Pages

Friday, October 19, 2012

$250 Laptop

There was another presidential debate this week, and it was clearly evident that no matter how different the views were on most issues there was one issue that both candidates could agree on. Our economy has gone through some rough times in recent years. While most people are willing to spend an ever-growing percentage of their budget on technology, the fact is that most people simply don't have a lot of money to spend on anything right now. In light of this fact, Samsung and Google have collaborated and announced Thursday that their new $250 laptop will begin shipping on Halloween.

The first question that comes to mind is “How good can this thing be for $250?” The answer may surprise you. While the new Chromebook is admittedly not going to replace your desktop computer anytime in the near future, it is surprisingly capable of handling most day to day tasks for the average user. As the name implies, the Chromebook is loaded with Google's Chrome OS. As one would expect from a Google product, this platform is geared towards web usage. However, it also comes with a variation of most of the applications that you'd expect to find on any other laptop. Web browsing is handled by the popular Google Chrome browser. Google Docs handles the text editing and spreadsheet functions. It also comes preloaded with calendar, notepad and media player applications. It has a webcam for video chatting and is available with WiFi and 3G chips installed for Internet connectivity.

The hardware is not what you'd find on a $1,200 MacBook Pro, but with Google's light weight applications it performs admirably at 17% of the price. Samsung used an ARM processor in place of an Intel chip. What this means is that the computer runs extremely efficiently allowing for 6.5 hours of battery life and does not need a fan. With no moving parts the computer is absolutely silent. While there is no optical drives for CDs or DVDs there are two USB ports to allow for external peripherals.

Of course there are always trade-offs. Otherwise every laptop would only cost $250. With the Chromebook you have the processing power to play 1080p high definition movies, but you can forget about playing the latest and greatest video games. Being a Linux based system, you also can't install most software that is made for Windows. However, you can download and install software from Google Play, the same app store that is used on Android devices.

While this new laptop isn't going to replace your desktop workhorse, if you are one of the 90% of people that spend 90% of their time online or on email this might be a great fit for you. At $250, it is also an option for families that want to get a second computer for their kids but don't have the income to spend on a Windows-based system. It could also be useful for people that aren't technologically inclined as the Chrome OS is wonderfully simple to use, and isn't vulnerable to malware and viruses that plague Windows and Apple products. Another group that could find value in this system would be students. At 2.5 lbs. and 8” across, the Chromebook will easily slide into a backpack for easy travel. Whether or not you fit into any of these categories, the Chromebook might be worth a look for you.

Saturday, October 6, 2012

Speed Up Your Start Up

One of the more common services that we perform is to optimize start-up programs. This is also one of the services that our customers seem to find the most surprising. However, when we look at a computer that is running slowly and bogging down under heavy loads unnecessary start-up programs are one of the most common culprits.

Start-up programs are exactly what they sound like. They are programs that start when you boot into Windows. They usually run in the background, and for the most part are not malicious. The most recognizable start-up programs are anti-viruses. Odds are you have an anti-virus running right now, and it started automatically when you booted into Windows. It's a background process, which means that there's no window that opens to tell you that you're running your anti-virus. There's usually just a little icon next to your clock that lets you know that you're being protected.

In the case of an anti-virus, we want that program to start every time we log onto the computer. It prevents incidents where we forget to protect ourselves before going online or checking our email. However, in many cases start-up programs only serve to draw off of system resources and bog down our system. Most of the times these programs are put out with good intentions by software developers, and individually they don't have much affect. The thing to remember is that your system has a limited amount of processing power and a limited amount of memory. Any program that is running pulls from that central pool and leaves less resources for you to use as you go about your tasks. Think of the water pressure in your home. If you're taking a shower and somebody decides to wash their hands in the kitchen, no problem. However, if every faucet on the house is turned on, the washing machine is running, and you're watering the garden you might be in some trouble when it comes time to rinse the shampoo out of your hair. The same is true of start-up programs. Having a couple programs constantly running in the background isn't going to be noticed, but when they start to add up you start to have problems.

I'm going to use the computer I'm on right now as an example of what I'm talking about when I say that start-up programs aren't malicious just unnecessary. I'm writing this article on my home computer that is used by my entire family. I have a smartphone that I plug in occasionally to load the pictures that I've taken so that I can back them up. We also connect our digital camera for the same reasons. We have a GPS that gets connected for map updates once every six months. My daughter has an electronic book reader that gets connected to download new material. Each of these actions requires us to download and install a program to let the device interact with the computer. Knowing that people don't want to try to find the proper application when they plug in a device, the manufacturers of these products have their programs start in the background when the computer is booted. That way, when we plug a device in it magically pops up the correct software. Because of this Samsung, Canon, Magellan, and Leapfrog all have programs that are set to constantly be running on this system. This doesn't even include the three different programs that HP has set to constantly run to keep track of my printer. You can see how this can quickly add up.

While the device manufacturers have good intentions, the thing to remember is that most of these devices are connected less than once a month each. In order to avoid the hassle of opening a program once a month I now have 7 unnecessary programs running constantly. This is in addition to the programs that I actually want to automatically run. Overall, on this machine I have 20 programs that are set by default to start on boot up. The other 13 are made up of software updaters, anti-malware, and utilities I use to track various metrics on my machine.

As you can imagine, having 20 programs running in the background may have some affect on the performance of my machine. When I have an email program, web browser and word processor open as I do now I've upped that number to 23. This is actually a pretty mild case, as it's not uncommon for us to see systems with 40 to 50 start-up programs. Therefore, it's not to surprising when the customer tells us that the computer is slow even though they only have a web browser open.

What we do when we perform a start-up optimization is to actually go through the start-up programs one by one and determine if it's something that needs to be run every time the computer is booted up. We can then deactivate the programs that are only used occasionally, thus freeing up your system resources. I have been able to cut my start-up programs down to 13 by eliminating the device helpers I mentioned earlier, thus freeing up nearly half of the resources drawn by my background processes.

I have to mention that some of the start-up programs are needed by Windows to operate properly. While it is possible for you to perform a start-up optimization yourself, deactivating the wrong programs can leave your system inoperable. A good example of this is Windows Explorer, which provides the taskbar and start menu. If you deactivate this you will have some trouble navigating your system. If you have any doubts about what a program does, play it safe and leave it activated.

Saturday, September 22, 2012

Internet Explorer Drama


A security hole was found in Internet Explorer early this week that allows cybercriminals to download and run programs onto your computer. How it works is that the program is uploaded to a web server and when a victim browses to a page on that server the server exploits the security breach in Internet Explorer to download the malware with no interaction from the user. A security analyst stumbled upon it while browsing the Internet. The hole is what's known as a zero-day exploit. What this means is that the security breach was found “in the wild” before anybody knew it even existed. So far, there have been three verified cases of web servers exploiting this security hole.

Microsoft has deemed this as a critical security flaw and hustled to create a patch to make their browser safe against such attacks in the future. The patch was released on Friday, September 21st. If you have Windows set to automatically install important updates your system will have installed this update for you. If not, go to http://technet.microsoft.com/en-us/security/bulletin/ms12-063. To manually download the security patch. You will have to find the version of Internet Explorer you are using and then finding your version of Windows. The blue colored text that reads Internet Explorer X is a link to the appropriate download page for your patch. When you get to that page there will be an orange Download button. Click that button and your browser will download the patch. You can find what version of Windows you're running by clicking the Start Menu and right clicking on Computer or My Computer and selecting Properties from the drop-down menu. You can find your Internet Explorer version by opening Internet Explorer and clicking on Tools and then About Internet Explorer.

While Microsoft was quick to react to this threat it brings up a deeper issue with Internet Explorer. 10 years ago, Internet Explorer was synonymous with the Internet. In 2004 IE had an estimated 91% of the market share. It was simply the best browser you could find, and coming preloaded with Windows there wasn't a reason to look for alternatives. That is no longer the case. In the last 8 years IE's market share has plummeted to an estimated 23%. There is good reason for this fall. Other browsers have caught up to and surpassed IE in nearly every relevant metric. Compared to the competition, IE is slower, takes up more system resources, is less secure and strays farthest from web standards meaning it causes errors on more web pages. For these reasons IE has lost nearly 70% of the market share despite being preinstalled on 90% of desktop computers. While Microsoft did a good job of patching this security hole once it was found, the fact remains that it was a hole that simply didn't exist on any other browser. In light of this last security snafu, many security agencies and governments have urged people to switch away from IE.

By this point in the article you can probably tell that I would be one of those people urging you to drop IE in favor of one of it's competitors. What competitor would I recommend? That depends largely on personal tastes. I will give a brief rundown of the three most popular and well regarded alternatives and leave it to you to decide which is right for you.

Google Chrome – Chrome has become the new market leader in the web browser arena. There are two main reasons for this. Google's goals when it set out to create a browser were to make it faster and lighter than anything on the market and to make it quick and easy to keep up to date. It has succeeded in both areas. Chrome is lightening fast and takes up a small fraction of system resources compared to any of the others on this list. This leaves your computer free to perform other tasks while you have the browser open in the background. However, the upgrading is where Chrome has really separated itself from the competition. Chrome's default setting is to check for, and install, upgrades automatically in the background whenever you launch the browser. This means that if you use Chrome you never have to worry about upgrades or security patches as the browser will take care of this without you even knowing. If this security hole was found in Chrome instead of IE the patch could have been put out the same day and the next time you launched your browser it would have been installed.

Mozilla Firefox – Anybody that was using the Internet in the late 90s remembers the old Netscape browser that gave IE a run for it's money. Unfortunately, Netscape was a relatively small company and simply couldn't compete with Microsoft in the web browser arena. In the end they had to close the doors and stop producing their program. Instead of letting Netscape die, they gave the code to the open-source community known as Mozilla who had been struggling to get their own browser off the ground. Armed with the code from Netscape, Mozilla created Firefox. Since that time, Firefox has been the go-to alternative for people looking to ditch IE. Much of the market share that has been lost by IE over the last 8 years has been lost to Firefox, who now owns an estimated 19% of the market itself.

Opera – The last browser I'm going to mention is Opera. Opera is produced by a privately owned company in Norway. Opera is credited with being on the cutting edge of browser technology despite holding just 5% of the market share. Opera was the first browser to offer features such as tabbed browsing, mouse gestures, caching to RAM, webpage zooming, saving sessions so that you can start from where you left off when reopening the browser, integrated search, pop-up blocking, speed dial, and many others. As you can see, the browser you currently use wouldn't be what it is without copying features from Opera. The feature that I like most, which is now also included in Chrome, is the ability to log into the browser. This will save all of your settings to an Opera server. When you log in from multiple locations Opera will sync the settings so that your favorites and history will be the same where ever you log in from.

There are many other options to choose from, and the differences could be daunting. My suggestion would be to install a couple and decide for yourself what you prefer. If you decide to stick with Internet Explorer though, make sure to follow the link above to the security patch and download it. Even if you have automatic updates activated, you can never be too safe with your online security.

Monday, September 17, 2012

Social Engineering


It seems like once a week we get somebody walking into our store and telling us about a phone call that they received telling them that there's a problem with their computer and offering help to fix it. These calls are supposedly from antivirus companies, Microsoft or even the FBI. These calls are actually coming from criminals using a method known as social engineering to gain access to your computers. I call them criminals because what they're doing is known as pretexting and as of 2007 it is a federal felony.

Social Engineering operates on a very simple premise. That premise is that it's much easier to trick someone into giving a password for a system than to spend the effort to crack into the system. Likewise, it's much easier to trick somebody into typing commands into their computer than it is to write a trojan or virus to run the commands. This is what we're hearing about from our customers. The scam involves somebody calling your house and claiming that they're from Microsoft and that they have reports that there's a problem with your computer or your copy of Windows. In order to avoid problems for you they'd like to verify your software. They direct you to open a command prompt and type in a series of commands. After you do so, they kindly tell you that everything appears fine and apologize for the inconvenience. This seems harmless enough, but what you've actually done is open a backdoor for the person on the other end of the phone to run code remotely on your computer. Your antivirus programs won't be triggered because you've physically typed the commands in yourself. Your computer is going to assume that you knew what you were doing.

A variation of this that we're seeing a lot of lately is a version of scareware that pops up a screen when you log onto the Internet that appears to be from the FBI. The screen will tell you that you've been logged as having downloaded illegal porn or pirated movies and/or music. It will advise you that your Internet services have been discontinued until you pay the fine for the illegal downloads. It will then prompt you to make a payment via credit card for several hundred dollars. If you fail to make the payment within a matter of hours a warrant will be issued for your arrest. This scam relies on the fact that a large percentage of people engage in behaviors that would bring them close to downloading illegal materials. Many aren't sure if they've done anything illegal when faced with an ultimatum like this. Due to the embarrassing nature of the supposed crimes, people are more likely to pay the money to make the problem go away. The problem is that these screens aren't put up by the FBI and the minute you enter your credit card or bank account information your accounts will be drained and your credit cards will be maxed out.

Both of these scams are becoming very common place. With malware protection becoming more complex and effective it is becoming harder and harder for criminals to gain access to your computers through technological means. This has caused them to revert to the simple act of preying on the trust of their victims. As of this time I am not aware of any company or agency that is going to contact you via phone or web browser to let you know that there is a problem with your computer. The FBI is not going to flash a screen on your computer to accuse you of crimes. They will knock on your door with a warrant. If you are contacted by somebody looking for information about your computer or asking you to run any commands on your computer, do your research. Ask them if you can call them back, then look up the number that they give you and see who it's registered to. If you have any lingering doubts, please call us at 262.767.3300. We will be happy to look into the situation for you.

Friday, September 7, 2012

More For Your Money


Everybody knows that technology becomes outdated and even obsolete at an alarming rate. The newest laptop or gadget can set you back a pretty penny, but in the blink of an eye you're told that it's not capable of performing the tasks that you require. Today I want to look at how to stretch your dollars in regards to your technology budget.

The best way to get the most bang for your buck is to make purchases near large release dates. There are two approaches to take, and which you go for depends on whether you need the latest and greatest or are looking for an upgrade without breaking the bank. You can take the early adapter route and buy new technology the moment that it becomes available. This way, you maximize on the time you have to work with your new device before it becomes yesterday's news. The flip-side to that coin is the option to purchase last year's model at extremely discounted prices. Using this method you get a device that is still very capable, though not cutting edge, at a price that allows you to upgrade more often.

Technology companies tend to clump their release dates together so that competing companies have competing devices coming out almost simultaneously. This is due to the companies trying to one up each other. When one company announces a news release for a new product there is a race for all the other companies to get their product to market faster. We are in the middle of one of these races right now. On September 5th, Microsoft & Nokia held a press conference to announce the new Nokia Cell Phones that will be running the Windows Phone 8 operating system. The same day, Motorola and Google announce a new line of cell phones running a new iteration of the Android operating system. On September 6th Amazon held a press conference announcing a new line of Kindle ereaders and tablets. Apple has a press conference scheduled for September 12th where they are expected to announce the new iPhones and iPods as well as updating their line of desktop and laptop computers. This is all coming to a head right before Microsoft releases the Windows 8 operating system for tablets and computers on October 26th.

What do all of these announcements mean to you? For starters it means that if you're interested in purchasing a new computer or gadget immediately you can get a great deal on what is considered the best on the market today. In anticipation of their new products Apple has already marked down their current products, discounting their current line of laptops up to $200 off of their price from just a month ago. Amazon has marked down their current Kindle line, although they have unfortunately already sold out of their current generation Kindle Fires. On the smart phone front, waiting until the Apple announcement to make a purchase should allow you to save significantly as carriers look to unload their current stock before the newest phones hit the shelves.

The release of the Windows 8 operating system should provide many deals on the home computer front. Windows 8 will take advantage of a new way to boot a computer. In the past BIOS was the preferred method of getting a computer to turn on and load an operating system. Windows 8 will be incompatible with BIOS and will instead rely on UEFI. What this means to consumers is that the vast majority of computers in use today will not be upgradeable to Windows 8. As the release date approaches we should see a similar markdown in computer prices as retailers look to clear out stock on items that aren't compatible with the newest operating system. If you don't mind using Windows 7 for the foreseeable future you can leverage this into huge savings. Keep in mind that as of this writing Windows 7 is the latest and greatest that is available. If you absolutely need a computer that will run Windows 8 purchasing one in November should allow you to select a computer whose hardware will give out before it's software becomes obsolete. Either way, the ideal time to buy is quickly approaching.

Technology is always going to be a money loser in the long run. The computer that costs you $1000 today will be a paperweight in a matter of years. There is no avoiding this. However, with a little bit of timing you can insure that your investment will last longer and have a higher return than the average. Hopefully I've given you some tools today to help make sure that that happens.

Friday, August 10, 2012

Patch Tuesday


Next Tuesday, August 14th, is the second Tuesday of the month. Every month on the second Tuesday Microsoft releases it's latest batch of updates. The vast majority of these are what is known as security patches. As an illustration, think of your computer as an air mattress. All of your personal information is the compressed air inside of the mattress, and the mattress keeps that compressed air separate from the rest of the world. Along comes a computer hacker, and he starts poking holes in that air mattress releasing your information, and possibly control of your system, to the outside world. Once a month, on Patch Tuesday, Microsoft comes along with security patches to fill those holes and make your system safe again. This month's batch of updates is particularly interesting. Microsoft has announced that it will be releasing nine security patches, five of which it considers critical.

In order to understand why next week's updates are so important we have to understand what Microsoft's criteria is to deem an update critical. Microsoft's definition of critical is an exploit that "could allow code execution without user interaction". This means that somebody could access your computer and run commands without you having done anything at all to allow it. You also wouldn't necessarily be notified in any way that this is happening. In other words, these security holes allow hackers and malware access to your system, without your knowledge, whenever they feel like causing some damage. One of these flaws even allows for elevation of privileges, meaning that malicious code can operate with administrative authority even if your user account doesn't have admin privileges. This allows hackers and malware to access parts of your system that you can't even access, which makes it extremely difficult to correct the problems that they cause.

So now that you know what a critical update is we need to make sure that you install them as soon as they become available. Microsoft suggests that all critical updates are installed within three days of being released. This is because once they release a patch the hackers and malware writers will be able to analyze that patch and determine how to exploit the holes that the patch is trying to fill. In other words, by putting out a fix Microsoft is making it easier for the bad guys to exploit the security flaw on any systems that haven't yet been patched. This is why the day after Patch Tuesday is commonly referred to as Exploit Wednesday. In order to ensure that your system is not vulnerable you have to make sure you check for and install critical updates on Tuesday. For Windows XP users this means going to the Start Menu, clicking on All Programs, and then selecting Windows Update at the top of the left hand column. For Vista and Windows 7 users you can simply click the Start Menu and type “windows update” in the instant search box. For all three operating systems make sure that you check for updates and then select all critical updates before clicking Install Updates. Windows Updates has a cache and it doesn't always look for the latest batch of updates before presenting you with your update options. Adobe also has two critical updates that they're releasing Tuesday, so if you have Adobe Reader or Adobe Acrobat installed make sure that you're checking for updates for those two programs as well.

Many systems are set up to automatically install critical updates every night. However, when this many large security flaws are being patched at once you know that the hackers and malware writers are going to take notice. In instances such as this it is good practice to manually check to ensure that your critical updates are in fact up-to-date. This batch of updates affects Microsoft Windows, Internet Explorer, Microsoft Office, Adobe Reader and Adobe Acrobat, so if you're missing your updates there are a lot of opportunities for criminals to take advantage. Hopefully we've given you the knowledge you need to protect yourselves against these attacks.

Friday, July 20, 2012

Is Your Sidebar Safe?


This week Microsoft revealed that security flaws have been found in the sidebar and gadgets found in Windows 7 and Windows Vista. Microsoft is saying that gadgets “can harm your computer and can access your computer's files, show you objectionable content, or change their behavior at any time.” They are recommending that all Windows 7 and Vista users disable their sidebars and all gadgets immediately.

What exactly is the threat? Apparently, a person with the right now-how can access your running gadgets and use them to run malicious code. This would allow them to download and install viruses, transmit your personal information or conduct attacks on other systems. All of these actions would be performed without your knowing.

This appears to be a very serious threat, and a fundamental flaw in the sidebar and gadget coding. Microsoft is not releasing a patch to make the programs more secure, they are simply telling you to turn them off altogether. Microsoft has also dropped gadgets from the upcoming Windows 8.

What do you need to do? I am attaching a link to the bottom of this post that will download a Microsoft Fix It program that will automatically disable your sidebar and gadgets. If you are running Windows 7 or Vista and still have not deactivated your gadgets and sidebar, I would strongly recommend that you download and run this program.


 Microsoft Fix-It to disable gadgets and sidebars: