Little d Technology

Little d Technology
Where Technology Comes Together

Thursday, December 16, 2010

FACEBOOK SAFETY TIPS

Contributed by Veronica Schneider, Little d Technology

Facebook is a social networking site used by more than 500 million people in every country on the planet, so far in 70 languages. The site’s minimum age is 13, but teens represent only a minority population on Facebook. It’s used by a lot of adults, certainly including parents.

So how do you keep your kids and yourself safe when using Facebook? According to Anne Collier and Larry Magid the Co-Directors of ConnectSafely.org, who wrote a 34 page guide on Facebook safety, the top safety tips are:

• One way to monitor your child’s Facebook activities, is to “friend” them and get them to friend you – then you can establish a family rule that says something like, “No one can block other family members from content any of us posts in Facebook.”

• Use your real age when setting up only. Facebook provides additional protection for users under the age of 13.

• Choose your friends wisely. If you choose not to accept someone as a friend they will not know.

• Do not use your picture for your profile. Instead choose a cartoon character or image that you really like.

• Never put your address, place of birth, phone number, date of birth or email address on Facebook for public viewing.

• Go to www.fbparents.org and look at the Parents guide to Facebook to find out more info on Facebook safety.

But the number one tip is to talk to your kids and set some rules about socializing online and even using the internet. The more you talk the more you will both be on the same page!

NOTE: Veronica Schneider has been with Little d Technology for three years. She is currently a freshman at Central Oregon Community College studying for a business transfer degree, and is a co-facilitator at the Ford Leadership program La Pine Cohort #2. This talented young lady teaches clients of all ages how to use their computers effectively. If you are interested in a computer tutoring session with Veronica, give her a call at Little d Technology at 541-536-1079.

Tuesday, November 2, 2010

Top Safety Tips for Protecting Digital Image Files


Lost PhotosWith the advent of digital photography and flash memory, a whole new set of potential problems has evolved for photographers. DriveSavers Data Recovery Engineer, Chris Bross, has assembled the following list of tips on how to handle flash memory cards properly and help prevent the potential loss of precious photographs.
  • BACK UP YOUR IMAGES! Protect yourself and your irreplaceable images by backing up onto CD, DVDs, tapes, online storage or an external hard drive. This will help guard against data loss when (not if) your hard drive crashes unexpectedly.
  • TRANSFER YOUR PHOTOS. Copy the image files from the camera's flash memory to a computer's hard drive a soon as you can. We recommend not deleting images or reformatting the memory card while it is still in the camera. Wait until all photos are transferred and verified.
  • FOLLOW INSTRUCTIONS. Take care when removing flash memory from the camera or card reader. Avoid deleting or corrupting images by using the eject command on the computer or moving the card icon from the desktop to the trash/recycle bin before physically removing the card.
  • VERIFY THE TRANSFER. Open the images on the hard drive before reformatting the card.
  • MAKE MORE THAN ONE COPY. Back up your backup media and keep a duplicate offsite in a secure location.
  • PROTECT YOUR FLASH MEMORY CARDS. Use the plastic holder when carrying them around. Simple static buildup can zap the card and make it unreadable. There are other dangers as well, such as breaking a card in your pocket or putting the card, along with your clothing, in the wash.
  • REPLACE YOUR FLASH MEMORY CARDS. Typically, flash memory cards can be used about 1,000 times before they start to wear out.

  • AVOID EXTREME TEMPERATURES. Heat, cold and humidity can wreak havoc with digital equipment, especially flash memory.

Friday, October 1, 2010

RAID Systems Are Not Infallible
by DriverSavers.com

Many businesses and organizations of all sizes rely on RAIDBinary Code(Redundant Array of Independent Disks) systems that distribute data and parity across a set of disks, protecting files held on the array against the failure of any individual disk. Unfortunately, even these redundant systems are not completely infallible. Initial failures sometimes go undetected until a secondary failure has occurred. A RAID 5 configuration can only offset the failure of a single disk drive, but cases of multiple drive failures happen more frequently than one might imagine.

To help you avoid catastrophic data loss we've assembled a few best practices:
  • Never upgrade any system without a verified backup.
  • Use up-to-date hardware and software utilities for data security, such as firewalls and virus protection.
  • Scan all incoming data, including packaged software, for viruses.
  • Use ventilation, fans, and/or air conditioning to keep servers at the proper operating temperature.
  • Connect systems to an uninterruptible power supply (UPS) to protect against power surges.
  • Power down and take extreme caution when moving computers.
  • Avoid static electrical charges when touching or handling the media, especially in arid environments.
  • Maintain an alternate and remote data center with "real-time" copies of corporate applications and data.
  • Train users to report any unusual noises and power down immediately if a drive makes scraping, tapping, clicking or humming sounds.

Thursday, September 16, 2010

Virus/Malware

So many of our customers come in with viruses. The question is usually "What did I do to get this virus?" The answers are varied. Here is an email I received today from a fellow technician. This is a common way to become infected. Please use caution when clicking on links contained in an email message. Especially if you do not know who the sender is.

Here is the message my friend received today, please read and take notice:

"If you receive an email, from anyone, with the subject line of “Here you have” it will contain a link to a malicious website that will infect your computer with a virus/malware. The email is not stopped by virus/malware filtering because the email doesn’t contain the virus/malware, but only a link to a website containing the virus/malware. The email is poorly worded yet tens of thousands of people have clicked on the link and infected their computers. This is not a new attack per se, the same subject line was used in 2001 with the Anna Kournikova virus. The virus/malware has already taken on new variations, and the subject line can be different that what is stated above. I’m trying to institute some additional measures here to protect us but the first line of defense belongs to the users. Remember, do not blindly follow links in emails, no matter who the sender is. Remember, most viruses and malware use the address book of the infected person to send itself out to other potential victims. This is why you can get an infected email from someone you actually know.

Currently NASA, ABC News, Wells Fargo, Procter & Gamble, Disney, Florida Dept of Transportation, and Comcast are battling infection because some of their users followed the link and infected their networks."

Monday, May 24, 2010

HP Expands Recall of Notebook Computer Batteries Due to Fire Hazard

This recall involves many different models of notebooks sold under the following brands: HP, HP Pavilion, Compaq Presario and HP Compaq. Several other HP battery recalls preceded this one, dating to 2005. You can find out if you have a battery from this recall or from one the older recalls on HP's recall site, which also has details about how to get your free replacement battery if you have one of the recalled units. HP also has an FAQ regarding all the battery recalls.

http://www.cpsc.gov/cpscpub/prerel/prhtml10/10240.html

Tuesday, May 18, 2010

A Great Example of using Social Media

One of my favorite websites is All-Star Basketball Academy's site. You can find it at http://www.ababend.com/index2.html. Here, Daniel integrates his Constant Contact Newsletters as well as his blog link into his site. I love the way the website is at the center of all this.

Friday, April 30, 2010

Fake Anti-Virus Software a Growing Online Threat

Google said Tuesday that fake software security programs rigged to infect computers are a growing online threat, with hackers tricking people into installing nefarious code on machines.

An analysis of 240 million web pages by the internet search giant during the past 13 months revealed that fake anti-virus programs accounted for 15 percent of malicious software it detected, AFP reported.

"The Fake AV threat is rising in prevalence, both absolutely and relative to other forms of web-based malware," Google said in its findings.
"Clearly, there is a definitive upward trend in the number of new Fake AV domains that we encounter each week."

Fake anti-virus (AV) peddlers rig websites to frighten visitors with pop-up messages warning that supposed scans have found dangerous malicious software on machines. The scam goes on by selling victims programs that hackers claim will fix the purported problems -- but which in fact usually plant nefarious computer code on machines.

Such transactions can also leave credit card information in the hands of cyber crooks.

Friday, January 15, 2010

Suspicious search results and strange behavior: What is phishing?


I found this in Google. I received a suspicious email from Paypal on January 10. I clicked on the link and there was a phishing warning on the webpage that looked like this picture. DO NOT CONTINUE BROWSING THE SITE! Read on....
-----------------------------------------
Phishing is a type of attack whose goal is to steal private information, such as login credentials or credit card numbers, usually to carry out various types of financial fraud. An attacker impersonates a trusted entity, such as a bank, government, ISP, or large web site, and tries to trick people into giving up their private information. These attacks often take the form of "urgent" emails asking people to take immediate action in order to prevent some impending disaster. Examples include topics such as the following:

"Our bank has a new security system. Update your information now or you won't be able to access your account."
"We couldn't verify your information; click here to update your account."
Sometimes the email claims that something awful will happen to the sender (or a third party), as in "The sum of $30,000,000 is going to go to the Government unless you help me transfer it to your bank account."
People who click on the links in these emails may be taken to a phishing site - a web page that looks like a legitimate site they've visited before, but is actually controlled by an attacker. Because the page looks familiar, people visiting these phishing sites enter their username, password, or other private information on the site. What they've unknowingly done is given a third party all the information needed to hijack their account, steal their money, or open up new lines of credit in their name. They just fell for a phishing attack.

The concept behind such an attack is simple: Someone masquerades as someone else in an effort to deceive people into sharing personal or other sensitive information with them. Phishers can masquerade as just about anyone, including banks, email and application providers, online merchants, online payment services, and even governments. And while some of these attacks are crude and easy to spot, many of them are sophisticated and well constructed. That fake email from "your bank" can look very real; the bogus "login page" you're redirected to can seem completely legitimate.

If you think you may have encountered a phishing site, please report the suspicious site to us.

What you can do to avoid phishing attacks

The good news is there are things you can do to steer clear of phishing attacks and phishing sites:

Be careful about responding to emails that ask you for sensitive information. You should be wary of clicking on links in emails or responding to emails that are asking for things like account numbers, user names and passwords, or other personal information such as social security numbers. Most legitimate businesses will never ask for this information via email. Google doesn't.
Go to the site yourself, rather than clicking on links in suspicious emails. If you receive a communication asking for sensitive information but think it could be legitimate, open a new browser window and go to the organization's website as you normally would (for instance, by using a bookmark or by typing out the address of the organization's website). This will improve the chances that you're dealing with the organization's website rather than with a phisher's website, and if there's actually something you need to do, there will usually be a notification on the site. Also, if you're not sure about a request you've received, don't be afraid to contact the organization directly to ask. It takes just a few minutes to go to the organization's website, find an email address or phone number for customer support, and reach out to confirm whether the request is legitimate.
If you're on a site that's asking you to enter sensitive information, check for signs of anything suspicious. If you're on a site that's asking for sensitive information -- no matter how you got there -- check for the signs that it's really the official website for the organization. For example, check the URL to make sure the page is actually part of the organization's website, and not a fraudulent page on a different domain (such as mybankk.com or g00gle.com.) If you're on a page that should be secured (like one asking you to enter in your credit card information) look for "https" at the beginning of the URL and the padlock icon in the browser. (In Firefox and Internet Explorer 6, the padlock appears in the bottom right-hand corner, while in Internet Explorer 7 the padlock appears on the right-hand side of the address bar.) These signs aren't infallible, but they're a good place to start.
Be wary of the "fabulous offers" and "fantastic prizes" that you'll sometimes come across on the web. If something seems too good to be true, it probably is, and it could be a phisher trying to steal your information. Whenever you come across an offer online that requires you to share personal or other sensitive information to take advantage of it, be sure to ask lots of questions and check the site asking for your information for signs of anything suspicious.
Use a browser that has a phishing filter. The latest versions of most browsers include phishing filters that can help you spot potential phishing attacks

Tuesday, January 5, 2010

What is a Computer Virus?

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or go unnoticed.

Article by Wikipedia

Monday, January 4, 2010

Little d Technology: Back up your cherished holiday photos

This holiday season protect your digital memories by following these simple tips:
Backup or transfer images from the camera's Flash memory onto CDs, DVDs or an external hard drive after each use.
Do not delete images or reformat the memory card while it is still in the camera. Wait until all photos have been transferred and verified.
Remove the Flash memory or card reader from the camera carefully. Follow instructions to avoid deleting or corrupting photo images.
Protect your Flash memory card from static buildup or breakage by using a sturdy container when carrying them around.
Replace your Flash memory card over time. After an average of 1,000 uses, they can begin to wear out.

This list is provided by DriveSavers