Working in IT is a double edge sword

I came to the conclusion today that working in IT can be a double edge sword. The upper management at my job really does not have a full understanding of what all my job entails. This can be a blessing when everything is working well and I can do a little techno babble and buy some extra time on a project. The flip side of that is when other departments need some extra help with something they seem to think that my department has all the time in the world to help out. It can be quite the tight rope act some times to balance that fine edge and not get overwhelmed. Sometimes I wish I was in a dark little corner where they forgot about me as long as everything ran smooth.

Lets try this again

Cheers all,

Its been about 2 years since I last messed around with my site. There is a laundry list of  reasons why family, a new job, I’m lazy you know the usual .  The one thing I discovered during the last 2 years is that I enjoy working on this site and never really gave it the attention it deserved.  Well now I think I can. I have a new job that I have been at for a little over a year and my schedule is opening up to where I can dedicate more time to the site. I’m gonna do things a little different this time. I am not a Tech Journalist and I will not pretend to be. I will post many articles about tech and my adventures in IT , but I will also be sprinkling in a heavy dose of just cool geek stuff and a little bit of fun family stories to boot. So here we are on the raggity edge and I will jump off and prowl the depths to see what I can find to bring back thats worth talking about.

How important is keeping your system up to date?

Hello all I’m back after another rather long hiatus. Anew Job and family matters have kept me away .Summer time seems to be a hard time for me to keep up my blogging so I apologize for the long time I have been gone. Recently I was visiting family and as usual I get asked to look at their computers that are acting up. I noticed a startling trend on each of the systems . All the systems had notifications in the system tray of updates that needed to be downloaded and installed. What is this system tray I speak of? Take a look at your computer screen now look in the bottom right hand corner. Yeah where you see the time displayed. That is what is commonly called the system tray and it does more than tell you the time. Some applications can put icons in the notification area to indicate the status of an operation or to notify the user about an event that needs your attention. If you have a newer system you may have to click on the little up arrow right next to the time to see the icons. Do You see a yellow triangle with and exclamation mark in it? Or any other icons that show yellow exclamation marks if so you need to update your system in some fashion. It may be you need to download and install a windows update or your antivirus program may need some attention. Ok go ahead and click on it and see what it says. It’s really easy just follow the instructions on the screen and let your system fix what it needs to fix, your system will run better and you will be more secure in your computing. Be sure to check the system tray periodically to see if there is anything that needs some attention(like service pack 1 that recently was released for windows 7.   If you have any question or a suggestion for a topic you would like me to cover just drop me a line and I will do it.

Keeping Your computer Safe

Today’s modern computing environment can be a dangerous place. Just think of how much stuff you do on your computer that involves you being online and connected to the internet. Once you expose you computer to the internet YOU ARE VONERABLE TO ATTACK. There is no getting around it. The days of a disgruntled nerdy teen in their moms basement hacking into a computer just to prove they can do it are long gone. Don’t get me wrong this still happens but hacking people’s computer has moved into a money making business. Before you secure your system it is good to know why people want into your system.

The most common type of virus is better classified as a trojan. These types of viruses are usually downloaded unknowingly by the computer user thinking that the file is something else, such as a file sent from an instant messenger friend or email attachment.

Once the host computer has been infected (known as a zombie computer), the trojan joins a private chat channel and awaits orders from its “Zombie Master”. This Zombie Master who is often the virus creator, will gather thousands of infected machines called a botnet and use them to mount attacks on web servers. The Zombie Master can command each of these infected computers to send a tiny bit of information to a web server – because there are potentially thousands of computers doing this at once, it often overloads the server. The Zombie Master may want to do this to another website because it is a rival website, a figurehead website (such as whitehouse.gov) or it may be part of an extortion plan. Send me $5000 or your mail order website will be offline during your new product launch. The Zombie Master can also use these infected computers to send spam while the zombie master remains anonymous and the blame goes to the infected computers

Another reason to hack your system is to Generate Money.
These types of infections often masquerade as freeware or virus removal tools (known as rogueware). Once ran, these fake applications will “scan” your computer and say it found has some viruses (even if there aren’t any) and in order to remove them, you must pay for the full version of the application.

People will also hack your system to Steal sensitive information
These types of viruses can sniff the traffic going in or out of a computer for interesting information such as passwords or credit card numbers and send it back to the virus creator. These types of viruses often use keylogging as a method of stealing information where it maintains a record of everything that is typed into the computer such as emails, passwords, home banking data, instant messenger chats etc..
The above mentioned methods also allows an attacker to gather an incredible amount of data about a person which can be used for identity theft purposes

There are many other reasons people do this but those are the main ones that normal users need to be on the look out for. Now what can we do about it?

 

First thing you need to do is change your mindset.
Most victims of computer crime do not think of themselves as a target for an attack.  Problem is, the majority of those who prowl the Internet don’t really care about your email messages or file content.  Prowlers do care about finding a platform from which to launch anonymous attacks against other computers, or about your credit card number and personal information.  Any computer connected to the Internet becomes worthwhile prey. With this in mind you need to change your behavior. Don’t click on links in email and don’t click on pop up ads from sites you visit.

Next you need to use strong passwords.

Here are some tips for creating a strong password.

  • Use BOTH upper- and lower-case letters.
  • Place numbers and punctuation marks randomly in your password.
  • Make your password long and complex, so it is hard to crack. Between 8 to 20 characters long is recommended.
  • Use one or more of these special characters: ! @ # $ % * ( ) – + = , < > : : “ ‘
  • To help you easily remember your password, consider using a phrase or a song title as a password. For example, “Somewhere Over the Rainbow” becomes “Sw0tR8nBO” or “Smells Like Teen Spirit” becomes “sMll10nspT.”
  • Make your password easy to type quickly. This will make it harder for someone looking over your shoulder to steal it.

Protect passwords from misuse.  Don’t let anyone else know or use your password.  Don’t write it down; or if you must, keep it in a locked area or in your wallet.  Don’t post it on your computer or anywhere around your desk.  Don’t include the name of the system or the associated login ID with the password.  Change your password periodically, even if it hasn’t been compromised.  Don’t type your password while anyone is watching.

Next you need to Patch Frequently.

Along with weak passwords and virus-spreading email attachments, unpatched computer systems constitute one of the greatest security threats on the Internet.  All major operating system vendors offer mechanisms that will allow you to regularly check for updates and apply them.  It is important to keep your operating system up to date to minimize your exposure. Microsoft windows usually patches on the second Tuesday of every month unless there is a major issue that needs to be fixed fast. Turn on auto update if you run windows.

Use Antivirus Software & Keep It Current. 

Keep Your System Protected Against viruses.  A system without antivirus software can be infected within minutes of going online. Once you have antivirus software it is important to keep it up to date just like your operating system. Antivirus software works by checking the code on software installed on your computer for what is called a virus signature. New viruses are being released all the time so the anti virus software is always having to update it’s virus definition database to find and block these bad programs. If you have an antivirus program that requires a subscription like McAfee or Norton and the subscription runs out it’s just like not having an antivirus program. A very good free anti virus program that I use is AVG.  

Remove Spyware
In addition to virus protection you also need to Remove Spyware. Spyware is software that is installed on your computer without your knowledge or is bundled with other software you download from the internet. 

Spyware can:

  • Track what you are doing on your computer for marketing purposes
  • Reset the homepage and search pages on your browser
  • Create pop-up advertisements
  • Slow down your computer’s Internet connection
  • Interfere with your computer’s normal operations

Spyware removal programs are available free for download from the Internet.  Two popular ones are Windows Defender  and Spybot Search and Destroy.

Avoid Phishing Scams

Phishing is the practice of sending millions of bogus emails that appear to come from popular Web sites or from your bank or credit card company.  The emails look so official that many people will respond to requests for their password, credit card information, and other personal information.  Microsoft recommends the below four steps to avoid Phishing Scams.  View the entire article from Microsoft.com.

  • Don’t respond to e-mails requesting personal information.
  • Don’t click on a link in an e-mail that you suspect might be fake.
  • Check a Web site’s security certificate before you enter any personal information.
  • Routinely review your credit card and bank statements

Back up your data regularly and keep copies in another location.
How important is your data to you?  If it’s important, it should be backed up. If it matters enough to get upset over losing, it’s worth protecting, and backups are an essential part of data protection. Part of your preventive maintenance and system care should include regular, reliable data backups. No matter how well you treat your system, no matter how much care you take, you cannot guarantee that your data will be safe if it exists in only one place. The risks are much greater than most people realize.

 In case all these steps fail keep your original system software handy

If your computer is compromised or you fall prey to a nasty virus, it may be necessary to reformat the disk drive and reload the operating system and drivers.  Keeping your original system software in a safe and easily reachable place ensures that you won’t have to waste valuable time searching for these items or downloading them from the Web.

Like I said  today’s modern computing environment can be a dangerous place, But if you follow the steps outlined here you can minimize your risk and increase you computing enjoyment.

Sarah Connor Made Me Do It

While we got good news from Fox that they are renewing Fringe many reports are predicting that “The Sarah Connor Chronicles” has been terminated.   A new Flickr! group called Sarah Connor Made Me Do It has cropped, showing fans with products placed within the show and from advertisers of the Fox series.   I am not one for internet petitions but this seems like a good idea to show fox execs that we notice product placement and act on it. Check out the link to get details as well as a list of products advertised on and during the show.

You can  show your support by joining the Facebook fan page.  You can also visit this thread at the Terminator Wiki to know which network and studio executives to contact and to view sample letters asking for the show’s renewal.

Fox will announce its schedule for next year later this month.  Hopefully we can get some more good news and Fox will partially redeem themselves for the whole Firefly debacle.

Windows Office’s grab for a piece of the online pie

It is easy is to underestimate Microsoft when it comes to online applications.  A workspace that can be shared with others and is accessible from anywhere is fast becoming a necessity for individuals that are always on the move. Microsoft’s free Office Live Workspace is an online space provided by Microsoft for saving, accessing, and sharing documents and files. Using it one can access his/her documents from anywhere over an Internet connection via Web browser with a downloadable plug-in. This tool can be used for grouping information for work, school, and personal projects

Office Live Workspace anticipates the kinds of jobs you’re likely to collaborate on, providing prefab workspace templates geared to specific business, school, and home tasks such as organizing a group meeting, launching a product, writing a term paper, throwing a party, or managing a little-league team. Individual templates contain document templates designed for the task, such as a project proposal outline in Word or a presentation in PowerPoint.

Office Live Workspace supports Excel files. On the other hand, I could not find that the service supports Microsoft’s Access database format, which is too bad Access users looking to delegate data entry and to simplify reporting tasks might benefit greatly from an online database-sharing arrangement.

You can view documents in the three supported Office file types online, but to edit the files, you must download and open them in your local copy of Word, Excel, or PowerPoint, or in a compatible suite such as OpenOffice.org, and then reupload them when you’re done

If you work with only a few collaborators, Office Live Workspace provides just the right combination of file-sharing controls and ease of use. As the workspace administrator, you create a new shared workspace and then invite other users by e-mail to join it, either as viewers (who can see but not modify files) or as editors (who can see, create, and modify files). You can share workspaces with invited users, make them public, or keep them private. Files are easy to move from one workspace to another.  Office Live Workspace displays a log of file creation, editing, and deletion activity and the administrator can retrieve an earlier version of a file if an editing blunder happens.  Office Live Workspace gives you just 500MB, with individual file size limited to 25MB. But if you and a few of your coworkers or family members want to collaborate in a lightweight fashion using Microsoft Office apps, Microsoft’s unique response to Web-hosted applications could be a free and easy no-brainer. And as we all know I’m cheap so as I have said before free is good. I also have to wonder what the future holds for other apps getting online components added to them is true cloud computing that far off. Well that’s a discussion for the next time I emerge from the murky depths of the interwebs. Till then happy browsing

Sharkey

According to the Hollywood Reporter Fox renews Fringe

One of My favorite shows that had been reported as a “bubble show” is getting a second season. According to the Hollywood Reporter Fox has decided to give fans a second season of J.J. Abrams’ “Fringe”. 

 “‘Fringe’ proved to be a notable addition to our schedule all season, and it really has fans buzzing as it builds to a fantastic season finale,” said Kevin Reilly, president of entertainment at Fox. “J.J. and the whole Bad Robot team have been phenomenal partners, and we look forward to years of making great television with them.”

“‘Fringe’ continues to gain momentum, creatively and with viewers. We couldn’t be more thrilled that ‘Fringe’ will continue to freak people out for at least another season!” added creator and producer Abrams.

With the renewal, fans can expect to see actor Leonard Nimoy at least two more times as the founder of Massive Dynamic, William Bell.

 All I can say is WOOT! That’s one show down now fox needs to announce the renewal of Terminator: the Sarah Conner Chronicles and Dollhouse and I will be happy with fox for another season.

Brian Austin Green Talks on Geek Outloud

In the latest episode of Geekout podcast Big Honkin Steve interviews Brian Austin Green about his role in Terminator: The Sarah Conner Chronicles and his general geekdom. The more I hear this guy in interviews the more I like him unlike a lot of stars …”chough chough Tom Cruise'” This is worth a listen to so head on over and check it out.

How powerful is your Windows Live Account? Part 4

Here is the wrap up for my windows live series and I’m going to group all the rest of my favorite features in this post. We’ll start with Windows Live Groups. Basically, it’s like SharePoint for consumers, offering a way for any group of individuals to share things like documents and other files, calendars, and photos, and a place to connect, discuss things, and discover what’s going on. When you create a group, a group calendar is created for you in Windows Live Calendar, and you can overlay your group calendars in your own private calendar if you’d like. Groups also get their own dedicated storage in SkyDrive that is separate from your individual storage, and you can privately share photos among members of a group very easily. Unique to Groups is the ability to start and participate in discussions, which are essentially Web-based newsgroups, but private, of course, to the group. This is a grate way to collaborate on projects or to set up your own private news group.

 Next let’s talk about Windows Live People a service that serves as a central address book for all of your contacts, including those from Hotmail, Windows Live Messenger, and elsewhere in the Windows Live network. Windows Live People has a few interesting features. Duplicate contacts resolution You can invite contacts from third party services, like Facebook, My Space and others to join your Windows Live network. Windows Live People includes new functionality around permissions so that you can determine which groups get access to which information you’re publishing online. Put simply, Windows Live People is like the ultimate cloud-based contacts management system. Very handy in managing all those friends you made online.

Now lets talk photo sharing you can access your online photo albums from just about anywhere in Windows Live. You can share photos and photo albums with friends via Windows Live Messenger, for example, and email them from Windows Live Mail. On the services end, your photos are available from Hotmail (for emailing), accessible from Windows Live Profile, can be posted to blogs and Web sites with Windows Live Spaces, and can be shared via Windows Live Events.

Some of the functionality in Windows Live Photos is obvious browsing to the Windows Live Photos Web site, you can view photo album thumbnails and see animated slideshows. You can push albums to digital photo frames via Windows Live FrameIt. The storage back-end? It’s all handled by Windows Live SkyDrive. And yes, you can browse your photos there as well. Looking at the Windows Live Photos site specifically, you’ll see mostly basic functionality. You can create and view photo albums, which don’t support sub-folders of any kind, which will be problematic for people with large photo collections. You can view photos inside an album by thumbnail or via List or Details view.You can also play slideshows, which are attractive enough, but don’t offer much in the way of options You can add a caption, tag people in the photo, or add a comment. Others who have permission to do so can also add comments.  As far as protecting photos go, Windows Live Photos offers various sharing options on a per-album basis. You choose to make albums public (available to one and all), or set permissions to your network (view or add, edit, delete) or your extended network. You can also filter permissions based on the groups you’ve set up in Windows Live People, Windows Live Messenger, and in other places, so you might set up an album to be viewable only by family members or whatever. You can also enter specific email addresses if you’d like.

My final thoughts of Windows Live are the sheer scope of what Microsoft is trying to accomplish with Windows Live is amazing. There’s a lot going on here, and it’s not all happening at once. The sum of Windows Live is greater than its individual parts thanks to the deep integration Microsoft has fashioned between these services, their Windows Live Essentials application counterparts, and the dozens of third party services that will be coming together over the next several weeks and beyond. Microsoft’s vision of creating a hub for your digital life is a good one, and its implementation is impressive. I think this release is really going to change people’s minds about Windows Live and what a powerful tool it can be. I have not listed all the possibilities in Windows Live, but I hope I have piqued your intrest enough to give it a closer look.

new geek link added

I added a new link on my geek links. Theforce.net . This is a site dedicated to Star Wars and all the news related to Star Wars. They also have a great podcast The forcecast that is really entertaining check them out.