Saturday, April 02, 2005
Enjoy some tech stuff
"Facts do not cease to exist because they are ignored."-- Aldous Huxley
As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.
This is one fun site if you just took a trip by plane
http://www4.passur.com/lax.html
OK, I gotta tell ya, it's going to work better the faster you chip speed is and the greater your ram. It's wasn't that great for me with my 750 chip and 512 of ram laptop.
P.S. If you change the date BACK one day you'll see all the info on the plane you check on. Ya really only have to go back 3 hrs. to see it all. ENJOY!
MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".
Friday, April 01, 2005
Hacker attacks exploit browsers, Web apps
"Facts do not cease to exist because they are ignored."-- Aldous Huxley
As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.
By: Chad Redfern
According to the latest report from security software company Symantec (www.symantec.com), every computer user needs to make a conscious effort to keep his computer safe and secure. The biannual report provides analysis of trends in Internet attacks, malicious activity and security risks. Symantec has warned that vulnerabilities in web applications and browsers are continuing to pose serious threats, allowing hackers to access confidential information. Hackers are increasingly using attacks that exploit browsers rather than trying to batter through firewalls and other network protection devices, according to Symantec.
The biannual report showed that there was a great increase in the number of strategic and coordinated attacks on application and browsers. Last year such threats accounted for barely a third of all reported vulnerabilities. Symantec warned that web applications are popular targets because they are widely deployed and can allow attackers to circumvent traditional security measures such as firewalls. Web application vulnerabilities made up 48 percent of all vulnerabilities disclosed, up from 39 percent in the first half of 2004, according to the results from Symantec.
Symantec found that on average organizations received 13.6 attacks per day, up from 10.6. Significantly, for the third straight reporting period, the Microsoft SQL Server Resolution Service Stack Overflow Attack (formerly referred to as the Slammer Attack) was the most targeted vulnerability, used by 22 percent of all attackers. Symantec reported 1,403 new vulnerabilities, a 13 percent increase over the previous six-month period.
Windows and Microsoft users, you’re not alone. The Symantec report also predicts that hackers are becoming more interested in Macs during 2005, specifically mentioning sales of low-priced mini Macs. As more casual, less tech-savvy users adopt Macs, expect to hear more about vulnerabilities exposed within the Mac OS, which is based on the Unix operating system. Other security companies confirm Symantec’s finding and are seeing an uptick in Mac OS flaws and vulnerabilities.
It is important to remember that information is the key target for hackers. Over half of the attacks, viruses and trojans reported last year were designed to capture personal data. Also, this year we should expect to see an increase use of embedded content in audio and video images to launch hidden attacks. Symantec expects security risks associated with adware and spyware will likely increase. Impending legislation to curb these risks is not expected to be an effective or sufficient deterrent on its own.
The Symantec report pointed out that many other personal electronic devices are under attack.
“As more people leave their desktops and start accessing the Internet via mobile devices, so too do the crackers, these attacks will continue to grow as Bluetooth and adoption sets in,” Symantec officials said.
The bottom-line is that it is critical to make sure your operating systems, firewalls, browsers, applications and virus protection are up-to date.
MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".
Thursday, March 31, 2005
Microsoft Sues Alleged Identity Thieves
"Facts do not cease to exist because they are ignored."-- Aldous Huxley
As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.
Associated Press: Technology
REDMOND, Wash. - Microsoft Corp. on Thursday filed 117 federal lawsuits against unnamed defendants, accusing them of a high-tech form of identity theft known as "phishing."
The lawsuits, filed in U.S. District Court for the Western District of Washington, accuses the "John Doe" defendants of using mass e-mail or pop-up ads to coerce consumers into revealing personal information such as bank account information, passwords or social security numbers.
The Redmond-based software company said it filed the lawsuits in hopes of uncovering some of the largest operators.
In phishing scams, the Internet-based communications often purport to be from legitimate organizations, such as banks, and use that perception of a trusted relationship to get people to reveal personal information.
To avoid such identity theft, experts warn that users should be wary of giving out any personal information via e-mail or pop-up ads, especially if someone contacts them unexpectedly. Users also should be wary of clicking on e-mail links, which could divert a user to a malicious site that will then steal personal information.
MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".
Wednesday, March 30, 2005
Trend Micro Partners With SINA For Security Services
"Facts do not cease to exist because they are ignored."-- Aldous Huxley
As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.
Trend Micro announced this week an agreement with SINA, China's top Internet portal and most frequently visited Web site, to provide advanced security protection for more than 100 million email users in China and the global Chinese community.
MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".
Pharming (farming) Attacks Outwit Even Savvy Surfers
"Facts do not cease to exist because they are ignored."-- Aldous Huxley
As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.
Pharming Attacks Outwit Even Savvy Surfers
The reason pharming can be lucrative is because it can
fool even fairly savvy computer users. This attack starts
when hackers take advantage of the ever-growing number of
peer-to-peer applications to help spyware, a Trojan horse,
or a virus slip past a computer's defenses and lodge
itself in the background of a user's PC.
Hackers possess two admirable traits: persistence and
ingenuity. These attributes have unfortunately lead to a
phenomenon known as "pharming," the latest in a
never-ending series of insidious attacks.
This new threat packages a number of established attack
methods, such as phishing, viruses, spyware, and Domain
Name Service (DNS) redirection, in a new manner with the
goal of perpetrating identity theft.
"Since pharming can be lucrative, a number of criminals
are quite interested in it," said Shawn Eldridge, chairman
of the Trusted Electronic Communications Forum (TECF), a
vendor consortium examining ways for companies to protect
consumers from various online scams.
The reason pharming can be lucrative is because it can
fool even fairly savvy computer users. This attack starts
when hackers take advantage of the ever-growing number of
peer-to-peer applications to help spyware, a Trojan horse,
or a virus slip past a computer's defenses and lodge
itself in the background of a user's PC.
Bogus Destinations
The malicious code locates the host files in the
computer's operating system and creates an IP address for
a criminal's Web site that is designed to look like a
legitimate site from a bank or credit card company. When
the user types the bank's or credit card company's URL
into his or her Web browser, the spyware bypasses the
typical search of the DNS (basically the Internet's white
pages) and inserts the bogus destination.
Unless he or she is paying close attention, the user does
not notice the change, arrives at the fraudulent Web site,
and enters personal data , like credit card numbers, bank
account information, or social security identifications.
Most people feel comfortable entering such personal
information , because they have gone to these Web sites in
the past without any problem.
As far as they can tell, nothing out of the ordinary has
occurred, but they have given personal information to
criminals who are now in a position to steal their
identity. Unfortunately as they have honed their craft,
pharmers have improved their lure.
"The first pharming sites were relatively easy to spot:
they were filled with typos, grammatical errors and skewed
URLs," noted Richi Jennings, leader of the anti-spam
practice at Ferris Research Inc., an e-mail market
research firm. "Recently, the attacks have become more
difficult to discern because the fraudulent sites more
closely resemble legitimate Web sites."
Successful Hacks
Successful pharming attacks have taken place. The Troj
Banker A/j worm, seen near the end of 2004, watched for
users visiting banking sites and redirected to bogus
locations run by pharmers. Other attacks were less
threatening. In November 2004, Google Inc. (Nasdaq: GOOG)
and Amazon.com Inc. (Nasdaq: AMZN) users were sent to Med
Network Inc., an online pharmacy. In March 2003, a group
dubbed the "Freedom Cyber Force Militia" hijacked visitors
to the Al-Jazeera Web site and presented them with the
message "God Bless Our Troops."
"There have been a few instances where hackers have taken
over search engines and redirected unsuspecting users to
fraudulent Web sites," said Paul Luehr, vice president and
deputy general counsel at Stroz Friedberg, LLC, a
consulting firm specializing in computer security.
Pharming has been viewed as the natural follow-on to
phishing, an approach where hackers send users e-mail
messages, such as "You need to update your account," and
then whisk them away to bogus sites where the users
inadvertently hand over personal data. As users become
more aware of phishing and vendors enhance their defense
mechanisms against it, hackers look for another attack
mechanism and pharming seems like a viable option.
Multiple Parties
But there are a few differences in the two approaches.
"Pharming seems to be a more methodical attack than
phishing," TECF's Eldridge told TechNewsWorld. "With
pharming, a hacker sends out his work and then waits for
the user to enter the link and end up in the wrong site.
With phishing, the results tend to be seen fairly
quickly."
As a result, he thinks that two different groups of
individuals are conducting the two attacks.
Regardless of who is launching the attacks, companies and
end users want to take steps to limit their exposure to
them, so vendors have been developing products
specifically for it. Anonymizer Inc. developed software
that creates an encrypted path between a computer and a
Web site to shield users from spyware. The product
protects users against host file pharming attacks by
intercepting all browser requests and returning the page
information to the end user before the connection is made.
Enhancing a user's browser could also help to thwart
attackers. Netcraft Inc. offers a browser plug-in that
displays geographic information about the site being
visited. If a user notices that a mortgage company's site
is being supported by a server somewhere in Eastern
Europe, he or she can assume the site is illegitimate.
Another approach is enhancing browsers so they
authenticate the identity of a particular Web site via the
public DNS system, an approach that is gaining traction as
users try to verify email transactions.
Preventative Measures
In addition to technical advances, companies are adding a
few more steps to their authentication processes.
Financial institutions have been experimenting with
multi-factor authentication where a transaction is not
completed until a user calls back and confirms that he or
she did in fact move from an account. In some cases, banks
rely on Simple Message Services and wireless handsets to
notify users that money has been transferred from their
bank accounts or items added to their credit cards.
As the new defense mechanisms take hold, hackers work on
new attack schemes. "Unfortunately, cybercrime presents an
ongoing arms race: as soon as defenses arrive to stop
attacks, criminals attempt to perfect new attack
mechanisms," Stroz Friedberg's Luehr told TechNewsWorld.
MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".
Tuesday, March 29, 2005
Creating Multiple Shortcuts
"Facts do not cease to exist because they are ignored."-- Aldous Huxley
As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.
Open explorer (left click on the your Geen start botton) and go to a file folder from which you need to make multiple shortcuts to your desktop. Select all of the files you need by holding down the Ctrl button and left-clicking each file. When you are done selecting, right-click one of the selected files and drag to your desktop. Release the button and select "Create Shortcut" on the menu that appears and multiple shortcuts will appear on your desktop. Be careful to use the right mouse button when dragging, not the left. Otherwise you will actually move the files, and not just create shortcuts.
MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".
Monday, March 28, 2005
Stroke symptons, just an FYI
"Facts do not cease to exist because they are ignored."-- Aldous Huxley
As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.
This is not my story. Good info to have tucked in the back of our minds.
A true story - Susie is recuperating at an incredible pace for someone who had a massive stroke - all because Sherry saw Susie stumble - -(that is the key that isn't mentioned below) - and she then asked Susie the 3 questions. So simple - - this literally saved Susie's life - - I had received this informative e-mail the week Susie had her stroke.
Susie failed all three questions, and I called 911. Even though Susie had normal blood pressure readings and it did not appear to be a stroke, as she could converse to some extent with the Paramedics they took her to the hospital right away. I thank God for the sense to remember the 3 steps!
Read the following and Learn how to help recognize a possible stroke victim!
SOMETHING WE ALL NEED TO KNOW. IS IT A STROKE?
Sometimes symptoms of a stroke are difficult to identify. Unfortunately, the lack of awareness spells disaster. The stroke victim may suffer brain damage when people nearby fail to recognize the symptoms of a stroke. Now doctors say a bystander can recognize a stroke by asking three simple questions:
1. Ask the individual to SMILE.
2. Ask him / her to RAISE BOTH ARMS.
3. Ask the person to SPEAK A SIMPLE SENTENCE.
If he or she has trouble with any of these tasks, call 9-1-1 immediately and describe the symptoms to the dispatcher.
After discovering that a group of non-medical volunteers could identify facial weakness, arm weakness and speech problems, researchers urged the general public to learn the three questions. They presented their conclusions at the American Stroke Association's annual meeting last February. Widespread use of this test could result in prompt diagnosis and treatment of the stroke and prevent brain damage. The quicker you act, the less damage to the patient's body.
A cardiologist says if everyone who gets this posting sends it to 10 people, you can bet that at least one life will be saved.
MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".
Beginner Tip: Search Option
"Facts do not cease to exist because they are ignored."-- Aldous Huxley
As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.
Beginner Tip: Search Option
When you are searching for a file using "Find" or "Search" within the Start menu, you can use the ? as a single wild-card character in the name of the file for which you are looking.
For example: *.EXE will find all files with the EXE extension. ??LY.EXE will find all files with L and Y as the third and fourth letters of a four-character name and an EXE extension.
MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".
Sunday, March 27, 2005
Alternatives to Outlook, you know the PIM from Microsoft
"Facts do not cease to exist because they are ignored."-- Aldous Huxley
As the prostitute said, "It's not the work, it's the stairs." As told to me by Elaine Stritch, star of stage, screen, & TV, right after she won her 1st Emmy. Ago 79.
Joel Durham Jr. - ExtremeTech
Don't care for Microsoft Office products? Or do you just not feel the need to pay the market price for a PIM, many of whose features you might not need? There are plenty of alternatives to Outlook that offer varying levels of functionality and compatibility. Here's a rundown of some of what's out there.
Outlook Express
Outlook Express is a no-frills e-mail client that's nice if you don't care about the calendar and robust contact management of Outlook. It doesn't include its own spam filtering, so you'll need a third-party spam-management tool.
Free with Windows, Outlook Express lets you do e-mail and not much more. It includes simple message rules and a folder system. Its address book keeps a minimal amount of information handy, and features such as shared contact lists aren't available. Outlook Express is potentially adequate for those who fear complicated feature lists, but power users will feel limited by its lack of robustness.
Eudora
As a non-Microsoft alternative to Outlook, Eudora might be the ideal email client for you. It includes a powerful email function and a nice address book, plus a million ways to use them, but lacks the calendar that Outlook offers.
Eudora's strength lies in its interface. This program offers a ridiculous number of ways to customize how it looks and behaves, and if you wander around an office that uses Eudora as its primary email client you'll probably see a different configuration on each monitor. Furthermore, it lets you sort through its address book in any number of ways, allowing you to pinpoint recipients in seconds.
Features like MoodWatch (which flags possibly offensive strings in outgoing email to keep you from alienating someone) and ScamWatch (which helps you avoid succumbing to "phishing" scams) round out an already robust package. A powerful anti-spam feature filters out junk mail according to your preferences.
Three levels of Eudora are available: the full-featured paid version for around $50, the ad-sponsored version with fewer features and a banner ad to distract you, and the Lite version which is comparable to Outlook Express.
Mozilla Thunderbird (My choose)
From the makers of the popular Firefox browser (you know the one, the browser that's actually making a dent in Internet Explorer's market share[and don't forget Opera.com this one handles cookies better than the other two and it holds you web pages till us use it again]) comes an email client that's not only free, but vastly powerful.
Thunderbird does an amazing job with its intelligent filtering of junk email. Beyond that, it includes such things as an RSS reader, message grouping, a wildly customizable view and a groovy feature called Saved Search Folders: these powerful folders look like other email folders, except they execute a search function according to your criteria and they display messages with that criteria.
Like Firefox, Thunderbird is an open source project. You can grab user created themes to change its look and user created extensions to add functionality. In fact, one extension you can download is a calendar function, which the base program lacks.
source: http://tinyurl.com/4e9uu Want to know more about that URL and how I did that, call me.
MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".