Tag Archives: control

The War for Government Control of the Internet – We’re Losing

Make no mistake – we are unwilling participants in a war – a war to “tame” the Internet. We’ve long been at war on the Internet in a sense and early on, there was no mistaking the enemy – cybercriminals. But, who would have considered that as the Internet evolved, the free thinking and freewheeling principles under which it was established, would come under attack?

While it’s true that the battle against the cybercriminal element continues unabated, the level of conflict – and its direction – has vaulted into a new dimension.

In a world driven mad by economic uncertainty, it’s hardly surprising that the principal players allied against Internet users, in the war to tame the Internet, are right-wing focused governments (who hold little regard for civil liberties and the right to freedom of expression) and, profit hungry corporations (who hold little regard for an individual’s right to privacy).

China, based on it’s aggressive control of Internet dissent, has long borne the burden of being classified as the black sheep of the Internet family but, the reality is somewhat less clear. The U.S. government in its paranoid motivation to address self created issues in it’s war on terror (spurning the Constitution in the process), may well be in the forefront in the drive to change the focus of the Internet as we know it.

In an article this past week on Slate – Evgeny  Morozov (a visiting scholar at Stanford University, a fellow at the New America Foundation, and a contributing editor/blogger at Foreign Policy) wrote –

“While Hillary Clinton likes to give speeches in which she fashions herself the world’s greatest defender of “Internet freedom,” the harsh reality is that her own government is its greatest enemy. Given the never-ending flow of draconian copyright and cyber security laws coming from Washington, this fact is getting harder and harder to conceal from the global public”.

The U.S. is hardly alone in its contempt for the rights of the individual and it should be noted, that the long lineup of draconian governments has been  enthusiastically joined by the governments of Canada, Australia, and the U.K.

Sergey Brin, the co-founder of Google, in a recent statement made the point –

“Very powerful forces have lined up against the open Internet on all sides and around the world.. . . It’s scary.”

Scary, indeed.

The stakes in the battle for control of cyberspace are enormous and, the outcome will affect you most directly. Taking the “path of least resistance” and allowing restrictive legislated Internet policies to wash over you, is just not on. Certainly not, if you wish to continue to use the Internet in the way in which it has evolved – free of unbridled government interference.

Sir Francis Bacon (1561-1626) recognized that “Knowledge is power” and, if a situation ever existed in which the reality of this truth can be played out – this is one which qualifies. To effectively fight back against unconstrained government interference – you will require the knowledge to do so.

With that in mind, I encourage you to spend some time reading an excellent series of articles published by the London based The Guardian newspaper. The series is wide ranging and includes coverage on issues from – governments attempts to control citizens, the rise of Facebook, Apple-style “walled gardens”’, the seemingly never ending attacks on  privacy, the efforts to “tame” the web – and, much more.

Click on the appropriate links as follows:

Over seven days

The Guardian is taking stock of the new battlegrounds for the internet. From states stifling dissent to the new cyberwar front line, we look at the challenges facing the dream of an open internet.

Day two: the militarization of cyberspace

Internet attacks on sovereign targets are no longer a fear for the future, but a daily threat. We ask: will the next big war be fought online?

Day three: the new walled gardens

For many, the internet is now essentially Facebook. Others find much of their online experience is mediated by Apple or Amazon. Why are the walls going up around the web garden, and does it matter?

Day four: IP wars

Intellectual property, from copyrights to patents, have been an internet battlefield from the start. We look at what Sopa, Pipa and Acta really mean, and explain how this battle is not over.

Day five: ‘civilizing’ the web

In the UK, the ancient law of defamation is increasingly looking obsolete in the Twitter era. Meanwhile, in France, President Sarkozy believes the state can tame the web.

Day six: the open resistance

Meet the activists and entrepreneurs who are working to keep the internet open.

Day seven: the end of privacy

Hundreds of websites know vast amounts about their users’ behaviour, personal lives and connections with each other. Find out who knows what about you, and what they use the information for.

14 Comments

Filed under Opinion, Point of View

Free StartUp Tuner 2 – Fixes Slow Computer Boot Time

image Is Windows boot time starting to get you down? Do you sometimes feel as if you could go and make a coffee while waiting for Windows to start? Let me tell you, if you feel that way, you’re not alone – it can happen to all of us.

You’ll often find, after installing a new application, that it automatically triggers an auto-start command on system start up.

That means, each time your computer is booted, this type of presumptive program is started with Windows, which is unlikely to be your intent, and in many cases is not needed. For example, iTunes is one of those programs that has this nasty habit.

As a result of this program behavior, your start sequence can become considerably longer, system resources can be ravaged, and manually shutting down these unnecessary startups can be frustrating, and time consuming.

The following is a perfect example of how out of control these presumptive  auto-start applications can become.

Recently, a friend asked me for advice on his sister’s computer that was slow at startup, and even worse, was slow in normal operation. It was easy to see why. The computer was loading 26 applications on startup, which then continued to run in the background, eating up system resources.

There are a number of manual methods available to deactivate these very irritating applications from auto starting, but a great free application from Ashampoo does the job quickly, cleanly, and with no fuss.

StartUp Tuner 2 lists all auto-start entries and allows you to individually delete or deactivate those entries. If you turn off all of the unnecessary entries (be sure they are not necessary), Windows will boot faster; in many cases considerably faster.

image

Bonus features:

StartUp Tuner 2 can do more than just this though. The tool can list all Windows services by name and it allows you to activate, or deactivate them, with the click of the mouse.

The application shows all installed Windows programs, but it builds its lists more quickly than the control panel software module. You can then uninstall programs that are no longer required, including program entries that the native Windows uninstaller generally leaves untouched.

Many Browser Helper Objects (BHOs) are useful, but others simply take up space on the Hard Drive and serve no useful purpose. StartUp Tuner 2 lists all of them, and allows you to delete, or deactivate them, if you determine you longer need them.

The application automatically generates a backup of the changes that you have made, giving you the opportunity to reverse any changes.

StartUp Tuner 2 can be used free for 10 days. After that time, free online registration is required. You will receive an activation code which will convert the test version of the program into the full version.

Ashampoo loves to remind you of the value of their full software lineup, so if you find it bothersome to receive this type of email, you’d be better off passing on StartUp Tuner 2.

Personally, I like to stay in the loop on new software developments, so I don’t object to receiving emails soliciting my business for new applications. One of the benefits of registering with Ashampoo is – they often give away full versions of their apps, just prior to the release of a new version.

System requirements: Windows 2000, XP, Vista. Win 7 (no x64 support).

Download at: Developer’s site

Note: Full administrative rights are required to install the program. After it has been installed it can be used with any user account.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under Computer Maintenance, Computer Tools, downloads, Freeware, Slow Computer, Software, System Tweaks, System Utilities, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Do We Need to “Fix” the Internet?

Each time that you connect to the Internet you are unfortunately, wandering through a raucous neighborhood which has a reputation for being jam-packed with predators.

These predators are intent on stealing your money and personal information, installing damaging programs on your computer, or misleading you with an online scam.

Cyber-crooks are relentless in their pursuit of your money, and it’s all about the money. In the worst case scenario, your identity and your financial security can be severely compromised.

Recently, Symantec reported that 51% of all the viruses, Trojans and other forms of malware it has ever seen were logged during 2009, and Symantec has been in the security business since before the Internet was launched.

Each day, when I boot up my home machine, Immunet Protect, advises me that it is protecting me against 12 Million threats. Today for example (May 16, 2010, the number is 12,866,263. That number is truly mind blowing.

Note: Later in the day, following a re-boot, I noticed that the protection level had risen to 12,876,095 – 10,000 additional threats had been identified.

Various Internet security companies report having to deal with up to as many as 40,000 new versions of malware daily. Here’s the math; one new malware program every four seconds!

Anti malware developer Comodo, looks at these numbers in a way that we can more easily relate to, in its instructive video – Did you Know? Dangers on the Web.

“Did you know that the amount of new malware discovered daily approximates the number of words a person speaks daily?

Or, the amount of money lost by US Consumers due to malware over the past 2 years would have paid the tuition of over one million US College Students?”

Seen in this way, cybercrime takes on a whole new dimension.

Since additional sophisticated threats are constantly being developed, or are currently being deployed, some observers are of the opinion that the Internet is essentially broken.

If you think this is an exaggeration, check this out and then you decide.

Tainted search engine results: Internet security gurus have known for some time that we cannot rely on Internet search engine output to be untainted, and free of potential harmful exposure to malware.

Cyber-crooks continue to be unrelenting in their chase to infect web search results, seeding malicious websites among the top results returned by these engines.

When a potential victim visits one of these sites, the chances of downloading malicious code onto the computer by exploiting existing vulnerabilities, is extremely high.

Infected legitimate websites: According to security solution provider  Kaspersky, the rate of infected legitimate web sites, in 2006, was one in every 20,000. In 2009, one in every 150 legitimate was infected by malware, according to Kaspersky.

Drive-by downloads: Drive-by downloads are not new; they’ve been lurking around for years it seems, but they’ve become much more common and craftier recently.

If you’re unfamiliar with the term, drive-by download, they are essentially programs that automatically download and install on your computer without your knowledge.

This action can occur while visiting an infected web site, opening an infected HTML email, or by clicking on a deceptive popup window. Often, more than one program is downloaded; for example, file sharing with tracking spyware is very common. It’s important to remember that this can take place without warning, or your approval.

Rogue software: A rogue security application (scareware), is an application usually found on free download and adult websites, or it can be installed from rogue security software websites, using Trojans or, manipulating Internet browser security holes.

After the installation of rogue security software the program launches fake or false malware detection warnings. Rogue security applications, and there seems to be an epidemic of them on the Internet currently, are developed to mislead uninformed computer users’ into downloading and paying for the “full” version of this bogus software, based on the false malware positives generated by the application.

Even if the full program fee is paid, rogue software continues to run as a background process incessantly reporting those fake or false malware detection warnings. Over time, this type of software will essentially destroy the victim’s computer operating system, making the machine unusable.

Email scams: Email scams work because the Cyber-crooks responsible use social engineering as the hook; in other words they exploit our curiosity. The fact is, we are all pretty curious creatures and let’s face it, who doesn’t like surprise emails? I think it’s safe to say, we all love to receive good news emails.

It seems that more and more these days, I get phishing emails in my inboxes all designed to trick me into revealing financial information that can be used to steal my money.

If you’re unfamiliar with phishing, it is defined as the act of tricking unsuspecting Internet users into revealing sensitive or private information. In a phishing attack, the attacker creates a set of circumstances where the potential victims are convinced that they are dealing with an authorized party. It relies for its success on the principle that asking a large number of people for this information, will always deceive at least some of those people.

A personal example of how this works is as follows. According to a recent email (similar in form and content to 20+ I receive each month), my online banking privileges with Bank of America had been blocked due to security concerns. This looked like an official email and the enclosed link made it simple to get this problem solved with just a mouse click. What could be easier than that?

Clicking on the link would have redirected me to a spoof page, comparable to the original site, and I would then have begun the process whereby the scammers would have stripped me of all the confidential information I was willing to provide.

My financial and personal details, had I entered them, would then have been harvested by the cyber-crooks behind this fraudulent scheme who would then have used this information to commit identity and financial theft.

These types of attacks against financial institutions, and consumers, are occurring with such frequency that the IC³ (Internet Crime Complaint Center), has called the situation “alarming”, so you need to be extremely vigilant.

This is by no means an exhaustive list of the dangers we are exposed to on the Internet. There are many more technical reasons why the Internet is becoming progressively more dangerous which are outside the scope of this article.

So what do you think? Is the Internet broken – do we need to fix it, and if so, how can we do that?

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

20 Comments

Filed under Comodo, cybercrime, Don't Get Scammed, Don't Get Hacked, Internet Safety, internet scams, Internet Security Alerts, Malware Advisories, Online Safety, Phishing, Rogue Software, spam, Symantec, trojans, Viruses, Windows Tips and Tools, worms

Remotely Assist Friends and Family with LogMeIn Express Beta

image If you’re the person who’s often asked by friends, to help them, their friends, their neighbors, ……..the list goes on, to reconstruct a computer that is not responding appropriately, has become loaded with malware, etc., then LogMeIn Express Beta is worth taking a look at. Running this free screen sharing/remote control application is simple – one of the easiest I’ve used.

To get up and running:

The sharer (host), downloads a small 874Kb applet from the LogMeIn Express site.

You (viewer), enter a 12-digit code given to you by the sharer, e.g. email, and then enter the code on the LogMeIn Express website.

That’s it – you now have access to their screen and remote control. To make it even easier, Chat is enabled – no voice support is included in this version.

image

Security is built into all aspects of a LogMeIn Express session; the  connection is secured using 256-bit SSL encryption.

image

It struck me, that the typical computer user using LogMeIn Express , doesn’t need to know anything about ports or protocols, or any other complicated jargon, and with LogMeIn Express up and running, connection to the remote computer can be accomplished within minutes.

A number of my friends, who are only moderately techno competent, have used this neat little tool to rescue their family’s and friend’s computers. Many have commented that it feels just as if they were working side by side with the remote user, on the same PC. I second that perception. Awesome!

Fast facts – from the developer’s site:

It’s Simple

Session code generated by the host instantly shares screen with one or many

Small download for the host; no client required for the viewer

Easy-to-use chat capabilities

It’s Secure

End-to-end, 256-bit SSL encryption — the same security levels used and trusted by major banking institutions

Permission based — end user must approve remote control

It’s Free

Express Beta is free for both commercial and non-commercial use

Host requirements:

Windows 7, Vista, XP, Server 2003 & Server 2008 (all including 64-bit)

Broadband connectivity to the Internet (i.e., T1, cable modem, ISDN, or DSL)

Viewer requirements:

Flash Player 9, 10

Internet Explorer 6, 7, 8 or Firefox 3 or Chrome 3 or Safari 4

Broadband connectivity to the Internet (i.e., T1, cable modem, ISDN, or DSL)

Go to: LogMeIn Express

Bottom line: If you have the skills, and you have the opportunity to provide tech support to your family or friends, then LogMeIn Express might just be the tool you’ve been looking for. Keep in mind however, that this application is still in Beta.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

16 Comments

Filed under downloads, Freeware, Geek Software and Tools, Interconnectivity, Remote Tech Support, Software, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Slow Computer Start Up? Fix it with Free StartUp Tuner 2

image Is Windows boot time starting to get you down? Do you sometimes feel as if you could go and make a coffee while waiting for Windows to start? Let me tell you, if you feel that way, you’re not alone – it can happen to all of us.

You’ll often find, after installing a new application, that it automatically triggers an auto-start command on system start up.

That means, each time your computer is booted, this type of presumptive program is started with Windows, which is unlikely to be your intent, and in many cases is not needed. For example, iTunes is one of those programs that has this nasty habit.

As a result of this program behavior, your start sequence can become considerably longer, system resources can be ravaged, and manually shutting down these unnecessary startups can be frustrating, and time consuming.

The following is a perfect example of how out of control these presumptive  auto-start applications can become.

Recently, a friend asked me for advice on his sister’s computer that was slow at startup, and even worse, was slow in normal operation. It was easy to see why. The computer was loading 26 applications on startup, which then continued to run in the background, eating up system resources.

There are a number of manual methods available to deactivate these very irritating applications from auto starting, but a great free application from Ashampoo does the job quickly, cleanly, and with no fuss.

StartUp Tuner 2 lists all auto-start entries and allows you to individually delete or deactivate those entries. If you turn off all of the unnecessary entries (be sure they are not necessary), Windows will boot faster; in many cases considerably faster.

Ashampoo Startup mgr

Bonus features:

StartUp Tuner 2 can do more than just this though. The tool can list all Windows services by name and it allows you to activate, or deactivate them, with the click of the mouse.

The application shows all installed Windows programs, but it builds its lists more quickly than the control panel software module. You can then uninstall programs that are no longer required, including program entries that the native Windows uninstaller generally leaves untouched.

Many Browser Helper Objects (BHOs) are useful, but others simply take up space on the Hard Drive and serve no useful purpose. StartUp Tuner 2 lists all of them, and allows you to delete, or deactivate them, if you determine you longer need them.

The application automatically generates a backup of the changes that you have made, giving you the opportunity to reverse any changes.

StartUp Tuner 2 can be used free for 10 days. After that time, free online registration is required. You will receive an activation code which will convert the test version of the program into the full version.

Ashampoo loves to remind you of the value of their full software lineup, so if you find it bothersome to receive this type of email, you’d be better off passing on StartUp Tuner 2.

Personally, I like to stay in the loop on new software developments, so I don’t object to receiving emails soliciting my business for new applications.

System requirements: Windows 2000, XP, Vista. Win 7 (no x64 support)

Download at: Download.com

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

15 Comments

Filed under Computer Maintenance, Freeware, Software, System Tweaks, System Utilities, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Tune Windows Start Up With Free Startup Tuner 2

Ashampoo Startup Box Is Windows boot time starting to get you down? Do you sometimes feel as if you could go and make a coffee while waiting for Windows to start? Let me tell you, if you feel that way, you’re not alone.

You’ll often find, after installing a new application, that it automatically triggers an auto-start command on system start up.

That means, each time your computer is booted, this type of presumptive program is started with Windows, which is unlikely to be your intent, and in many cases is not needed. For example, iTunes is one of those programs that has this nasty habit.

As a result of this program behavior, your start sequence can become considerably longer, system resources can be ravaged, and manually shutting down these unnecessary startups can be frustrating, and time consuming.

The following is a perfect example of how out of control these presumptive  auto-start applications can become.

Recently, a friend asked me for advice on his sister’s computer that was slow at startup, and even worse, was slow in normal operation. It was easy to see why. The computer was loading 26 applications on startup, which then continued to run in the background, eating up system resources.

There are a number of manual methods available to deactivate these very irritating applications from auto starting, but a great free application from Ashampoo does the job quickly, cleanly, and with no fuss.

StartUp Tuner 2 lists all auto-start entries and allows you to individually delete or deactivate those entries. If you turn off all of the unnecessary entries (be sure they are not necessary), Windows will boot faster; in many cases considerably faster.

Ashampoo Startup mgr

Bonus features:

StartUp Tuner 2 can do more than just this though. The tool can list all Windows services by name and it allows you to activate, or deactivate them, with the click of the mouse.

The application shows all installed Windows programs, but it builds its lists more quickly than the control panel software module. You can then uninstall programs that are no longer required, including program entries that the native Windows uninstaller generally leaves untouched.

Many Browser Helper Objects (BHOs) are useful, but others simply take up space on the Hard Drive and serve no useful purpose. StartUp Tuner 2 lists all of them, and allows you to delete, or deactivate them, if you determine you longer need them.

The application automatically generates a backup of the changes that you have made, giving you the opportunity to reverse any changes.

Free registration:

StartUp Tuner 2 can be used free for 10 days. After that time, free online registration is required. You will receive an activation code which will convert the test version of the program into the full version.

Ashampoo loves to remind you of the value of their full software lineup, so if you find it bothersome to receive this type of email, you’d be better off passing on StartUp Tuner 2.

Personally, I like to stay in the loop on new software developments, so I don’t object to receiving emails soliciting my business for new applications.

System requirements: Windows 2000/XP/Vista

Download at: Download.com

If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

1 Comment

Filed under Computer Maintenance, Freeware, Slow Computer, System Tweaks, System Utilities, Utilities, Windows Tips and Tools

Boot Windows Faster With Free Startup Tuner 2

Ashampoo Startup Box One of the things that I find really annoying when I install a new application is that program’s decision that it is so essential to system operation, that it automatically triggers an auto-start command on system start up.

So that means, every time my computer is booted, this type of presumptive program is started with Windows, which is rarely my intent, and in most cases is not needed.

As a result, the start sequence can become considerably longer, system resources can be ravaged, and manually shutting down these unnecessary startups can be frustrating, and time consuming.

For example, recently a friend asked me for advice on his sister’s computer that was slow at startup, and even worse, was slow in normal operation. It was easy to see why. The computer was loading 26 applications on startup which then continued to run in the background, eating up system resources.

There are a number of manual methods available to deactivate these very irritating applications from auto starting, but a great free application from Ashampoo does the job quickly, cleanly and with no fuss.

StartUp Tuner 2 lists all auto-start entries and allows you to individually delete or deactivate those entries. If you turn off all of the unnecessary entries (be sure they are not necessary), Windows will boot faster; in some cases considerably faster.

Ashampoo Startup mgr (Click pic for larger view)

Bonus features:

StartUp Tuner 2 can do more than just this though. The tool can list all Windows services by name and it allows you to activate, or deactivate them, with the click of the mouse.

The application shows all installed Windows programs, but it builds its lists more quickly than the control panel software module. You can then uninstall programs that are no longer required, including program entries that the native Windows uninstaller generally leaves untouched.

Many Browser Helper Objects (BHOs) are useful, but others simply take up space on the Hard Drive and serve no useful purpose. StartUp Tuner 2 lists all of them, and allows you to delete, or deactivate them, if you determine you longer need them.

The application automatically generates a backup of the changes that you have made, giving you the opportunity to reverse any changes.

Free registration:

The StartUp Tuner 2 can be used free for 10 days. After that, free online registration is required. You will receive an activation code which will convert the test version of the program into the full version.

Ashampoo loves to remind you of the value of their full software lineup, so if you find it bothersome to receive this type of email, you’d be better off passing on StartUp Tuner 2.

Personally, I find it easier to stay in the loop on new software developments, when I do receive emails soliciting my business for new applications.

System requirements: Windows 2000/XP/Vista

Download at: Ashampoo

5 Comments

Filed under Computer Maintenance, Free Full Versions, Software, System Tweaks, System Utilities, Utilities, Windows Tips and Tools

How to Protect Your Child on the Internet

Instant Messanger changed There is little doubt that the Internet neighborhood can provide a rich educational and cultural experience for children of all ages and backgrounds.

But, would you drop your child off in a neighborhood where more than half of the buildings were adult stores, and was potentially full of predators? Well of course you wouldn’t.

If you let your child explore the Internet unsupervised, or without having communicated to your child information about potential on-line dangers, this is close to what you’re doing.

According to the FBI in the United States, the following are some of the most important positive actions, you as a parent can take, to enhance your child’s safety on the Internet.

Communicate, and talk to your child about potential on-line dangers.

Spend time with your children on-line. Have them teach you about their favorite on-line destinations.

Keep the computer in a common room in the house, not in your child’s bedroom.

Utilize parental controls provided by your service provider and/or blocking software.

Parental Control Bar 2

Since computer-sex offenders are a very real danger on the Internet, the FBI suggests that you instruct your children to:

Never arrange a face-to-face meeting with someone they met on- line.

Never upload (post) pictures of themselves onto the Internet or an on-line service to people they do not personally know.

Never give out identifying information such as their name, home address, school name, or telephone number.

Never download pictures from an unknown source; there is a good chance there could be sexually explicit images.

Never respond to messages or bulletin board postings that are suggestive, obscene, belligerent, or harassing.

Parental Control Bar 4

An important aspect of ensuring that your child is safe while using the Internet, (recommended by the FBI and child safety experts/organizations), is the installation of parental control software. Parental controls will provide you with the advantage of being able to:

Block access to materials (text and pictures) identified as inappropriate for kids.

Permit access only to materials specifically approved as safe for kids.

Specify what types of materials are appropriate for your child.

Monitor your child’s activity on the Internet by storing names of sites and/or snapshots of material seen by your child on the computer for you to view later.

Set different restrictions for each family member.

Limit results of an Internet search to content appropriate for kids.

Enforce time limits set by parents.

A free solution, available as a download from the Internet is Parental Control Bar, a browser toolbar which works on the most popular Internet browsers.

Parental Control Bar is provided free of charge to the public by WRAAC.org, a non-profit organization dedicated to providing free, effective internet control tools.

Parental Control Bar Features:

Child/Parent Mode

This status indicator makes it easy to tell if your computer is in Child-Mode or Parent-Mode. When in Child-Mode, control features are enabled and web sites are blocked based on your parental settings. When in Parent-Mode, control features are disabled and you, the parent, have unrestricted access to the Internet.

Parental Password

A single password makes it easy for you, the parent, to enable or disable Child-Mode. There is a hint to help you remember your password, or if you forget it completely have it sent to a parental email address.

Help Menu

Clicking this button opens the toolbar menu where parents can access tutorials, help menus or change your password.

Change Parental Settings

Clicking this button opens the parental settings menu where you can specify the types of content you wish to block your family from accessing in Child-Mode. You can also manage your personal list of ‘blocked’ and ‘child-safe’ sites from this menu.

Easily Block Adult Sites

The toolbar helps block a significant amount of adult-oriented websites. In addition, you may select specific sites to block by clicking this button. Once you have added a website to the ‘blocked sites’ list it is only accessible in Parent-Mode

Parental Alert

When the toolbar is in Child-Mode, this parental alert blocks your child from accessing adult-oriented websites (based on your parental settings).

Add Web Site to Safe List

Clicking this button adds the website you are currently visiting to the ’safe site’ list. Once a website is added to the ’safe site’ list it can be accessed from either Child-Mode or Parent-Mode (regardless of site label).

For parents looking for a cost-effective tool to help give their children controlled freedom on the Internet, Parental Control Bar is a safe way to go.

System requirements:

Windows 98/ME/2000/XP

Internet Explorer 5.5 and above

FireFox 1.5 and above

Safari 10.4 and above

Download at: WRAAC.org

For more information on Internet safety issues for parents and /children/teenagers, I encourage you to visit CNET. This site includes information on the following.

Developing safe and smart Internet citizens

Parents, tech outdo lawmakers on Internet safety

Parental controls that keep tabs on young Web surfers

User-generated videos challenge parental controls

Growing concerns over cyber bullying

Readers address online safety for kids

8 Comments

Filed under Browser add-ons, Firefox Add-ons, Free Security Programs, Freeware, Interconnectivity, Internet Safety for Children, Internet Safety Tools, Online Safety, Parenting Help, Safari add-ons, Safe Surfing, Software, Utilities

Slow Windows Startup? – Speedup with Free Startup Tuner 2

One of the things that I find really annoying when I install a new application is that program’s decision that it is so essential to system operation, that it automatically triggers an auto-start command on system start up.

So that means, every time my computer is booted, this type of presumptive program is started with Windows, which is rarely my intent, and in most cases is not needed.

As a result, the start sequence can become considerably longer, system resources can be ravaged, and manually shutting down these unnecessary startups can be frustrating, and time consuming.

For example, recently a friend asked me for advice on his sister’s computer that was slow at startup, and even worse, was slow in normal operation. It was easy to see why. The computer was loading 26 applications on startup which then continued to run in the background, eating up system resources.

There are a number of manual methods available to deactivate these very irritating applications from auto starting, but a great free application from Ashampoo does the job quickly, cleanly and with no fuss.

StartUp Tuner 2 lists all auto-start entries and allows you to individually delete or deactivate those entries. If you turn off all of the unnecessary entries (be sure they are not necessary), Windows will boot faster; in some cases considerably faster.

(Click pic for larger)

Bonus features:

StartUp Tuner 2 can do more than just this though. The tool can list all Windows services by name and it allows you to activate, or deactivate them, with the click of the mouse.

The application shows all installed Windows programs, but it builds its lists more quickly than the control panel software module. You can then uninstall programs that are no longer required, including program entries that the native Windows uninstaller generally leaves untouched.

Many Browser Helper Objects (BHOs) are useful, but others simply take up space on the Hard Drive and serve no useful purpose. StartUp Tuner 2 lists all of them, and allows you to delete, or deactivate them, if you determine you longer need them.

The application automatically generates a backup of the changes that you have made, giving you the opportunity to reverse any changes.

Rated 4/5 stars by CNET.

Free registration:

The StartUp Tuner 2 can be used free for 10 days. After that, free online registration is required. You will receive an activation code which will convert the test version of the program into the full version.

Ashampoo loves to remind you of the value of their full software lineup, so if you find it bothersome to receive this type of email, you’d be better off passing on StartUp Tuner 2. Personally, I find it easier to stay in the loop on new software developments, when I do receive emails soliciting my business for new applications.

System requirements: Windows 2000/XP/Vista

Download at: Download.com

7 Comments

Filed under Freeware, Slow Computer, System Tweaks, System Utilities, Uninstall Managers, Utilities, Windows Tips and Tools

Should You Need a License to Surf the Internet? – You Decide

Car drivers must be educated, practiced, and licensed in order to drive a car. This legal requirement of course, does not stop drunk drivers from getting into a car and killing innocent victims.

And it certainly does not eliminate our exposure to the speeders, tailgaters, and the road ragers that seem to plague our highways. Licensing then, doesn’t seem to eliminate the risks we face on the road.

So would requiring a license to use the Internet make it a safer place for all of us? Would requiring a license from the “Department of Computer Literacy”, protect us from the ever increasing exposure we all face to Trojans, Spyware, Virus’, Phishing Scams, Identity Theft, ….. the list goes on.

You may think that I’m being facetious; but I’m not. The fact is the dangers on the Internet are not, in a sense, unlike the dangers and risks we face while driving on our streets and highways.

Unlike the need to be educated and practiced, in order to qualify for a driver’s license; to access the Internet all that is required is a modem attached to a computer. There’s no need to prove qualifications. There’s no need to prove an awareness of the very real dangers that the Internet presents.

Being involved in computer security, I am amazed at the lack of knowledge exhibited by typical computer users, and most importantly, the lack of knowledge concerning the need to secure their machines against the ever increasing risks on the Internet.

I’m not talking about unintelligent people here. I am talking about people who are intelligent in every other aspect of life, but who view computers like cavemen who saw fire for the first time.

The problem, it seems, is multifaceted. Part of the problem is simply fear. People do not understand computers, so they are afraid of them in a sense. Secondly, people generally, are simply not interested in learning about computers sufficiently to make the fear go away. The question is, of course, should they need to know anything other than how to turn on a computer? Well maybe not.

Many computer experts agree that it is primarily flawed computer software, and not just inadequate user knowledge, that is the biggest contributor to the proliferation of unsecured computer systems and cyber-crime, on the Internet.

It seems to me then, what is needed as a good first step, are machines that are designed with simple, but internally sophisticated operating systems, secure and easy to use for the majority of users; where no user interaction is required to maintain the security of the system.

We now live in the age of the “Interconnectedness of All Things” in which we are beginning to see the development and availability of large numbers of Internet connected devices. There is no doubt that this will lend new strength to computer-aided crime and perhaps even terrorists.

Unless we develop a rational approach to the underlying security issues surrounding the Internet, and insist software companies’ stop rushing out new products with little regard for security, hackers will continue to flourish and successful attacks on computers over the internet will continue to proliferate.

There are steps you can take to decrease the likelihood you will be the victim of a successful attack on your computer.

The following is a brief guide to the basic security issues you should be aware of on the Internet, followed by a guide to some of the steps you can take to secure your computer for Internet usage.

Security risks on the Internet you need to be aware of:

Trojan horse programs

Back door and remote administration programs

Denial of service

Being an intermediary for another attack

Unprotected Windows shares

Mobile code (Java, JavaScript, and ActiveX)

Cross-site scripting

Email spoofing

Email-borne viruses

Hidden file extensions

Chat clients

Packet sniffing

Security Checklist: Actions you can take to protect your computer system:

Install WOT (Web of Trust), a free Internet Browser add-on. WOT tests web sites you are visiting for spyware, spam, viruses, browser exploits, unreliable online shops, phishing, and online scams, helping you avoid unsafe sites.

Don’t open unknown email attachments

Don’t run programs of unknown origin

Disable hidden filename extensions

Keep all applications (including your operating system) patched

Turn off your computer or disconnect from the network when not in use

Disable Java, JavaScript, and ActiveX if possible

Disable scripting features in email programs

Make regular backups of critical data

Make a boot disk in case your computer is damaged or compromised

Turn off file and printer sharing on the computer

Install a personal firewall on the computer

Install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet

Ensure the anti-virus software scans all e-mail attachments

4 Comments

Filed under Browser add-ons, Don't Get Hacked, Firefox Add-ons, Interconnectivity, Internet Safety, Malware Advisories, Online Safety, Personal Perspective, Spyware - Adware Protection, Windows Tips and Tools