Monday, March 28, 2011

Spyware and Viruses

Spyware and Viruses are rampant on the internet these days. It is probably the number one problem we get calls for. We are going to give you a few points today on how to avoid them and help keep your machine safe.

1) Keep your Antivirus/Antispyware/Windows up to date.
Most of these programs will download the updates themselves, but require you to install them. Most people do not want to take the time to install them, restart the computer and possibly install and restart more. I know it is a hassle, but it pays off in the end.


2) Be careful with “free” software.
Companies use they keyword free to get our attention and draw us in. Everyone likes a deal and loves something for free. The old saying that there is no such thing as a free lunch is still true. A lot of these free programs install 3rd party software that can be very dangerous to your system.


3) Dangerous Websites
This usually goes without saying, but it does need to be said. Stay away from Gambling and Pornographic websites. These sites are some of the biggest carriers of spyware, viruses, and other harmful programs.


4) Masquerading programs.
We have seen this type of attack becoming more and more frequent. It looks like Norton Antivirus, McAfee Antivirus, or AVG. They have copied the graphics and layout and put a virus where the antivirus should be. If something popups telling you it has found a virus and starts to do a scan, but you did not start anything, then it is probably this virus.


We can take care of all your virus/spyware questions and problems in the store. Please give us a call if you have any questions.
If you have questions about any security related issues please feel free to contact us by visiting our website at http://www.scs-llc.info/ . Any of our technicians will be glad to assist you.

Safe Email Practices

We are seeing more and more E-Mail scams and viruses come through our shop. We want to inform people as much as we can about how to avoid being a victim to these attacks. We can’t guarantee the following tips will keep you one hundred percent protected, but they will help you in recognizing potential threats.

  • Don’t open email attachments unless you know what they are and who they came from.

  • Don’t open, forward or reply to spam or suspicious emails; delete them

  • Be aware of sure signs of scam email.


    • Not addressed to you by name

    • Asks for personal or financial information

    • Asks you for password

    • Asks you to forward it to lots of other people

    • Is too good to be true


  • Don’t click on website addresses in emails unless you know what you are opening.

  • Use antivirus and update it regularly.


The most important tip is to use common sense. If a VIP (very important person) of some far away country is trying to contact you or a long lost relative has passed on leaving you a substantial sum of money, it is probably not legitimate.

If you have questions about any security related issues please feel free to contact Secure Computer Service by visiting our website at http://www.scs-llc.info/ . Any of our technicians will be glad to assist you.

Thursday, April 1, 2010

Thunderbird Addressbook from Command line...

I needed to search the TB address book from a family member's computer... but I didn't want to force a mail run.

So I looked online.

I Google'd "Where is Thunderbird's addressbook"... thinking to find an article telling what file the address book was stored in.

Instead, I found http://kb.mozillazine.org/Run_Address_Book_from_Command_Line
which detailed a different answer --

You can bring up Mozilla Suite's or Thunderbird's Address Book using the command-line switch "-addressbook" [1].


Peace.

Sunday, February 28, 2010

Running Skype using Tor

I know, I know...
Tor...
Skype...

What am I talking about?

What is Tor?

Simple description -- Tor gives you a "fake" computer id.
Tor lets you connect over the internet to another computer (a Tor Relay). Tor then uses the other computer's IP address to identify you as you browse websites and other internet resources that you visit.
Tor relays are worldwide, so prepare yourself when Google and Yahoo come up in languages that you don't usually read, or may not know.
According to Tor's "Overview" page (http://www.torproject.org/overview.html.en) -

Summarized (visit the Tor Overview page for the whole non-technical article) --
  1. Overview
    • Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet.
    • The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

  2. Why we need Tor
    • Using Tor protects you against a common form of Internet surveillance known as "traffic analysis."
    • Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

  3. The solution: a distributed, anonymous network
    • Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination.
    • This section of Tor Overview page contains examples and graphics to explain how Top works.
    • For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.

  4. Hidden services
    • Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server.

  5. Staying Anonymous
    • Tor can't solve all anonymity problems. It focuses only on protecting the transport of data.
    • Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms.

  6. The future of Tor (as of Wed 2010 Jan 27)
    • As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone..
    • Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. ... Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.
What is Skype?
This is a internet phone/videoconference/messenger/file-sharer. Here is the Skype site.

So, can Skype run on the Tor Network?
I am looking at Skype 4.1.0.136 (apparently one of the current versions, since there are no updates available).

When I look at "Tools", "Options", "Advanced", "Connection", and look in the proxy section in the second section, I see "Automatic Proxy Detection", "HTTPS", and "SOCKS5" listed.

When I look in Tor, I know that I can control both HTTPS and SOCKS5 protocols.

So, Skype can run on Tor networks as a HIDDEN SERVICE on localhost HTTPS/443, or SOCKS5/1080... or any other port that you assign as a hidden service for HTTPS or SOCKS5... so long as you set up Tor to use the port correctly, and then tell Skype to use the correct port on localhost.

So... Yes