Saturday, May 31, 2008

International cooperation busts cyber-crime ring



In a pair of related cases, a total of 38 people with links to global organized crime—mostly working out of Romania and the U.S., but also operating in Pakistan, Portugal, and Canada—were indicted for engineering a decidedly 21st century cyber-based scheme. (From the FBI Website.)

By using the fairly routine online crime of "phishing", the online scam also used a clever offline payoff, and ultimately swindling thousands of people and hundreds of financial institutions out of millions before being shut down.

  • Phraudsters working primarily out of Romania—known as the “suppliers”—went phishing and obtained thousands of credit and debit card accounts and related personal information by sending out masses of spam.
  • These suppliers then sent their ill-gotten financial data to their partners in the U.S.—so-called “cashiers”—through Internet chat and e-mail messages.
  • By using some sophisticated but readily available software and technologies, the cashiers manufactured their own credit, debit, and gift cards encoded with the stolen information, giving them unfettered access to large amounts of money via ATMs and point-of-sale terminals.
  • Before these cards were used, cashiers directed “runners” to test the cards by checking balances or withdrawing small amounts of money from ATMs. Then, these “cashable” cards were used on the most lucrative accounts.
  • The cashiers wired a percentage of the illegal proceeds back to the suppliers.

    (More details of the method used, the people charged, the charges and possible sentences, can be read here.)

    Folks-- were you one of the "thousands" who responded? One phish message was made to appear as if it originated from Connecticut-based People’s Bank. (In fact, the e-mail message directed victims to a computer in Minnesota that had been “hacked,” and used to host a counterfeit People’s Bank Internet site. {called "pharming"}) During the course of the investigation, it was determined that the individuals had engaged in similar phishing schemes against many other financial institutions and companies, including Citibank, Capital One, JPMorgan Chase & Co., Comerica Bank, Wells Fargo & Co., eBay and PayPal.

    Tip of the day: I don't care how "authentic" the e-mail, IM, or text message looks; don't click the link!

    Today's free link: This video quick tip on CNet TV shows you how to move your complete (including playlists and metadata) iTunes library to a new computer.

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix



  • Friday, May 30, 2008

    Mrs. Kitty Anderson

    Folks, there will not be an article today on Tech--for Everyone.. and it is quite possible that I may never write another article ever again. I may just retire.

    Now before you go getting all 'het up', and cross with me, I want you to ask yourself if maybe you wouldn't retire too.. if you were me. Understand, I'm rich now. See? This e-mail proves it:

    BRITISH NATIONAL LOTTERY LONDON, UK.
    PRICE AWARD DEPARTMENT.
    Ref: UK/0274K82/10
    Batch: 172/104/ZY370
    We the Board and Management of the British National Lottery happily announce to you the draw (#251) of the British National Lottery.. claim a total sum of £1,000,000 (ONE
    MILLION POUNDS) in cash credited...

    I am not exactly sure how much real money a million "pounds" works out to be.. but I'm thinking it is a pretty good sum, and I'm hoping it is enough to buy myself a tropical island somewhere in the Pacific.. Because I think that would be pretty neat. Me. Palm trees. Sandy beaches. Sunshine.

    I have sent my vital information, and winning reference number to Mr.Hillary Martins (The Foreign Service Manager) as the e-mail instructed me to do.. and now I am simply waiting for them to deposit the money into my account.
    Once that happens, I'm pretty sure I'll be out of here.. because that's gotta be a lot of money.

    In fact, I think it's enough money that I'm willing to overlook the "PRICE AWARD". (I know they meant "prize". They're probably just as excited and happy as I am..) I've never been a millionaire before.. this is so cool!

    Today's free link: http://www.scambusters.org/

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

    Thursday, May 29, 2008

    Apple releases 41 patches for Leopard, Flash

    Keeping your software patched and up-to-date is a vital part of safe(r) computing these days. I cannot recommend enthusiastically enough that you enable "automatic" updating wherever and whenever it is offered.
    A "patch" (aka "update") closes 'holes' (aka "vulnerabilities") that hackers are "exploiting" to take control of, or plant malware on, (your) machines.

    There is an active exploit out there for the Flash player (Those animations on Webpages) that affects anyone who has not disabled Flash-- whether you're running Windows, Mac, or Linux.
    If you like having Flash animations, you should visit this page on the Adobe Website which will analyze your version of Flash Player to see if you need to update.

    Mac users should visit Apple Update and get these important updates.

    Today's free link: A repeat today, because you really should know about this free tool: the Secunia Software Inspector will scan your machine's installed programs and determine if they're out-of-date, or there's patches missing-- and it will help you resolve the problems it finds.

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix



    Wednesday, May 28, 2008

    Skype says I'm infected with malware...

    Yesterday a "chat" window (Skype) opened on my machine, and presented me with a dire warning from someone named "Software Update". It said that "WINDOWS REQUIRES IMMEDIATE ATTENTION" and, it provided me with a solution.
    SkypePhish

    Please, folks, tell me you have spotted this for what it is.

    Please tell me that you knew --instantly-- that this is a cybercrime attempt.. that it is Phraud-ulent.

    Please tell me that you know what will happen if the link provided in this message is clicked; and, please, please, please tell me you would never click the link.

    Just in case you aren't sure...
    * "Software Update" doesn't exist.
    * "www.onlinemonitor.info" is not registered in ARIN (the registry of Internet addresses)
    * clicking the link will allow scripts to run and/or take you to a poisoned Website which will install malware on your machine.. or/and, it may take you to a site that will sell you a rogue antispyware program (please read my article, Is that antispyware program really spyware).. all of this so that the hacker can take control of your machine.
    * Microsoft DOES NOT alert you via Instant Messaging. No legitimate company does.

    This is a classic example of a hacker's attempt to get you to click their link. Please point your less-savvy friends and family to this article and educate them to the dangers of spam (unsolicited) messages: show them, and tell them--
    NEVER CLICK THE LINK.

    Today's free link: I have assembled on my Website a collection of links to the best free anti-malware programs to help you prevent infection.. and clean up if you've been infected. To see them, click here.

    Copyright 2007-8 Tech Paul. All rights reserved.jaanix post to jaanix

    Tuesday, May 27, 2008

    When bigger was better

    I love to read. I love books, and magazines, and libraries. I like reading so much, that I have even purchased books; though I much prefer to get them free. I am always on the look-out for books at yard sales, Church sales, and the library's Free Bin. I have discovered writers, and read about esoteric topics I never would have, simply because they were in a box of paperbacks I picked up for a dollar.
    This has been true for as longs as I can remember.

    Needless to say, the books you pick up for free at such places as I mentioned are somewhat.. well, out of date and often are really old. (The book I'm about to mention is older than I am, if you can imagine that!)

    In my latest bag of free books I discovered a book from 1961 titled, SAC, Men and Machines of Our Strategic Air Command. (This was published well before Dr. Strangelove* made the scene.) This book provided a tour of the branch of the Air Force often thought of as the "doomsday boys"-- the ICBM and B-52 crews of the Cold War policy of MAD.

    The reason I mention it here is because of this picture of the "computerized nerve-center" of SAC Headquarters-- titled "IBM Underground Computers"
    SAC computer room

    "Still further underground the electronic computers of SAC hum continually as all new information of interest is fed into the giant machines. Here all information pertaining to SAC, such as status of aircraft, missiles, crews, bases, war plans and supplies, are stored for instant readiness right up to the minute. In case of war these computers would record progress of strike force, so that all data is instantly available for use in strategy maneuvers. From a trajectory center, intelligence specialists will, with the aid of such computers, mathematically compute trajectory and space data for use in aiming SAC missiles from its many bases."

    This picture fascinates me. Here you see the machines that have evolved into your PC's today (In fact, your laptop is more capable than this whole room was).
    Of particular note:
    * The reel-to-reel things in the back, nearly as tall as a man, are what we call a "hard-drive" today.. and I doubt that all of them (I count 7) added together equals a Gigabyte.
    * In the foreground is a printer-- as big as a wetbar, and capable of printing 60 words a-minute.
    * Where's the monitor?

    This was the best money could buy back then, and I would estimate you're looking at several million dollars' worth of equipment. State of the art-- 1961.

    As the saying goes, we've come a long way, baby!

    * A Tech Paul's Top 100 Movies list member.

    Today's free link: Looking for a great way to view and manage your RSS feeds from your desktop? Look no further than , the most popular Windows RSS reader.

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

    Monday, May 26, 2008

    Holiday Edition-- IE questions & Security "Zones"

    My recent article on tweaking IE 7 and using Security Zones has prompted several reader questions whose answers are worth posting here. So today there will not be my usual Tip of the day, but instead there will be several Q's and their A's. If for some reason you missed the original article and would like to get up to speed, click here.

    Q. Can't add a site to Trusted Zone, Why are my options "greyed out"?
    A. The person who sent me this question did not specify if they were experiencing this at home, or at work, which can have different causes. If you are on your personal machine at home, the most likely cause for having any Settings or Options choices greyed out (unavailable) is that you are running in User mode. You need to be running as an Administrator to make changes to Windows' behavior. Log out of your current session by clicking on Start >Log Off and switch to a user account with administrator privilege. Now your menu choices will not be grayed out and you can make your changes. When you're finished, log off and return to your normal user account.
    If you're at work and using the company's machine, it is likely that there are policies in place that prevent employees from making these kinds of changes. If you have a legitimate change (that will "help improve your productivity") that you'd like to have made, submit a request to your IT department.
    **Also, some types of malware will modify your Trusted Sites zone (adding poisoned, or junk sites such as a bogus lottery) and then change a setting in your Registry which blocks -- greys outs -- your ability to go in and remove them. Use anti-spyware programs to scan your machine and remove the infection. In this case, I would start with the Microsoft Malicious Software Removal Tool.

    Q. How do I remove a site from a Zone?
    A. You can remove a site from any Zone by navigating to the Security tab of Internet Options as shown in the prior article, click on the zone you want to edit, and then click on the site you want to remove, as shown below.
    remvsite.jpg
    Now click on the "Remove" button.
    Actually, the fella who sent me this question was referring specifically to the Restricted Sites zone. He either really doesn't trust Microsoft, or is trying purposely to load his machine with malware...either way, I would think twice before removing sites from the Restricted Sites zone!

    Q. What should I do with these security warnings?
    A. IE displays several types of warnings -- suspected phishing, ActiveX, prevented download, open site in your Trusted Zone, et al -- and so the answer depends on which warning you are getting...and what you're doing when you get them.
    If you are being warned that the site you're looking at is a "suspected" Phishing site, then by all means do NOT enter any personal information! As these sites often also try to install trojan horses and malware downloaders, close down your browser and run a full antispyware sweep. Not all "suspected" sites are truly Phishing sites, sometimes mistakes happen, but in this day and age, it's better to err on the side of caution.
    ActiveX is a tool (a bit like Java) that usually is used for good purposes, more often than not actually (Microsoft Update uses ActiveX, and that's something you definately want enabled), but in keeping with the thought expressed immediately above, you should decide on a case-by-case basis. If you can see and do everything you want to on a site without installing the ActiveX control, why install it?
    Preventing unwanted downloads is a very good thing, so I strongly advice you: do not turn this warning feature off. Just click on the yellow bar and select "download this software" when you are downloading code. In fact, I believe this advice can be applied to all of IE's warnings. We are living in a world where the Internet is relatively unpoliced, and so while it is irritating, it is safer (and wiser) to live with these warnings that to have our identity stolen and used to commit crimes, or have our PCs turned into a spambot.

    Today's free link: if you suspect a site is fraudulent and/or being used to "phish" for your personal information, and IE hasn't flagged it as such -- but you're suspicious anyway -- download McAfee's free Site Advisor. This IE "plug in" will give you a valuable 'second opinion'...and is updated more often than IE is.

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

    Friday, May 23, 2008

    The WorldWide Telescope: An amazing app

    Yesterday I attended an event at Microsoft's Silicon Valley Research Center and learned  about the technologies of the future.

    Well, sort of. What I saw was an overview of what Microsoft is doing in the area of R&D-- research and development.
    Microsoft is planning on sticking around for a while, and they understand that technology is innovation... not a stagnant build-it-once-sell-it-a-million-times type thing, like a paperclip.

    This from their Website: "Microsoft Research is dedicated to conducting both basic and applied research in computer science and software engineering. Its goals are to enhance the user experience on computing devices, reduce the cost of writing and maintaining software, and invent novel computing technologies."

    It was an interesting and informative event, and I want to take a minute and thank those folks involved.

    * The keynote technology displayed was a program that is available now, and it is pretty amazing -- especially when one considers the amount of data that must be accessed -- it's a virtual picture of the universe. And the best part is, you can explore it.
    Yes, you can fly to Mars... or Rigel.. or the crab nebula.. or the top of Mt. Rainier here on earth (Virtual Earth is one data source).

    "A state-of-the-art combination of software and Web 2.0 services, WorldWide Telescope offers terabytes of high-resolution images, astronomical data, and guided tours that bring the universe to your fingertips." (again, from Website.)

    This isn't just pictures folks, when you right-click on Mars (for example) and select Properties, you will be offered practically every known fact about Mars. This is an unparalleled learning tool!

    The engine behind this is kind of hard to explain; maybe.. real-time, super-advanced PowerPoint? Infinite MSN Maps?
    But I don't have to try to explain it. You can see it for yourself, and I highly suggest you do. Simply stunning.

    To read more about the project, click here.
    To see it -- and if it interests you -- download it for yourself, click here.

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

    Thursday, May 22, 2008

    Make Outlook open when Windows starts

    Do you have a favorite program that you'd like to start as soon as Windows does -- perhaps your email client? I have told you in previous articles about stopping programs from loading at boot, and today I'll tell you how to reverse the process, and gain further control your computer's behavior.

    Tip of the day: It seems a lot of you have been interested in how to remove unwanted programs from your Startup Folder, and if you've done so, you already know how to navigate to and open it. For today's tip I'm going to use as an example adding Outlook Express, so that it will automatically open for you when you turn on your machine and start your day (simply substitute the program you use). Because if you're like me, one of the first things you do is check your email...and you like to save steps and time. I will also show you a different way of navigating to the folder.

    In the previous articles I told you that when you deleted programs from your Startup Folder you we not deleting the programs -- merely shortcuts to the program. Today we're going to add a shortcut.
    In Windows XP, start by opening My Computer, either by Start >My Computer, or double-clicking the My Computer icon on your desktop. Now double-click the Local Drive (C:) icon, [you may get a window saying "these files and folders are hidden". Just click on the "view these now" link.] and then locate and double-click the Documents and Settings folder.

    docsett.jpg

    If you wanted to make a change for all the users of your machine you would open the All Users folder. Since we are customizing the start-up behavior just for ourselves, we open the folder that matches our User Name -- in this machine's case, the folder named "Terry" (sharp-eyed, security-conscious types will notice that the Administrator account hasn't been renamed on this machine -- a "no no".). Now we look for and open the Start Menu Folder. Open it and then open the Program folder, and finally, Startup.

    DeskTp

    As you can see, this User Account has no programs at all listed in its Startup folder. That doesn't mean that no programs launch at boot. The programs I do want, (antivirus, firewall, etc.) I want to have run no matter who is using the machine, so they're listed in the "All User's" Startup folder.

    In Vista, it is a little different: the Startup folder is listed in Programs, accessed from the Start button. Click Start >Programs and scroll down until you see the folder labeled Startup. Double-click it to open its contents window and drag your shortcuts into there.

    Adding a program shortcut is easy, and it's easiest if there is already an icon on the desktop (which is also a shortcut, btw). Simply right-click on the icon and drag it into the open Startup window, and let go. A menu will open: select "Create shortcut here". And that's it. You're done.
    If there isn't a desktop icon, hover your mouse over the Start button, and then Programs. Now the list of all your programs appears. Again, simply right-click and drag the ones you want, as outlined immediately above. Now the next time you boot Windows, those programs will open for you automatically. A neat little trick.

    Today's free link: Trillion. For those of us who use Instant Messaging. This tool lets you combine your various IMs into a single "control panel". From Website: "Trillian™ is a fully featured, stand-alone, skinnable chat client that supports AIM, ICQ, MSN, Yahoo Messenger, and IRC. It provides capabilities not possible with original network clients, while supporting standard features such as audio chat, file transfers, group chats, chat rooms, buddy icons, multiple simultaneous connections to the same network, server-side contact importing, typing notification, direct connection (AIM), proxy support, encrypted messaging (AIM/ICQ), SMS support, and privacy settings."

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

    Share this post :

    Wednesday, May 21, 2008

    The print job won't stop printing

    Sometimes we tell our machines to do something (let's, for the sake of example choose, oh, say, print a 10-page document) and then, being human and somewhat fickle, we change our minds.

    Perhaps we notice that we selected the wrong document; or, we have a sudden "inspiration" and there's now a whole new thought we want to insert into it.. or we notice a major typo that we need to fix. Whatever it is, we want the printer to stop printing NOW.

    Now what I am going to say next might comes as a surprise and a shock to some of you folks-- but, sometimes in life you just have to grab that band-aid by the corner and rip that sucker off.
    Here's the thing, and I ain't gonna sugarcoat it-- computers are dumb machines. (Maybe, instead of "dumb", I should say "obedient"..)

    Computers follow rigid logic to obey the "commands" you "input", and they really don't "multitask" very well. They 'think' and act sequentially.. and don't move on to the next input/command until they have completed the first one.
    What this means is: they won't even see the command to stop printing the 10-page document until they have "processed" the Print command you gave earlier.
    (The paper and ink that gets wasted this way is truly your fault, and not the computer's. You told it to Print, and it merely obeys!)

    When you hit the power button on the printer (or yank the power cord out of the wall) you haven't really stopped the Print job. Oh, no. You have only interrupted it. When you turn it back on, or reconnect the USB cord-- your machine is going to everything in its power to complete its assigned task.. and it starts printing the 10-pager from right where it left off.

    The correct way to stop the print job (you commanded) is to erase it from your PC's memory. Remember I told you computers were dumb? Well, they can be forgetful too.

    1) Go to Printers in your Control Panel (In XP: Start> Settings> Printers and Faxes. In Vista: Start> Control Panel> Hardware and Sounds> Printers.)
    2) Double-click on the printer that is still trying to print the 10-page document.

    The window that opens will show all the print jobs scheduled to be sent to the printer for completion, and the 10-page document should appear here.

    3) Click on "Printer" from the menu bar, and click "Cancel All Documents". (Answer "Yes" if you're asked, "are you sure?")
    PrintQ

    That's it. Your computer has now "forgotten" your command to print, and when you turn your printer on again, it will not start printing something you no longer want.

    Copyright © 2007-8 Tech Paul. All rights reserved.jaanix post to jaanix

    Tuesday, May 20, 2008

    IE's Menu bar, Taskbar icons, and bad Updates*

    Reader questions this week bring me back to IE 7 and the Taskbar, and a new topic: what to do when an Update causes crashes and other troubles. So today I will not post my usual Tip of the day, but the (hopefully) now familiar "Q's and their A's" format.

    IE 7 Questions: (you may want to review my post on IE7 Security zones, and Questions answered, as well.)

    Q: My Explorer menu bar disappeared, how do I get it back?
    A: In IE version 7, the old familiar menu bar (File, Edit, View, etc.) was removed from the default configuration to 'streamline' IE's look, and quite possibly because Microsoft was aware that people were installing their own toolbars (see "toolbar madness"). To get it back, use a method similar to the one used for Windows' Taskbar. Click on the down arrow next to the gray "gear" icon marked "Tools" and click on the Menu bar option. Now a checkmark will appear next to it, and your menu bar is back. To keep it there, hover your mouse over the option below Menu bar, "Toolbars", and click on (select) the "Lock the toolbars" option.
    While you're there, you may want to play around with the "Customize" option and tweak which buttons appear on your bars.

    Q: I can't add a site to my Trusted zone:
    A: I answered this in the previous answers post, but this detail is worth repeating: The person was on their personal machine and was running as an administrator, so there's no problem there. The trouble was they hadn't cleared the checkbox next to "Require server verification (https:) for all sites in this zone".https.jpgThe difference is the "s" at the end of "http", which indicates a special, secured Internet protocol. You will know if you're on such a Website by the gold lock icon that appears in the URL window (and/or elsewhere on the page). It is an encrypted connection generally only used for electronic payment sites. A check here prevents you from adding regular websites.

    Q: Can I make IE block sites when my child is browsing, but allow them for me?
    A: This is a great question! And the answers are: yes, sort of, and ... how many sites are we talking about? There are a couple of ways to go about this, but I want to spend more time on this topic than there's room for here today. Protecting your children from the dangers of the Internet is a huge subject. Please see my page on this topic.

    Taskbar question:

    Q: What happened to the icons in my Taskbar?
    A: These "my icons disappeared" questions depend on if we're talking about the Notification area (on the right, by the clock), or the Quick Launch area (on the left, by the Start button).
    In the Notification area, an icon's disappearance usually indicates that the "process" has gone idle and is not "running" at the moment.That means it isn't needed, and hasn't been needed for quite some time. It will run when it's needed so, in this case don't worry about it. In some instances, such as the speaker icon or the the two PC's network icon, speaker.jpga checkbox has become unchecked and you simply need to check it again. Click on Start >Control Panel >Speakers and Audio devices, and select (check) the "Place an icon in the Taskbar".

    If the Quick Launch icons have disappeared, right-click on a blank area in the Taskbar and select Properties. Click on the Taskbar tab, and place a check in the checkbox labeled "Show Quick Launch". As I have mentioned before, these Quick Launch icons are simply shortcuts. You can add more shortcuts here by simple drag-and-drop, or remove the ones you never use.

    NOTE: If your icons have always been there and then, suddenly, some (or all) of them are gone -- you may have picked up some malware. I recommend that you run "deep" antivirus and an anti-spyware scans immediately.

    Windows Update:

    Q: An Update is causing BSOD's, what do I do?
    A: From time to time a Microsoft security Update will not be compatible with the software and/or device drivers on your machine and the instability will trigger the Blue Screen Of Death (for more on BSOD's and what to do, see "When good computers go bad"). Usually, Microsoft will repair this and issue a new Update ... eventually. In the meantime, remove the Update (If you're not sure which Update is the perp, remove the most recent ones) by going to Add/Remove Programs in your Control Panel. (Start >Settings >Control Panel >Add/Remove Programs) Now look to the top area and place a check (select) in the "Show updates" checkbox. Now you will be able to see the list of installed Updates.
    add1.jpg
    Click on the Update you want to remove, and click on the Remove button.

    Today's free link: I do NOT recommend uninstalling security updates unless they cause your machine to become inoperable. I am a big fan of security updates and want all my vulnerabilities patched. If you're like me in that aspect, Secunia's Personal Software Inspector is for you. While this software is still in beta, it is very good at scanning all your programs and reporting any missing updates and open vulnerabilities. (Thanks Ryan!)

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

    Share this post :

    Monday, May 19, 2008

    Mailbag: reader questions answered, Apple Edition

    Today I am going to answer a few questions submitted by readers, in the Q's and their A's format.

    Q: Will the programs I have on my old Mac run on a new "Leopard" system?
    A: There are enough differences in the new OS X 10.5 that some programs may need to be replaced with the latest versions that are "Leopard-compatible" (Norton AV often needs this, for example) to run at their best. The keyword is "may": most programs will work just fine once you visit Apple Update.
    Please note-- if you intend to migrate your programs and data from an old machine to the new Leopard machine, make sure you have updated all the software (programs) on the old machine before initiating the migration. Leopard will/can refuse to accept programs that aren't current.

    Q: I am thinking about buying a new iMac and I was told Apple runs on Intel circuits now. Does this mean I would be vulnerable to viruses, worms and spyware like Windows? What security programs would I need?
    A: While it is true that Apple runs on the same type of "circuits" as Windows PC's now, it is not your hardware that is vulnerable to malware and hackers, but the lines of software "code" (programming) that make up your applications/programs.
    Now to the second part of your question... The lines of code that make up the Mac operating system (the most recent being OSX 10.5 "Leopard") are not currently being targeted by the bad guys.. simply because there's too few machines running it (and the ones that are do not contain credit card number databases). However, some of the programs you would have on your Mac are being targeted for exploits-- QuickTime (a media format/player) and the Safari browser, notably. (Neither of which you need, btw.)
    And now the last part: as things stand, today, if you are running a fully updated Leopard machine, and the firewall is on, you really don't need a "protection program". That statement may not be true this afternoon, or next week, or next month (for future readers, this was written 05/19/08) and so you may, for peace of mind, want to install the Norton Internet Security 2008 package*.

    Today's free link: I'm keeping with a Macintosh theme today, and so today's app is for Apple users. I don't want it said that I never think of you guys! Watch TV on your iMac with Miro, a C/Net Editor's Choice. Description: "Democracy Player is a free and open source internet TV/video podcast application, with a beautiful, easy to use interface. You can subscribe to any Internet TV channel, including video podcasts, video RSS feeds, bittorrent feeds, and video blogs. A built-in Channel Guide lists hundreds of channels of all types, all free to subscribe to. Browse videos, download, and watch fullscreen-- all in the same application."

    * Folks, please don't write to tell me "Norton is evil". Read the reviews for NIS 2008. It may open your eyes.

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix


    Share this post :

    Saturday, May 17, 2008

    Digital device + water = oh no!*

    Folks, where I live we're actually having the kind of weather that makes one think about jumping into the pool. This reminded me that the time is right for me to re-publish my How To on what to do when your cellphone or laptop gets wet.

    From time to time I do something stupid -- like stub my toe or knock my coffee mug over or blurt out a blaspheme in the general vicinity of women and small children. On my better days, I sometimes do all three at once.
    This Saturday I went swimming, and I had my cell phone in the pocket of my shorts. Like I said, stupid. To my credit, I noticed that sad fact quite quickly. But the damage had been done. The phone had suffered not just a spill, but total immersion--submersion--and it was wet. In my defense, it was over a hundred degrees. In the shade.

    It is a simple and a natural fact that electronic devices and water (or coffee) don't 'play well together'. It would not in the least be unreasonable to assume that total immersion of an electronic device (such as my phone) would render it, to use a technical term, kaput. Quick action on my part, good fortune, and the fact that I wasn't using the phone underwater (it was "off") combined, in this particular case, for a much happier result, and my phone seems to be no worse for its adventure. (The fact that my make and model phone is very low end probably, to my way of thinking, helped a bit too. It has always struck me that the more costly to replace something is, the more delicate and fragile it is. A cosmic law, perhaps?)

    Tip of the day: Rescue your drowned device with quick action.
    Should you be suddenly struck with a case of bad luck and/or fumble-fingers, and you spill your drink right onto your keyboard, or you find some other creative way to get liquid onto your digital device, all may not be lost. The quicker, and more effectively you do the following, the better your chances of saving your device from the recycler's heap.

    1) The first and most important thing is to turn it off and remove any power source. Shut it down, yank the cord, remove the battery, isolate the dilithium crystals! And do it fast. Some devices, such as those connected to your PC by USB cables, and keyboards, get some voltage through their connecting cable, so also remove any attached cords or cables. Turning it off is not enough. You need to open the cover and remove any batteries. Remember, it is not the moisture which will ruin your device, it's "short circuits", and those are an electrical phenomenon.

    2) Get as much of the moisture out as quickly as possible. Pick it up and let gravity drain it as much as possible. You should have the battery cover off already, now open up the device as much as possible. If we're talking about a laptop, remove any PCMCIA cards (PC cards), release and remove the optical drive, and turn it upside down and with a screwdriver remove any access panels -- such as the one covering your RAM chips. If your model allows, release the spring-latches and remove the keypad.
    If we're talking about a cellphone or PDA or MP3 player, try "popping" its case with a flat-head screwdriver. If the Web is available on another nearby machine, go online and look at the manufacturer's instructions for opening the device's case. Now that it is opened as much as possible, gently blot with a paper towel, or whatever absorbent material is handy.

    [Note: If the liquid you spilled is the kind that dries sticky, such as a soda, you have more work to do. If it's available, use rubbing alcohol (the "purer" the better) and cotton swabs to clean it up as much as you can. If rubbing alcohol is not handy, use water. Yes, water. Distilled if possible.]

    Removing the moisture is key: drain and blot what liquid you can see. When that's done, rest assured that there is still more liquid lurking in your device. Now is when absorption and evaporation become our friend. Since it was a hundred degrees outside, I simply left my phone in the sun for several hours. If sunshine is not an option, you can try using a hairdryer set to low (this will take a while), or if you're brave (and ready to stand and keep a close eye), place it in a conventional oven set no higher than 150 degrees, for an hour. In the case of a PDA or phone, you can also carry it, wrapped in tissue or a hanky, close to your body in a pocket. Another trick is to place the device in a sealed plastic bag with a handful of uncooked rice. Replace the rice every couple of hours or so.

    3) Regardless of the method used, I strongly advise you to not reassemble and power up your device until the following day. Give evaporation/absorption every chance.

    If you are lucky, and have lived a "clean life", your device will power up and function just fine -- good luck and how quickly you removed the power being the key contributors to your success. If, however, you power up and your device functions strangely, or not at all, you may be able to isolate and replace the malfunctioning component (if you're an experienced troubleshooter type). Or you may want to take it in to your friendly neighborhood repair shop and have them do it. Sometimes it is more cost-effective to simply replace the device; your particular situation will vary.

    Free link of the day: As my faithful readers know, I am a big proponent of combating the modern plague of adware, spyware, and all sorts of malware. I have posted links for the better free versions of anti-spyware applications in the past. Sometimes though, it pays to invest in a "professional strength" application. The subscription-based anti-spyware application I use is the consistently top-rated Webroot Spy Sweeper. I suggest you try-before-you-buy whenever possible, and to do that with Spy Sweeper, click here.
    * update: in the year that has elapsed since this was first posted, I have switched to Spyware Doctor. You can download a trial version of the "Full" edition here, or get the "limited" edition free as part of the Google Pack.

    Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

    Share this post :