header



Welcome to the Micro Center Tech Support Blog!
Find free technical support on a variety of products featured at Micro Center and plenty of how-tos on new technology. Start searching our Blog below or search our Tech Center archives »

Can't find what your looking for? Take advantage of our Tech Support services »

Join the MC Tech Support Community Forum: Get direct advice from the Knowledge Experts @ Micro Center.
Click here to access the Forum »

Search This Blog

Showing posts with label anti-virus. Show all posts
Showing posts with label anti-virus. Show all posts

Monday, October 8, 2012

Tech Tip of the Day: How to download, install, and run SUPERAntiSpyware

Description: Are you concerned about possible spyware, adware, malware, or similar problems on your computer? Does your computer seem to run very slow? SUPERAntiSpyware is a utility that may help you to diagnose and repair these types of problems.

These days there can be a new virus or infection created every three seconds, and computer users need to be ready for the next attack that could be made on their systems. Along with routine Windows maintenance addressing concerns such as cleaning up temporary files or repairing registry errors, running multiple scans from AntiVirus and AntiMalware programs can help to take care of these problems. There is a program called SUPERAntiSpyware that scans your computer for infections, temporary files, registry errors and things like that in just one scan, and then makes recommendations for corrections to the system that it can make.

  1. To download the program, you can go directly to the program's website http://www.superantispyware.com - be sure to understand any terms and conditions of the program.
  2. Go ahead and download the installer, saving it to a location on your computer where you will be able to find it easily, and then run the installer as shown in the picture.

    download the installer
  3. Once finished, open the program and the user will be greeted with a home screen as shown here.

    home screen

  4. Just click "Scan your Computer" to get a full scan under way and let the program work for you.

    Scan your Computer

  5. Once finished, the scans will provide a result pop up as shown below. Click the continue button to delete the threats.

    continue

  6. Once the deletion process has completed, click the Finished button.

    Finished

  7. The program will then ask you to reboot or reboot later, it is best to save and close all programs then reboot your computer for the changes to go into effect.

    *In this and similar situations, it is important for the end user to understand that they are obtaining utility programs such as this one from known reputable sources. If you are unsure of the source being reputable, it can be possible for rogue programs to present themselves as solutions when, in fact, they are actually "problems in disguise" that will make things worse instead of better.
For more assistance contact Technical Support here.

Tuesday, May 15, 2012

Tech Tip of the Day: How to download, install and immunize your browser with Spybot

Description: This article will show you how to download, install and immunize your browser using Spybot. Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behavior to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies.

If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is free, so there's no harm giving it a try to see if something has invaded your computer.¹
  1. Open you browser and go to the SpyBot home page

    spybot homepage

  2. Click on the download link in the upper right corner.
  3. When the page loads click download

    download

  4. Select the mirror to download from

    mirror

  5. Click on the download link

    download

  6. Select ‘Run’ to start the download and install

    run

  7. Select language and click OK

    language

  8. Click on Next

    Next

  9. Accept the license agreement and click Next

    accept

  10. Select or change install location and click Next

    install location

  11. Select or deselect components and click Next

    components

  12. Select start menu folder location and click Next

    start menu

  13. Select Additional Tasks and click Next

    additional tasks

  14. Click on Install to begin installation

    Install

    installing

  15. Select Finish when install is complete

    finish

    loading

  16. Click on Create Registry Backup
    • When completed, click Next

    create registry backup

  17. Select "Start Using The Program"

    start using program

  18.  Click on Immunize to immunize your browser.

    Immunize

  19. When Immunization scan is completed and unprotected lists zero, close program.

    finish
For more assistance contact Technical Support here.

¹cited from http://www.safer-networking.org

Thursday, February 9, 2012

Tech Tip of the Day: How to download and use Malwarebytes

Malware is shorthand for "malicious software" and is used to describe an entire group of programs that includes advertising, tracking, key-logging, ID or credit theft or that cause other bad or undesirable activity. Malwarebytes specializes in fighting malware.

(including Free, Trial, or Retail versions)
  1. Go to www.malwarebytes.org. Follow the download link to download.cnet.com and click on "Download Now" icon (not the "Start Download" buttons - which link to other stuff.) Alternatively, purchase a full version of Malwarebytes in the software aisle or Service Department at Micro Center. The full version includes a LIFETIME subscription and active background monitoring.


welcome
  1. Run Malwarebytes Installer. If installer does not work, there may be a virus present which is interfering. In that case, complete the following, but after restarting the system in "Safe Mode with Networking"
    To start windows in Safe Mode, do the following.
    1. Tell windows to Shut Down (not sleep or hibernate).
    2. Press power button
    3. Continually tap F8 until the Windows Start Menu appears (black screen with white text).
    4. Use Up/Down arrow keys to select "Safe Mode with Networking", press enter
  2. Make sure there is an active internet connection.
  3. Start Malwarebytes by double clicking the icon on the desktop or from the Start, Programs list.
  4. Click on Update tab. Click on "Check for Updates" button. Malwarebytes will search for updates, download and install them.


If you have a network connection during the installation, Malwarebytes should update automatically, otherwise, check for updates before starting a scan.
  1. Click on the "Scanner" tab. Select "Perform full scan" (this takes the most time, but is recommended for the first time scan on an infected system), or "Perform quick scan". Click on the "Scan" button to start.


A Full Scan can take anywhere from 10 min. to 2 hrs. Malwarebytes will highlight in red details of infected files found.
  1. When scan finishes, click "Show Results" button. A list of viruses, security issues, or any malware found will appear.
  2. If the items are not selected, do so, and then click "Remove Selected" button. The malicious files or registry issues will be removed.
  3. Restart the computer in normal windows mode. If Malwarebytes detected and removed threats in Safe Mode, it is recommended to repeat the scan process in normal mode to look for additional threats.
For more assistance contact Technical Support here.

Wednesday, December 21, 2011

Computer Viruses and How to Avoid Them

What is the difference between "malware" and a virus?


Malware is shorthand for "malicious software" and is used to describe an entire group of programs that includes advertising, tracking, key-logging, ID or credit theft or that cause other bad or undesirable activity. Simply explained, a "virus" is a computer program that invades or infects a user's computer by replication from another source (a disk, a USB flash drive, a network or the Internet), and then performs malicious functions on the new host computer. It's the malicious functionality that poses the problem, and for that reason viruses could be also called "malware."

 

A virus is just one type of Malware.
A virus is just one type of Malware.


There are many different undesirable things that computer malware does. Earlier viruses simply performed mischievous tasks, such as deleting data or program files. But the authors of newer malware are driven by the desire to steal enough sensitive data in order to eventually steal money. Some are thus designed to scan and send information from a victim’s computer back to the author of the malware. Still others keep track of actual keystrokes typed by an unsuspecting user. Some plant annoying "popup" advertisements on a computer. There are a few types of malware that will perform any of the above, but also attach themselves to email addresses so that they get automatically sent to the user’s address list to replicate on an ever growing number of systems. Sophisticated malware might even install itself on the hidden "boot sector" of a computer hard drive, or try to make a network server vulnerable to a hacker (a person who gains unauthorized access to a computer network). But, the most common type of malware, by far, is the malicious program that deceitfully disguises itself as a good or useful program, seeking to get results which the user did not intend.

The fact is that malware has caused billions of dollars in losses to computer users. People have lost valuable data and have had personal and financial identities stolen. Whole companies have been compromised or crippled by malware infections. At the very least, the average user suffers from the slowdown or complete hijacking of their system through a malware infection. It is therefore imperative for computer users to know some basics about viruses, or "malware," in order to protect themselves.

Types of malware

  1. Virus - The original malware. Malicious code attaches itself to other program files so that the execution of the host file also executes the malicious code. The malicious code also causes the virus to replicate itself by copying its code onto removable media or other computers in a network. Back in the 1980s, the first "in the wild" viruses spread themselves mostly through shared floppy disks, and performed everything from pranks to data destruction. By the 1990s, Internet "bulletin boards" were unwitting spreaders of viruses. Today, very little malware is of the virus type.
  2. Trojan - These comprise 75% or more of all malware, according to security experts. As the name from classical Greek mythology suggests, Trojans operate by deceit, tricking a computer user to trust a fraudulent program. Most Trojans are actually a complex of files - pop-ups that steer the unsuspecting user to a harmful website, or just install more malware, even when clicked to shut down; downloaders that bring in supporting malware programs; hijackers that shut down operating system functions and security; bots that may use the host computer as a slave to the malware author’s intentions; backdoors that make an infected computer open to free scanning by the malware author. Trojans operate independently of other programs, and thus do not need to attach themselves to other executable files as a classic virus does. The most popular Trojans, these days, masquerade ironically as anti-virus programs. The user experiences sudden low computer performance, and then sees a pop-up offer with a phony virus scan report, urging the user to purchase the program offered as a solution to the computer problems they are experiencing. Naive and unsuspecting users then type personal information into the form provided (including name, address and credit card info). This information is never used to purchase the phony software. Rather, the Trojan authors use the stolen info to open new credit card accounts in the user’s name, and then sell those accounts on the underground market within minutes of receiving it.
  3. Worm - A Trojan that has the capacity to infect computers from other infected systems by scanning for IP addresses on vulnerable computers on the Internet or within a network, then replicating itself. Many phony anti-virus programs start out as a worm infection. Worms are also notorious for attaching themselves to email address lists. Users falsely believe that Trojan infections come mostly from certain "dangerous" or risky websites. In truth, worms may employ any website that users visit as stepping stones to their computers.
  4. Spyware - Software programs that "spy" on users, observing data, keystrokes, screens and/or web sites visited. This is a broad category of malware and includes everything from adware to keyloggers (see below). Unlike viruses, Trojans and worms, spyware typically does not self-replicate by infecting other computers or removable media, but is downloaded through Internet connections.
  5. Keylogger - A particular type of spyware that is designed to steal "live" information. It secretly keeps track of such things as the user’s keyboard keystrokes, video screens, or streaming network data, and transmits that information back to the malware author. This malware attack is more rare, but it poses the serious risk of loss of private identity information, including credit cards, bank account info, Social Security numbers, and computer passwords.
  6. Rootkit - A stealth program that allows continual unauthorized access to a computer by a person unknown to the user. This malware replicates itself on a victim’s computer usually as a worm or a Trojan. It quickly shuts down user account controls and security designed to prevent unauthorized access. It can then steal and transmit info or simply provide a "back door" for a hacker. Rootkits are usually quite sophisticated, and often include the ability to deflect detection from weaker and more modest anti-virus programs.
  7. Phishing - Typically an email message that is "fishing" for personal information. The victim receives a randomly sent message that appears to be an official request from an Internet service provider, a bank or some other service or organization. The graphics in the message typically look professional and authentic, though the grammar in the message is sometimes suspiciously bad. An appeal is made to the user to provide "lost" information. However, NO organization or bank will ever seek information this way. Such fraud should always be reported to the organization or service that is being used as a cover.
  8. Adware - The most benign of all types of malware, it can still annoy users with commercially-charged pop-ups and reduced system performance. Adware often gets installed without user’s consent, and often when downloading program updates, trial software and games or other services. Some adware functions as spyware by tracking the user’s favorite web sites and targeting the user with advertising that is likely to be the most appealing. Adware can hijack web-search functions. The most common form of adware is the browser "toolbar," which ostensibly provides services such as search windows and quick-access icons. These toolbars slow computer and Internet performance, take screen space from web pages, and can even be a conduit for more serious malware.
    Prevent and cure  
    Prevent and cure

How to Prevent Malware Infections

The best way to be free of malware infections is to take preventative measures rather than relying upon removal after infection. Once infected, a computer is often very difficult to clean. Some malware will destroy a computer’s operating system, or make it so difficult to recover that wiping the hard drive and reinstalling the operating system, programs and data is the only solution. This is usually quite a chore, may be expensive if the user does not have the technical know-how and may be personally costly if the user’s own data has not been previously backed up. There are several preventive measures that every computer user can take:
  1. Utilize a good anti-virus program. There is no substitute for this measure. Avoid the seduction of free anti-virus programs and the ones that come with Internet service providers, as they only do a mediocre job of prevention. A $40 to $50 investment in a good anti-virus program with an annual license to update itself regularly is pretty inexpensive insurance.
  2. Manually scan your computer with an anti-virus program. All good anti-virus programs come with manual scanning features. Most will let you set a schedule for automatic scanning. This is good to do once a week, or every month, and especially if you see any suspicious activity on the computer screen.
  3. Update key programs every time. The Ziff-Davis network cited a study done in Denmark earlier in 2011 utilizing results from half a million computers. The conclusion of the study was that some 99% of common malware infections could be avoided simply by updating Windows security patches, Internet Explorer, Java, Adobe Flash and Adobe Reader. The reason? Malware authors attempt to gain access to computers through weaknesses which the updates are written to prevent.
    (See: ZDNet - The Ed Bott Report, Oct 7, 2011. Summary: Want to avoid being attacked by viruses and other malware? Two recent studies reveal the secret: regular patching. A fully patched system with a firewall enabled offers almost complete protection against drive-by attacks and outside intruders.
    www.zdnet.com/blog/bott/if-your-pc-picks-up-a-virus-whose-fault-is-it/4039)
  4. Use a hardware firewall. The SPI (Stateful Packet Inspection) firewalls that come with most newer routers is a great way to close unused ports and prevent hackers from intrusion. Even single computer homes and offices can benefit greatly from the use of a router. While utilizing a router’s hardware firewall, you may also use your operating system’s software firewall. Beware of using third-party software firewalls (such as those included with anti-virus software) which serve to slow down a computer. If you’re using a wireless router, make sure to encrypt your network with WPA or WPA2 level encryption, never the older and simpler WEP encryption.
  5. Uninstall browser toolbars. Toolbars are the quarter-inch wide strips that layer near the top of a web browser. While some toolbars may be useful on a limited basis, they all steal screen space and clog up your Internet bandwidth only to provide revenue for the author. By definition, toolbars communicate with their authors, thus opening a vulnerability "hole" while the PC user is online. Utilizing the add/remove function in Windows machines is the best way to rid a computer of these browser plugins. Some of the most common toolbars include: AIM, AOL, Ask, Bing, Crawler, Dogpile, eBay, Google, My Way, My Search, My Web Search, Yahoo, etc.
  6. Regularly delete browser cookies and "Temporary Internet Files." This is performed from within the browsers, themselves. Malware can hide amongst these files.
  7. Do not click on pop-ups - shut them down alternatively. If you DO get a suspicious pop-up window, try using the "Alt-F4" combination to get rid of it rather than clicking on it and risking an unintended installation of a virus. If that combination does not work to close a window, use the Microsoft Windows "Task Manager" ("Ctrl-Shift-Esc") and the "Applications" tab. Simply click once on the listed application and then click the "End Task" button. After a forced-close, some browsers will attempt to recover the last page you were on the next time you restart. Select "No" or have it go to your Home Page instead.
  8. Use an Anti-Malware application and keep it updated. While Anti-Virus applications will detect and block viruses, worms, and other programs that spread by design, they do not always detect or block programs that you allow to install on the computer. Clicking on pop-up advertising windows, opening, email or Instant messaging attachments, or downloading and installing games or other programs can trigger the installation of an undesirable application. Using a program to scan your computer periodically for programs your antivirus may miss is recommended. Programs like MalewareBytes, Spy Sweeper, or SuperAntiSpyware may catch and remove malware.

Security and Urban Legends

While it is important to be informed about the facts regarding malware, methods of infection, and methods of prevention, it is also just as important to know that there are some common public beliefs that are just not true. Here are some common "urban legends" that are patently false:
  1. Anti-virus software companies conspire to write viruses so they can stay in business. Many computer users are tempted to believe this falsehood, but only because they do not understand how lucrative the criminal activity of malware authoring has become. If legitimate software companies were the actual criminals, someone would have blown the whistle years ago. The actual malware criminals enjoy both anonymity (they attack unseen from anywhere in the world) and impunity (there are limited resources and jurisdiction for prosecuting them, even when observed).
  2. Viruses come mostly from questionable web sites. Computer users also typically believe that infections are the result of using social, illegal downloading or pornographic web sites. However, the fact is that malware infections such as worms and Trojans can attack from anywhere, and may use any legitimate and otherwise well-guarded web site as a stepping stone from one infected PC to another.
  3. Free anti-virus programs are just as good as the paid-for programs. This is demonstrably not true. Observe the results of serious testing labs. If ever there were a good application of the "you-get-what-you-pay-for" principle, it would apply with anti-virus programs. Simply put, you pay for regular and effective program and virus definition updates. Licensed programs are anxious to push out good updates - often daily - to their customers. They want our business year after year, and therefore work hard to distribute good products, and largely succeed at it.
    (See: AV Comparatives - Independent Tests of Anti-Virus Software. www.av-comparatives.org)

Summary

Don’t let the threat of malware infections stop you from using the rich resources of computing. Just use your computer wisely. Utilize the measures outlined above. And exercise a healthy dose of suspicion about what you see on your computer screen, short of being paranoid. There is no reason why the careful computer user cannot buy things with a credit card, do banking and investments, and send critical business data over the Internet If possible, encrypt the data you are sending or utilize a VPN (Virtual Private Network). Certainly, you should never carry out financial transactions over a public wireless network. In spite of the risks - which are present primarily in the midst of carelessness - computers provide a powerful tool for use both on and off the Internet

For more assistance contact Technical Support here.

Monday, July 11, 2011

Creating a Strong Password

strong password
This document provides some simple guidelines for creating a user account or network access password which combines a higher level of security with a better chance of remembering it.

Why Do I Need a Password?
A personal computer system is very fast, but also very literal. It has no real means (in the human sense of the word) of distinguishing good data from bad or authorized commands from unauthorized. It simply does what it is told, for good or for ill.

With this fact in mind, it is not surprising that there are malicious entities (this writer hesitates to apply the word 'people') who are all too eager to force other peoples' computers to do things their owners would not wish them to do.

The Hack Attack!
Some computer users set up accounts with no password at all, or use a very simple password (a proper name, a simple number sequence or a string of repeated letters. Or, worse still, use their very user account name as their password! One technique used by malicious entities against such users is the dictionary hack. A computer is set up to transmit codes over a network, running through a list of words, names and number sequences.

If a match can be found with some other computer's user name and password, the "entity's" computer may then be able to transmit commands to the "victim's" computer, just as if it were a local user with a keyboard and mouse.

Piece of String vs. Combination Lock
Security experts typically recommend that computer user accounts should each be associated with a distinctive, strong password. The typical rules for defining a strong password are as follows:

  • 8 to 16 characters in length

  • Not a proper name or a "dictionary word"

  • A mixture of uppercase letter, lowercase letters and digits.

  • Optionally, includes "special characters (understroke, dollar sign, brackets etc.)


While it is true that a password such as "qqKJ_932vHc" meets the definition of a strong password, most computer users would probably have a rough time remembering it, until they had entered it many times from a "cue card". However, there is a technique which has been tested with a wide variety of Customers in a Micro Center Technical Support office, which may offer you a way to generate a strong, memorable password.

  1. Begin with a word of your choosing. Example – sailboat

  2. Separate the syllables. sail boat

  3. Misspell the word in a phonetic way – for example, use a "q" instead of a "k", or a "y" instead of an "i". sael bowt

  4. Place one or more numerals between, and / or on either side of the modified syllables. sael2bowt5

  5. Substitute or insert at least one uppercase letter, somewhere other than the first character. sael2bowT5


You now have generated a strong password ("sael2bowT5") and a starting word ("sailboat") to use as a password hint. The password hint is designed to appear in a user account login window, to jog the user's memory and point the user toward the actual password.

Finally, if your operating system includes this feature, create a password reset file and write it to an optical disk, flash-drive or a memory module. This file will help you reset your own user password, should it be forgotten, mislaid or compromised.

Thursday, June 30, 2011

Tips for Securing Your Wireless Network


Wireless security

1. Set a Router Password

Failing to set or change the default password of your wireless router or access point is probably one of the most common security holes in home networks. The reason is that even if you take all the other suggested steps with SSID, WEP and WPA settings, wireless transmission of data is not 100% secure. If someone succeeds in accessing your network, the security settings in the router cannot be changed without access to the menus. Changing the password helps prevent someone from granting themselves access to your network, changing your router settings, or worst-case, locking you out of your own equipment.

Wifi router

While most routers and access points require configuring the device through a physical cable connection, some will allow you access to the setup menus through the wireless connection. For this reason, you should make it a point to change both the name (SSID) and password for your router as your first order of business.

2. Change the SSID - (Service Set IDentifier)
Many Operating systems and client applications give you some way to browse available wireless networks. Changing the SSID from the manufacturer's default makes it slightly more difficult to determine "known" information about the router (like its capabilities or default passwords.) But if a router is configured not to broadcast the SSID, then a casual passerby will not be able to connect without manually configuring their client settings. This means they either have to monitor wireless activity and capture network packets to analyze, or know the SSID in advance.

When the SSID broadcast feature is disabled on a router, the list of available wireless networks (on the client) will not display it in the list. To access a wireless network router that has the SSID "hidden" you must create a connection setting that has the SSID entered manually. To do this under Windows XP, click on the option to "Change Advanced Settings" in the Wireless Connection Wizard. From here you can add a new connection, specify the SSID (as it was entered in your router) and specify other settings required for the connection such as WEP and the associated encryption keys.

Changing the name (SSID) helps identify your specific network, which can be useful if there are multiple Wireless networks in your business or immediate neighborhood. Hiding the SSID won't keep "them" out, but it will slow "them" down.

3. Turn On Encryption:

WEP - Wired Equivalent Privacy
Security encryption provides a good layer of you can enable for your wireless network is WEP encryption. Although WEP encrypts your data, people using special network utilities may be able to collect enough information to identify the WEP key that is in use. Once they have the SSID and WEP key, then they can access the network. Like the SSID, WEP won't prevent a determined hacker from accessing your network, but it will prevent or discourage the casual "war drivers" and neighbors.

Choices for WEP security may be presented in several ways, but the core features work out to: no encryption, 64-bit encryption or 128-bit encryption. (Microsoft and some of the wireless vendors may describe this as 40 bit and 104 bit encryption.)

WEP encryption codes can be entered as a hexadecimal string (numbers 0-9 letters a-f), or generated with a text-based pass-phrase. (The pass-phrase is used to create the hexadecimal string.) If the method to generate the string is not consistent between your different clients, you may need to copy or manually enter the resulting hexadecimal string from one device, and then paste or manually enter it into the rest of the network configuration boxes.

The Wireless Networking Wizard that is part of Windows XP Service Pack 2 includes a method of saving this configuration detail to a USB flash drive (or other storage media) to transfer the necessary settings to other XP SP2 systems.

WPA (Wi-Fi Protected Access)
Some routers and clients may support enhanced security features that are stronger than WEP encryption. WPA automatically rotates or changes the encryption key, making it more difficult for eavesdroppers to determine the codes necessary to access your network. All of your devices must support the feature to be able to take advantage of this, so check your documentation. If you are using equipment from assorted manufacturers, and one piece does not support WPA, then you must decide whether to use WPA - but not with that adapter, or not to use WPA on your network.

4. Use MAC (Media Access Control) address filtering
Most routers support this feature. To determine the hardware (MAC) address for your wireless network adapter, examine the details of your wireless adapter properties or use the text IP configuration utility with the /ALL switch (IPCONFIG /ALL). You can manually enter this address into a client list through the router's setup menus. Once a list of your known adapters has been entered and the MAC filtering feature is active, only devices with these addresses will have access to the router. Again, there are ways around this, but only if the hacker is really determined to get into your equipment.

MAC filtering must be enabled in the router or access point. Once this has been done, there should be a section to select or enter the MAC Address of the wireless client that you want to have access on the network. Devices that are not in the MAC address list will not be able to connect to the network.

The MAC address for your adapter can be found on a label on the adapter itself in most cases, although if this is a wireless adapter built-in to a notebook computer, you will find it easier to just check the network connection status. To do this, open your Network Connections, either from the Control Panel or by right clicking on "My Network Places" and selecting "Properties". Double click on your wireless connection icon to open the status window. Click the "Details" button to display the current configuration details and the MAC address (Physical Address) at the top of the list.

Most routers will allow you to add MAC address from a list of devices that have recently connected to the router. Verify that the MAC address you select is the one that matches your client computer.

5. Other Network Security
Hiding the SSID, using WEP, WPA and MAC Address filtering are all features of Wireless Networking; In addition to these, you should take general Internet and networking security precautions as well. Standard security measures would include Virus Scanning, Firewalls, and restricting your resources being shared.

[caption id="attachment_218" align="alignnone" width="300" caption="Antivirus applications like ESET NOD32 can catch individual threats as they get downloaded to your system."]ESET NOD32 program[/caption]

Virus Scanning
Virus scanners with current definition files will generally scan any file or attachment that gets saved to your computer. Most Anti-Virus programs scan the files as they arrive, even in the background, blocking or deleting threats before they can infect your system. When sharing your hard drive or directory on the network, most will detect infected files as they arrive, even from "trusted" users on the network.

[caption id="attachment_219" align="alignnone" width="300" caption="Malware programs can bypass your antivirus application if the bad guys trick you into installing something. Like antivirus apps, anti-malware apps can be used to keep your system clear of threats."]Malwarebytes[/caption]

Malware
Unlike viruses, malware can bypass your firewall and even antivirus security because many of these threats are "invited in" by the user. Malware (malicious software) can take several forms, including key-loggers, anti-malware apps, addware, and spyware, just to name some of the more common ones. There has always been a risk to specific programs or browsers, and some malware can target these to attack systems across multiple platforms.

Keep in mind, that any system, Macintosh, PC, or Linux can be infected. Linux is reasonably secure, only because there are so many different versions and implementations available, making it difficult to consturct a program to attack your specific OS. This does not make it invunerable, just less likely to be on the receiving end of most malware.

[caption id="attachment_220" align="alignnone" width="300" caption="A fake security application shows up after users are tricked into installing it - on a Macintosh."]Malware example[/caption]

Macintosh likewise enjoyed a similar status, being based on Unix, and having a much smaller market share. But that has been changing, and we have seen more malware and viruses both on this platform.

Firewalls
Firewalls are software that monitor and block suspicious network activity. Windows XP has a basic firewall that can be enabled for any network connection, including Wireless connections. Starting with Service Pack 2, a more robust version that allows you more configuration options is installed. Vista and Windows 7 both have more aggressive firewalls than XP.

The main feature of the Windows Firewall is to block external threats from accessing your computer over your network. Third party Firewalls can expand on the features to monitor activity generated by the various programs on your computer, alerting you to suspicious behavior as it occurs. This has the advantage of detecting (and blocking) Spyware and Adware types of software, that are attempting to report your activity or sending personal information out to the Internet.

Resource Sharing
As with any network, you can share printers and files on the network. But without some sort of security, anyone connecting to your network can access these resources. For this reason, sharing your files on the network can be a risk to either privacy or the security of the system itself.

If you share your C: drive for example, you are allowing people on the network access to all of the files on the drive, and not just ones that might be in your pictures or documents folder. There would be network access open to your system files, to the hidden boot files, and to your programs and data files as well.

If an unknown someone were to alter or delete one of the critical system files, it is possible that your system would not be able to start the next time you power on. If a program directory were deleted, that application would have to be re-installed before you could use it again. And if you lose the only copy of your report or thesis paper, you could be out of luck in more ways than one.

What can you do to prevent this type of issue? The easiest way to avoid problems like this is not to share printers and files on the network, but if you need to do so, only share the folder that contains files that you want others to be able to access. In simple terms, share individual folders and not drives.

You can also restrict access to files that are being shared by creating a read-only share. When you share a folder, one of the options is to "Allow others to make changes to the files." By leaving this check box blank, others can access your shared folder and the files you place inside, but they cannot delete or change the files themselves.

If you want to get really paranoid under Windows XP Professional (sorry, not supported with the Home version), or you just like the level of control that was standard in Windows NT or Windows 2000, then turn off "Simple File Sharing" under the folder options. When this feature is disabled, you can set security and access permissions for folders or individual files. Additional levels of security can be set, allowing you to allow one user read-only access, and another full-modification access. You can prevent the folder directory from being shown, but allow access to a file if they know the name.

To enable or disable simple file sharing under Windows XP, open My Computer, select "Folder Options" from the Tools menu, select the "View" tab and scroll to the bottom of the checkmark list. To be able to grant permissions to a specific user, you will have to add users from "User Accounts" in the control panel. If you get thoroughly confused after looking at this, change it back by replacing the check mark next to "Use Simple File Sharing".

Tuesday, June 14, 2011

Troubleshooting

badgeTroubleshooting a computer or its peripherals doesn’t require the user to know how their system works in detail or to be a certified computer technician. While a specific problem may take more steps to solve, six basic steps will permit a user to troubleshoot most computer or peripheral faults effectively:

  1. Observe Symptoms

  2. Isolate Problems

  3. Research Information

  4. Identify Solutions

  5. Apply Fixes

  6. Confirm Function


In the computer industry, around 80% of the time spent in troubleshooting
is involved in accurately defining what’s wrong. Even if you choose
to check a computer in for repair, a clear definition of the problem saves
the technician’s time, which puts the computer back in your hands that much
faster.

Observe Symptoms


When troubleshooting a computer, how it behaves is an important part of the
evaluation. The following questions will often help to narrow the troubleshooting
"focus":

  • If the system is new or newly-built, did it ever work?

  • If it did work, what changed?

  • Can the problem be reproduced? For example, does it appear when
    a program is started?

  • What other programs are running?

  • If the system has been in use for some time, has a new program or upgrade
    been added?

  • Is there an error message?


Answer these questions as clearly as possible. Remember, an approximate problem
description will only yield an approximate solution. And, of course, If It
Ain’t Broke, Don’t Fix It!

Isolate Problems


As a computer starts up, it usually produces a single short beep,
telling us that the first internal checks have passed. However, other sounds
are an indication of an internal problem, most often in the computer’s hardware.
A series of short or long tones or "beep codes" can indicate the nature of
a self-test fault. These can be interpreted with information from the computer’s
motherboard manual or from the manufacturer’s Web site.

Once the operating system is up and running, it performs a series
of "housekeeping" tasks, guided by "system information" and other files which
direct the computer. In Windows systems (98, ME, & XP), you can use MSCONFIG
to view and control what the system runs at startup (Click Start, Run, type
msconfig and click OK). Testing programs, such as Norton System Works,
can also create log files (reports of what a computer did while being
tested), which can be read or printed to help find the problem.

Windows Safe Mode provides an environment where most startup programs
are not running, but still allows you to run some programs that can clean up
or test for problems. If a virus or spyware program is running in normal mode,
and it is blocking the very tools that could be used to remove it, Safe Mode
may allow you to run your Anti-Virus or Anti-Spyware program successfully. Windows
Defrag utility may run fine in safe mode where it won't be interrupted by screen
savers, anti-virus or other background programs. Accessing Windows Device Manager
in Safe Mode allows you to see all devices that have drivers installed, even
if that hardware is no longer present.

Ancient History: In Windows 95, 98, and even in Windows Millennium Edition
(ME), it is possible that multiple copies of hardware drivers can get installed,
causing conflicts or intermittent problems when Windows is running in normal
mode. Start Windows in Safe Mode, open Device Manager and expand each of the
hardware device categories listed. If you find multiple listings for the same
device, delete ALL duplicated copies you find and then restart Windows. Windows
should re-detect the missing hardware at the next startup and reinstall a single
copy of the driver. Remember, in some cases, you will need the driver CD or
diskette to complete this step.

Before pursuing a repair strategy yourself, we suggest you consider
your answers to a few more questions to make the most of both the troubleshooting
and any potential repair:

  • Is the system still under warranty?

  • Is the system or information in the computer critical to my business?

  • Is this a laptop computer, or a system which uses proprietary
    parts
    ?

  • If the system is damaged during a repair or cannot be repaired, how
    will it be replaced
    ?

  • Is this a repair with which I have had prior experience?

  • Am I too frustrated or tired to complete this repair safely and
    effectively?


Apply Fixes


Quite a number of potential computer problems are simple enough that they can
be addressed by a "quick fix". One example of a quick fix would be
to troubleshoot a newly-installed "dead" system by checking for loose
connections between the computer and its monitor, keyboard, mouse, printer and
so forth. In applying any repair, however, remember the advice Dr. Hippocrates
gave his first class of med-school students: First: Do No Harm.
Think your repair strategy over, including any potential loss of data, and take
the time to work safely.

[caption id="attachment_90" align="alignnone" width="300" caption="System Restore is usually buried in the System Tools folder under Progras, Accessories."]System restore program[/caption]

In Windows, you may be able to correct problems by restoring the system to
a previous restore point. (Your system must be able to boot to the Windows desktop,
and restore points must be enabled for this to be an option.) System restore
is available from MSCONFIG under XP and some other versions of Windows. You
can also look for System Restore under Start, All Programs, Accessories, System
Tools

Confirm Function


After any repair is performed, take one more look at the system
overall. Ensure that not only was the observed problem solved, but that the
rest of the system is still working well. Then, make a fresh, full backup
of the repaired system to protect the integrity of your data.

As mentioned previously, the behavior of a system holds
important clues in troubleshooting a system successfully. For example, if
documents printed from a word-processing program are not formatted correctly,
does the same thing happen when printing a spreadsheet, or a Web page? If
documents from many different programs print incorrectly, the fault may be
in the printer’s drivers or supporting software. If only one particular program
fails to print, that program is the likely culprit.

Research Information


Beyond a computer product’s printed manuals, there are many other
sources of information available to a computer user. Check the CD-ROM media
that came with your software or hardware. Many manufacturers include additional
troubleshooting documentation or "ReadMe" files on the disk. Use
the troubleshooting "Wizards" included with Windows. Most wizards
can be found or accessed from the Windows Help and Support menus or by searching
on "Troubleshooting" in the Help and Support search box. Check out
the Internet web sites of the hardware and software manufacturers, as well
as user forums, where the people who use various products "meet online"
to share helpful hints and solutions to problems.

Internet search engines, such as www.google.com,
have recently become the electronic "clearing houses" for a great
deal of troubleshooting information. For example, we can type an error message
from a program just as it appears "in quotation marks" in a search
engine, and be taken directly to an online resource just for that problem.

[caption id="attachment_95" align="alignnone" width="300" caption="If you get an error message, write it down (or take its picture.)"]Windows error[/caption]

When searching with google, less information may provide better results. If
you get a blue screen message for example, try entering just the error code
such as 0x0000000a. You can also limit results
to specific sites, where you know information should exist, by adding a "site:domain"
tag such as site:microsoft.com or site:support.microsoft.com

Many manufacturers also offer toll-free telephone-based support.
These resources can be very helpful, if the user accurately describes the
problem to the support representative.

Identify Solutions


There is, unfortunately, no one-step procedure which will always
pin down a computer problem to a specific fault. This is because a computer
cannot "re-think" a software command: it only performs whatever commands are
possible, be they for good or for ill. We can, however, divide the
problem into smaller pieces, making it easier to solve.

For example, pressing the [F8] key on a Windows system just before
the Windows logo screen appears will call up the Windows Startup
menu
. Selecting Safe Mode from this menu will load just enough
of Windows to "get things going". If a system starts up fine in Safe Mode,
but not in a normal log-in, there is probably a software fault outside of
the Windows "core", such as a background program or driver, rather than a
hardware error.




Troubleshooting Resources


Free Tools

Commercial Tools

  • Black Ice (Firewall)

  • Computer Associates (Firewall, Anti-Virus, etc.)

  • ESET NOD32 Antivirus or Security Suite

  • McAfee (Virus Scan, Personal Firewall, Anti-Spyware, Spam Killer, etc.)

  • Norton / Symantec (AntiVirus, Internet Security, System Works, etc.)

  • PandaSoft (Anti-Virus, etc.)

  • Trend Micro (Anti-Virus, Anti-Spyware, etc.)

  • WebRoot (Anti-Spyware, Anti-Spam, etc.)

  • Windows Update (Critical updates and security)

  • Zone Labs Zone Alarm Pro (Firewall, etc.)


Troubleshooting Wizards found in Windows XP:







































































System setupInstalling and setting up Windows.
Startup ShutdownStarting and shutting down your computer.
DisplayVideo cards and adapters, including your computer screen,
outdated or incompatible video drivers, and incorrect settings for your
video hardware.
Home networkingSetup, Internet connections, sharing files and printers.
HardwareDisk drives (including CD-ROM and DVD drives), game controllers,
input devices (such as keyboards, mice, cameras, scanners, and infrared
devices), network adapters, USB devices, modems, and sound cards.
Multimedia and gamesGames and other multimedia programs, DirectX drivers, USB
devices, digital video discs (DVDs), sound, joysticks, and related issues.
DVDs(Digital Video Discs) drives and decoders.
Input DevicesKeyboards, mouse and trackball devices, cameras, scanners,
and infrared devices.
Drives & NICsHard discs, floppy discs, CD-ROM and DVD drives, network cards,
tape drives, backup programs.
USBUSB connectors and peripherals.
SoundSound and sound cards.
Modemsetup, configuration, and detection.
ICS(Internet Connection Sharing) Connecting and logging on to
your Internet service provider (ISP).
Internet ExplorerBrowsing the Web, downloading files, saving your favorites,
using IE toolbars, or printing Web pages.
Outlook Exp.Outlook Express and Windows Messenger Service.
File and Print SharingSharing files and printers between computers, connecting to
other computers in a network, installing network adapters, logging on.
PrintingPrinter installation and connection, printer drivers, print
quality, printer speed, and fonts.