Dear readers and subscribers,
Tech Thoughts is taking a break for the holidays. Regular posting will begin again on Monday, January 5, 2009.
Wishing you a safe and happy Holiday Season, and a properous 2009.
Bill Mullins
Dear readers and subscribers,
Tech Thoughts is taking a break for the holidays. Regular posting will begin again on Monday, January 5, 2009.
Bill Mullins
Filed under Windows Tips and Tools
You’ll never lose your Laptop computer, and you take particular care to ensure it won’t be stolen, right? Of course you do. But does loss, or theft, of laptops happen? You bet.
Recent survey results from the Ponemon Institute, indicates that more than 10,000 laptops are lost, or stolen, each week at U.S. airports. Are you as surprised as I am?
Not surprised? Well, how about this astonishing statistic from the same survey: 65% of those lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information.
One can only hope that the data on these laptops was encrypted, although it seems when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – 200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week.
Other available statistics indicate that a laptop is stolen, not lost but stolen, every 53 seconds and 97% of stolen laptop computers are never recovered.
So what can you do to increase the probability that should your laptop be lost or stolen, you can increase the chances that it will be returned to you, than the above statistics indicate?
Adeona (named after the Roman goddess of safe returns), is a recently released small software client for tracking the location of a lost, or stolen laptop, that does not rely on a proprietary central service, but instead, is offered free by the Open Source community.
This powerful free software has been developed through collaboration involving the University of Washington, the University of California San Diego and the University of California Davis.
The developer’s website describes the application as follows:
Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner’s laptop.
The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location.
The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the cipher texts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.
Quick facts:
Private: Adeona uses state-of-the-art cryptographic mechanisms to ensure that the owner is the only party that can use the system to reveal the locations visited by a device.
Reliable: Adeona uses a community-based remote storage facility, ensuring retrievability of recent location updates. (See caveat)
Open source and free: Adeona’s software is licensed under GPLv2. While your locations are secret, the tracking system’s design is not.
The Mac OS X version can capture pictures of the laptop user, or thief, using the built-in iSight camera.
System Requirements: Windows XP/Vista, Mac OS X, Linux
Download at the developer’s web site: Adeona
A caveat: According to the development team, “OpenDHT has been experiencing some problems. We are working on a new private version, that does not depend on OpenDHT”.
For a review and download links to free encryption software read “Lose Your USB Stick and You Lose it All – Encrypt Now with Free Software!” on this site.
Virtual CloneDrive is a small freeware application that allows you to mount image files, from a hard drive, as a virtual CD or DVD drive, just as if you had inserted the application into a physical CD/DVD drive.
To explain briefly: a disk image is a computer file containing the complete contents and structure of a data storage medium or device, such as a hard drive, CD or DVD. As such, a disk image contains all the information necessary to replicate the structure and contents layout, as well as the actual contents, of a storage device.
Generally, operating systems, particularly Linux and its many derivatives are available for download on the Internet packaged as an image file, e.g. an .ISO file, or as a .BIN/.CUE file. As well, larger applications can often be packaged for download in this way.
Since I download and test operating systems and large applications frequently, over the course of the last year I could have easily burned up to 50+ CD’s or DVD’s just to use or install the software for testing. But by having Virtual CloneDrive installed on my test system, I saved time and resources.
Once Virtual CloneDrive is installed on your system it will be assigned a drive letter, and will appear as a drive in Windows explorer.
To mount an image file navigate to the file and right-click. When the menu pops up simply navigate to Open with > Mount Files with Virtual CloneDrive. This will create a new drive letter so that you can access the file.
An added benefit for those with a larger hard drive is you now have the option of converting your CDs and DVDs into files that run directly from your hard drive. You can play games without inserting the physical discs — simply click on a desktop icon to launch a virtual optical drive.
You can share virtual CDs, photo CDs, and disc-based applications over a network, with access rates up to 200 times faster than physical CDs; boosting the performance of PC games, photo CDs, and disc-based applications.
Quick facts:
Supports all common image formats including ISO, BIN, CCD
Supports up to 8 virtual drives at one time
Easy to use – just double-click an image file to mount as a drive
Virtual CloneDrive is freeware
System Requirements: Windows 98, ME, 2000, XP
Download at: Download.com
Hazard Shield jumps into the already overcrowded anti-malware application market, as yet another free anti-malware contender. On the other hand, choice is good, and it’s always a plus to have another free and effective security application to choose from.
In testing Hazard Shield on my test systems as a secondary on-demand scanner, this nifty little program impressed me with its performance. This application however, is not restricted to acting only as a secondary scanner.
Orbitech, the developer of Hazard Shield describes this application as “a fast anti-malware program that scans for any and every threat we can get our hands on. These include malicious items such as malware, viruses, spyware, Trojans, backdoors, dialers and much more”.
Hazard Shield’s Real-time malware monitor, which is not a system resource hog as so many others can be, protects your computer by removing threats before they can do damage.
There’s no question that Hazard Shield is fast. In testing, I found it completed scanning approximately 30GB in just a few minutes. It did not find any malware on my machines. However, I have heard from other Techs who have tested this application, that it has detected and removed a number of infections missed by other anti-malware programs including Norton and Webroot Spy Sweeper.
The simple and straightforward interface is a definite plus, particularly for less experienced users. There’s no learning curve involved here. With a couple of simple clicks you can scan for threats, and remove them from both local and network drives.
Included in the application are a number of integrated tools including a file killer. This tool can be particularly important in removing locked or in-use files. Additional tools include an uninstall manager, a process manager, and a scheduled task manager.
If you’re looking to strengthen your anti-malware resources, this application might be one that’s worth taking a look at.
Quick Facts:
Light on resources
Simple, straightforward interface
Scans local, network, and removable drives
Scans for viruses, spyware adware, malware, Trojans, dialers, hijackers, backdoors
Fast, easy database and program updates
Real-time protection
Additional integrated tools
Scores a respectable 3.5/5 Stars on Download.com and 4/5 Stars on Softpedia.com
Free for personal and commercial use
Bonus: Free tech support is available from the deveoloper at any time, should you have any problems.
System Requirements: Windows XP, Vista
Additional Requirements: NET framework 2.0
Download at: Download.com
Here we are getting ready for the holiday season, once again. For many of us it’s a wonderful time of the year, full of memories of previous Christmases, and great anticipation for all the good things to come.
During the last holiday season, like many of you, I took the opportunity to get together with family and friends. As so often happens on these occasions, I got quizzed on everyones, it seems to me, least favorite computer related topic; the state of computer security.
These informal “question and answer” gabfests are important to me, since they are a good way to stay in the loop of real world computing experienced by typical users, and not just the esoteric world of the typical “geeky” user.
At that time, some intriguing statistics had just been released from a survey which had been developed by the National Cyber Security Alliance, and security firm McAfee.
The overriding conclusion from the survey was: typical computer users are in need of a “reality check” when it comes to home computer security. Based on my own experiences, I believe this survey does not overstate the case and in fact, additional studies done in the last few months of this year seem to indicate the “security knowledge gap”, continues to widen.
The McAfee/NCSA study found that while 98 percent of computer users agree that having up-to-date security software is important for system security, a significant number of the survey respondents had computers with security software that was incomplete, or dangerously out of date.
Highlights of the survey:
Ninety-two percent of those surveyed believed their anti-virus software was up to date, but in fact, only 51 % had updated their anti-virus software within the previous week.
Seventy-three percent of those surveyed believed they had a firewall installed and enabled, yet only 64 % actually did.
Approximately 70 % of PC users believed they had anti-spyware software, but only 55 % actually had it installed.
Twenty five percent of survey participants believed they had anti-phishing software, but only 12 % actually had the software.
Where do you fit in all this?
Most of us now store a large volume of confidential personal information on our home computers, including information concerning our personal finances, taxes, health, and perhaps personal documentation of other types.
So, it may well be that we need to take the time to survey our computers to insure that all relevant security applications have been installed, are up to date, and are operating correctly.
One of the better applications that will produce a survey of your computer is Belarc Advisor which can be reviewed and downloaded, if you choose, from this Blog. As well, consider downloading and installing Secunia Personal Software Inspector (PSI) which constantly monitors your system for insecure software installations, and notifies you when an insecure application is installed.
If you need to update, or add, additional security applications to your computer, then checkout The Best Free Spyware, Virus and Browser Protection, on this site for reviews and free security application downloads.
There are plenty of good anti-malware products, but experienced computer users’ realize that to ensure maximum safety, it’s important to have layered defenses in the ongoing fight against malware.
Given the virtual epidemic of malware currently circulating on the Internet, no single anti-malware tool is likely to identify and remove all of the millions of rogue malware that infests the cyber world.
A recent study carried out by PandaLabs of more than 1.5 million users, revealed that 23% of home computers with up-to-date security solution installed were infected by malware. Current data indicates that this situation has not improved.
If you are an experienced/advanced computer user (sometimes known as a geek), and you’re looking for a program to strengthen your anti-malware resources, then A-squared HiJackFree is one that’s worth taking a look at. This free application, from EMSI Software, offers a potent layer of additional protection to add to your major anti-malware programs.
The program operates as a detailed system analysis tool that can help you in the detection and removal of Hijackers, Spyware, Adware, Trojans, Worms, and other malware. It doesn’t offer live protection but instead, it examines your system, determines if it’s been infected, and then allows you to wipe out the malware.
Quick facts:
Analyzes the system configuration using live online analysis
Manages all types of Autoruns on your system
Controls all Explorer and Browser plug-ins (BHOs, Toolbars, etc.)
Manages all running Processes and their associated modules
Controls all Services, even those Windows doesn’t display
Allows you to view open ports and the associated listening processes
Allows you to view all DNS entries in the hosts file
Manages installed Layered Service Providers
Multilingual – language packs for English, German, French, Spanish, Italian, Japanese and many more.
This is a worthwhile application to add to your anti-malware toolbox that impressed me with its performance on my test systems.
A-squared HiJackFree is free for private use only.
System Requirements: Windows 98/Me/2000/XP/2003 Server/Vista
Download at: Download.com
Who’s going to turn down an email savings coupon from that great American institution – McDonalds? The cyber-criminals behind this spam/scam email are counting on the fact that not many of us will turn it down.
Let’s face it – we’re all pretty used to McDonalds wishing us a “Merry Christmas” so getting an email with that heading is likely to entice many of us to “Simply print the coupon from this Email and head to your local McDonald’s for FREE giveaways and AWESOME savings” as the email instructs.
(Pic courtesy of Panda)
According to PandaLabs, Panda Security’s laboratory for detecting and analyzing malware however, you won’t get a coupon, you won’t get “FREE giveaways and AWESOME savings”, but you will get infected by the P2PShared.U worm.
“Once on the computer”, according to Panda, “the worm sends out emails with the same subject and appearance to other users. Finally, it copies itself to folders of various P2P file-sharing programs (eMule, LimeWire, Morpheus, etc.) with names relating to security software, image editing programs, program cracks, etc. This way, any user that tries to download any of these applications will be actually letting a copy of the worm into their computer”.
At this time of the year, we can expect to be bombarded by socially engineered email spam/scam with a Christmas or Holiday Season theme, so be more vigilant than you normally would be.
Don’t open unknown email attachments
Don’t run programs of unknown origin
Disable scripting features in email programs
Ensure your anti-virus software scans all e-mail attachments
If you are interested in staying on top of the latest in Internet security news, consider adding Panda Security news to your feed reader by adding the following URL – http://feeds.feedburner.com/PandaSecurity.