Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Do Not Want That Update? How To Stop A Nag

IE 8 is an “Important” Update, Yes, But I Don’t Want It

Sometimes we need to tell Windows Update to stop prompting us to install a particular Update.
Ups_avail

When Microsoft has released important and/or critical Updates (aka “patches”) for us, Windows has various ways of letting us know, including a System Tray icon. [note: The normal route for accessing Update choices is Start >Windows Update, or Start >Programs >Windows Update. Click “View available updates”.]

I am a big fan of Updates. I (almost) always install them the moment I become aware of them. I use Secunia’s Personal Software Inspector to keep an eye on all my installed programs’ update state.. and I recommend you do too. Updates are ‘good’ and you want them.

Tip of the day: Manage Windows Updates prompts.
Currently, Microsoft Update is annoying me by continuously nagging me that there are Updates available. And when I click on the icon to see just what these updates are…
Hide_Update

.. and I see that there is just one Update Microsoft wants me to install (the others only rate “optional”) — Internet Explorer 8.
Now, I understand why Microsoft wants us to be using a more secure browser (and I understand why it’s considered “important”) and I will upgrade from IE7 on most of my machines — but not all. Not yet.

So I right-click on the Update I don’t want to be nagged about and then click on “Hide update”.

That’s it. I’m done. Windows Update will no longer prompt me to install this (now) ‘hidden’ update. At a later date, to see Updates that I’ve hidden, I just click on “Show hidden updates”. I can undo my change.

Note: This technique can be used on troublesome Updates that cause incompatibility issues such as BSOD. If a Windows Update install causes you trouble, and you need to uninstall it, the “Hide” tip won’t help you (it’s too late). Please refer to the 3rd answer in this article, IE’s Menu bar, Taskbar icons, and bad Updates*, to see how to remove Updates.
After you get that Update uninstalled, (then) use the Hide feature to prevent Windows Update from re-Installing it on you again.

Today’s free link(s): Panda Cloud Antivirus – Free Cloud Protection
Panda Security has launched a brand new type of antivirus, and Security blogger Bill Mullins has this excellent write up. “FREE, antivirus thin-client service for consumers which is able to process and block malware more efficiently than locally installed signature-based products.” Click the link for more..
[update: For more, also see Panda Cloud Antivirus – Is it netbook ready?]

Today’s free download: Adeona is the first Open Source system for tracking the location of your lost or stolen laptop that does not rely on a proprietary, central service. This means that you can install Adeona on your laptop and go.

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

April 30, 2009 Posted by | advice, computers, how to, tech, Windows | , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | 22 Comments

A 60 – 40 Split

It’s Time To Play LETS COUNT THE TYPOS!

Dear Friend,

I am Mr. Ebrahim Abdul Hamid, a senior staff with National Bank of Dubai Fujerah branch, I have urgent business proposition to discus with you.
A British Oil consultant and contractor with the Kruger Gold Company, Mr. Raymond Beck made a numbered time (Fixed) Deposit for twelve calendar months, valued at USD$3,000,000.00 (Three Million United State Dollars) in my branch.
Upon maturity of this deposit, I sent a routine notification to his forwarding address but got no reply. After a month, we sent a reminder and finally we discovered from his contract employers, the Kruger Gold Company that Mr. Raymond Beck died in a plane crash along with his wife in a plain crash along with his wife in Egypt Air Flight 990, 1999 air crash. (For more information about this crash and person you can contact this website; <http://news.bbc.co.uk/1/hi/world/americas/502503.stm
>
Since we got this information about his death and on further investigation, I found out that he died without making a WILL, and all attempts to trace his next of kin were fruitless. I therefore made further investigation and discovered that Mr. Raymond Beck did not declare any next of kin or relations in all his official documents, including his Bank Deposit paperwork in my Bank.
This sum of USD$3,000,000.00 (Three Million United States Dollars) is still sitting in my Bank and the interest is being rolled over with the principal sum at the end of each year. No one has ever come forward to claim it. According to Laws of United Arab Emirates, at the expiration of 10(TEN) years, the money will revert to the ownership of the (U.A.E) Government if nobody applies to claim the fund.
Consequently, my proposal is that I will like you as a foreigner to stand in as the next of kin to Mr. Raymond Beck so that the fruits of this old man’s labor will not get into the hands of some corrupt government officials.
This is simple, I will like you to provide immediately your full names and address so that the attorney will prepare the necessary documents and affidavits that will put you in place as the next of kin.
We shall employ the services of an attorney for drafting and notarization of the WILL and to obtain the necessary documents and letter of probate/ administration in your favor for the transfer. A bank account in any part of the world that you will provide will then facilitate the transfer of this money to you as the beneficiary/next of kin.
The money will be paid into your account for us to share in the ratio of 60% for me and 40% for you. There is no risk at all as all the paperwork for this transaction will be done by the attorney and my position as the Branch Manager guarantees the successful execution of this transaction.
Upon your response, I shall then provide you with more details and relevant documents that will help you understand the transaction. Please send me your confidential telephone and fax numbers for easy communication. Please observe utmost confidentiality, and rest assured that this transaction would be most profitable for both of us because I shall require your assistance to invest my share in your country.
I am waiting for your urgent response.

Regards.
Mr. Ebrahim Hamid.
Please respons with this email; ima.moron@ymail.com

Wow. How many clues did you spot?
Plain crashed in 1999…

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

April 28, 2009 Posted by | Internet scam, Phishing, phraud, spam and junk mail | , , , , , , | 8 Comments

Questions From Apple Users*

Today I am going to answer a few questions submitted by readers, in the Q’s and their A’s format. apple_logo_rainbow_6_color

Q: Will the programs I have on my old Mac run on a new “Leopard” system?
A: There are enough differences in the new OS X 10.5 that some programs may need to be replaced with the latest versions that are “Leopard-compatible” (Norton AV often needs this, for example) to run at their best. The keyword is “may”: most programs will work just fine once you visit Apple Update.
Please note– if you intend to migrate your programs and data from an old machine to the new Leopard machine, make sure you have updated all the software (programs) on the old machine before initiating the migration. Leopard will/can refuse to accept programs that aren’t current.

Q: I am thinking about buying a new iMac and I was told Apple runs on Intel circuits now. Does this mean I would be vulnerable to viruses, worms and spyware like Windows? What security programs would I need?
A: While it is true that Apple runs on the same type of “circuits” as Windows PC’s now, it is not (generally) your hardware that is vulnerable to malware and hackers, but the lines of software “code” (programming) that make up your applications/programs.
Now to the second part of your question… The lines of code that make up the Mac operating system (the most recent being OSX 10.5 “Leopard”) are not currently being targeted by the bad guys.. simply because there’s too few machines running it (and the ones that are [generally] do not contain credit card number databases). However, some of the programs you would have on your Mac are being targeted for exploits– Adobe Reader, QuickTime (a media format/player) and the Safari browser, notably. (None of which you need, btw.)
And now the last part: as things stand, today, there have been worms distributed via P2P “file sharing”, rogue “cleaners”, and there’s now an “iBotnet” of infected Macs. This new trend will only increase as Apple’s marketshare grows. Mac users should not think themselves immune.

Today’s free link: There’s been some nifty new features added to Gmail, which has been getting some attention. The Official Gmail Blog has the details.

Today’s free download: I’m keeping with a Macintosh theme today, and so today’s app is for Apple users. I don’t want it said that I never think of you guys! Watch TV on your iMac with Miro, a C/Net Editor’s Choice. Description: “Democracy Player is a free and open source internet TV/video podcast application, with a beautiful, easy to use interface. You can subscribe to any Internet TV channel, including video podcasts, video RSS feeds, bittorrent feeds, and video blogs. A built-in Channel Guide lists hundreds of channels of all types, all free to subscribe to. Browse videos, download, and watch fullscreen– all in the same application.

* Folks, please don’t write to tell me “Norton is evil”. Read the reviews for NIS 2008 [and NIS 2009]. It may open your eyes.

* Orig post 09/18/08

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

April 28, 2009 Posted by | advice, Apple, computers, how to, PC, security, tech | , , , , , , , , , , , , , , , | Leave a comment

Thank You Tech–for Everyone Readers

I have noticed that the old odometer has just clicked over the 500,000th visitor to my humble Tech Tips, Tricks, and Advice site.

Since I first published article #1, The first Tech Paul Post: secure your web connection, I have learned a good deal, made some very important friendships, and – hopefully – helped a few folks solve problems and better enjoy technology along the way.

To my readers I say…
thank_you

April 27, 2009 Posted by | blogging, tech | , | 11 Comments

Have You Gone Virtual Yet?

One of the hot topics in the IT industry is virtualization. Basically what this is, is software that creates an environment — on an existing PC — into which you can install (and run) another operating system [OS]; in short, running a PC on top of your PC.. which gives you two PCs. This “on top of” machine is called a “virtual machine“.

Tip of the day: Get more out of your PC by using a virtual environment.
(I must take a moment to state that it is the power of the newer generations of PCs that allow us to take advantage of machine virtualization. VM “shares” resources (CPU, RAM) with the existing install… so if you’re barely clunking along as it is, forget about VMs and click here to read my article(s) on when it’s time for a new machine.)

How can this benefit you? One of the main advantages is when you are thinking about a dual-boot install, or would like to do away with an existing dual-boot set up — say, for security reasons. Instead of partitioning your hard drive, and using FAT32 to run (boot to) either Windows 98 or XP, format your drive in NTFS, install XP, and run 98 inside the virtual environment. (I am using Windows 98 as an example. You may want to run a Linux distro, and learn about Open Source. The fact is you can run any OS that you have a license for… except Vista.)
If you do this, and create a shared folder for the VM on XP, you will be able to switch back and forth between the two and share files with both OS’s.

Another advantage of using a VM is, it loads much like “mounting” a disk image. You can make multiple ’snapshots’ of your VM, and load the one of your choosing. This is an absolutely fantastic method for dealing with security issues. I know several geeks who run an XP VM on their XP machine– they use the VM version for their daily surfing and usage, and as a “sandbox” for testing downloaded programs and patches/Updates. At the end of the day, they just close the VM, and when they open it again (unless they take a ’snapshot’ and Save those changes to the VM) their pristine VM loads: no browsing history, no spyware, no trace of yesterday’s activity… just a brand-new XP machine.
By keeping a copy of the VM snapshot in another location, they always have a full system backup on hand. (And all my readers know about the importance of recovery backups!)

These are just two uses and applications for virtual machines (VMs). You may be able to think of others. You are not just limited to one VM, either — but each VM (unless it is an Open Source OS, like Linux) does require a valid Product Key/license. This is not a way to cheat.

Today’s free download(s): The most popular virtual machine software is put out by VMware. The free offerings are VMware Server (don’t worry about the use of the word “server”) and VMware Player (which is a web browsing sandbox). Not only is this a flexible (highly compatible with your particular hardware) program, but VMware offers several pre-configured Open Source ’snapshots’, called “appliances”, that you can download and run without going through an OS install process.

Microsoft also offers free virtual machine software, that some people argue works better with Microsoft OS’s. From website: “Virtual PC 2007 is a powerful software virtualization solution that allows you to run multiple PC-based operating systems simultaneously on one workstation.”

Either way you decide, you are not making fundamental changes to your hard drive or currently installed operating system. This is just a program, like Excel or Word is a program. Simply uninstall it if you find you don’t like or need it.. but I doubt very much that you ever will– it’s just too useful and safe.

Copyright 2007-9 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

April 27, 2009 Posted by | advice, computers, how to, tech, Virtual Machine | 1 Comment

The Internet Is Not Disneyland

Folks, the Internet is not Disneyland. Most knowledgeable people refer to it as the “wild, wild, West”, (a reference to sheer lawlessness) but I like a different analogy better.. think of it as going into the Big City, and going down to the docks/warehouse district, alone, and at night.
You can do it, but you best be careful.

What you can do to have protection:

1: please read Top 10 things you should do to your computer. It is a checklist, and provides you with the How To’s for a (more) protected_computersecure computer, as well as providing links to important (free) security downloads.
2: enable an anti-phishing filter, which can help alert you to poisoned websites before you go there. All modern browsers have a filter built in, and all you have to do is turn it on. Or you can add an anti-phishing toolbar/plug-in such as Link Scanner Lite, McAfee’s Site Advisor and/or – the excellent WOT.
3: make sure ALL the programs on your computer are patched and up-to-date. The easiest and most effective way to do this (IMHO) is to download and install the PSI (Personal Software Inspector) from Secunia.
4: Never respond to e-mails asking for personal information. Legitimate businesses never contact you about “important issues” via e-mail. But criminals love to go phishing!
5: Be PARANOID on the Internet. (Use common sense) Think someone can’t trace back to you? Guess again; your browser reveals a wealth of information by default.
Sound too good to be true? It is. There’s no such thing as a “free iPod”… and, no, you did not win the Irish Lottery.
Is looking at sexually explicit material simply irresistible? Go to one of those video rental shops that has a back room instead of clicking links and images.

A malware infection can cost you all your data and/or several hundred dollars in cleanup.. and/or many hours of your time..

[note: almost all of these things referred to above are “set it, then forget it” simple. You do not have to be an über-geek, or devote hours, to implement them. An ounce of prevention really is worth a pound of cure!]

Today’s free link: What’s On My PC… FREE Layers of Protection!

Today’s free download: K9 Web Protection is a  free Internet filtering and control solution for the home. K9 puts YOU in control of the Internet so you can protect your kids.

* Orig post: 2/4/09

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

April 26, 2009 Posted by | advice, Internet, kids and the Internet, security | 2 Comments