Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Bigger Is Better

I haven’t been paying hawk-eyed attention, but I haven’t seen too many monitors this big for under $300…

Samsung S27B350H 27″ Widescreen LED Backlit LCD Monitor – Mega DCR, 1920 x 1080, 2ms, HDMI

And, yes. When it comes to viewing screens, bigger is better. A big screen and upgrading your Internet speed are my top two methods for improving your “computing experience”. (Nice specs on that one there..)

Also, if this (next) unit had a SSD, I think I’d jump. (Seriously considering buying my last laptop I ever buy now, before Windows 8 (and cloud OSes) arrive.)

 
Dell XPS 15z 15.6″ Ultra-thin Core i5 Laptop
What makes this a great deal?
This PCMag Editors’ Choice award-winner is described as “every bit as luxurious as the Apple MacBook Pro 15″, but it won’t cost you nearly as much.” At less than an inch thick and stuffed full of the latest technology, like an Intel Core i5 and 1GB NVIDIA graphics, you won’t be wanting for anything with this premium PC. You’ll especially like the finer touches, like the backlit keyboard, aluminum design, and 1 year in-home warranty with premium phone support. Click See It and step into a new premium PC today.
How to redeeem:
1. Start at Dell store
2. Click “Review & Checkout,” then “Add to Cart”
3. Apply coupon code R536ZTX3RS8NL8 for total $300 instant savings applied automatically, proceed to final checkout.
List Price: $999.99
Sale: $699.99 + FREE SHIPPING
You save: 30% ($300)

Has specs I like (like USB 3.0, and 2×2 Wireless A/G/N [can “see” 5.0GHz], and HDMI out on discrete graphics card…)(But.. not on sale is a 1080P version, w/2GB’s discrete.. hmmm..)

Hmmm.. a docking station, and the two together.. Santa? You there?

Reading reco: Are you bored? Need to start a good argument? Sending certain people you know this science news item will cure your troubles…

Today’s quote:Don’t accept your dog’s admiration as conclusive evidence that you are wonderful.” ~ Ann Landers

Copyright 2007-2012 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

October 20, 2012 Posted by | advice, computers, hardware, mobile, shopping for, tech | , , , | Leave a comment

Next Great App for Android, iPhone –> Rootkit

Rootkit, SMS text messages used to build a botnet of smartphones

The “hot” tech items to own these days are the (not inexpensive) iPhone and Android “smart phone” devices. (If you doubt that, ask yourself why does the news infotainment departments send reporters and camera crews to film lines of people standing outside the Apple Store when a new model comes out?)

These phones are really not phones anymore, but mini-computers – which happen to make cellular phones calls. They are Internet-connected, so they can send/receive e-mail, text and ‘chat’, and download files.. such as movies. They contain address books of your friends and family… In short, they have everything a cyber-criminal wants to target.

In the interest of making the world a better place, “a researcher at ShmooCon DC this weekend will demonstrate a smartphone botnet spewing spam, and unleash proof-of-concept code that builds a botnet out of Android and iPhone smartphones.

Yes, that’s right. A “researcher” will show us all how it’s done, and provide the code.

Georgia Weidman, an independent researcher, says her botnet attack evolved out of work she did on making an Android application send SMS text messages transparently such that the user didn’t even know it was happening from his or her smartphone. “As I did more research, I [realized] if I did this in the base operating system instead of in ‘userspace’ where most apps are, it would be a better way to do it,” she says. “If I can remotely control someone’s phone, it can be part of a botnet.”

While there has been plenty of smartphone research that pits one smartphone against another in an attack, she says, a more likely attack scenario would be a user unknowingly downloading an app that contains malicious code. “I think the majority of malware installations will come from a user downloading infected apps,” which can easily be rigged with rootkits given the lack of sufficient vetting of most smartphone apps, she says.

Well.. now that all someone has to do is copy>paste the code, yeah, she’s right. Invisible viruses that turn your smart phone into relay stations for spammers — sending us come on’s for V1@gra and C1al1s, and virus-laden links and attachments are only, I estimate, weeks away.

… and before you get too angry at this particular person, there is a whole industry of people doing this “research”, and several conventions have been going on for years. I believe that (some of) these people actually believe they are doing a good thing.

And maybe they would be.. if they only released the code to the affected device (or software) manufacturers and developers. But you don’t get rich or famous for that. (Maybe you heard about the “teen hacker” who got hired after writing viruses that attacked Twitter? There’s a lot of that kind of idiocy in tech..)

Here is the entire Dark Reading article, Researcher To Release Smartphone Botnet Proof-Of-Concept Code. I suggest you read it. Particularly if you own a smart phone.

In case you don’t know what a “botnet” is, http://en.wikipedia.org/wiki/Botnet
Or why a “rootkit” is the worst kind of virus, http://en.wikipedia.org/wiki/Rootkit

Does your smart phone have an antivirus? A firewall? Maybe you want those things?
Maybe it’s important to know that the apps at the app store are not checked (aka “vetted”) for malware? Doesn’t that *smell*?

IMHO, there is something wrong with this whole deal. Top to bottom.

Related:
* iPhone Users Are About to Be Screwed Over. The addition of the NFC chip to the iPhone isn’t for easy credit card purchases, but so the phone companies can control your financial transactions. Be warned. ~ By John C. Dvorak

“There has been a lot of talk about the addition of an NFC (near field communication) chip to the next-gen iPhone. This will allow the phone to be used as a swipe-it-yourself credit card. I consider this technology to be the most onerous ever.”

* CNet’s roundup of security apps for Android.

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


January 31, 2011 Posted by | advice, Apple, cellular, computers, cyber crime, gadgets, Google, hackers, hardware, Internet, iPhone, mobile, News, rootkits, security, tech | , , , , , , , , , , , , , , , , , , | 8 Comments

Windows Owners– Visit Update

Microsoft released yesterday an unscheduled or “out-of-cycle” patch for a highly critical vulnerability that affects all versions of Windows. Security bulletin MS08-067 (patch 958644) was posted to warn of a remote-code attack that could spread wildly across the Internet.

Folks, you want to install this one.

October 24, 2008 Posted by | advice, computers, PC, tech, Windows | , , , , , , , | 1 Comment

It’s not your fault– how the Tech Industry is failing you

Your computer was infected with pop-up pornography because you visited a popular travel Website to look at hotel room prices in Orlando. And you have a well-known Company’s Internet Security Suite.

Or maybe, because your ISP promised you they’d scan all your e-mails for you, before they got into your Inbox.. you thought they really did, and you also thought that made your e-mail safe. You clicked on a link in one of those e-mails… (it said it was from your Uncle Victor..) and, voilà! Someone’s using your credit card.
In Malaysia.
To buy big-screen TV’s.
Like, six of them.. so far.

Perhaps you did neither of those things. But.. your friends wanna know why you’re sending them all this junk e-mail, and your ISP is threatening to turn you off if you don’t stop sending mass-mailings. Huh?
Turns out, you happen to have CoolProgram 6.0* on your machine, and a cracker has “exploited” the code and turned your machine into a spambot. Your machine has been merrily sending out thousands of e-mail come-ons for generic drugs, male enhancements, and penny stocks… all while you were asleep in bed.

Or you brought home a new digital picture frame…

Does this sound like a bad sci-fi movie to you? It does to me. But, sadly, this is our current reality.

You haven’t done anything wrong (or, really stupid) and you’ve even tried to protect your machine, but you got hijacked anyway.

I, for one, think there’s something seriously wrong with this state of affairs. When I think about the state of the Internet, I start feeling like that guy in the movie.. you know the one..

Why is this happening? Many reasons. Some are:
* Software companies are, to this day, releasing programs which contain insecure code.
* Hardware manufactures don’t include any extra features– like hard-wired security.
* In their rush to bring us new and exciting technology (he who’s first to market, wins), nobody stops and ponders the consequences.. or the vulnerabilities.
* For a long time, nobody took the hackers seriously enough.
* Cost. (I put this last because this can be offset.)

Believe it or not, there are steps the IT Industry can take to remedy a lot of this, and counteract this unsecured Internet. They could be doing much more to combat spam, malware, and hackers. There’s also steps we (us “consumers”) can take as well.. which space restriction has run out of room for today, and I will discuss tomorrow.

To be continued…

Today’s free link: I have recommended other graphics manipulation/image editing tools in the past, and it is only fitting that I give space to another winner: Paint.NET is simply the closest thing to Photoshop I have seen. 5 Star-rated by C/Net.

* Pick a program, any program. “CP 6.0” is simply my generic example.

*** Folks, like my new look? Hate it? Let me know by answering this 1 Question survey Click Here to take survey. ***

To read part 2, click here.

Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

May 9, 2008 Posted by | advice, computers, hardware, Internet, PC, security, software, tech | , , , , , , , , , , , , , , , , , , , , | 3 Comments