Geeks to Go! - Free help from tech experts - Tech experts answer your questionsGeeks to Go! Fre

Web Name: Geeks to Go! - Free help from tech experts - Tech experts answer your questionsGeeks to Go! Fre

WebSite: http://www.geekstogo.com

ID:67058

Keywords:

Free,help,from,

Description:

Why I Still Teach Malware Removal8 May, 2018No CommentWhen Microsoft introduced Windows 10, it used the tagline The most secure Windows ever and built to stay that way . In a perfect world, everyone would now be running on Windows 10 and enjoying the enhanced security features that are included. This is real life, however, and that s not how it works. There are still millions of PCs running Windows XP, four years after Microsoft ended support for the product, and millions more than that running Windows 7. Aryeh Goretsky, a researcher for ESET, states in a white paper that the number of computers running Windows XP has stayed about the same over the last few quarters at around 5.5 percent.  While that may not sound like much, it means there may be somewhat over 80 million computers out there still using Windows XP. ComputerWorld estimates that at the end of 2019, just a year from Windows 7 s retirement, an estimated 47% of Windows computers will still use that OS.The point of this post is not to analyze these trends, as there are plenty of articles and blog posts already out there. I simply want to explain why I still teach malware removal in GeekU, over 10 years after I became involved with the malware removal community. The number of computers running obsolete operating systems are a large part of the reason. The need for security on these systems has not gone away, and neither has the need for malware removal. There have been no security updates for Windows XP in 4 years, and after January 2020, Windows 7 will no longer receive them either. That means a lot of PCs remain vulnerable even as malware becomes more sophisticated. The best advice I could give to someone running Windows XP is to stay off the Internet, but that s not realistic, so I continue to teach trainees the specifics of the XP operating system and how it differs from that of Windows 7 and above. I teach that Windows XP should have a 3rd party firewall installed, as the embedded version doesn t block outbound traffic. That s why I teach how to use an elevated command prompt in Windows XP. That s why I teach using Chkdsk from a command prompt on Windows 7. We have a lot of GeekU students who are younger and more conversant with Windows 8.1 and 10, but many are in college and may enter a workplace in which Windows 7 is still prevalent, so maybe I m even teaching skills that will benefit them as a professional.Realistically, Windows 10 is not completely safe either, so what I m doing will remain relevant for some time. As long as there are users, as long as there are people who choose to exploit the vulnerabilities of both software and users, there will be those who fall prey to malware and exploits.Share this:FacebookTwitterEmailYoast SEO, do you need to be green? Content analysis and importance.21 Mar, 20161 CommentYoast SEO is not only one of the most popular WordPress plugins, but one of the most popular WordPress plugins overall. One of the reasons WordPress powers a 1/4 of all websites (and growing) is that is has pretty good SEO out-of-the-box. Yoast succeeds in making a good thing better.If you were just to install the plugin, and forget about it. You d still see benefit. Yoast rewrites page titles, and creates an XML sitemap for search engines. Beginners often get hung up on Yoast s mechanism for grading your SEO per post. It works like this. You specify a keyword (only one with the free edition), and then it displays the colors of a stoplight to rank your post; red, yellow and green. It s tempting to tweak every post until you have all green lights. Like a deserted street at 3am.Yoast has live recommendations, that change with your content. So we can t cover every recommendation here. Let s review some of Yoast s most common content analysis recommendations, and see which are worthy of your time. Read the rest of this entry Share this:FacebookTwitterEmailBeware the Facebook Urban Myths2 Dec, 2014No CommentIf you have a Facebook account, you ve probably seen, or shared, at least one urban myth. Maybe it’s this image:Or this:Today, 12/01/2014 in response to the Facebook guidelines and under articles L.111, 112 and 113 of the code of intellectual property, I declare that my rights are attached to all my personal songs, lyrics, literary excerpts, data, drawings, paintings, photos, texts etc… published on my profile. For commercial use of the foregoing my written consent is required at all times……Or even this:I just found out that should you ever be forced to withdraw monies from an ATM machine, you can notify the police by entering your Pin # in reverse. The machine will still give you the monies you requested, but unknown to the robber, etc, the police will be immediately dispatched to help you.The broadcast stated that this method of calling the police is very seldom used because people don t know it exist, and it might mean the difference between life and death. Hopefully, none of you will have to use this, but I wanted to pass it along just in case you hadn t heard of it. Please pass it along to everyone possible. There is no validity to any of these posts, and none of them are new.  In fact, the third one started circulating in an email as early as 2006, before migrating to Facebook. The first one has been circulating since at least 2010. The Facebook privacy one surfaces in a new form every time Facebook announces changes to its privacy policy. These are just a sample of the many myths that are out there. All of these have been discredited, and the validity can be easily checked. The next time you see a Facebook status like that, stop and think about it. How will sharing a picture 100 times provide a free heart transplant? If entering a PIN backwards would summon police, don’t you think that information might actually be shared by your bank? Who decided stating your rights in a Facebook status would provide any legal protection whatsoever? (For the record, you agree to Facebook’s Terms and Conditions when you create an account. Stating otherwise publicly doesn’t change anything).While it’s not possible to completely stop these things from circulating, you can become part of the solution. Don’t blindly share or post anything just because everyone else is. It’s possible to quickly check whether a post is valid or not. I use Snopes.com to check these items out. For example, here’s the Snopes link debunking the backwards ATM  PIN myth. If the story isn’t true, don’t spread it. While there’s not necessarily anything malicious about these myths, there’s no point in perpetuating them. Your friends will probably thank you for having a little less clutter in their feed, too.Share this:FacebookTwitterEmailRobots, Humans and the Future of Jobs15 Aug, 20142 CommentsRobots are fact and no longer science fiction. Robotics technology we have in development NOW is going to greatly impact our jobs and economy. This issue is creeping up on us quickly, but experts are split on their opinions about how it will affect jobs. Historically, new technology created new jobs to replace those it displaced, but this time it might be very different. All the rules go out the window when technological acceleration reaches a certain point.If you haven t seen this video, it s worth 15 minutes of your time:And if you re really interested, here s a longer read from the Pew Research Institute: AI, Robotics, and the Future of Jobs [pdf]Can robots and artificial intelligence replace your job?Share this:FacebookTwitterEmailHeartbleed Things you should know and what you can do about it10 Apr, 2014No CommentWhat Is It?By now I m certain you ve heard of the Heartbleed bug. If you haven t, then you should know that it is a flaw found in one of the most common open source SSL implementations on the internet that COULD allow an attacker to get sensitive information from the web server. A successful attack could expose the server s SSL private keys that would allow the attacker to decrypt the data traveling to the site, such as usernames and passwords.As of now there have been no confirmed attacks using this bug, but an exploit of the bug is completely untraceable so there s no way to be certain if a site has been targeted.Places to learn more:General informationLastPass and the Heartbleed BugHow Heartbleed Works: The Code Behind the Internet s Security NightmareHow can you tell if a site is affected?First, you need to figure out how vulnerable your data might be. There are several  lists of vulnerable sites that you can manually search through and several online tools that can be used to check specific sites (lastpass and SSL Labs have two particularly useful tools, linked below). There is a Chrome extension that can help identify vulnerable sites as you visit them. The folks at www.Mashable.com have a hit list of sorts that lists several sites that they have had direct communication with and recommendations as to what you should do to protect yourself on those sites.Since Google s Android operating system is built on open source principles, it is heavily integrated with OpenSSL so any Android device may be vulnerable to this bug as well. Lookout Security has developed a tool to check your device for vulnerability (linked below). If your device is vulnerable you will have to wait for an update for the device.How can you protect yourself now and in the future?Once you ve identified what sites you ve used that contain sensitive information, you need to change your passwords. You should make sure that they have patched their systems before you change your password for good but many experts are saying that you should change the passwords now just to be sure that any data captured in the last 2 years is safe.Many systems online were not affected at all because they run on server platforms that don t use OpenSSL (like Microsoft IIS). These sites have not been compromised by this bug and you should make your own judgment as to whether or not you should change your passwords. If you have used the same username and password combination on an unaffected site as you have on an affected site, you should change your password on both, and make sure they re different this time.If you have two factor authentication in place (which you should on any service that supports it) you are at an advantage since even if someone has your username and password they don t have your second authentication method (typically an app or a text to your mobile phone). You should probably still consider changing your passwords on these sites to be safe.If you use a password manager (like LastPass or Keepass) then you should most likely regenerate new passwords for your important sites. If you’re using LastPass, they have updated their app to include a tool that will automatically alert you of the Heartbleed status of any sites that you have saved or generated passwords for and give you suggestions as to when you should change their respective passwords.You should never use the same logon and password for two important sites (like your banking site and your email). If you are using the same information on multiple sites that are important to you, you should change them now so that they are different.The best thing you can do is not panic and stay aware of the current status of this bug. Keep checking the status of your frequently visited SSL enabled websites and if any of your important sites aren’t patching their systems, find a different company to do business with.Share this:FacebookTwitterEmailXP End of Support Popup Notifications Start March 8th (tomorrow)7 Mar, 2014No CommentWindows XP End of Support is on April 8th, 2014. Click Here to learn more.Don t show this message againMicrosoft is ending support for Windows XP, and it’s about to let every XP user know. On Saturday March 8th, and then the 8th of every month after, XP users will see the popup window shown above (unless they tick don’t show again). Many users may mistake this warning for a fake security alert, often used to trick people into installing malware. But this one is legitimate. Any computer connecting to Windows Update will display it. Most enterprise computers won’t, as they don’t get updates directly from Windows Update.There are two more patch Tuesday’s left for XP, and then Windows Update will no longer offer updates for what may be the most successful operating system of all time. Many experts are predicting a spike in XP related malware as vulnerabilities go unpatched. Amazingly, XP still has a 29% market share. Not sure if you have XP? There’s a website for that: http://amirunningxp.com/There is no direct upgrade from XP to Windows 7 or 8. However, Laplink has a free migration tool called PCmover Express that will help transfer files, settings, and profiles. If you want to also transfer programs, there’s a special offer on the professional version ($23.95).Are you still running Windows XP? Will you be upgrading? What are you going to upgrade to?Share this:FacebookTwitterEmailPhonebloks20 Feb, 2014No CommentPhonebloks is a Thunderclap project started by Dutch Engineer David Hakken that might just be the next big thing in the mobile industry. A phone only lasts a couple of years before it breaks or becomes obsolete. Even if just a part of it failed us, we’ll have to make it an expensive paper weight.  Phonebloks is all about solving this problem, in an unusual, yet innovative and possibly viable way. Phonebloks is made of detachable bloks. The bloks are connected to the base which locks everything together into a solid phone. If a blok breaks you can easily replace it; if it’s getting old just upgrade. David Hakken has publicized this project as an attempt to reduce e-Waste.And guess what it has a store all for itself. The Blokstore. It’s like an app store for hardware. In the store you buy your bloks, read reviews and sell old bloks.Motorola has shown keen interest in Phonebloks. The company’s Advanced Technology and Projects (ATAP) team went public with its one-year-old Ara Project (it’s own version of upgradable smartphones) after agreeing earlier this month to partner with Phonebloks. Now with Hakken as its new face, Motorola’s Ara project aims to bring some substance to Hakken’s arguable pipe dream, and “do for hardware what the Android platform has done for software.”Project AraMartin Cooper, the inventor of the cell phone, told CNN that while the Phonebloks concept is ‘well-meaning’ he suspects it will never become a reality: “the main reason that the Phonebloks will not hit the market as it will cost more, be bigger and heavier, and be less reliable. By the time it could be brought to market, the problem that engendered it will be gone.”He might be right, but there’s always two sides to a coin.Why I think it could work?People love customizing their phones! The time of software upgrades, rooting jailbreaking could be history.If it’s physically possible, it might be bigger than the huge leap forward Capacitive touch screens were, when they first arrived.As a student, we can get tight on the pocket, we could settle for the default and upgrade later!Why I think it might not work?The phone could get too bulkyIt might succeed as a concept, but to surpass the impact that the iPhone or Galaxy’s have in day to day work might be too much of a task.Google Play is a key factor to the success of Android. As for the Blokstore, a store with a very small number of bloks could lead its way to doom. I don’t think there could be bloks enough to satisfy consumer needs.It will be as expensive as hell.Let’s see where it goes from here.Share this:FacebookTwitterEmailHow to Avoid Toolbars, Unwanted Software and Other Installer Tricks12 Feb, 2014No CommentNon-technical friends and relatives have two universal truths regarding computers. One, they have toolbars, background software, coupon offers, and/or search engine redirects. Two, they have no idea how they got there. Most likely, they installed them. Even if you are technically inclined, you’ve probably still been trapped by Dark User Interface Patters.A Dark Pattern is a type of user interface that appears to have been carefully crafted to trick users into doing things, such as buying insurance with their purchase or signing up for recurring bills.Downloading software and updates is a minefield of unwanted software. Scott Hanselman details the confusing experience offered by download wrappers.I am disappointed in us, Internet, that this is a business. Someone wrote this, for their job, directed by their middle manager, who was directed by their rich boss. There was a meeting (there s always a meeting) where it was discussed on how we could most effectively fool non-technical relatives into installing crap.These techniques are well-honed and tested. Even experienced users can install stuff they don’t want. So what’s the average user to do? Here are some applications that aim to help avoid unwanted installs.Ninite will automatically install popular apps. Great for setting up a new system. Pros: It won’t bother you with choices and options. It says no to all toolbars and junkware. To update, you simply run it again. Cons: If you add an application you need to rebuild the installer. Automatic updates require the paid version. Limited applications (some like CCleaner, and Adobe Flash have “opted-out)”. Read the rest of this entry Share this:FacebookTwitterEmailBionic Hands A Different Feeling9 Feb, 2014No CommentBionic hands have been around for quite some time now. But I m sure these pair of hands that can help one feel is going to be one of those breakthroughs in technology that can touch the hearts of millions, bringing tears of happiness to ones eyes. The world s first bionic hand with the sense of touch is here. A team of researchers from Case Western University have made a new prosthetic bionic hand, designed to be capable of using measurements from 20 sensor points to control ones grip. Amazingly, the sensor data is linked directly to the sensory nerves in the patient’s forearm. The control for the grip is then extracted myoelectrically and returned to the muscles in the forearm. Our dream is to have Luke Skywalker getting back his hand with normal function, researcher Silvestro Micera told TechNewsDaily, referencing the hero in Star Wars who gets an artificial hand after his real one is cut off.This was the first time that such a variant of the bionic hand was implanted into an amputee with high hopes that he would regain his sense of touch. The patient wore the bionic hand for some time over a month to see how his body adapts to the new presence. When I held an object, I could feel if it was soft or hard, round or square, said Dennis Aabo Sorenson, a 36-year-old man from Denmark who lost his left hand in a fireworks accident. I could feel things that I hadn t been able to feel in over nine years, Sorensen said in another statement.This is truly a miracle. An answered prayer. A dream come true for many.Share this:FacebookTwitterEmailHow an HVAC Company May Have Compromised Target s Data6 Feb, 2014No CommentA recent post by KrebsonSecurity reports that the attacks on Target were made possible using stolen credentials from a third-party vendor, specifically an HVAC contractor for the company. While that may seem unlikely to you – how could an HVAC contractor have access to Target’s network? – it’s not surprising that in this day and age, HVAC systems can be remotely accessed and monitored. After all, we live in a digital age. We think nothing of programming our DVRs while away from home, or logging into our home thermostat to program it, so it should be no surprise that large systems have advanced capabilities. The surprising part is that credentials for the HVAC system would also allow access to the rest of Target’s network. The investigation is still underway, so there are a lot of unknowns.  Did Target  require some form of two-factor authentication for access, and if not, why not? Was the HVAC network segmented from the rest of the network? How frequently were passwords changed, if at all? I would assume Target is taking a hard look at some of their security practices, and in the light of this and the recent announcement of the Neiman-Marcus breach, a lot of other companies that process millions of credit cards should also be reviewing their practices.The Krebs article highlights another security issue, as well. The stolen data was transmitted using “drop” locations; compromised computers that stored the data, and that could be accessed by the hackers. While Target shoulders the brunt of the blame for this situation, it also underscores the importance of security at multiple levels, from home computers to small and medium businesses. An infected computer or server doesn’t just put the users of that system at risk; hackers can use that system for their own nefarious purposes, such as being an intermediate drop for stolen data.The important thing to learn from this is the importance of protecting a network, regardless of where it is and what it’s doing. Even Fortune 500 companies and security professionals can be vulnerable. Limit access to your network. If 3rd parties need access, limit their access, monitor their use, and disable the access when not needed. Take security seriously, even at home. It’s not just your data that you might be protecting.Image courtesy of chanpipat/FreeDigitalPhotos.netShare this:FacebookTwitterEmailCancelPost was not sent - check your email addresses! Email check failed, please try again Sorry, your blog cannot share posts by email.

TAGS:Free help from 

<<< Thank you for your visit >>>

Tech experts answer your questions

Websites to related :
Pure Mac: Software for Mac

  This app is jumpin".JumpcutDoes one thing and does it well, multiple copies easily accessable from your clipboard Microsoft Office 2019 16.31 - Office

Welcome To Penny Thornton's Astr

  We are aware that some of you are experiencing delays receiving updated Friday Bites and weekly forecasts. This appears to be server-related and depen

Windtoons

  While all wind generation is not bad, industrial scale wind generation is creating massive problems for those individuals and communities unfortunate

Hush Affair - Dating for married

  Welcome to our community!Before proceeding you need to register your profile and become our member. Join

:: Welcome to liveseafoodsystems

  Being the first company to ever export Live Grouper Fry in the 1980’s to Singapore, we pioneered the live food fish trade in Sir Lanka. Expanding thr

New Cars, Used Cars For Sale, Ca

  Get detailed information on new cars to help you with your new car buying decision. Research cars including prices, standard features, options, fuel e

法政大学機関リポジトリ移行のお知

  重要なお知らせ(2019年度以前)法政大学機関リポジトリ移行のお知らせ 2018年08月20日 重要なお知らせ(2019年度以前) 法政大学では、教育・研究成果の発信システム

AMCofH at CPED | PIHMA Center fo

  How can you protect your family with Homeopathy training? Join us for our Virtual Open House on Tuesday, June 16th. Learn something new, prepare for t

StoryJumper: #1 rated site for c

  Video chat with collaboratorsShare your books & get positive feedback from our communityWe use cookies on this site. By continuing to use this site, w

Florent's Guide To The Tropical

  Subscribe to feed Welcome To Florent's Tropical Reef Life Identification Guides!

ads

Hot Websites