Thursday, December 10, 2009
Watch out Microsoft....Apple. (maybe)
Personally, I don't believe that we will be going away from windowed desktops anytime soon. I also feel like the continuum desktop is a bit clumsy, but I'd definitely love to see more or even try it out. Hopefully they release somewhere and I can try a demo! In the end, Microsoft will end up buying them out and incorporating the technology into it's collective...
Monday, November 23, 2009
Creepy, yet interesting
Here is an excerpt (a particularly disturbing one) from Bill Joy's, "Why the future doesn't need us." article written for WIRED in 2000. Enjoy!!
http://www.wired.com/wired/archive/8.04/joy.html
Why the future doesn't need us.
Our most powerful 21st-century technologies - robotics, genetic engineering, and nanotech - are threatening to make humans an endangered species.
By Bill Joy
THE NEW LUDDITE CHALLENGE
First let us postulate that the computer scientists succeed in developing intelligent machines that can do all things better than human beings can do them. In that case presumably all work will be done by vast, highly organized systems of machines and no human effort will be necessary. Either of two cases might occur. The machines might be permitted to make all of their own decisions without human oversight, or else human control over the machines might be retained.
If the machines are permitted to make all their own decisions, we can't make any conjectures as to the results, because it is impossible to guess how such machines might behave. We only point out that the fate of the human race would be at the mercy of the machines. It might be argued that the human race would never be foolish enough to hand over all the power to the machines. But we are suggesting neither that the human race would voluntarily turn power over to the machines nor that the machines would willfully seize power. What we do suggest is that the human race might easily permit itself to drift into a position of such dependence on the machines that it would have no practical choice but to accept all of the machines' decisions. As society and the problems that face it become more and more complex and machines become more and more intelligent, people will let machines make more of their decisions for them, simply because machine-made decisions will bring better results than man-made ones. Eventually a stage may be reached at which the decisions necessary to keep the system running will be so complex that human beings will be incapable of making them intelligently. At that stage the machines will be in effective control. People won't be able to just turn the machines off, because they will be so dependent on them that turning them off would amount to suicide.
On the other hand it is possible that human control over the machines may be retained. In that case the average man may have control over certain private machines of his own, such as his car or his personal computer, but control over large systems of machines will be in the hands of a tiny elite - just as it is today, but with two differences. Due to improved techniques the elite will have greater control over the masses; and because human work will no longer be necessary the masses will be superfluous, a useless burden on the system. If the elite is ruthless they may simply decide to exterminate the mass of humanity. If they are humane they may use propaganda or other psychological or biological techniques to reduce the birth rate until the mass of humanity becomes extinct, leaving the world to the elite. Or, if the elite consists of soft-hearted liberals, they may decide to play the role of good shepherds to the rest of the human race. They will see to it that everyone's physical needs are satisfied, that all children are raised under psychologically hygienic conditions, that everyone has a wholesome hobby to keep him busy, and that anyone who may become dissatisfied undergoes "treatment" to cure his "problem." Of course, life will be so purposeless that people will have to be biologically or psychologically engineered either to remove their need for the power process or make them "sublimate" their drive for power into some harmless hobby. These engineered human beings may be happy in such a society, but they will most certainly not be free. They will have been reduced to the status of domestic animals.
In the book, you don't discover until you turn the page that the author of this passage is Theodore Kaczynski - the Unabomber. I am no apologist for Kaczynski. His bombs killed three people during a 17-year terror campaign and wounded many others. One of his bombs gravely injured my friend David Gelernter, one of the most brilliant and visionary computer scientists of our time. Like many of my colleagues, I felt that I could easily have been the Unabomber's next target.Kaczynski's dystopian vision describes unintended consequences, a well-known problem with the design and use of technology, and one that is clearly related to Murphy's law - "Anything that can go wrong, will." (Actually, this is Finagle's law, which in itself shows that Finagle was right.) Our overuse of antibiotics has led to what may be the biggest such problem so far: the emergence of antibiotic-resistant and much more dangerous bacteria. Similar things happened when attempts to eliminate malarial mosquitoes using DDT caused them to acquire DDT resistance; malarial parasites likewise acquired multi-drug-resistant genes.Check out the rest of the Article. It's very interesting.
Wednesday, November 18, 2009
Et tu, Mario? (Then fall ...Luigi?)
Here is an excerpt from an article I read on slate.com today. Check out the full article here!
"Multiplayer video games operate along two dimensions. There are fighting games like the Tekken and Street Fighter franchises that give players a single option: defeat each other in glorious battle or turn off the console and bake cookies together. On the other end are games like the popular Facebook application FarmVille in which players must help each other by fertilizing one another's crops and exchanging gifts... Most cooperative games lie in a vast middle ground, however, a no man's land between altruism and gaming Darwinism that offers up a host of ways to misbehave."
It's a fairly funny article and it also brings back some great memories of growing up. My first system was an Atari 2600 that I purchased at a church garage sale...Without my parents knowledge... My mother wanted to throw it in the trash, but my father, a kid at heart, was as excited, if not more, than I was. We hooked it up to our glorious, 14ish", wood-paperedTV, and started out playing Moonraker. Other games we had were Pitfall, Joust, some space game and a myriad of others. So, the reason this brings back memories?? I can't exactly put a finger on which one, but ONE of my sisters absolutely loved playing Joust with me and spending all of her time finding some way to get me killed.
After moving away from Colorado and settling in Jacksonville, FL, my dad purchased us a Playstation...the original fat greyish box. One of my favorite games was Tekken 2. Anna, Jo, and I played it all the time. Jo had a favorite cheap move with Heihachi Mishima that we dubbed the 'Noogie' and Anna had her favorite character 'Nina' with which I'm sure she had some cheap move as well. I admit, I had a favorite character too, and after memorizing all of his moves, I found the cheapest and most affective. Marshall Law, I assume who's based loosely on Bruce Lee, had this famous spinning backflip kick thing that was a sure hit just about anytime I mashed those special buttons. We eventually purchased Tekken3 and Tekken Tag for Ps2 and wore those characters out as well. Now, I own a PS3 (I'm very, very loyal) and I'm playing games like CoD Modern Warfare 2, Uncharted 2, and various other games. I haven't experienced too much unfair or down-right dirty multiplay online yet, but I'm sure it will hit soon enough. However, I do play the Lego games (Star Wars, Indiana Jones, Batman) with my girlfriend, and I can't even count the hours we've spent simply running around chasing one another with a lightsaber or thermodetonator trying to kill eachother. She has gotten quite good at it and usually can destroy my character pretty quick.
Well, check out the article! I'm sure that if you've played games at all, it will give you a laugh. Oh, while I was in STL, Renee, Ellen's mom, showed us a tv show about people who simply hoard stuff... It was very gross! I do wonder though, is there a person out there who simply hoards video games?? If so, I'd love to see what their house looks like. I don't even think I'd be disgusted by that!
Monday, November 16, 2009
The Speed of Life
Thursday, October 15, 2009
A Phish Full of Dollars
Authorities say computer hackers drained more than $479,000 from a Pennsylvania county redevelopment agency's bank account.
Cumberland County officials told reporters Wednesday that the intruders transferred funds from the agency's account to their own accounts at 11 different financial institutions last month.
"We were all shocked when we heard this," said Cumberland County Redevelopment Authority Executive Director Chris Gulotta.
The Carlise (Penn.) Sentinel said that less than $110,000 has been recovered thus far and the county is negotiating with two other institutions.
The hackers apparently gained access to the redevelopment authority account through a virus that records keystrokes and was able to swipe a pass code. The virus was contained in a phony Web page that said the bank's real site was down for maintenance."
This is why you always know what your banking site looks like. If it says that it's down for maintenance, call your local branch to make sure that it really is! Who knows, it could save you your entire life savings. Other Tips for avoiding Phishing are:
1) Check for a lot of misspelled words. This is a common indicator that the site is a phishing site because they are usually hastily made.
2) Look at the URL (the http://...... part). If it looks different from what you usually type in, it may be a sign of a phishing attempt.
3) If you usually see the little "lock" symbol to the left of HTTP://, or your site uses HTTPS://, make sure it's there.
4) Finally, just plain avoid those sites that make you sign up to win something or receive a free gift. On the Internet, if it looks to good to be true, it usually is. In a study done, 90% of people gave up their userID or Password for a free item, usually something small like a pen or a calculator. 70% of people gave both away for a larger prize like a DVD.
Wednesday, October 14, 2009
Techsmith
1) Snagit- Capture anything you see on the screen. Edit and combine those captures. Share them via your favorite applications. Organize and find them again later. Don't waste time cropping your captures. Snag exactly what you need with just a click.
Find a free trial Here
Snagit is simple and user friendly and it also offers a lot of unique tools to help make your screen captures look beautiful. Give the trial a shot and see if you like it! You'll be surprised at what you can use it for.
2) Camtasia Studio- People don’t want a long, drawn-out explanation. They want to see what you’re talking about. With Camtasia Studio, you can record your PC screen and create professional-looking videos that clearly demonstrate a process, a product, or an idea. Some call Camtasia Studio the world's smartest screen recording software. Why? Because it adapts to your workflow, not the other way around. Here's how it works:
-Record whatever you want, right now, at any size. Decide how to use it later
-Edit and Enhance to clarify and amplify your message
-Share your creation anywhere, in multiple formats
Find a free trial download Here
I use Camtasia at work to create training videos. It records the screen beautifully and let's you record sound during video capture or place it into the file afterwards. It also has a smart zoom feature that will zoom in on a location in the video if you are typing something...this can be turned off and edited to fit your needs. A great little program and I definitely recommend the 30 day trial.
Tuesday, October 13, 2009
Todays Threat Level
Today
Monday, October 12, 2009
The Wonderful World of ATF-Cleaner
1) Right click the link and go to "open link in a new window" and wait for the page to load
2) Locate the red letters that read, "ATF Cleaner", which are about halfway down the page. This is the link to the download.
3) Click the red letters and save it to your computer. I would suggest your 'My Documents' folder, but feel free to save it anywhere that you'll remember where it's at.
4) After the program downloads, browse to it's saved location and double click on the icon. The icon is a blue garbage can.
5) After locating the icon, double click it. Microsoft will most likely pop-up a warning like the following:
6) Click Run and the following window will open:
7) For the first time running this, click the 'Select All' option and then deselect the 'All User Temp' item:
8) Next, click the 'Empty Selected' button and let it sit. This is a lot faster cleaner than the Windows Disk Cleanup, but it will still take a bit of time...especially if you don't delete your cookies and temp files very often. I clean mine every other day, so it goes pretty quick. However, the first time I ran it, it took a while, but it cleaned over 2Gbs of data. It may look like it's frozen, but it will eventually pop up a screen like the following:
9) Click OK on the box and then run ATF again, but this time check the 'Select All' item and leave everything selected. The reason why we didn't do this first is because it has a tendency to take hours to clean if you select everything. I'm not sure why, but it does.
10) click OK again and close ATF Cleaner. You should restart your computer after this, but you don't have to do it right away. I would recommend restarting it sometime within the next day though.
If you have questions, please feel free to post them!
Today's Threat Level
Sunday, October 11, 2009
Today's Threat Level
Hacking for UFO's
The High Court ruled the case was not of "general public importance" to go to the UK's highest court.
Glasgow-born Mr McKinnon, 43, of Wood Green, London, is accused of breaking into the US's military computer system. Mr Mickinnon, who has Asperger's syndrome, insists he was just seeking evidence of UFOs.
Janis Sharp told BBC Radio 5 live that the ordeal had "broken" her son".
(http://news.bbc.co.uk/2/hi/uk/8298924.stm)
McKinnon's craziness manifested itself in obsessive hacking. With a joint in the ashtray and a can of Foster's next to the mousepad, he hacked Nasa, the Pentagon, and every US military installation he could get into. It was, he says, incredibly easy. He wrote a script that searched for network administrators who'd been too lazy to change their user names from "user name" and their passwords from "password". And when he found one he was in.
His testimony offers a compelling argument against conspiracy theories. He spent between five and seven years roaming the corridors of power like the Invisible Man, wandering into Pentagon offices, rifling through files, and he found no particular smoking gun about anything. He unearthed nothing to suggest a US involvement in 9/11, nothing to suggest a UFO cover-up. Nothing, he told me, except two things.
"I found a list of officers' names," he said during our first meeting in 2003, "under the heading "Non-Terrestrial Officers". I looked it up and it's nowhere. I don't think it means little green men. What I think it means is not Earth-based. What I saw made me believe that they have some kind of spaceship, off planet."
"Some kind of other Mir that nobody knows about?" I asked.
"I guess so," said McKinnon. "But I was smoking a lot of dope at the time. Not good for the intellect.
(http://www.guardian.co.uk/world/2009/aug/01/gary-mckinnon-extradition-nightmare)
OK. So should the British Government Extradite this man? I think so. He has been caught for breaking into multiple U.S. Government sites and the kicker is that he has admitted it! He claims to be searching for information on UFO's, but does it really matter? Either way he compromised a government system and he needs to be tried for it and sentenced.
"For the past seven years, in bedsits in Crouch End and Bounds Green, north London, the Pentagon hacker and UFO buff Gary McKinnon has – according to his family and friends – been suffering one long anxiety attack. He's prone to regular fits of fainting and thoughts of suicide. He's written that he can't look himself in his eyes when he's shaving in case the sight of himself sets the spiral off. He jumps out of his skin if someone touches him by surprise. I've met him sporadically during these years and can vouch that he's a chainsmoking, terrified shell.
"I'm walking down the road and I find I can't control my own legs," he has told me. "And I'm sitting up all night thinking about jail. About male rape. An American jail. I'm only a little nerd … My life is like walking through a world you know is probably going to end."
Is this guy fit to stand trial? Most likely not. He seems like he's a bit out there. I think one major issue with this guy is that he didn't/doesn't realize the consequences of his actions. Did he really think that if he hacked into anything, and was caught, that nothing would happen to him? He says, "...And I'm sitting up all night thinking about jail. About male rape. An American jail. I'm only a little nerd …" OK, well yes, shit happens in jail that isn't good, but really, you should have thought about that before you started doing illegal stuff. The news claims that he was one of the first to start messing around on the Internet and that he was testing it's boundaries. If that's the case, he should have stopped hacking after Mitnick was arrested and tried. In the end, I hope that he is extradited and that he stands trial. He deserves to go to jail, even if it is for a short term.
The Internet Storm Center
I was looking at the dshield website today and found this interesting diary entry from yesterday.
"The Internet Storm Center is focusing on IP ports for the month of October. I am going to continue the theme, but with a bit of a twist. I am going to talk about a few of the ports that are usually not desirable to appear in a traffic analysis. There are many more than I could list, the majority associated with malware. But not all of them.
Here we go:
1214 - Limewire/Kazaa (A Peer-to-Peer application. Not by definition malware, but not something desirable in an enterprise)
2773 - SubSeven (Trojan)
5631 - pcAnywhere (A commercial remote control application)
1863 - Numerous Microsoft applicationsI want to emphasize that these listed are not necessarily bad.
The point here is awareness. Knowledge, and management, of the ports required and permitted in the enterprise, and at home, will lead to an overall improvement of the security posture of a network. This is where syslogs, traffic analysis, and documentation will tie everything together." (tony d0t carothers @ isc d0t sans d0t org)
Also, to help promote Internet security and awareness, I'm going to start posting the Internet Security Threat Level and 'On-Duty' Handler for the Internet Storm Center(ISC). If you get time, check out their site at http://www.dshield.org/. This site has a lot of interesting information including the amount of malware that is being distributed and reported. Check out the image below:
Adobe Zero Day Flaw
The company has issued an alert and said it will release a patch for the flaw on Tuesday. In the meantime users are advised to disable JavaScript, although Adobe warned this may not be a complete solution."
“Adobe Reader and Acrobat 9.1.3 customers with DEP enabled on Windows Vista will be protected from this exploit. Disabling JavaScript also mitigates against this specific exploit, although a variant that does not rely on JavaScript could be possible. In the meantime, Adobe is also in contact with Antivirus and Security vendors regarding the issue and recommends users keep their anti-virus definitions up to date.”
So, it should be common sense to keep your antivirus up to date, but it is surprising how often I talk with people who say that they don't. As an IT guy, I really can't stress how important it is to keep your Antivirus current. In a later post I will be describing the differences between an Antivirus suite and an Internet Security Suite. Most people believe that they are perfectly protected and safe with just Antivirus. However, they really need to understand the added benefits of a firewall. Well, like I said, that will come later.
As for this flaw, I'm glad that Adobe is aware of it and making it's users aware. "Security through Obscurity is Never the Answer." This is a very important thing for companies to realize. Obscuring security flaws leads to a false sense of security for the company and for the end users.
Yay Microsoft! Oh wait....
Well, that just isn't good! I know that just about every company is going to have some type of security breach during it's operations, but it really isn't good for Microsoft to have something like this happen to them. Already, they have bad PR due to their last OS and with the release of Windows 7 around the bend, it just plain 'ol doesn't look good. Hopefully they can get the issue sorted out and catch the guy who leaked the info/hacked the live accounts.
http://www.reuters.com/article/sarahPalin/idUS33422544820091005
Saturday, October 10, 2009
Solitaire as a Key Generator
On Bruce Schneier's site, he has a very interesting encryption algorithm simply called 'Solitaire', and it is what it sounds like. The algorithm uses a deck of cards and the game solitaire to create an encryption cipher that can be used to encrypt/decrypt a message. For those of you who have read the book 'Cryptonomicon', by Neil Stephenson, this is the cryptosystem used by Enoch Root and Randy Waterhouse. Check this out:
"Solitaire gets its security from the inherent randomness in a shuffled deck of cards. By manipulating this deck, a communicant can create a string of "random" letters that he then combines with his message. Of course Solitaire can be simulated on a computer, but it is designed to be implemented by hand. Solitaire may be low-tech, but its security is intended to be high-tech. I designed Solitaire to be secure even against the most well-funded military adversaries with the biggest computers and the smartest cryptanalysts. Of course, there is no guarantee that someone won't find a clever attack against Solitaire (watch this space for updates), but the algorithm is certainly better than any other pencil-and-paper cipher I've ever seen. It's not fast, though. It can take an evening to encrypt or decrypt a reasonably long message. In David Kahn's book Kahn on Codes, he describes a real pencil-and-paper cipher used by a Soviet spy. Both the Soviet algorithm and Solitaire take about the same amount of time to encrypt a message: most of an evening.
Encrypting with Solitaire is an output-feedback mode stream cipher. Sometimes this is called key-generator (KG in U.S. military speak). The basic idea is that Solitaire generates a stream, often called a ``keystream,'' of numbers between 1 and 26. To encrypt, generate the same number of keystream letters as plaintext letters. Then add them modulo 26 to plaintext letters, one at a time, to create the ciphertext. To decrypt, generate the same keystream and subtract, modulo 26 from the ciphertext to recover the plaintext."
It's a very interesting algorithm Schneier goes through very easy to understand steps. A few practice runs and you'll be good to go!! Remember, it takes time to get it set up and executed, but it offers a great thrill once you've completed one successfully! For all of you out there who are programming nuts, he offers a multitude of premade scripts that you can use to turn this into a program. http://www.schneier.com/solitaire.html
Have fun!
Bypassing the Antivirus Software
I'm learning a bit more about malware, and I came across a video by Chris Hurley, who is a pentester, and he shows how it's possible to alter a viruses signature using a hex editor. Hex editors can be downloaded for free, just google search 'hex editor download,' and find one that you like. This has been known for quite a long time, but I thought that I'd post it here for those of you, like me, who didn't know that you could do this. Go to http://www.uat.edu/tv/ and then find the 'Tech Forum Fall 2008' section and then Chris Hurley. I encourage you to watch the whole video, it isn't too long. Also, check out the other videos that they have on there. All of them are fairly interesting.
Enjoy!!
Thursday, October 8, 2009
Wow...So That's How it Works?!
In a post yesterday I said how I was writing a paper for my final. In the research process, I stumbled upon this nifty little
The Power of Python
class HelloWorldApp {
public static void main(String[] args) {
System.out.println("Hello World!"); // Display the string.
}
}
Where as the simplest python program is:
print "Hello, World!"
You can simply type that in and press enter and you've created yourself a program. I've completed the first 20 lessons and I'm enjoying it thoroughly. Plus, the tutorials are between 2 and 10 minutes a piece, so you don't have to commit a ton of time to each one.
Use Your Mind
This technology opens up endless possibilities for being incorporated into games, software, programming, etc. In one demo from Emotive, an individual uses the device to control an electric wheelchair. Emotive also claims that their device can be used in any game available today. An example would be using it in the Harry Potter games or The Elder scrolls IV: Oblivion, to cast spells or shoot an arrow, open doors, etc. If anyone has had an opportunity to try this out, please post your thoughts!
Wednesday, October 7, 2009
my school project
Sunday, May 17, 2009
oops!
Been a long time since the last post. A lot's been going on recently. Works been crazy busy, My girlfriend and I are trying to see eachother as much as possible (lives 6ish hours away), I have a sister getting married next weekend and I need to lose weight to fit into the tux (20lbs down, 5ish more to go), and I'm studying for my Ethical Hacking Cert. All in all, april 14th, my last post, through today have flown by so fast that I didn't realize it had been so long...
Fun little thingy: I've been playing with Ubuntu lately. Any one interested in Linux, aka. those who hate microsoft and aren't made out of money, go and get the 'Linux Starter Pack.' It's a magazine you can find in Barnes & Noble or Borders, etc. It comes with a 'how to' for us new linux users, and an Ubuntu start up disk (free OS). It's pretty nifty. Show's you most of the stuff you need to get going. I would still recommend getting some reading material a bit more in-depth later on, but it's a good starting place.
That's all for now! I'm working through Tuesday and then have the rest off, so maybe I'll get another post out this week. We'll see...Busy Busy Busy!
Tuesday, April 14, 2009
AHHHHH!
Saturday, April 4, 2009
Weird and Funny
http://www.thetoyzone.com/25-inspiring-my-little-pony-mods/
Wednesday, April 1, 2009
Rant of the Day
Sunday, March 29, 2009
Things Your IT Guy Wishes You Knew
1. If you ask me technical questions please don’t argue with me because you don’t like my answer. If you think you know more about the topic, why ask? And if I’m arguing with you…it’s because I am positive that I am correct, otherwise I’d just say “I don’t know” or give you some tips on where to look it up, I don’t have the time to just argue for the sake of it.
2. Starting a conversation by insulting yourself (i.e. “I’m such an idiot”) will not make me laugh, or feel sorry for you; all it will do is remind me that yes, you are an idiot and that I am going to hate having to talk to you. Trust me; you don’t want to start a call that way.
3. I am ok with you making mistakes, fixing them is my job. I am not ok with you lying to me about a mistake you made. It makes it much harder to resolve and thus makes my job more difficult. Be honest and we can get the problem resolved and continue on with our business.
4. There is no magic “Fix it” button. Everything takes some amount of work to fix, and not everything is worth fixing or even possible to fix. If I say that you just need to re-do a document that you accidentally deleted 2 months ago, please don’t get mad at me. I’m not ignoring your problem, and it’s not that I don’t like you, I just cant always fix everything.
5. Not everything you ask me to do is “urgent”. In fact, by marking things as “urgent” every time, you almost ensure that I treat none of it as a priority.
6. You are not the only one who needs help, and you usually don’t have the most urgent issue. Give me some time to get to your problem, it will get fixed.
7. Emailing me several times about the same issue in the same day is not only unnecessary, it’s highly annoying. Emails will stay until I delete them, I won’t delete them until I’m done with them. I will typically respond as soon as I have a useful update. If it is an urgent issue, let me know (see number 5).
8. Yes, I prefer email over telephone calls. It has nothing to do with being friendly, it’s about efficiency. It is much faster and easier for me to list out a set of questions that I need you to answer than it is for me to call and ask you them one by one. You can find the answers at your leisure and while I’m waiting I can work on other problems.
9. Yes, I seem blunt and rude. It’s not that I mean to, I just don’t have the time to sugar coat things for you. I assume we are both adults and can handle the reality of a problem. If you did something wrong, I will tell you. I don’t care that it was a mistake, because it really makes no difference to me. Don’t take it personal, I just don’t want it to happen again.
10. And finally, yes, I can read your email, I can see what web pages you look at while you are at work, yes, I can access every file on your work computer, and I can tell if you are chatting with people on an instant messenger or chat room (and can also read what you are typing). But no, I don’t do it. It’s unethical, I’m busy, and in all reality you aren’t all that interesting. So unless I am instructed to specifically monitor or investigate your actions, I don’t. There really are much more interesting things on the internet than you.
Wednesday, March 25, 2009
Cybercrime.gov (people getting 'Pwnd')
(http://www.cybercrime.gov/kunselmanIndict.pdf)
Have fun all!
Danger Will Robinson, Danger!
Monday, March 23, 2009
Lego Video Games = Geniusness! ;)
Friday, March 20, 2009
The danger of not having Antivirus and Internet Security tools
and I suggest that you read it if you have a few minutes.
I have tried quite a few different antivirus and Internet Security software packages over the last 3 years. Everything from AVG, DefenderPro, Kaspersky, McAfee and many many others. So far, my favorite would be Kaskpersky but it is a lot of work to initially set up. I've owned it for about 4 months now and I haven't had any issues with it letting malicious content in. It's a bit pricey though and can frustrate users who don't have patience or time to devote to getting it set up. McAfee has been pretty helpful as well and is a little less expensive. I had a few issues where it wasn't pulling updates down from the server but I got that resolved by calling the tech support. AVG is probably the next on my list of ones to trust. It worked, but I didn't care for the user interface. And finally, DefenderPro. The 15in1 package was awesome the 10in1 is good but the 5in1 is too basic. Most people wouldn't use half of the stuff on the 15in1, but it gets the job done for a fairly decent price. I did have a few issues where I upgraded from a previous version and it didn't install correctly. This had a very negative effect on my computer. It made the alg.exe process start for every file that it scanned on my computer. I would start scanning and would have 300 processes running in no time that I couldn't kill! Not the most pleasant experience. :-P Other than that, all of them kept the malware at bay. I don’t routinely surf dangerous web sites that are know to have malware though. I did test them out by infecting my system with the Antivirus 2009 and Police Antivirus 2009 viruses. All of them were able to remove these with no problem. The only virus that I did have a problem with fully removing was a couple of Vundo variants. I will post about them some other time though. They can be nasty buggers to get rid of!!
Well, that’s all for now. I will try and post something tonight, but as I’m living out of a hotel I may not have enough free time.
First Post: YAY!
It's my first post. This may be deleted later, but I figured that I needed something on here. I will be working on getting a new/better background up tonight and this weekend. This is my very first blog ever so I'm still getting use to the idea of posting junk. I do follow www.picture-bliss.blogspot.com and it's actually the reason why I started this blog. Plus, she's my Girlfriend so I figured I better mention her. ;) This site will hopefully contain technical help, a daily 'rant' about IT or something, and place for questions. If I have an answer for the question you ask, and your permission, I will post it to the site. There will also be the occasional funny picture posted or funny story about every day things. For example:
I recently moved back up to Iowa for my job. It is a good move for me because I have a smaller footprint to cover. In Missouri it was about 71 Retail locations and in Iowa it's about 20. : ) I had lived in Iowa while I went to high school and college, and outside my parents front yard was a very large Corn/soy bean field. It is common knowledge to most individuals that Iowa raises Corn, Soy beans and Pigs. The occasional cow can be found grazing as well, but they are usually few and far between.
I moved a couple weeks ago and after getting settled at my temporary location in a medium sized farming town I decided that my shaggy head of hair needed to go. I drove over to one of the local hair cutting places and signed in. About 15 minutes later I was happily seated and getting my head buzzed. The sweet lady, about 45 years in age, who was cutting my hair tried making small talk with me. She asked questions about my job, where I lived, if I was married, so on and so forth. I told her that I was taken but not married and that I had recently moved back here from Missouri. She says, "Wow! Do you like it back here?" I answered with a, "yup," and tried to move the conversation along. Figuring that it would be polite to continue chatting, I asked her if she was from the area originally. She replied with a yes and started blow drying the hair off my neck. She then stopped, put down the dryer, looked at me and said, "Well, you're all finished. And by the way, welcome back to the land of Potatoes." I sat there dumbfounded. "Land of Potatoes..." I thought. She couldn't be serious! What, did she think that Potatoes grow on Stalks?? I was completely lost for words and got out of my chair to go pay. After leaving I sat in my pickup for a bit and wondered if the lady was really serious....potatoes....how does some one from Iowa think they are in Idaho?