that the company has an effective security response system in place.


"They showed little real concern about the flaw," he said. "They were more concerned with it being discussed in public."
END

There is no free lunch, they gave you services, you let them take information on you and whoever you interact with


MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

This page is powered by Blogger. Isn't yours?