The typical computer user must be aware of the possible threats their computer faces each time you connect to the internet. It is a treacherous place for a computer and the security threats are growing every day. It all so confusing, viruses, spyware, malware, and adware, just to name a few. Why are they all so different?
In the old days we used to call everything a virus, however now days we have more specific names to further classify them.
What is Malware?
Malware is a software program that has bad objectives. It can either be installed by the computer user unintentionally or it can sneak into your computer through various ways. Its not the same as a piece of software that unintentionally causes harm to your computer, malware is software that has been developed with the intent of causing problems with your computer.
What is Spyware?
Spyware is a type of malware program that invades your computer and basically spies on you. There are different types of spyware that collect different information. A common spyware type is a keylogger which records keystrokes typed on your keyboard. This is how people lose their bank account details. Other spyware will record your actions and browsing practices on the internet. Any information collected by spyware is usually with the goal to sell.
What is Adware?
Adware is another form of malware and is precisely as the name suggests, software with advertising. Adware can be downloaded and sometimes included in free programs. For example Windows Live messenger and Yahoo messenger contain adware. Although some programs give the option not to install the extra adware, others seem to sneak it in without permission.
What is Virus?
A virus is a small program designed to contaminate your computer and cause errors, computer crashes, and even destroy your computer hardware. Unlike spyware, a virus can grow and replicate itself. It can also travel from one computer to another via an internet connection. Of course you can get viruses from discs with virus infected files stored on them; however the internet is the most common entry point. Some common symptoms of a virus are emails being sent to all contacts when you didn't send them, being taken to web pages that you didn't choose, or being told you have a virus and to download a program to fix it.
If you think your computer may have been infected by any of these, please give us a call at 843-553-8800 or visit our website at www.kotoritechnologies.com. We offer a variety of computer security services from computer troubleshooting to email solutions to intrusion detection to firewall security encryption. So whatever the problem, we can help to clean up your computer and protect it from future occurrences.
Kotori Technologies wants to be the computer company in Charleston that is known for helping its clients. We are determined to be the best IT company around. One way to accomplish this is to make sure that we put out some more quick tips for the business and home computer users out there. 1.Quick web address Hope you enjoy using these tips. I would love to get some feedback on what you think of our weekly postings. Do you enjoy them? Would you like to see more shortcuts, more data security, computer services, computer help, or do you have any ideas for something Im missing? Please contact me at Elizabeth@kotoritechnologies.com and let me know.
Type the name of a web site such as 'kotoritechnologies' into your browser's address bar and press CTRL+Enter to automatically add http://www and .com and be taken to the site.
2.Save a web page picture
To copy a picture from a web site on to your computer, right-click the image and select Save Image As or Save Picture As.
3.Move between web links
Use Tab and Shift+Tab to move between links on a web page and press Enter to follow the selected link.
4.Create a web shortcut
Right-click on a web page in your browser and select Create Shortcut to place a shortcut link on your desktop.
5.Change how you view file lists
You can change how your files are shown in a folder by clicking on View then choosing between Thumbnails, Tiles, Icons, List or Details.
6.Create Taskbar shortcuts
Drag a file, folder or shortcut on to the Taskbar for quick access to programs, files or web sites.
7.Change Desktop background
Right click on your Desktop and select Properties. Click on the Desktop tab, pick a new Background and click Apply to change your wallpaper.
8.Take a screen snapshot
Press Print Screen to take a snapshot of the whole screen or ALT and Print Screen for just the current window, then paste it into an image editor such as Paint to save it as a picture file.
9.Make web pages easier to read
To make text on web pages easier to read, click on View (or Page in Internet Explorer 7) then Text Size and choose a larger size.
To send an e-mail to several people at once without showing all their addresses at the top of the e-mail, use the BCC (Blind Carbon Copy) box in your e-mail client.
Kotori Technologies wants to be the computer company in Charleston that is known for helping its clients. We are determined to be the best IT company around. One way to accomplish this is to make sure that we put out some more quick tips for the business and home computer users out there.
1.Quick web address
Hope you enjoy using these tips. I would love to get some feedback on what you think of our weekly postings. Do you enjoy them? Would you like to see more shortcuts, more data security, computer services, computer help, or do you have any ideas for something Im missing? Please contact me at Elizabeth@kotoritechnologies.com and let me know.
During the holiday season, more people will be working away from the office or on the road. But beware; by taking that laptop with you, you have become a target for theft. If your laptop gets in the wrong hands, your company information is at risk, as well as any personal and financial information stored on the laptop.
Keep these 9 tips in mind when you are travelling with your laptop.
1.Avoid using computer bags. This only brings to attention that you are indeed carrying a laptop. Try disguising it a little by carrying it in a padded briefcase.
2.Practice Computer Security. For instance, never leave access numbers or passwords in your carrying case. This is like leaving your keys in the car and doors unlocked. If the thief doesnt have this information, he will have to work to get access, and may give up.
3.Carry your laptop with you at all times. Do not check it with your other luggage. Luggage gets lost every day; you dont want your laptop to be one of those. If travelling by car, it is best to lock it in the trunk.
4.Be aware of data security. An easy way to do this is encrypt your data. Encryption can give you another layer of protection, should your laptop be stolen. With most Windows programs, you can choose to encrypt files and folders. If someone were to get past the passwords and access your laptop, they cannot decrypt the files and see your information.
5.Keep your eye on your laptop. When going through security checkpoints, keep your eyes on the bag. Keep it with you until the person in front of you has gone through the metal detector. A lot of laptop cases look alike, and someone get confused and take yours in the shuffle.
6.Avoid setting your laptop on the floor. Setting your laptop on the floor is an easy way to lose it or forget it. If it needs to be set down, place it between your feet or against your leg. If it is touching you, you are aware of it.
7.Buy a laptop security device. If you need to leave your laptop in a room or at a desk, use a security cable to attach it to a heavy chair, desk, or table. This will make it much more difficult for someone to pick it up and walk off. There are also programs to track the laptop when it connects to the internet and reports the exact physical location.
8.Use a screen guard. These guards help prevent people from looking over your shoulder and spying on your work. This is very useful if you need to check your bank balance in the crowded airport lobby.
9.Try not to leave your laptop in your hotel room or with the front desk. Lots of things get lost in hotel rooms and they are not completely secure. If you must leave it, hang the do not disturb sign on the door. This may help to keep others out of the room.
10.Be careful with wireless networks. Do not attempt to connect to your banking website (or other confidential information sites) through a wireless connection, unless it is a secure site using https.
Have a safe trip, but be careful with your laptop. The hardware may be easily replaced, but the data could be priceless. If you plan to travel a lot this season, please give Kotori Technologies a call for a checkup at 843-553-8800 or visit our website at www.kotoritechnologies.com for more information.
While retailers and shoppers are rushing into the holiday season, so are the cybercriminals.
According to Consumer Reports 2009 State of the net Survey, cybercriminals took $8 billion from consumers in the past two years. Cybercriminals use their best plots during the holiday season to take peoples money, credit card information, social security number, and identity. During the holiday season, people are spending more time online, paying bills, shopping, networking, and so criminals can be a little more effective during this time.
I listened to a podcast in which Larry Magid interviewed David Marcus with McAfee. In this interview, Marcus went through the 12 Scams of Christmas. I thought they were interesting enough to share with you. So, lets start the countdown of Christmas scams:
12. Files for ransom: Virtual kidnappers use malware to gain control of your computer and lock your data files. The kidnappers then demand payment for you to be able to access your files.
11.E-mail banking scams: A common type of phishing scam is sending out official looking e-mails that appear to come from your bank asking you to confirm your account information. Don't click on any links but type in your bank's Web address manually if you need to access your account.
10.Password stealing scams: Criminals use low-cost tools to uncover passwords and in some cases sending key logger software to record keystrokes. Once criminals get your passwords, they gain access to bank accounts and credit card accounts and start their own shopping with your money. They also start sending you a lot of spam email.
9.Auction site fraud: Make sure you're actually going to eBay or whatever site you plan to deal with. Also watch for deals that are too good to be true. They may just be phishing for your information.
8.Job search related scams: With the unemployment rate going up, there are lots of people looking for work. Beware of online offers for high paying jobs or at-home money making schemes. Some of these sites ask for money up front, which is a good way for criminals not only to steal your "set up fee" but misuse your credit card too. Some of these offers are all about money laundering, asking you to accept a check and wire transfer money to them.
7.Christmas media and song lyrics can be bad: Criminals know that people are searching for holiday related sites for music, holiday graphics, and other festive media. During this time, they create fraudulent holiday related sites full of viruses.
6.Practice safe holiday shopping. Make sure your computer network is secure and you're shopping on sites that are secure. Though it isn't a guarantee, you should look for the lock icon in the lower right corner of your browser and make sure the Web page starts with https. The "s" stands for "secure."
5.Fake "luxury" items: If you see an offer for luxury gifts from companies like Cartier, Gucci, and Tag Heuer at a price that's too good to be true, it probably is. These links could lead you to malware and take your money or merchandise that will probably never arrive (or be counterfeit if it does). Some of these sites, according to McAfee, even display the logos of the Better Business Bureau.
4.Holiday e-cards: It may be green to send out the Christmas cards through e-mail, but beware if it is not from a reputable company like Hallmark. Also, be aware of cards you may receive. Make sure it is from someone you know. This is another way of delivering malware and viruses straight to your computer or a friends computer.
3.Social networking friend requests: Cybercriminals take advantage of this social time of year by sending out authentic looking friend requests via e-mail. Do not click on those links but sign into Facebook and other services and look for friend requests from the site itself. Clicking on a link could install malware on your computer or trick you into revealing your password.
2.Fake invoices from delivery services: During this period, scammers will send out fake invoices and delivery notifications appearing to come from Federal Express, UPS, the U.S. Postal Service or even the U.S. Customs Service. They tell you that they were unable to deliver a package to your address. They then ask you to confirm your address and give them credit card information to pay for delivery. You may pay to deliver a package, but it may be delivering a virus straight to your computer and a someone may take a trip around the world at your expense.
1.Charitable phishing scams: Hackers take advantage of the giving spirit in the holiday season. They like to set up fake websites that not only take your money and deprive charities of needed funds, but they also steal your credit card information and identity.
Just remember, it is a great time of year to celebrate and shop, just use common sense and make sure your anti-virus and spam filters are up to date. If you are unsure of your protection or want to upgrade, please visit our website at http://kotoritechnologies.com/it-solutions/email-solutions.aspx .
To listen to the podcast follow this link: http://news.cnet.com/8301-19518_3-10403100-238.html?tag=mncol
3 lb. or 40 servings, about two squares each
What you need
3 cups sugar
3/4 cup (1-1/2 sticks) butter or margarine
1 small can (5 oz.) evaporated milk (about 2/3 cup) (Do not use sweetened condensed milk.)
1-1/2 pkg. (12 squares) Semi-Sweet Chocolate, chopped
1 jar (7 oz.) Marshmallow Creme
1 cup chopped Walnuts
1 tsp. vanilla
LINE 9-inch square pan with foil, with ends of foil extending over sides of pan; set aside. Place sugar, butter and evaporated milk in large heavy saucepan. Bring to full rolling boil on medium heat, stirring constantly. Boil 4 min. or until candy thermometer reaches 234F, stirring constantly to prevent scorching. Remove from heat.
ADD chocolate and marshmallow creme; stir until completely melted. Add walnuts and vanilla; mix well.
POUR immediately into prepared pan; spread to form even layer in pan. Let stand at room temperature 4 hours or until completely cooled; cut into 1-inch squares. Store in tightly covered container at room temperature.