Rich-M
Active Member-
Posts
1,600 -
Joined
-
Last visited
-
Days Won
38
Content Type
Forums
Blogs
Events
Articles
Resources
Downloads
Gallery
Store
Everything posted by Rich-M
-
Windows 9: Start Menu To Return, Rumored To Be Free
Rich-M replied to allheart55 Cindy E's topic in Tech Help and Discussions
I actually finally got used to Windows 8 but I still prefer a Start Menu for less used things it is quicker to find things and I agree this new menu is a mixture of Metro and traditional and I like it alot.- 9 replies
-
- return
- start menu
-
(and 2 more)
Tagged with:
-
Unheard of price I backed up the truck: http://www.newegg.com/Product/Product.aspx?Item=N82E16822236498&ignorebbr=1&cm_re=PPSSHYXXUZKJVR-_-22-236-498-_-Product Deal is over Monday 7/21 and use this code for extra off: Extra savings w/ promo code EMCPCWE243, ends 7/21
-
Sensational price on a size much looked for at Newegg a 250 Gb Samsung (probabloy the best brand IMHO) for $143.99: http://www.newegg.com/Product/Product.aspx?Item=N82E16820147248&ignorebbr=1&cm_re=PPSSCZDRBPASSW-_-20-147-248-_-Product
-
I was a beta tester for Power Quest sickened by the sale to Symantec and then moved to Acronis for many years until I became disillusioned with them as they wouldn't listen to anything we said (Russians what can I tell you)! So I continue on beta testing Backup Software and Security software when I have the time and can get product but that takes time and reestablishing contacts. Centercode used to be a fun place to pickup beta testing but they seem distant these days. I still get the email asking for my participation but everyone I know there is gone and I am never chosen any more when I say yes.
-
That cancellation call went viral everywhere and it is so hard to believe its real or that anyone can be that stupid as to keep up like that.
-
Yeah like we expect they will?
- 13 replies
-
- access
- downloading
-
(and 1 more)
Tagged with:
-
Yeah that is really important or he gets right around it.
- 13 replies
-
- access
- downloading
-
(and 1 more)
Tagged with:
-
Ok great. I will have a few to send to some of my faithful also.
- 13 replies
-
- computer help
- extreme
-
(and 2 more)
Tagged with:
-
Yeah and I can tell you if Ken is sending this email, we can bet this will be a "biggie". He never has paid any attention to any of this prior to the Cryptolocker virus last year, and he still never sent a mass email about that one.
-
Is the email for this weekend still on Bob?
- 13 replies
-
- computer help
- extreme
-
(and 2 more)
Tagged with:
-
Thinking more about this your solution might be here: http://support.microsoft.com/kb/929826/en-us
-
Time to repair or refresh your pc: http://windows.microsoft.com/en-US/windows-8/restore-refresh-reset-pc
-
Yup same experiences I have with m,any clients offspring. And they have no idea who disabled this or that either.
-
I posted it on CHF as well hoping one of them would reply. Ken Dwight is a serious Pro who travels around the country giving classes in Malware Removal and is supposed to have a completely different technique he uses so his training is in one day long seminar and its not cheap, but he is quite successful.
-
I know this user so we need to take this seriously.... Rich-M My First-Ever Virus Alert Submitted by Ken Dwight on Tue, 07/15/2014 - 07:33 Share to: Facebook Twitter Google Plus LinkedIn Digg Delicious In the 12+ years I’ve been operating as The Virus Doctor™, I have never issued a general Virus Alert to all of my clients and subscribers to my e-mail list – until now. In the past week I have learned of a very widespread virus outbreak that could ensnare even the most cautious users of the Internet and e-mail. This outbreak crippled a major hospital in the Texas Medical Center, in Houston, and surely many other computer users around the United States. But unlike some viruses you may have heard about on the evening news, this one has gone mostly unreported in the news media. Going a step further, only one computer security vendor, to my knowledge, has published anything about it. And even at that, it took some serious digging through their web site before I was able to uncover more details of this infestation. But what I found was very troubling, on multiple levels. This is a very sophisticated attack with multiple ways of infecting computers, multiple ways of appearing to be legitimate, and multiple payloads (ways of making money by infecting your computer). I’ll start by describing the attack in layman’s terms, which I hope will be understandable to “normal” computer users who are not geeks. Then I’ll provide more details for the techie readers who want to know more about how the attack works and why I’m so concerned about it. The first thing you need to know is that this virus infects computers that have been used to research any of at least 15 different travel destinations. It has been able to accomplish this by infecting the web sites that people use to find more information about specific cities or areas. Here are some of the sites that were infected: www (dot) visitmyrtlebeach (dot) com www (dot) visithoustontexas (dot) com www (dot) seemonterey (dot) com www (dot) visitannapolis (dot) org www (dot) bostonusa (dot) com www (dot) tourismvictoria (dot) com Making matters worse, users were directed to these sites through promotional e-mails that actually came from legitimate sites that the users had opted-in to receive. Some of the promotional e-mails included references to 4th of July activities, while others were general travel-related content, so the attackers timed their activities to coincide with the summer travel season and the marketing activities that usually happen this time of year. In most cases of a web site being compromised by criminals, it is still necessary for the user to click on an infected link on that page in order for their computer to become infected. That is not the case with this exploit, though – as soon as that page opens in your browser, your computer is infected. As if that weren’t enough bad news for this exploit, it gets even worse. Because of the way this infection enters your computer, the attack won’t be recognized or blocked by most anti-virus, firewall, or Internet Security software. Even Malicious Web Site Blocking in Internet Security software is likely to treat these as legitimate sites, unless they analyze the actual behavior taking place on your computer when you go to those sites. It appears that this attack originated in the Ukraine, and the exact number and identities of all the infected web sites may not be known. The hosting companies for all of the known sites have been contacted, so some of the sites should have been fixed by now. The payload, or objective, of this attack falls into several broad categories. These are discussed in more detail in the “For the Geek” section, below. But here is the short version: A downloader that downloads and installs additional pieces of malicious software A rootkit that makes the infection invisible to most security software and support techs A component that attempts to steal user credentials and hijacks the computer into a botnet In short, this attack follows “Best Practices” to make it likely to infect the maximum number of computers, generate as much profit for the criminals as possible, and avoid detection and removal by any but the most skilled IT Support technicians. For the Geek This attack is delivering the Nuclear exploit kit to the infected computers, without the user doing anything that could be considered “wrong” or inappropriate. If they do a Google search on Houston, Texas, for instance, and click on one of the top search results, their computer could become infected. Here are the actual components of the attack: Zemot – the downloader that downloads and installs additional pieces of malware Rovnix – A sophisticated bootloader/rootkit that launches the installed malware when the PC boots and then hides itself and other malware from detection Fareit – Also a downloader that also attempts to steal user credentials and can be used in DDoS attacks For more technical details, you may want to read the article by Proofpoint, here: http://www.proofpoint.com/threatinsight/posts/travelers-targeted-by-infected-travel-websites.php
-