Saturday, February 28, 2009

Searching for good

Want to help people while you search the Internet? Try using Goodsearch - http://www.goodsearch.com/ - for your search engine. They donate a small amount of the money raised from advertising when people use their site (you can view their FAQ for details). I have it set as my home page.

I'm donating to Heifer International http://www.heifer.org/ but there are thousands of organizations to choose from and you can add your own.

Thursday, February 26, 2009

Staying safe at public wi-fi spots

If you use your windows laptop on a public wireless access point (like Starbucks or Barnes and Noble) there's a safety tip you should be aware of. You should turn off 3 exceptions to your firewall (remember, the firewall controls the flow of data and access from an outside computer, or the Internet, to your computer). Most of the time you allow these 3 exceptions but you should turn them off when outside your network.

The exceptions are:
Remote Assistance: allows someone to connect to your computer over the Internet or a network and take over operation; used to provide technical assistance
Remote Desktop: allows a user to log in to a computer while not sitting in front of it; usually used to telecommute
File and Printer sharing: as the name implies, lets others see your files and lets you print

To turn these off:
Start, Control Panel, Security Center, Windows Firewall, click the "Exceptions" tab

Legal stuff: This information is for general educational purposes only. Use at your own risk, and I can't be held responsible if something goes wrong. If you have questions consult a computer technician.

Wednesday, February 25, 2009

Pop-up protection

You know how you're surfing through websites and you get pop-up windows? Then you have to spend time clicking on those windows to close them. There's a problem (besides the obvious annoyance factor of pop-up windows): some of those windows can activate viruses or Trojan Horses.

Here's a cool trick: instead of clicking on a window to close it, use ALT-F4. Hold down the ALT key and press the F4 key. That closes the active window. Voila! You're back to surfing.

Legal stuff: This information is for general educational purposes only. Use at your own risk, and I can't be held responsible if something goes wrong. If you have questions consult a computer technician.

Securing your wireless network

I'd like to ask a favor: Please keep your wireless network secure.

In an earlier post, I talked about the physical structure of a wireless network. When you have your wireless router connected to your modem, you will configure it per the manufacturers instructions. Many (too many) people leave it at that. You're not done yet; you still have to secure your network against unauthorized access. How you do this will vary a bit depending on what router you have, but you need to take the time to do this.

There are 3 encryption protocols:
Wired Equivalent Privacy (WEP). This is an older protocol. It looks secure, but it can be broken by someone with the right software and the skills. It's better than nothing, but let me be clear: IT CAN BE BROKEN. You definitely should not use WEP for any sort of business applications.

Wi-fi Protected Access (WPA). Newer and more secure than WEP. It may still be possible to break into a WPA protected wireless network but it won't be as easy as breaking a WEP network.

WPA2 - newer and even more powerful than WPA. Some older computers may not be able to handle this level of encryption.

Legal stuff: This information is for general educational purposes only. Use at your own risk, and I can't be held responsible if something goes wrong. If you have questions consult a computer technician.

Tuesday, February 24, 2009

how wireless networks work

So what's so great about a wireless network?

Well, basically, it gives you the ability to work on your computer anywhere in your house. No more sitting in the basement next to the water tank while paying your bills. Tuck that laptop under your arm and go out on the deck; play World of Warcraft or chess on Yahoo while listening to the neighbors dogs bark.

What does a wireless network consist of?

First you will need to get with an Internet Service Provider (ISP). Some of the big ones are Earthlink, Bellsouth, Comcast and AOL (Note: mentioning them does not imply endorsement. And no, I'm NOT going to tell you that I use Earthlink, so don't even bother to....oops.). The ISP will give you an account to connect to the Internet.

Then you will need some equipment. The first thing you need is a MODEM. This is actually an abbreviation for MOdulation/DEModulation. Back before high speed Internet, when we were still using dial up connections over a regular phone line, the stream of data from your computer had to be altered - modulated - to be sent over the phone line, then at the other end the process had to be reversed - demodulated - so that another computer could decipher it. This is because computers use a digital format and your voice uses analog. We don't do this transformation anymore, but the name has stuck. Your ISP will give you your modem, and you will either connect it to a cable line (if you're using cable) or the phone line (if you're using a Digital Subscriber Line, or DSL).

What is DSL? The reason we don't have to modulate and demodulate from digital to analog anymore is because science has discovered an unused range of frequencies on your phone line that can be used to transmit data (there's no telling what was being transmitted over these undiscovered frequencies before computers were invented!). Now, digital computer signals can travel over the very same phone line as your analog voice. Your voice will use it's own frequency range (0 to 3400 cycles per second, also called a HERTZ) and your computer will use another range (4 KiloHertz - Kilo is thousand - and above), and never the two shall meet. You will still need DSL filters to put on all your phone jacks; your ISP will supply these as well.

At this point, you could plug in your computer to the modem with an ETHERNET cable (basically like a fat phone cable....but don't call it that to it's face....) and be ready to go.

So here's how the setup would work:
Your phone jack would connect to a DSL filter with a regular phone cord
Your DSL filter would connect to your modem with a regular phone cord
Your modem would be plugged into an electrical outlet for power
Your modem would be plugged into your computer with an Ethernet cable

At this point you would have a traditional wired network, even though you're really using only 1 computer so it can't really be called a network (please forget that I just called it that). In order to make it a wireless network, you need to add a wireless ROUTER. A router is a device that allows multiple computers to connect and talk to each other. In the past, routers simply were connected to computers by Ethernet cables (and they still can be) but wireless routers have a radio signal beamed out that allows computers with a wireless card to connect to them and transmit data as though they were connected with an old-school Ethernet cable.

Even though you could stop there, there's one other component that is VERY important: a FIREWALL. This prevents unauthorized access to your computer from the Internet. You should not get on the Internet without a good firewall. The Windows Operating System comes with a firewall that is regarded by many experts as having too many vulnerabilities to be your only firewall. Firewalls are available as software (programs) or hardware (things you can touch, or throw). Most routers have at least 1 firewall included.

So here's how the wireless setup would work:
Your phone jack would connect to a DSL filter with a regular phone cord
Your DSL filter would connect to your modem with a regular phone cord
Your modem would be plugged into an electrical outlet for power
Your modem would be plugged into your wireless router with an Ethernet cable
The wireless router would beam out a radio signal for any computer in range with a wireless card

In a subsequent post we'll talk about SECURING your wireless network (very important!).

UNDERSTANDING MALWARE

The term Malware is actually kind of a play on words - "MAL" is bad and "WARE" like softWARE or hardWARE.

So just what does a virus, worm and Trojan do?

Virus
Probably the best known type of Malware
They can replicate themselves
They attach to a host file (usually an executable file whose name ends in EXE)
They are activated by a human being (or, I suppose, a very bright monkey with a valid password....) interacting with the host file (like by opening it)
Thousands of new viruses are written every month
Can damage your computer data, steal your sensitive information and even allow someone to control your computer!

Worm
Type of virus
Does not require human intervention to activate nor a file to be a host
Can spread itself by looking through all of your email contacts and sending itself to them
Can damage your computer data, steal your sensitive information and even allow someone to control your computer

Trojan Horse
Used to conquer an ancient city; soldiers hid in it in order to infiltrate....oops, ah, sorry, wrong blog! ;-)
Masquerades as a legitimate program; you think you're downloading/installing something good
Do not replicate themselves nor infect other files
A common symptom is many pop-up windows appearing when you are on the Internet (often with Internet Explorer browser)

Phishing
Attempt to steal your password by impersonating a helpdesk or other authorized network administrator, usually with an email
The user is fooled into responding to the email with login credentials
HELP DESK PEOPLE WILL NEVER ASK YOU FOR LOGIN CREDENTIALS/PASSWORDS IN AN EMAIL!

Terminator
Hostile robot that can look like a human being
Sent back from the future
Will attempt to steal your password if your name is Sarah Conner

In a subsequent post we'll talk about protecting yourself against these and other threats

Sunday, February 22, 2009

Getting started

Beginnings are always difficult times, but I'm excited about having my own blog! This blog is dedicated to people who want to know more about computers and who are not tech-savvy. You want to be able to say to your friends at parties, "Why yes, I optimized Twitter to leverage my bandwidth while utilizing HTML and CSS." Well now you can!

Over the course of this blog I will be posting tips, tricks, hints, reviews, and other amazingly useful information to help you, the non-power user, learn to survive in a computer world. After all, computers are going to run the world one day, so you might as well learn how to be assimilated....er, get along with them....

Paul