Your Internet browser’s setting for home page is your very first view into the Internet the moment the browser is opened.  It only makes sense that you set it to a page that you use most often so that you can save time in your Internet surfing activity.  This page is called your home page.

What if you have more than one page you wished you could open everytime you ran your browser?  Well, with Internet Explorer (IE) 8 (or IE 7 for that matter), you can open more than one.  As a matter of fact, you can open up to 8 home pages when you launch IE 8.

Home Page Icon

Home Page Icon

 The Home Page icon is illustrated on the left.  When you click the icon IE 8 will take you to your home pages.  If you only have one, you can add 7 more by clicking the down arrow immediately to the right of the Home Page icon.

When you click on that down arrow, you can choose from the list of your up to 8

Remove Home Page

Remove Home Page

 home pages or you can manage your home pages.  Specifically, you can

  • Add or Change Home Page
  • or Remove (a home page or all)

If you are setting your home pages for the first time, the quickest way to do it is to open IE 8, set each tab to browse to the appropriate page, then click the Tools item from the command bar, then select Internet Options from the drop down menu that shows. 

In the Internet Options window, make sure you are in the General tab.  From there, simply click the Use Current button, and that will set your home pages.  Click the OK button of the Internet Options window and you are done.

Internet Options dialog box

Internet Options dialog box

Most people don’t know these about Internet Explorer 8’s Home Page function.  You are now one of the few who does; make sure to pass this information on.

You need a tool that will allow you to record your computer screen or any part of it in order to show how to do something on a particular application. You also need to be able to edit your recording. Where can you find such a tool without having to shell out a few bucks?

Well, look no more, there is a jewel of a utility right from under your very nose. It is called Windows Media Encoder. This tool is available from Microsoft and it is free. All you have to do is download and install it and you are off and ready to do screen capture and playback.

This tool comes with the following:

  • Windows Media Encoder – main program
  • Windows Media File Editor – edit your media files
  • Windows Media Profile Editor –  use create or edit Windows Media profiles
  • Windows Media Stream Editor – use to combine or split streams

In the last few days there has been reports of a worm designed to wipe out your data.  CNET reports that this worm has already targetted US and South Korean web sites.  The worm travels through emails which has an attachment.  The email is basically a trojan with a payload designed to erase files on your computer–including the master boot record.  When installed on your computer, the malicious load with will basically render your computer inoperable on the next boot.

Don’t wait until this happens to you.  Take action; backup your precious files (documents, pictures, videos).  You have several options.

If you don’t have too many files to back up (i.e. less than 2GB), a free account at mozy.com would do the job.  They provide 2GB of free online backup storage space; however, for unlimited space it is only $4.95 per month!  However, if you are cheap like me, you can try to convince others to to sign up for their free 2GB as well, and you’ll get an additional 250MB of storage space for every referral!

There are other online backup solutions like elephantdrive.com and carbonite.com; however, these don’t provide an initial free online storage space.

The other approach is to simply buy a flash drive or an external high capacity USB drive.  There are many out there.  I’ve seen flash drive with capacities as high as 32GB, but I’m sure there are higher capacity units out there now.  You can buy external USB drives now with over 1TB of storage space for less than $200.  As a matter of fact, I recently purchased one at Best Buy.  Over two weeks ago, I completed a full backup of my drives containing years of accumulated documents and pictures.

I know that if by some chance my drive crashes or I am infected by one of this worm, I’ll have my backup to fall back on.

So don’t wait too long before backing up your data.  Get that peace of mind that you have something to fall back to should the worst happen to your hard drive.



Mozy Remote Backup.  Free.Automatic.Secure.

Encryption: key to secured data transmission

Encryption: key to secured data transmission

Not many people realize that the traffic they generate on the Internet as they check e-mail, upload files, chat, and so on are out in the clear. This means that if someone tapped into the network (wired or wireless) where your traffic is flowing, that someone would be able to capture the information flowing through that network, and possibly interpret or maybe even change the account or various confidential information that may be in that flow. One way to keep those Internet peeping toms from seeing your confidential information is by using some form of encryption technology. There are three general scenarios where encryption technology is crucial. The first is the encryption technology you must ensure is used when accessing confidential information online. The second scenario is when you are sending confidential information to someone or some organization. The third is when you are using wireless technology to access your network or someone else’s in the process of connecting to the Internet.

When accessing confidential information online, you must make sure that the site you are connecting to uses TLS/SSL (Transport Layer Security, the successor to SSL–Secure Socket Layer). You can tell this in three ways:

1) The URL for the sites starts with https://

2) There is an indication in your browser that your connection is secure—typically symbolized by a padlock icon (in Internet Explorer 8, it can be found to the right side of the address field)

3) Your browser indicates that it trusts the site you are visiting (in Internet Explorer 8, the address field background turns green)

For example, when you access your bank online, you will see that their URL begins with “https://”, and that there is a padlock symbol somewhere on the bottom or top of your Internet browser. When you’re browser is using TLS/SSL to communicate with a web server on the Internet, you are doing two things by convention—ensuring that the site you are visiting is who they say they are through the use of an SSL certificate which is certified by a trusted authority (for example Verisign) , and the data you are transmitting are encrypted and thus protected from eavesdropping exposure.

What if you need to send something to someone—like a file or an email containing very confidential information (e.g. a set of social security numbers tied to their corresponding owners’ identity)? If trust and confidentiality are important attributes needed in your communication, then there is a product called PGP Desktop that you and your receiver can use. PGP stands for Pretty Good Privacy. The way it works is as follows:

1) Each user creates two kinds of crypto keys—one key is the secret key, the other the public key

2) The public key can be used to encrypt data. The data can then be decrypted using its corresponding secret key.

3) Say that user A and B have each created their PGP key pairs. User A wants to transmit data to B, and he wants only B to be able to read A’s message. They would first need to exchange public keys. User A would then use B’s public key to encrypt his data before transmitting it. When B receives the message, he can use his secret key to decrypt the message. No one else can decrypt A’s message because B is the only one that has the corresponding secret key to decrypt the message.

The use of PGP in the above example is just one of the many ways people can use the pair of crypto keys to encrypt their Internet traffic. By the way, the existence of PKI (Public Key Infrastructure) facilitates the exchange and certification of public keys.

The third and final scenario where you can encrypt your Internet traffic is WI-FI technology use. If you are using some form of wireless technology, you need to make sure you encrypt your wireless network lest you invite your neighbors to see everything you do on the Internet. Currently, the best form of encryption one should use for your home wireless access point is WPA2. WPA stands for Wi-Fi Protected Access. It is more secure that the previous WEP (wired equivalent privacy) or the WPA standard. By using WPA2, you are ensuring that your neighbors cannot see your private Internet traffic.

Remember, Internet traffic is generally not secure. To help keep your confidential data secured when it has to traverse it, you will need to put into effect the habit of only using web sites that support TLS/SSL. And if you need to transmit data to someone, you can use PGP. Lastly, make sure to use WPA2 encryption for your wireless access point to keep your neighbors from seeing your wireless traffic.

OVERVIEW

To make your computer run faster you need to know the following:

  1. Key resources of a computer
  2. Typical ways resources are used by your computer
  3. What can slow down your once fast and responsive computer

Once you know these, you can make a better decision about what you can do to make your computer run faster.

COMPUTER RESOURCES

To understand how to make your computer run faster, you need to understand the primary computer resources that impact the performance of your computer. These resources are what help your computer perform its job. They are as follows: processor (central processing unit or CPU, the brain and processing power of your computer), memory (your computer’s RAM, or primary memory), hard disk drive (HDD, your computer’s secondary memory), network interface (your computer’s connection to the world-i.e. the Internet). The network interface could be your modem, your WI-FI card, or the built-in fast Ethernet network interface of your computer.

If at least one of these resources gets taxed, the computer’s performance gets worse and thus the computer slows down!

Depending on what you are doing with your computer or what it is doing on its own, certain resources will get taxed first. Once a resource is taxed, your computer slows down. Here are some typical scenarios to illustrate this.

  1. Having many applications open or windows open will tax your computer’s memory. For example, if you have a lot of Internet browser windows open, your computer will start slowing down.
  2. Running a program that performs heavy calculations will tax your computer’s processor. For example, if you are running a CAD program and are doing some image rotation, you will see that your CPU usage will increase.
  3. Performing a large file download or upload will task your network interface. For example, when you upload a YouTube video, your computer’s network interface will be busy. It can impact your computer’s responsiveness.
  4. A simple file copy from your hard disk drive can impact the performance of your computer. For example, copying a huge multi-megabyte file to your flash drive will tax your hard disk drive, and thus slow down your computer.
  5. Your computer gets infected with a malicious adware or worm. Most malicious adware will cause multiple Internet browsers to open and cause memory, processor, and hard disk drive to be completely taxed-making your computer totally useless. Almost all worms will use up all of your computer’s resources causing your computer to slow down as well.

TYPICAL WAYS RESOURCES ARE USED

Unless your computer is infected with some form of malware, its resources will typically get used up in the following manner:

  • The first resource to get used up is memory-your computer’s RAM. When a computer program runs, it uses up memory and disk space for any temporary file it uses.
  • When RAM is in short supply, your computer starts using virtual memory. Virtual memory resides on your computer’s hard disk drive. The hard disk drive is the slowest of all computer resources. Thus, the moment your computer starts using more virtual memory, your computer will start to show poor performance-i.e. it will become less responsive. When the hard disk drive starts to flash frequently and you aren’t explicitly reading or saving a file, this is a sure sign your computer is depending more on virtual memory. At this point, your computer is probably running sluggishly.
  • Files on a computer’s hard disk drive are stored in storage units called blocks. A computer can extract data faster if the file is stored in a contiguous sequence of blocks. Over time, files change and thus get scattered in the hard disk over non-contiguous blocks. When this happens, the file gets fragmented. When more and more files get fragmented, the computer will take longer and longer to read files. This is why computers perform better when you first get them. Then over time, it starts to perform poorly as data and program files get fragmented on the hard disk drive.

WHAT CAN SLOW DOWN YOUR ONCE FAST COMPUTER

You might notice that when you first opened up your computer, applications and other utilities are pretty responsive. Over time, your computer starts to get sluggish. The items enumerated below will account for this sluggishness.

  • Installation of New Devices. When you install a new device (e.g. a printer) various additional programs get installed on your computer to help make it convenient for you to manage that device. For example, a printer installation will install at least a couple of programs that run in the background-a printer management utility and a printer driver/software updater.
  • Applications in General. When you install an application, the application will also install a program that will help keep the program’s version up-to-date. This program will run in the background, periodically checking for software updates. When it detects an update, it will download the update and install it.
  • Internet Browser Plug-ins. Adobe and Java are two of the most notorious plug-ins that use up your computer’s resources. These and other plug-ins typically download updates frequently and often-causing your computer to slowdown when it is downloading, probably without your knowledge.
  • * Virus Infection. Antivirus software will occasionally fail to detect a virus infection. When your computer is infected with some virus (or some type of malware or malicious adware), your computer will start to slow down. Depending on what the virus or malware is doing, your processor, memory, or network resources could easily be used up.

MAKE YOUR COMPUTER RUN FASTER

Now that you have the proper background, there are things you can do to help make your computer run faster. Some may cost you, but most can be done at no cost. Here is a quick overview of what you can do:

  • Perform a full virus scan of your computer
  • Perform a disk defragmentation
  • Uninstall or disable unnecessary programs
  • Add more RAM
  • Add faster disk drives

Before you spend money, the first thing you should do is to perform a full virus scan of your computer. To do this, you need to:

  • Make sure your antivirus program has the latest updates
  • Boot in safe mode
  • Run a complete scan of your computer; making sure all disk drives are scanned

By doing this, you will help guarantee that a virus, malware, or adware isn’t slowing down your computer.

It is generally good practice to periodically defragment your main computer disk drive. Defragmenting will help your computer load data or program files into memory faster. On Windows, you will typically find the Disk Defragmenter tool in the Systems Tools folder, under Accessories.

Uninstalling or disabling programs or services can help your computer run faster as well. There are two ways to approach this-in Windows XP they are Add Remove Programs and MSCONFIG.

Do not attempt this if you aren’t sure of what you are uninstalling, but if you are, by all means do so.

In Windows XP, the first way is to open up the Add Remove Programs utility in the Control Panel. In the Add Remove Programs utility, look for programs you no longer use, and uninstall them. By doing this, you free up disk space and possibly remove any memory resident programs that the program installed. The other approach is to use the MSCONFIG utility (Microsoft System Configuration utility). To run MSCONFIG, simply click START, select RUN, enter “msconfig” in the “Open:” field, and click OK. Look for things you don’t need in the Startup and Services tabs. In the Services tab, you can reduce the chance of disabling key services by making checking the “Hide all Microsoft Services.” This ensures you don’t impact key services used by your operating system.

If you still find that your computer is slow, it is probably because the programs you are using require more memory, or the way you are using applications require more memory. In this case, purchase and install more memory. Check how many memory slots your computer can take, then make sure to consult your manufacturer’s specifications to ensure you purchase the right type and size RAM. If you aren’t comfortable dealing with hardware, you can always get the help of someone who is.

If you use a lot of data files, it may also be to your advantage to purchase a fast disk drive. Install the fast disk drive as a slave drive and place your data there. A faster disk drive can also help speed up your computer if you replace your boot drive with a faster disk drive. Note, however, that it takes a lot of time to replace your boot drive with another. You may want to consult the help of a professional of a competent friend to do this.

SUMMARY

There isn’t one quick action you can take to make your computer go faster-aside from buying a new one. You must first have some basic understanding of the key resources that affect your computers performance-processor, memory, disk drive, and network interface. You also need to understand how these resources are typically used up, provided your computer isn’t infected with a virus. Some key examples of things that over time slow down the performance of your once fast computer can also help you understand. With the proper background, you will make a better decision about what to do to speed up your computer.

Microsoft Security Essentials, also known as “Morro”, was officially released as BETA to the public Tuesday, 23 Jun 2009.  This article gives you a quick first look at it.  If you want to look at it yourself, you can download it at https://connect.microsoft.com/securityessentials, but you’ll need an account in connect.microsoft.com (just make one if you don’t have one; it’s free).

OK.  Here’s a quick look at MSE’s user interface.

When you’ve installed it, you will see this icon on your traybar:  mse-traybar-icon

When you open it, you will the following four tabs:  Home, Update, History, and Settings.

mse-home

mse-update

mse-history

mse-settings

After you install it, MSE will perform its initial scan.  When it did the scan, I checked to see how it was doing with respect to resources and how it was affecting the performance of my computer.  And to my surprise, it was very forgiving.  I was able to do work without having to wait or be affected by MSE scan because apparently it generally tries to run when your computer is idle.  So, when you are busy doing other things, it does release the CPU resource as needed.  Check the task manager below and you’ll see that when I was idle the CPU was at 100%, then I started working and the CPU utilization went down.

mse-no-takeover-cpu

Also check out the detailed performance below.  If you aren’t idle, it does get out of your way.

mse-cpu

Its memory utilization, for an AV product, doesn’t look that bad.

mse-mem-use

Of course, I can’t really tell at this point how effective it is in catching malware.  I’ll save that for someone else to do.  For now, know that it is out there and seems to be running just fine.

When people think of home computer security, antivirus software always comes to mind. Unfortunately this isn’t enough to cover the basics of home computer security. Since there are many ways computers can be breached, it makes sense to employ multiple solutions to address the various vectors of computer attacks. Regardless of your computer or Internet skill level, you must establish some basic computer setup and practices in the following areas:

  • Tools that keep malware out and help avoid malicious sites or content
  • Safe computing practices to keep malware from getting in and to keep your private information from getting out

Malware (virus, spyware, worms, adware, root kit, Trojan, etc.) can enter your computer using the same path as data—through the network interface (via wireless or the network interface card) by exploiting one or more operating system vulnerability, email, web downloads, flash drives, CD/DVD discs , external hard drives and many others. You can also be lured in through malicious web sites where you can unsuspectingly download malicious content.

When malware makes it into your computer, the damage can range from a minor annoyance, file corruption, computer slowness, computer operating system corruption, identity theft, all the way to financial loss, or a mixture of any of these damages.

Your privacy or identity can be breached through your computer when fraudulent email posing as your bank, the government, or some authority requesting your confidential information is acted upon. Or through some links that takes you to a malicious site disguised as a bank, government, or other authoritative site.

First let’s look at the various tools you can use to keep malware out and help protect your privacy/identity. You will need one or more of these tools to keep malware away and protect your privacy/identity:

  • K9 Web Protection (free)– provides web filter and protection from malicious sites; this is great for keeping you from entering malicious sites.
  • AVG LinkScanner(free) – helps provide web surfing protection while you search; it rates and assess the integrity of sites during web searches and thus can keep you from visiting malicious sites .
  • Avast! Home Edition (free) – provides basic spyware, root kit, and virus protection; has worm protection and malware protection via web shield feature.
  • ZoneAlarm Internet Security Suite – provides a comprehensive protection solution ranging from firewall, root kit detection and protection, antivirus/antispyware, privacy protection, anti-Spam, anti-Phishing, and identity protection.
  • Kaspersky Anti-Virus 2009 – provides virus, spyware, and adware protection; getting the Internet suite version also provides intrusion protection, personal firewall, protection from malware sites, content filtering, spam protection, and identity protection.
  • SurfSecret Privacy Protector – provides privacy and identity protection; also sells a privacy vault product designed to secure through encryption your confidential files and information; the privacy vault can prevent exposure of your confidential information from malicious programs and spyware.
  • SurfSecret Keypad – provides identity theft protection by protecting passwords and usernames; also protects credit cards and other financial information through the use of an external device.
  • CA Anti-Virus 2009 – provides protection against viruses, worms, Trojan horse programs; they have a separate anti-spyware program to protect against spyware.

Tools alone aren’t enough to keep your computer from getting affected or impacted by malware. You need to exercise safe computing as part of your basic computer security. When you exercise safe computing, you avoid opening email attachments that you aren’t expecting. You also learn to spot phishing scams—those fraudulent emails promising millions of dollars if you send personal and bank information, or those emails scaring you into providing your bank account login information to correct supposed account issue.

Should your computer get corrupted as a result of malware getting through, backups of your important files would become very important. Maintaining backups outside your computer is best. Elephant Drive is an Internet service which provides unlimited secure online storage; you’ll need this before your computer files are corrupted by malware. It’s like insurance, you’ll need it when disaster hits.

At the very minimum, your computer security should include the use of tools to protect a computer from malware and malicious sites and reinforced by the exercise of safe computing habits.

In order to properly spot an Internet phishing scam, you need to know what it is.  When someone or some organization is phishing, they are attempting to obtain confidential information under false pretenses with the objective of stealing credit card numbers, passwords, or other personal or financial data.  With this in mind, spotting an Internet scam may be extremely difficult for a novice Internet user like grandma, grandpa, or anyone who isn’t familiar with the Internet or someone who doesn’t know what may or may not be legitimate online.

When you finish reading this article, you will:

  • Know how to spot and avoid phishing scams 100% of the time
  • Know what to do with phishing attempts against you
  • Know what to do should someone you know become a victim

Pay close attention to every word of this article; it may save you and others a lot of headache later.

Phishing scams is nothing new.  If you use Google Trends, you will see that the term “phishing” and “phishing scams” can be found in news articles ever since Google started tracking them in late 2003, early 2004.  You will also notice that the search trend for the term “phishing” took off in the second quarter of 2004.  The search for the phrase “phishing scam” only took off in the first quarter of 2005.  At the time of this writing, June 2009, there continue to be several news articles regarding the rise of phishing scams.  Here are some recent ones just to give you a feel:

  • Phishing Scams can Wipe Out your Bank Account (19 Jun 2009) – The lure of money can convince some people down on their luck to send in their bank account information in hopes to get free money.
  • Internet Job Scams (19 Jun 2009) – Job postings online lure job seekers into providing confidential information online
  • Phishing Disguised as Virus Warning(15 Jun 2009) – Users are University of Arkansas being scammed of their account information through an e-mail warning users of a virus
  • E-mail Account Phishing Scam hits Penn State (08 Jun 2009) – Penn State users being scammed through an e-mail that purports to come from the Penn State helpdesk; e-mail requests users to divulge their account name and password.

It may seem that one has to have some degree of computer and Internet literacy to spot a phishing scam.  Fortunately, that isn’t the case.  It is extremely easy to spot these scams; all you need to remember are two simple rules.

These two rules will help ensure you have a 100% hit on your ability to spot any phishing scams.

  • If it is too good to be true, it probably is.
  • Any unsolicited communication (e-mail, text, social networking message, or any other forms of communication) requesting for confidential information or asking you to click a link to sign in is an attempt at phishing.

You can apply these rules against the examples below and see how easy it is to spot a scam:

  • You receive an e-mail stating that there is some inheritance that is to be released to you; however, they need to receive your name, address, phone/fax, age, and occupation in order to release the funds to you.
  • You receive an e-mail from Mrs. Aaisha Ali Abaul who is dying and who happens to have inherited millions of dollars.  She would like to give you her millions as her last good deed; of course you will need to provide her your bank account information in order to transfer the millions
  • Bank of America sends you an e-mail stating that you need to verify your account information.  A login link is provided for your convenience.
  • PayPal sends you and email stating that your account has been breached.  They ask you to login in order to correct the problem, and they conveniently give you a link to help you do this.
Now that we know how to spot phishing scams, dealing with their disposition is very straight-forward and easy.  Simply, if they are in your e-mail box or message inbox, simply delete them.  If you cannot delete them, simply ignore them.  By all means, do not respond to any of these communications as it lets the “scammers” know you are a live one.
At this point in the article, you should never become a phishing scam victim; but what if a relative or close friend becomes one?  It is never to late to learn, so have them read this article as well and learn.  Then have them read the article at the Federal Trade Commission web site on Defend: Recover from Identity Theft. This site provides a wealth of information on what to do.
If you don’t remember anything else from this article, just remember this:  “If it’s an unsolicited communication, it is very likely a phishing scam in one form or another.”

Protect your computer

Protect your computer/confidential information

Introduction

These days, there are so many bad or nasty things your computer can catch or stumble into from the Internet without even trying.  Virus, malware, trojan, spyware, and malicious web sites are some of the things to avoid. Each is intended to damage files, steal your identity, capture your account information, show you ads, or turn your computer into a platform for launching more infections (worms, virus, adware/spyware).

With so many potential vectors of attack, what is one to do? How is a typical computer user going to fight this onslaught? Well, if you are reading this, chances are you are looking to improve your computer’s security because of some prior bad experience. Guess what, you’ve found the most complete discussion on computer protection ever.

First Line of Defense

In order to protect your computer, you need to acquire a multi-layer set of solutions like the one listed below.  All these are free!

Last Line of Defense

If your first line of defense fails, your last line of defense can help you by protecting your personal or confidential information.

Encryption

If you own a laptop, then you shouldn’t leave home without making sure you are using TrueCrypt–an encryption solution that can help make sure your confidential and personal information are totally secure should you lose your laptop, or god forbid, should it be stolen.  This free open-source software solution allows you to create virtual encrypted disk drives which only you can read.

ID Protection

If you are worried about identity theft and have a few dollars to spare, look into subscribing to a credit or identity protection service like protectmyid.com.  This service sends you alerts whenever there is a change in your credit status–like someone applying for credit under your name!

I’ve been stumbling around more often these days.  Last night I stumbled upon eyeOS, my first ever contact with something using cloud computing system.

EyeOS is an Internet cloud computing operating system, where your computer is accessible anywhere so long as you have Internet access.  It’s user interface is much like a computer desktop.  You’ll find items on your desktop as you’ve left them when you logged out.  EyeOS has various applications–single user applications, group applications, and file sharing capabilities.

You can host your own eyeOS server, but if you don’t have one, you can sign up at http://www.eyeos.info.  When you get there, you get a login prompt.

login prompt for eyeOS

login prompt for eyeOS

Since you don’t have an account yet, click the new user link.  The login prompt expands to show more fields.  Fill it in as requested and click Create Account.

Create a new account

Create a new account

Once you’ve created a new account, you will be asked to pick a new theme as shown below.

Pick a theme

Pick a theme

Select a theme and you will be asked to login with your new account.  Login, and you will be taken to your desktop.  Since I chose the new theme, my desktop looks like this:

Your new eyeOS desktop

Your new eyeOS desktop

It looks like your typical computer desktop, and it has the following key areas:

  • Menu or tool bar
  • Desktop items
  • Floating menu

I will cover each an everyone of these areas in a more indepth review of eyeOS.

This Internet application is interesting, and has lots of potential applications.

Subsribe to my site so that you can receive the latest news or review on this topic.