Tag Archives: USB stick

Download Microsoft’s Free Microsoft Office Starter Edition 2010

Update: November 30 – This offer is no longer available.

In October of last year, I noted that Microsoft had begun a campaign to tear down OpenOffice by focusing on what Microsoft considered the downside of working with OpenOffice. This struck me as a bit unusual – after all, why waste time on those who can’t hurt your sales. Unless, that is, OpenOffice, LibreOffice and similar open source office suites, are in fact, “real competition” for Microsoft.

It seems that may well be the case since Microsoft has now released Office Starter Edition 2010 (as a freebie), which includes Microsoft Word Starter 2010 and Microsoft Excel Starter 2010 – it does not include PowerPoint or Outlook. Both included components function almost the same as the full editions.

No need to worry about licensing issues either – Office Starter 2010 is not a trial version – it will not expire. On top of that, installing the application to a USB stick makes for the perfect (sort of), portable office.

Installation is an easy task – both application download and installation combine in a seamless single process.

image

Following installation you’ll find the application, and its components, neatly laid out in your “Start” menu as illustrated below.image

Word Starter 2010 screenshot:

image

Excel Starter 2010 screenshot:

image

Fast facts:

Create and edit basic Word documents and Excel spreadsheets with 100 percent file fidelity

Open existing Word and Excel documents

Manage a simple home budget

Write letters

Create newsletters with photos and easily send them out

System requirements: Windows 7, Windows Vista with Service Pack 1, Windows Server 2003 with SP2 and MSXML 6.0 (32-bit Office only), Windows Server 2008, or later 32- or 64-bit OS.

Download Office 2010 Starter at: Microsoft

There is some discussion, at the moment, as to just how long this offer from Microsoft will continue to be available so, if you’re interested, now might be the time to jump on this.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

23 Comments

Filed under 64 Bit Software, downloads, flash drive, Free Office Suites, Freeware, Microsoft, Software, USB, Windows Tips and Tools

USBThief – Making it Easy for Cyber Criminal Wannabes

image With access to your passwords, cyber-criminals (they come in all shapes, sizes and flavors – so don’t be fooled), can and will, steal your identity and without a doubt severely compromise your financial security. Stolen passwords have the potential to cause serious havoc in your life.

There are numerous ways of course that a password can be stolen. Popular methods employed by cyber criminals include, but are not limited to:

Email scams: Email scams work because the Cyber-crooks responsible use social engineering as the hook; in other words they exploit our curiosity to start the process of infecting unaware computer users’ machines

Search engine redirection: Cyber-crooks continue to be unrelenting in their chase to infect web search results, seeding malicious websites among the top results returned by these engines. Malware, including password stealers can be installed on a computer simply by visiting a site.

Drive-by downloads: Drive-by downloads are not new; they’ve been lurking around for years it seems, but they’ve become much more common recently. They are crafted to automatically download and install malware including password stealers on your computer without your knowledge.

Added to the burden we already carry in protecting our computers, our private personal information, and our confidential financial information, we now have to be careful, and perhaps even suspicious of our friends, or for that matter anyone, who inserts a USB drive including MP3 players, such as a iPod, into a USB port on our computer.

image

USBThief is a free hacking application – available for download on virtually every torrent download site that I investigated – which can be installed on a USB flash drive, or even an iPod, or other MP3 player.

I haven’t tried (yet), to install this on a Digital Camera, but I suspect (with some modification), that it can be done. Consider how often a friend, or family member, has connected any one of these peripherals to your machine.

image USBThief has been designed and crafted with only one purpose in mind, and that is to steal both the passwords, and software keys, on the duped party’s computer.

There is no requirement that the culprit is a seasoned hacker – all that’s needed is that an ethically challenged individual download the program; decompress the archive and put all the files located in the folder “USBThief” onto a USB drive.

After connecting and removing the tweaked USB drive from the victim’s computer, the cyber-criminal simply views the dump folder to view the captured information.

Learning to use this application is an absolute “no brainer” – there are multiple sites on the Internet offering tutorials (including video tutorials), in the use of  USBThief.

Here’s a little blurb from a hacking site:

1.Insert the USB in your victim’s computer.

2.View folder “dump” to see the passwords. It also makes a second dump folder in the batexe folder. Tested and Working perfectly!

I have not written this article to produce paranoia, or to make you suspicious of either your family, or your friends, but so that you are aware of the ever increasing challenges we all face in protecting valuable information in a world that threatens us, at every turn it seems.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under Bill's Rants, cybercrime, Don't Get Scammed, Don't Get Hacked, flash drive, Geek Software and Tools, Malware Advisories, Privacy, Spyware - Adware Protection, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

USBThief – Designed to Steal Your Passwords

Stolen passwords 1 We all know that the purpose of computer passwords is to protect personal information that you’ve stored on your computer, as well as in your online accounts.

With access to confidential passwords, cyber-criminals (they come in all shapes, sizes and flavors – so don’t be fooled), can and will, steal your identity and without a doubt, severely compromise your financial security. Stolen passwords have the potential to cause serious havoc in your life.

There are numerous ways of course that a password, or software license key, can be stolen. Popular methods employed by cyber criminals include:

Email scams: Email scams work because the Cyber-crooks responsible use social engineering as the hook; in other words, they exploit our curiosity, emotions and fears, to start the process of infecting unaware computer users’ machines

Search engine redirection: Cyber-crooks continue to be unrelenting in their chase to infect web search results, seeding malicious websites among the top results returned by these engines. Malware, including password stealers can be installed on a computer simply by visiting a site.

Drive-by downloads: Drive-by downloads are not new; they’ve been lurking around for years it seems, but they’ve become much more common recently. They are crafted to automatically download and install malware, including password stealers, on your computer without your knowledge.

Now, added to the burden we already carry in protecting our computers, our private personal information, and our confidential financial information, we have to be careful, and perhaps even suspicious of our friends, or for that matter anyone, who inserts a USB drive including MP3 players, into a USB port on our computer.

USBThief is a free hacking application available for download on virtually every torrent download site that I investigated – which can be installed on a USB flash drive, or even an iPod, or other MP3 player. I haven’t tried to install this on a Digital Camera, but I suspect (with some modification), that it can be done. Consider how often a friend, or family member, has connected any one of these peripherals to your machine.

Stolen passwords 4

USBThief has been designed and crafted with only one purpose in mind, and that is to steal both the passwords, and software keys, on the duped party’s computer.

The culprit doesn’t need to be a seasoned hacker; all that’s needed is that an ethically challenged individual download the program; decompress the archive and put all the files located in the folder “USBThief” onto a USB drive.

After connecting and removing the tweaked USB drive from the victim’s computer, the cyber-criminal simply views the dump folder to view the captured information.

Should you now be suspicious of your family, or your friends? Of course not; but you do need to be aware of the ever increasing challenges we all face in protecting our valuable information.

Good news for all of us however, is in the works. Windows 7 addresses this problem with its Guest Mode feature which when activated, will prevent users from writing to any USB, or other attached device or drive.

2 Comments

Filed under Don't Get Hacked, Freeware, Interconnectivity, Malware Advisories, PC Monitoring Application and Key Loggers, Software, System Security, USB, Windows Tips and Tools

Steal Your Friends Passwords and Software Licenses!

I’ll bet that headline got your attention!

We all know that the purpose of computer passwords is to protect personal information that you’ve stored on your computer, and in your online accounts.

With access to your passwords, cyber-criminals (they come in all shapes, sizes and flavors – so don’t be fooled), can and will, steal your identity and without a doubt severely compromise your financial security. Stolen passwords have the potential to cause serious havoc in your life.

There are numerous ways of course that a password, or software license key, can be stolen. Popular methods employed by cyber criminals include, but are not limited to:

Email scams: Email scams work because the Cyber-crooks responsible use social engineering as the hook; in other words they exploit our curiosity to start the process of infecting unaware computer users’ machines

Search engine redirection: Cyber-crooks continue to be unrelenting in their chase to infect web search results, seeding malicious websites among the top results returned by these engines. Malware, including password stealers can be installed on a computer simply by visiting a site.

Drive-by downloads: Drive-by downloads are not new; they’ve been lurking around for years it seems, but they’ve become much more common recently. They are crafted to automatically download and install malware including password stealers on your computer without your knowledge.

Now, added to the burden we already carry in protecting our computers, our private personal information, and our confidential financial information, we now have to be careful, and perhaps even suspicious of our friends, or for that matter anyone, who inserts a USB drive including MP3 players into a USB port on our computer.

USBThief is a free hacking application – available for download on virtually every torrent download site that I investigated – which can be installed on a USB flash drive, or even an iPod, or other MP3 player. I haven’t tried to install this on a Digital Camera, but I suspect (with some modification), that it can be done. Consider how often a friend, or family member, has connected any one of these peripherals to your machine.

USBThief has been designed and crafted with only one purpose in mind, and that is to steal both the passwords, and software keys, on the duped party’s computer.

There is no requirement that the culprit is a seasoned hacker – all that’s needed is that an ethically challenged individual download the program; decompress the archive and put all the files located in the folder “USBThief” onto a USB drive.

After connecting and removing the tweaked USB drive from the victim’s computer, the cyber-criminal simply views the dump folder to view the captured information.

I have not written this article to produce paranoia, or to make you suspicious of either your family, or your friends, but so that you are aware of the ever increasing challenges we all face in protecting valuable information in a world that threatens us, at every turn it seems.

4 Comments

Filed under Don't Get Hacked, Geek Software and Tools, Interconnectivity, Malware Advisories, Privacy, Software, Spyware - Adware Protection, USB, Windows Tips and Tools