702 Sydney Weekend computers: April 2012

Join Paul and Simon Marnie to discuss the tech that affects your home and office

On ABC 702 Sydney Weekend computers this Sunday, April 8 from 10.15am Paul Wallbank and Simon Marnie will be looking at the end of innocence for Apple Mac users, the DNS Changer Virus and how political campaigning is coming to a Facebook site near you.

Some of the topics we’ll discuss include;

If you’d like to learn how to protect your Mac or Windows computers from malware, visit our Netsmarts article on the Flashback virus that explains the security settings and suggests some free anti-viruses.

Listeners’ Questions

While we had a great range of calls from listeners, there was only one we promised to get back to. Kay clearly has a virus infection on her Windows computers and we recommend the free MalwareBytes program to clean it up.

Our IT Queries site has more instructions on cleaning up a virus infection if you’re worried about a sick computer.

We love to hear from listeners so feel free call in with your questions or comments on 1300 222 702 or text on 19922702.

If you’re on Twitter you can tweet 702 Sydney on @702sydney and Paul at @paulwallbank.

Should you not be in the Sydney area, you can stream the broadcast through the 702 Sydney website and call in anyway.

Similar posts:

The business of denial

Denying market realities is rarely a good business move

Denial is a powerful sedative, it allows us to trundle dozily along a well worn patch oblivious to the reality our comfortable world has changed.

Last week’s claim that youth is fed up with the iPhone by Nokia’s Niels Munksgaard – who has the wonderful title of Director of Portfolio, Product Marketing & Sales – is a great example of how far and how long denial can continue while there’s still money to pay executive bonuses.

Canada’s beleaguered Research In Motion, manufacturers of the Blackberry phone, showed the same delusions when they released their Playbook tablet computer with the declaration Amateur Hour Is Over.

The only amateur hour was in the hubristic minds of RIM’s marketing team.

While profits keep flowing big organisation can afford delusions – Google can indulge their social media fantasies while the Adwords rivers of gold continue to flow ever faster and Microsoft can continue to indulge their delusions while their Windows and Office products remain immensely profitable.

Microsoft’s “droidrage” campaign, designed to embarrass Google’s Android mobile phone platform, is part of that delusion; for Microsoft’s campaign to work they have to prove there is a widespread Android malware problem, show their system isn’t prone to the same flaws and – most importantly – have enough product on the market to sell to those disillusioned Google customers.

Such a negative campaign has many fallacies – it assumes there are widespread security problems in Android, that Microsoft will pick up disaffected Google customers and there are enough Microsoft based products to grab those sales.

Probably Microsoft’s biggest problem is the assumption that customers actually care about that stuff – for years Windows dominated its market despite being riddled with computer with security holes and malware.

Microsoft succeeded because their competition was delusional; the best example being WordPerfect claiming graphic systems like Windows were a fad at a time when an inferior Microsoft Word was gobbling up their markets.

By the time WordPerfect realised their error and released a truly dreadful WordPerfect for Windows it was all too late, like a stagecoach company realising the motorcar is here to stay.

The problem for businesses in denial is that reality eventually does bite; plenty of people in the newspaper industry believed their advertising based model was secure and profitable – indeed many of the cosseted managers in that sector still believe it is – which now leaves them struggling in a changed world they thought they could ignore.

Denial among incumbents is a great opportunity for newer, more flexible players; for years mobile phone and tablet computer manufacturers were in denial about the usuability of their product – Apple proved them wrong and now commands the most profitable chunks of those markets.

Being the village blacksmith or a buggy whip maker was a good business to be in at the beginning of the 20th Century. Thirty years later those block boys and saddlemakers who hadn’t made the jump found themselves out of work.

It’s going to be interesting to see will be this century’s buggy whip manufacturers.

Similar posts:

Securing the USB stick

There are some risks with carrying around private data on a portable drive

While I’m always reluctant to publicise security company’s media releases – believing many of them to be hysterical hype – a quick study by Sophos on lost USB keys has some interesting lessons for all of us who use thumb drives to carry data.

Sophos bought 50 USB drives at Sydney’s CityRail unclaimed lost property auction and analysed them for malware and security risks.

The study – not yet online – found more than 4,400 files including photos, CVs and job applications. Confidential material that could be used for identity theft, stalking or commercial advantage.

Encryption

If you are moving confidential data between computers, it may be a good idea to consider encryption software that protects files from unwanted visitors. Mac OS X has encryption software built in as does  all but the home versions of Windows 7 and Vista.

Should you have a computer that doesn’t come with encryption, or you’re taking the drive between different venues, then you may need a third party encryption program like TrueCrypt. Note you’ll need administrator rights to install the software on every machine you use.

The Malware threat

As a security company Sophos leaned heavily towards the malware aspect with a headline that 66%, or 33, of the drives had some sort of malware on them.

While that statistic is suspiciously high, it does illustrate the risk of plugging USB sticks into school, office and internet cafe computers. Like unsafe sex, the likelihood of catching something nasty increases with the more partners you have.

Perversely Apple Macs could be helping spread the malware as Mac users generally don’t use or need anti virus sofware and any viruses picked up on someone else’s Windows system can sit undetected and dormant until they are used on another PC.

Consequently, its good practice to wipe a drive when you’re finished with it so along with deleting malware you are also not keeping unnecessary and possibly out of date files on your drive.

Overall, Sopho’s survey illustrates why cloud services like Dropbox and Box.net are best for sharing data although the USB stick still has an important role when everything else goes wrong.

Similar posts:

Avoiding industrial nightmares

How we can harden our computer networks from hacking attacks

The Iranian nuclear program is crippled by a virus that infects their control systems while a hacker claims a Texas waterworks can be accessed with a three word password.

Any technology can be vulnerable to the bad guys – obscure systems like office CCTV networks and home automation services can be as vulnerable as the big, high profile infrastructure targets.

While there’s good reasons to connect our systems to the web, we need to ensure our networks are secure and there’s a range of things we can do to protect ourselves.

Does this need to be connected?

Not everything needs a Internet or network connection, if there’s no reason for a device or network to be connected then simply don’t plug it in.

Keep in mind though that threats don’t just come through the web, both the Iranian malware attack and the Wikileaks data breach weren’t due to hackers or Internet attacks.

Get a firewall

No server or industrial system should be connected directly to the public Internet, an additional layer of security will protect systems from unwanted visitors.

All Internet traffic should go through a firewall that is configured to only allow certain traffic through, if the router or firewall can be configured to support a Virtual Private Network (VPN), then that’s an added layer of security.

Disable unnecessary features

The less things you have running, the fewer opportunities there are for clever or determined hackers to find weaknesses.

Shut down unnecessary services running on systems – Windows servers are notorious for running superfluous features – and close Internet ports that aren’t required for normal running of your network.

Patch your systems

Computer systems are constantly being updated as new security problems and flaws are found.

Unpatched computers are a gift to malicious hackers and all systems should be current with the latest security and feature updates.

This is a lesson the Iranians learned with the Stuxnet worm that was almost certainly introduced through an unpatched system – probably one running an early version of Windows XP or even 98 – which was vulnerable to known security problems.

Have strong passwords

Passwords are a key part of a security policy, they have to be strong and robust while being different to those you use for social media and cloud computing services.

It’s also important not to share passwords and restrict key log in details and administrator privileges to those who require them for their work.

With online services like social media, cloud computing and other web tools becoming a part of business and home life, we have to take the security of our systems seriously. Hardening them against threats is a good place to start.

Similar posts:

Cloud Computing Explained: 702 Sydney Weekends

This month’s 702 Sydney Weekend spot looks at cloud computing.

What on earth is cloud computing? Is it just another IT buzzword or something that you can use in your home and business?

On the November 20 ABC Weekends show, Paul and Lex Marinos discussed what cloud computing is and how it can help you.

We also helped out listeners with various computer and tech questions, including the following;

Malware

Sue was caught out by the DNS Changer Trojan that was recently busted by the FBI. Probably the best fix for this is downloading and running the free Malwarebytes software.

Our IT Queries site has instructions on the somewhat convoluted process for removing this Trojan and other viruses from your computer.

Synchronising an iPhone with iCloud and Google Calendars

One advantage we have with the cloud is that it means you can use devices anywhere, however there is a bug where iPhone calendar functions aren’t synchronising with Google Calendar.

Unfortunately the problem is the iCloud and Google services aren’t compatible on the iphone so one has to be turned off.

If your preference is to use the Google services, then you will have to turn off the iCloud services through the iPhone’s settings app and turning off all of the calendar and contact settings.

You may then want to check your Google services are being synchronised through the iTunes settings.

Sharing data between laptops.

One of the advantages with networking is that you can share data between computers. Sonya wanted to know how she can setup her windows 7 laptops to share data to an external drive.

The best option is to use a Windows 7 compatible Network Area Storage device that sits on the network.

For the setup to work, the network name has to be the same on all three devices, Microsoft has instructions for setting Windows7 network name and the hard drive will have the instructions included for setting it up correctly.

It’s also worthwhile using Microsoft’s Active Sync software to synchronise machines as well so you have files stored on your computer.

If you missed Sunday’s ABC program, there’s more details at Netsmarts’ Cloud Computing explained and The Networked Business, we’ll also be running a Demystifying the Cloud webinar on the Australian Businesswomen’s Network at the end of November.

That will probably be the last ABC 702 Weekends spot for 2011 unless there’s something else that comes up.

Subscribers to our newsletter get early notice of any upcoming programs and other useful information on getting more value online. Don’t miss the next program.

Similar posts:

Protecting yourself from the Conficker worm

Nearly a year after it was identified, the Conficker computer worm continues to plague Windows users, infecting systems controlling everything from fighter planes to bus lane fines. We look at how to protect your computers from this threat.

Nearly a year after it was identified, the Conficker computer worm continues to plague Windows users, infecting systems controlling everything from fighter planes to bus lane fines.

The problem has become so great, a consortium of vendors have set up the Conficker Working Group to deal with the malware’s spread, and Microsoft are offering a $250,000 reward for the identity of the writer.

It’s not a problem that should be understated – the worm’s main use appears to be as a controller of botnets, networks of remote controlled computers used to launch attacks on other systems or to hide the tracks of scammers and password thieves.

Update your systems

Given the risks and embarrassment of being infected, avoiding this worm and others like it should be a priority for your business. First of all your Windows computers should have the latest updates as Conficker relies on some old security bugs that Microsoft patched last October.

Run an anti-virus

Naturally, you should be running an up to date anti-virus. Most widely used AV programs will do the job, including Open Source detectors like Clam AV and freeware programs.

Note though that the licences for freeware programs like AVG and Avast! are specifically for home use only. If you are running those on your office system, respect the developer’s right to make a living and buy a commercial licence, they are actually cheaper and more reliable than many of the better known brand names.

Restrict your users

Finally, make sure your users log on in Limited User mode. The reason why Windows computers are more prone to viruses than their Mac and Linux cousins is because most users run their Microsoft systems as the powerful Administrator mode which is the equivalent of leaving your car doors unlocked all night.

I’ve some instructions on setting up Limited User Profiles for Windows XP systems on the PC Rescue website. If you have an office with a Windows 2003 or 2008 server, your IT department or consultant will be able to do this through the network, which is a lot more secure way of doing things.

Be warned that some programs won’t work unless they run in Administrator mode. If you find this is a problem then you should consider replacing that software as the vendor has shown they are either incompetent or are prepared to put their customers at risk to save a few dollars.

Either way, you don’t need suppliers that have no respect for their customers.

Your computers are too important to your business and shouldn’t be exposed to these sorts of embarrassing and expensive risks. Get your IT people to make sure the office systems are locked down properly.

Similar posts:

  • No Related Posts