Monthly Archives October 2011

Toolkit – PC Firewall

Zone Alarm Personal Firewall by Zone Labs
Protects your computer by placing a barrier between your PC and all network traffic coming in and going out of your computer.  Make sure you are downloading the free ZoneAlarm firewall and not the ZoneAlarm Security suite which is “nagware”.  What that means is that after 30-60 days of free use, the software begins to nag you to upgrade to the paid version.


Read More

Rootkit Scanner

A rootkit is a stealthy type of malicious software (malware) designed to hide it existence from the Windows operating system as well as hide from Antivirus and AntiMalware scanners.  If your computer continues, and I’m talking every few minutes or hours, to become re-infected with Trojans, Viruses, or Malware then you might have a rootkit.  Rootkits can remain on your computer and re-infect the computer even if you perform a system restore, reload your operating system, or use a manufactures factory installation media.

Malware-Bytes  Rootkit scanner – An excellent utiity that is small, easy to use and is one of the best rootkit scanners available.

Kapersky Anti-rootkit utility – TDSSKiller is a free utility provided by Kapersky that will scan for Malicious rootkit software on your computer. 

McAfee now provides a Rootkit scanner –  A Rootkit is basically a malicous program (virus) that hides itself by using invalid WIndows characters – Microsoft will not let you create a file or folder with characters – !@#$%^&*()….).  Most antivirus scanners can not detect rootkits.


Read More

Toolkit – AntiMalware and AntiSpyware

Special Note:   Remember – If your computer appears to be infected the first step I perform is a Windows Recover / System Restore.  A system restore will return your computers system files to a state recorded on a particlulare date and time you have selected (before the infection).

The longer the virus, malware, or scare-ware is running the more deeply it can embed itself into your computer, even disabling the ability to install antivirus / antimalware scanners.  When you perform a system restore the malicious files may still be on your computer but the modifications made by the virus that allows it to run when the computer starts up or the changes to critical system files will have be removed and restored.  You need to still need to scan your computer after the system restore with an updated Anti-virus and / or Malware scanner.

To perform a system restore:
Windows Vista / 7  Start / (all) Programs / Accessories / System Tools / System Restore. Restore your computer to an earlier date and time (when your computer was not infected).
Windows 8 / 10  – Control Panel / Recovery / Open System Restore

Malwarebytes (free edition Scanner – Purchased …


Read More

Toolkit – AntiVirus

Special Note:

Remember – If your computer appears to be infected the first step I perform is a Windows System Restore.  A system restore will return your computers system files to a state recorded on a specific date and time that select.

The longer the virus, malware, or scare-ware is running the more deeply it can embed itself into your computer, even disabling the ability to install antivirus / antimalware scanners.  When you perform a system restore the malicious files may still be on your computer but the modifications made by the virus that allows it to run when the computer starts up or the changes to critical system files will have be removed and restored.  You need to still need to scan your computer after the system restore with an updated Anti-virus and / or Malware scanner.

To perform a system restore:
Start / (all) Programs / Accessories / System Tools / System Restore. Restore your computer to an earlier date and time (when your computer was not infected).

Most Internet Service Providers (Comcast, ATT, brighthouse) provide a free Anti-Virus security suit.  If your ISP does not provide antivirus protection, select one of the free suits below.

Microsoft


Read More

Podcast: October 22, 2011

Gary Baker, Ed Rudel, Cal Carson, Foster Braun, Erik Anderson

Show Notes:

Education Embraces E-learning: Jim Rarus and Anupam Chugh talk about RESA’s role is expanding education in Wayne County through online resources.

Celebrating the iPod’s 10th Anniversary: The little device that shook the world.

Here kitty, kitty.  Taming Lion and installing iOS5 on Apple devices.

Our second hour is focused on answering listener questions that have been sent to us by email.  We will tackle each issue in a roundtable format and even call some of our listeners to answer their questions personally.  Don’t miss this segment of our show.

Podcast: October 22, 2011 – Hour 1
Podcast: October 22, 2011 – Hour 2


Read More

Microsoft Weblinks

Thanks to Dave Sawyer, Technical Director, Microsoft Heartland Division for these interesting and useful links:

Microsoft Security Report http://www.microsoft.com/security/sir/default.aspx

Take your browsers for a test drive and compare the results http://ie.microsoft.com/testdrive/Views/SiteMap/

Your Browser Matters (Shows how your browser protects you) http://www.yourbrowsermatters.org/#/home

Microsoft Home Security Essentials Suite (32 and 64 bit available) http://www.microsoft.com/en-us/security_essentials/default.aspx

Steve Sinofsky, MS Windows Chief, presents Windows 8 Build: http://channel9.msdn.com/events/BUILD/BUILD2011/KEY-0001


Read More

Netflix Android App Steals Account Information

It may look like a legitimate Netflix app, but it’s not. Users of devices with the Android OS need to beware of a phony Netflix application that looks a lot like the real thing but delivers a nasty payload designed to steal account information.


Read More

Microsoft Releases Latest Malware Report

The folks in Redmond want you to be up on the latest threats to computing and what you can do about that.  They recently released their semi annual Security Intelligence Report.  Here is a quick outline of their findings and steps consumers can take.

Key findings in volume 11:

  • A new method of analyzing malware distribution indicates that the zero-day vulnerability accounted for a very small percentage of actual infections in the first half of 2011
  • One of the more prevalent threats involves social engineering, or manipulating people into performing actions or divulging confidential information. This is where a cybercriminal targets a human vulnerability rather than a software vulnerability.
  • Another finding indicates cybercriminals abuse Autorun to install malware such as malicious and potentially unwanted software.

Tips for consumers:

  • Keep all software on your systems updated
  • Third-party as well as Microsoft
  • Use Microsoft Update
  • Updates all Microsoft software
  • Use strong passwords
  • Run anti-virus software from a trusted vendor
  • Keep it updated

Download the Microsoft Security Update Guide: www.microsoft.com/securityupdateguide

 

 

 


Read More

Michigan Launches Cyber Command Center

Following a national gathering on cyber security, Governor Rick Snyder of Michigan has established a center for Cyber Security in Ypsilanti, MI near the heart of two great universities and the Metro Detroit area.


Read More

State Of Michigan Wins 5 IT Awards, Most Of Any State In Nation

The State of Michigan won five awards in information technology, more than any other state, at the National Association of State Chief Information Officers in Denver, Colorado.  Michigan Tech News

 


Read More