Computer Gaming and Me.. and a 12 yr-old.
To actually be in “vacation mode”, I must resist the compulsion to hammer out a new article everyday. And so today I am re-posting an article that I enjoyed writing, some time ago, and I hope you will enjoy reading today.
When I first started writing Tech–for Everyone way back on the 8th of June (56 how-to articles ago)[update: today is #741], I wondered how long I could go before I talked about computer gaming. I think I did fairly well at delaying the inevitable. Two things triggered this post: a user with a pre-teen boy, and my mood. I’ll look at the latter first.
This week I got into a foul mood. I became short-tempered, irritated, antsy. I was definitely ‘out of sorts’. I was not a Happy Camper. Part of this was due to the fact that I had several back-to-back days of too-much-to-do/too-little-time (can anyone relate?). I felt a bit less than “in control”.
I managed to keep up with demands, and my time-spent was successful. I not only kept afloat, but I succeeded. However, this didn’t lighten my mood.
Finally, by staying up a little longer than I should, I was able to take a break and play a conquest map of Age of Empires III, The Warchiefs (naturally, I won). Amazingly, I was calm, refreshed, and happy. I was a Happy Camper again.
Why? I realized that it had been several days since I had played a game, and I had subconsciously “missed it”, like a smoker during a long flight, or a dieter walking past the bakery. And that once I got my “fix”, I was returned to a normal psychological state. This realization has caused me to wonder if I (me! myself!) wasn’t developing a gaming “addiction”. Wow.
There have been several news stories about computer gaming; ranging from the couple who suffered financial ruin by devoting their lives completely to the online game World of Warcraft (a couple of nut-jobs, if you ask me), to the medical ramifications (carpal-tunnel) of too much controller/mouse/keyboard use … especially in children.
There is a real belief in “gaming addiction”, and there’s a doctor who’s gone so far as publicly stating that as much as 40% of all WoW players are clinically addicted to it. (Read the article) Consider that there’s at least six and-a half million people subscribing, and you realize that that’s a LOT of people … and that’s just one game. It is my belief that these news stories will only increase in number; that as our society becomes more and more of a shut-in society, and more of our interactions take place online, topics along this line will only grow. Google “World of Warcraft+divorce” and you’ll see 747,000 results. WoW.
If your friends are telling you you’re an addict, please … don’t take it as a compliment. Take a serious look at yourself, before you lose everything.
That said, I do play computer games; and if you’re curious, I like the WW II FPS titles (Call of Duty, Medal of Honor), air combat simulators (Lock On, Il-2, Microsoft), and civilization games. And good-old Solitaire. I play a couple of games a day, to “unwind”. I think I’m alright… I haven’t, as yet, spent real money on ‘magic armor’.
The second topic I mentioned was the lady with the pre-teen son. She keeps having “weird pop ups”, and her machine is “always so slow.” I had installed a security suite, and the full gamut of protections onto her machine, and yet she keeps having these issues. She asked me, “why does this keep happening?”
I asked her several questions and looked over her logs and histories. She told me she has a 12 year-old son, and that as soon as he gets home from school he goes straight to the computer to “do homework” … that he spends quit a bit of time on the PC. Well! I was once a 12 year-old boy, and I remember well how much time in the afternoon — freshly released from scholarly confinement — I spent on homework. None. Zero. Nada. (At least, not willingly.)
Sure enough, a look at IE’s browsing history (read how to do this here) did not reveal any instances of National Geographic, The History Explorer, Encyclopedia Brittanica, or “math help” (or anything else even vaguely homework-related), but revealed endless explorations of Flash games, online games, and “cheat codes”.
I looked at his download history and found plenty of “demo games”, magic swords and shields, and other “bonuses” he’d earned playing his online games. Could one of those ‘magic swords’ (or demo-games) have contained spyware??? Does spyware slow down your machine? Cause pop ups? Well … (duh) YES!
Tip of the day: Here’s the thing most folks fail to fully grasp — when you let your child run under your User Account, he’s running with full administrator privileges and can install programs unrestricted and when you click on “download this file”, you’re bypassing your protection. (It has to be this way, or you’d never get anything done) You are telling your anti-malware apps, “it’s OK. I know what I’m doing.” A 12 year-old boy, caught up in the excitement at having just “triumphed” and earning himself a +2 Sword of Sharpness, probably doesn’t know what he’s doing, and he will click “download your prize now!”
98% of the time, it’s harmless fun. How can you tell which demo game or ‘magic shield’ is safe, and which one’s contain spyware? You can’t. Sorry. Like I said, 98% of them are safe.
If missed my series on protecting your kids from the Internet, you can learn how to remedy this — creating a Limited User Account, and cranking up IE’s security, etc. — by clicking here.
Today’s free link: Today’s free link is a light-weight (small and efficient) 3-D chess game. It will run easily on older machines. You can adjust the difficulty level from Beginner to Club, and improve your game. Pawn 2
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Holiday Edition– IE questions & Security "Zones"
My recent article on tweaking IE 7 and using Security Zones has prompted several reader questions whose answers are worth posting here. So today there will not be my usual Tip of the day, but instead there will be several Q’s and their A’s. If for some reason you missed the original article and would like to get up to speed, click here.
Q. Can’t add a site to Trusted Zone, Why are my options “greyed out”?
A. The person who sent me this question did not specify if they were experiencing this at home, or at work, which can have different causes. If you are on your personal machine at home, the most likely cause for having any Settings or Options choices grayed out (unavailable) is that you are running in User mode. You need to be running as an Administrator to make changes to Windows’ behavior. Log out of your current session by clicking on Start >Log Off and switch to a user account with administrator privilege. Now your menu choices will not be grayed out and you can make your changes. When you’re finished, log off and return to your normal user account.
If you’re at work and using the company’s machine, it is likely that there are policies in place that prevent employees from making these kinds of changes. If you have a legitimate change (that will “help improve your productivity”) that you’d like to have made, submit a request to your IT department.
**Also, some types of malware will modify your Trusted Sites zone (adding poisoned, or junk sites such as a bogus lottery) and then change a setting in your Registry which blocks — greys outs — your ability to go in and remove them. Use anti-spyware programs to scan your machine and remove the infection. In this case, I would start with the Microsoft Malicious Software Removal Tool, and then click here for my list of free, safe, and effective antispyware apps.
Q. How do I remove a site from a Zone?
A. You can remove a site from any Zone by navigating to the Security tab of Internet Options as shown in the prior article, click on the zone you want to edit, and then click on the site you want to remove, as shown below.
Now click on the “Remove” button.
Actually, the fella who sent me this question was referring specifically to the Restricted Sites zone. He either really doesn’t trust Microsoft, or is trying purposely to load his machine with malware…either way, I would think twice before removing sites from the Restricted Sites zone!
Q. What should I do with these security warnings?
A. IE displays several types of warnings — suspected phishing, ActiveX, prevented download, open site in your Trusted Zone, et al — and so the answer depends on which warning you are getting…and what you’re doing when you get them.
If you are being warned that the site you’re looking at is a “suspected” Phishing site, then by all means do NOT enter any personal information! As these sites often also try to install trojan horses and malware downloaders, close down your browser and run a full antispyware sweep. Not all “suspected” sites are truly Phishing sites, sometimes mistakes happen, but in this day and age, it’s better to err on the side of caution.
ActiveX is a tool (a bit like Java) that usually is used for good purposes, more often than not actually (Microsoft Update uses ActiveX, and that’s something you definately want enabled), but in keeping with the thought expressed immediately above, you should decide on a case-by-case basis. If you can see and do everything you want to on a site without installing the ActiveX control, why install it?
Preventing unwanted downloads is a very good thing, so I strongly advise you: do not turn this warning feature off. Just click on the yellow bar and select “download this software” when you are downloading code. In fact, I believe this advice can be applied to all of IE’s warnings. We are living in a world where the Internet is relatively unpoliced, and so while it is irritating, it is safer (and wiser) to live with these warnings that to have our identity stolen and used to commit crimes, or have our PCs turned into a spambot.
Today’s free link: if you suspect a site is fraudulent and/or being used to “phish” for your personal information, and IE hasn’t flagged it as such — but you’re suspicious anyway — download McAfee’s free Site Advisor. This IE “plug in” will give you a valuable ‘second opinion’…and is updated more often than IE is.
Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Strong passwords, hidden Admin
Some basic security pointers–#1 was one of my first articles and it appeared 6/9/07–
Is your computer a zombie? You can never be too secure, and neither can your PC. These few steps will go a long way in keeping your private information away from prying eyes, and prevent your machine from being used as a “zombie” by tech-savvy evil doers. (Most owners of zombie PCs are totally unaware that their computers are being used in this way.)
Tip of the day: The two basic steps I will discuss today– password protecting your User Accounts (and requiring logging in), and renaming your Administrator Account– should be prefaced with a quick description of what is, exactly, a strong password.
Strong passwords should be “complex”. That means that they should contain both upper and lower-case letters, special characters (!@#$%^&*(){}[]) and numbers, and be at least eight characters long, and–most definitely–not be a word found in the dictionary (or a name). Your passwords (notice the plural. It is not wise to use the same password for everything.) will be easier to remember if you make them into a ‘passphrase’. An equestrian might use a passphrase of 1Lu^h0rsez, for example.
Now that you have a good password, it’s time to require authentication to use your machine. Start by clicking on Start>Control Panel>User Accounts (or Start>Settings>Control Panel>User Accounts. Depending on your version and preference setting). Then click on “Change an account,” and then click on “Create a password for your account.” Enter your password, twice, and if you’ld like, a password “hint” that will remind you (but not clue in the whole world) of your new password. Click “Create password.”
Now, since knowing your User name is half the battle, click on “Change the way users log on or off.” Deselect (by unchecking the check in the checkbox) “Use the Welcome screen.”
Unbeknown to most folks, Windows has a hidden Administrator account (this becomes vitally important when troubleshooting failing systems, or when User accounts get “locked out”) named “Administrator”. Hackers are well aware of this, and it is their favorite method of gaining access (and control over) your machine; since they know the User name (Administrator), all they have to do is guess the password–which by default, and unless you set one, there isn’t one!
Remedy this in XP Professional by going to Control Panel>Administrative Tools (you must use Classic View) and clicking on Local Security Policy. Then in the left column click on the plus sign next to Local Policies, and then click the Security Options folder (If you receive a warning about Group Policy, just ignore it) and a series of policies will appear in the right pane. The 4th or 5th one from the top should be “Accounts: Rename administrator account”. Double click on it and a dialogue box will open. Enter a new name, and click Apply, and OK.
In XP Home, the method is to click Start>Run. In the Run dialogue type in “Control userpasswords2” [no quotes] and click OK. From the User Accounts dialogue box, select the Administrator Account and click Properties. Enter the new name in the User Name text box, and click OK.
(For other versions of Windows the methodology is similar, but I recommend Searching Microsoft’s website for the specific steps.)
The last step is to congratulate yourself, because you have just made your computer much, much harder for a determined cracker to penetrate, and practically eliminated access to the casual browser.
Today’s free link: Steve Gibson’s ShieldsUp! This free scan, offered by a true giant in the computer field, analyzes your computer for vulnerabilities coming from the Internet, and tells you how your private data may be visible to outsiders. This link will appeal to the more tech-savvy, and be an eye-opening experience for those of you who have not learned about firewalls yet.
Copyright © 2007-8 Tech Paul. All rights reserved.
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Some basic security pointers–#1
Is your computer a zombie? You can never be too secure, and neither can your PC. These few steps will go a long way in keeping your private information away from prying eyes, and prevent your machine from being used as a “zombie” by tech-savvy evil doers. (Most owners of zombie PCs are totally unaware that their computers are being used in this way.)
Tip of the day: The two basic steps I will discuss today–password protecting your User Accounts (and requiring logging in), and renaming your Administrator Account–should be prefaced with a quick description of what is, exactly, a strong password.
Strong passwords should be “complex”. That means that they should contain both upper and lower-case letters, special characters (!@#$%^&*(){}[]) and numbers, and be at least eight characters long, and–most definately–not be a word (or name) found in the dictionary. Your passwords (notice the plural. It is not wise to use the same password for everything.) will be easier to remember if you make them into a ‘passphrase’. A equestrian might use a passphrase of 1Lu^h0rsez, for example.
Now that you have a good password, it’s time to require authentication to use your machine. Start by clicking on Start>Control Panel>User Accounts (or Start>Settings>Control Panel>User Accounts. Depending on your version and preference setting). Then click on “Change an account,” and then click on “Create a password for your account.” Enter your password, twice, and if you’ld like, a password “hint” that will remind you (but not clue in the whole world) of your new password. Click “Create password.”
Now, since knowing your User Name is half the battle, click on “Change the way users log on or off.” Deselect (by unchecking the check in the checkbox) “Use the Welcome screen.”
Unbeknownst to most folks, Windows has a hidden Administrator account (this becomes vitally important when troubleshooting failing systems, or when User accounts get “locked out”) named “Administrator”. Hackers are well aware of this, and it is their favorite method of gaining access (and control over) your machine; since they know the User name, all they have to do is guess the password–which by default, and unless you set one, there isn’t one! Remedy this in XP Professional by going to Control Panel>Administrative Tools (you must use Classic View) and clicking on Local Security Policy. Then in the left column click on the plus sign next to Local Policies, and then click the Security Options folder (If you receive a warning about Group Policy, just ignore it) and a series of policies will appear in the right pane. The 4th or 5th one from the top should be “Accounts: Rename administrator account”. Double click on it and a dialogue box will open. Enter a new name, and click Apply, and OK.
In XP Home, the method is to click Start>Run. In the Run dialogue type in “Control userpasswords2” [no quotes] and click OK. From the User Accounts dialogue box, select the Administrator Account and click Properties. Enter the new name in the User Name text box, and click OK.
(For other versions of Windows the methodology is similar, but I recommend Searching Microsoft’s website for the specific steps.)
The last step is to congratulate yourself, because you have just made your computer much, much harder for a determined cracker to penetrate, and practically eliminated access to the casual browser.
Today’s free link: Steve Gibson’s ShieldsUp! This free scan, offered by a true giant in the computer field, analyzes your computer for vulnerabilities coming from the Internet, and tells you how your private data may be visible to outsiders. This link will appeal to the more tech-savvy, and be an eye openning experience for those of you who have not learned about firewalls yet.
Copyright © 2007 Tech Paul. All rights reserved.
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |