Datajockeys, LLC

Providing Professional IT Service Since 1982

Active Scam Mitigation

Email scams often look like legitimate mail from large companies that you may use in day to day life. ADP, Wells Fargo, UPS, American Express, Face Book et al. Lust looking at the email is not problematic. It when you click on any of the attached links is where you will get into trouble. If you are tech savvy enough to look at the message code, you can see where the links are actually pointing. Normally to a .ch or .ru address suffix. Lately there have been a smattering of .com sites showing up that trace back to legitimate US companies. Curiosity got the best of me and the quest was on.

Over the last few weeks, there was a church, health food, and an abandoned site that was compromised. ALL of the admins that were contacted responded in a grateful manner and hopefully properly corrected the problem. The abandoned site was a good lesson to either properly remove unused sites.

This week it was a WordPress exploit in the Askimet plugin. The cyberpunk incincerts a bogus HTML page into the Askimet directory and then sends spam out redirecting people to the bogus page to serve up their payload.

Below is an overview of what we do as a community service. It gives warm fuzzes, educates admins on real vulnerabilities (since they were just hacked) and generally gives cyberpunks a hard time.


  1. Open the email and take a look at the raw file. If you a novice, sometimes you can mouse-hover over the link and your mail program will balloon the actual link address.
  2. If the suffix is to a us company, use whois to locate the domain owner information. See if you can get the Technical Contact or Administrative Contact address.
  3. When calling the victim, be clear with the information. Describe the type of email scam, what directory the bogus web page is in, and encourage them to do a full security stand down and not just delete the bogus file.
  4. Do not give out contact information. This is an informal notification not a solicitation for business. … and we don't need a bunch of non-billable follow up questions.

spam

OpenDNS the Right Way

opendns_logo_300

One of the most cost-effective ways to protect your network issuing the OpenDNS service. Unfortunately in the process of making setup user friendly, it has become a nightmare to install properly. Below are some general steps to get OpenDNS properly set up.

Have a Plan:
Think about why you want to accomplish.
Read the information on the http://opendns.com site.
Sign up for the plan that best meets your needs.
Confirm the email that will be sent to you.

Installation:
Follow the directions on the OpenDNS site to set up your router properly.
Be sure to set up one permanent computer on your network to use the OpenDNS updater.
Go into your firewall settings and limit DNS services to ONLY the 2 OpenDNS servers and block all others.

Setup:
Go into the OpenDNS site and configure your settings.
Be sure to log your service and schedule regular visits to review them!

Reporting Spam?

images
Just a quick link for those of you that find chronic SPAM as frustrating as I do. It is a lot simpler to report SPAM to the FTC than it used to be. Just forward it to spam@uce.gov and you are done. Reported SPAM is collected into a BIG database for analysis and forwarded onto a case worker.

Security? Security You Say? Hah!

RTC_Magazine

by: Tom WIlliams, Editor and Chief

OK, folks, let’s get real. If you put it on a computer and that computer is connected to a network, it’s not secure. It may be difficult to get to, but it’s just plain not secure. I know, I know—I will surely get blowback explaining things that the responders are not “at liberty” to fully explain, telling me that things really can be made secure. But I’m not buying it. We’ve seen too much.

The recent WikiLeaks imbroglio is but the latest example. When some Pfc can walk into his workplace with a Lady Gaga CD and walk out with all kinds of military and State Department cables, the word “security” becomes a laughing stock. Yes, I know there are higher levels of security and more “secure” networks, but all these things are really just a means of making difficulty of access appear greater than the value of that access to the intruder. They do not make the systems “secure.” In the case of the WikiLeaks breach, that relation was insufficient.

The word “secure” comes from the Latin word “securus” meaning carefree, without care. It can also mean reckless or careless. It is the combination of se (without) plus curus (care). People working on computer security are definitely not carefree types. They are better off as paranoids. Securus is what we are not.

At the time of this writing, the WikiLeaks upset is still in full swing. Recently there have been—in addition to the attempts of several governments to take down WikiLeaks—attacks by anonymous WikiLeaks hacker support groups against organizations they perceive as opposed to their champion. They have at least temporarily taken down sites for Master Card, Visa and a Swiss bank to mention a few. What we have been seeing is the outbreak of the world’s first infowar. Most of these have been denial of service attacks but things could easily turn more ominous and may give us a picture of what might happen if the PhD-studded cybertroops of nation states started going after each other. The recent rather successful attack on Iranian nuclear sites with the now infamous Stuxnet worm is an example.

There is an irony in all this. The more our advanced technologies like power generation, transportation and communication depend on embedded computer intelligence, the more vulnerable they become to attacks using the same technology they are based upon. For example, the Smart Grid is, in most informed opinions, essential to a more efficient, reliable and expandable system for energy distribution. Still, it depends heavily on embedded intelligence and networking—all of which can be compromised if hackers can breach the perimeter. It is being designed to prevent the uncontrolled spread of accidental outages but could as easily leverage the spread of intentional malicious access.

We constantly hear hype about “evaluation assurance levels,” e.g., “EAL-5,” as if these meant anything about actual security. They are assurance levels that the claims made about the security of a software product have been evaluated to that level of assurance. To know anything about the actual security of the product, you also have to carefully examine those claims. And some of the documents filed that describe the strength of the security that is supposedly provided can have some pretty slippery language.

But hype doesn’t make us secure. Besides, that which technology can supposedly reliably protect can also be breached by people by means of carelessness (there’s that word again), subterfuge or sex. How do we know there was only one Pfc with a Lady Gaga disc? How do we know there aren’t more of them and more sophisticated breachers going after even higher-level networks? The fact is that we don’t. The fact is that we never will for certain. The fact is that if you put it onto a computer that is connected to a network, it is not secure. It is at the very best simply more difficult to access than some bad guy feels is worth the trouble.

In the end, of course, that is actually worth something. We have to try. We have to do better. But we cannot operate on illusions. We have to at some point be prepared for a catastrophic breakthrough. And we have to have the means of recovery at hand. What that might entail has been little studied, or at least little discussed. Could the same Smart Grid that is being designed to limit the scope of an outage also be designed to automatically detect and limit the damage caused by an intentional break-in? Could such techniques be applied to other systems? Maybe if we admit that the walls will never be perfect, we can develop more in-depth resistance to damage to go along with increased efforts to achieve the unachievable—complete security.

Bob's Note: Normally I don't pass on Internet articles, but this person is spot on. Short, to the point and correct in his findings.

Speed Up My PC - SCAM-

as-seen-on-tv
Lately there has ben a lot of these "Speed Up My PC" scams on the television. I am surprised the FTC has not shut them down. More surprising is the willingness of the broadcast companies to knowingly propagate this fraud. Here is a list the procedures they use to "Speed Up Your PC". Hopefully enough people will take this on as common knowledge and put these scammers out of business.

Note: If you use a Mac or a LINUX based computer, disregard this. You don't need any manual tuning.


1) Use Microsoft update and be sure to choose the "Custom" option. Select all the updates (except MS Live) and update your system. http://www.update.microsoft.com/

2) Remove ALL unnecessary programs. If you don't use it, delete it! Be careful and use the uninstaller that came with your program. If you get too aggressive, you can break things!

3) Update all of your programs, not just the Operating System. Often vendors will release fixes for problems, patch security holes and maybe even add new features.

4) FREE AV Program! Yes, it is FREE from Microsoft. http://www.microsoft.com/security_essentials/

5) Piriform is your friend. Get and use their CCleaner and Defraggler Products. Again... FREE Note: Don't schedule Defraggler it will wear out your drives by doing a lot of unnecessary maintenance. Also be sure to use the Registry Check feature in CCleaner. http://www.piriform.com/

That's it! You have safely tuned your PC without inviting questionable entities into your computer. Did I mention that it was FREE?

IT Turnover

fired-stormtrooper

Workforce turnover in any form is a pain. There are some specific issues related to IT turnover that need to be addressed when the time comes. This guideline is focused on permanent, temporary, vendor and non-binding contract situations.

Before Notice is Given:

1) Define what assets are in play. Make sure all persons involved are notified of the impending change. Note issues that need to be addressed in the turnover process. Realistic time to deal with any issues is about 8 hours before notifying HR.

2) Notify HR and deal with any paperwork they have. Have everything you need (including last payment) for the termination session. If a contract worker or vendor is leaving, be sure to pay their last invoice promptly.

3) Notify IT. Make sure all access to systems are changed according to company policy. If person leaving has access to any system administration logins, ALL passwords will need to be reset system-wide (not just the Admin).

Note: Changing of all passwords applies to inter-company transfers as well. If the person is no longer in a sysadmin or position of needing "root" access to the systems, ALL passwords will need to be changed.

4) Go to work area and box persons personal affects. Ask co-workers if there is anything in the common areas that needs to be removed as well.

As Soon as Notice is Given:

1) Have someone in the termination room to act as escort. It may be best to have security or someone from another department to be the escort. The less chit-chat the better.

For security reasons it is not advised to give any notice (by either person or company) of termination intent. It may sound rude, but it is a MAJOR security issue to have a "short timer" with access to IT assets.

2) Collect any keys, or company material in person's possession. Be sure to account for any additional material that cannot be readily collected.

3) Once notice is given and paperwork is signed, give person personal affects and escort them out of the building. No stops along the way.


After Notice is Given:

1) Send email to all employees notifying them of the personal change. Scuttlebutt can do a lot of damage. Be professional and give people closure. List person involved, person temporarily taking over duties, and where to forward questions.

2) Notify vendors and clients of changeover. Let them know the new contacts they will be using. It is unnerving trying to contact a vendor to be told my account is being serviced elsewhere or by someone else.

3) Be sure to send amended contracts to parties that need them, even if on a temporary basis.


Bringing in New Talent:

1) Debrief the new person as best you can (without violating any ethics) what happened to the previous person.

2) Introduce new person to co-workers, vendors and clients.

3) Make sure work area has ben properly prepared for new occupancy.

4) Amend any contracts that may be in place. This is also a good tool to get new person familiar with commitments that need to be kept while occupying the position.


This entry is a work in process. Check back often as I will be adding as more information comes to light. There are no specific IT termination processes readily available, so lots of changes will be made.

Single Password Security

images

Another news story about a website being cracked, credit card information stolen, and fraudulent purchases made. There is an underlaying story about the default user IDs and passwords people use to access on-line resources.

Back in the day, user IDs were chosen by the user as well as passwords. If logins were going to be compromised, the attacker would need both user ID and password to gain access. A few years ago a trend toward using email addresses as the User ID and a user-chosen password started. Email addresses are easily located, giving attackers 1/2 the key to your access.

Now compromised websites are giving up both user IDs and passwords, as well as credit card information. Take the newly acquired user ID and Password and try it on several banking, shopping and social sites and there is a good chance that it will work there too. Why? Because people are creatures of habit. Ask yourself: "How many different User ID and Passwords do you use to access your on-line resources?"

No need to panic. Just be aware as you visit your web site resources, make sure each one has a different password. If possible, change both your User ID and Password to be unique. There are several ways to securely keep your login information and to generate a secure password. Read up on the subject and find a solution that best meets your needs.

Stolen Laptop Contains Cancer Cure Data

There is some doubt as to wether there was anything close to a cancer cure for this laptop, so ignore the hype. I just can't believe the stupidity and irresponsibility of these highly educated and paid Phds. This is yet another reason upper management should take an ACTIVE ROLE in protecting data.

-----ARTICLE-----

13833909_BG2_610x343

by Leslie Katz

Sook Shin and Ralf Jankecht have posted flyers in pawn shops appealing for the return of their stolen laptop.
(Credit: News 9)

Today's "Dude, you
got to back up your data!" public-service announcement comes courtesy of Sook Shin, a university researcher who says her stolen laptop contained years worth of data related to a possible cure for prostate cancer.
And nope, you guessed it. She didn't back up and says some of her research can never be retrieved, while other parts could take up to two years to replicate.
Shin and husband
Ralf Jankecht, a professor of cell biology at Oklahoma University, are leading cancer researchers at the school. Sunday, they made a quick stop in Oklahoma City on their way back to the lab, according to the local News 9. That's when someone smashed the window of their car and made off with a 13-inch white MacBook in a dark orange computer bag.
"I'm devastated and I feel so guilty," a tearful Shin told News 9.
The pair is now offering a $1,000 reward for return of the computer, no questions asked. "Thief, it is OK. Everybody makes mistakes," reads a flyer that's been posted in area pawn shops.
"Please return the computer with the data saved," Jankecht said. "This would tremendously help us and you would do something for society."
While most people who own a computer know they should regularly back up their data,
surveys have shown that a surprising number rarely (or never) do. In this case, we can only hope for a story like that of the Swedish professor who had his laptop stolen and a week later received a USB drive holding all his data.
That thief, it appeared, took pity on the professor, backed up his information, and returned it to him. At which point, we hope, the professor backed it up a few more times over.

Jungle Disk

imgres

We have ben testing JungleDisk in house and at a couple of client sites for a couple of months now. So far we have a Linux Server, Server 2003, and two Macs running OS X on the system.

Please note that we are a reseller, so this review is biased.

All of the client installs were straight forward with the exception of the Linux server. The Linux install is poorly documented and a main to get going but it has ben rock-solid since it was set up.

Cost estimation is a pain since you start up with 10Gb to start with and then charged per GB of online space you use. Good news is that the client has de-duplication so you are not paying to keep redundant files on line. You will also want to carefully consider which files you want to back up online to keep costs down.

Initial backup can take days to complete. Fortunately there is a time-enabled throttle so you can continue working while the backup is going. Once the initial upload is completed, only the changed data is backed up.

I will edit this post to include setup instructions and usage notes as they come up.

Mail Steward - Mac

imgres

I was testing the online backup system.  One of the pre-upload reports showed that I have a LOT of email to deal with.  The thing about email programs is that they are only built to manage about 2,500 emails efficiently before getting progressively bogged down.  The 2nd issue is that mail needs to be kept in a universal format.  Outlook, Apple Mail, Eudora, and Exchange keep mail repositories in a proprietary format.  So I did some research and found a neat little program for Apple Mail called Mail Steward  http://www.mailsteward.com  . It has some interesting videos (old version) and it is s straight forward and useable program.

The general procedure is this.
1)  Get good backups of your data.
2)  Install configure and run Mail Steward.
3)  Delete email in your mail program as you see fit.
4)  EIther schedule auto archive or manually run as you see fit.

Mail Steward will catalog your email remembering mail that has already ben archived.  

Be sure to delete the archived email from your mail client to free up resources in your mail client.  Please be aware that archiving will not necessarily reduce the amount of space needed for backups, it is for archiving in a universal format and to relieve congestion in your mail client.

On-Line Backup Services, Revisited



None of the above. It looks like RackSpace is finalizing the migration of JungleDisk into their services. JungleDisk offers an online server backup solution that is reasonably priced, simple to use and reliable.

So far it has ben tested in our lab and with one of our medical facility clients with success. Prices start at $5.00 a month for 10Gb storage and 15 cents per each additional Gb of data. No additional charges for upload or download service.

Datajockeys manages the account. We check the logs daily to make sure issues are taken care of promptly. Each client gets their own login to the service. Changes to the backup job and restores can be done via this interface.

Please note that we charge admin rates to set up this service. It can be done via remote, and takes just under 1 hr to complete. For now, it looks like we will be billing yearly for the base service and quarterly for any overages.

On-Line Backup Services

I have ben getting a lot of calls about on-line backup services. Frankly the concept gives me the willies. If you are considering an off-site backup solution, please give us a call 503-356-9101.

Here is a list of additional questions you might want to ask before taking the On-Line Services plunge:

  1. Are employees subject to regular background checks?
  2. What is their drug policy enforcement?
  3. When was the last time their product ben verified by a credible outside party?
  4. How are the facilities provisioned?
  5. Do they offer de-duping technology?

If you are already using an On-Line Backup Service, you may want to add some of these steps into your admin calendar:

  1. Check the raw backup logs to be sure there are no errors.
  2. Try to restore a file and directory. Compare results with the data you have in house.
  3. Put a network probe on the remote service so you can monitor performance and reliability.

Finally there is the issue of perception. Can you tell your clients, with certainty, that their data is safe?

UPDATE:
I am compiling a list of reputable providers. They will be interviewed and the results posted here.




Pricing
Technology
Regulatory (No Information On-Line)



Pricing
Technology
Regulatory (No Information On-Line)



Pricing
Technology
Regulatory



Pricing
Technology
Regulatory (No Information On-Line)



Pricing
Technology
Regulatory

Evidence Storage


I found this little gem while researching a paper I was drafting for the Oregon Bar.

Proper long term evidence storage is extremely important. Not just in keeping the Chain of Custody in tact but the physical needs of the evidence itself need to be met. Access control has also ben problematic.

A viable solution (especially with large or varying case loads) is off-site storage. Until recently this was not practical. Most "Climate Controlled" storage systems have heat only and are subject to wild temperature and humidity swings. Most security in off-site storage facilities not acceptable for keeping evidence secure.

Premier Storage offers inside access, individually alarmed, temperature controlled units. The video surveillance is impressive and the key-lock system is a nice touch. Factor on spending around $2.00 a square foot per month. For more information call Jared Jensen at 503-645-1111.

For high profile cases, you may want to also include a Fire-Safe.

NSA Security Configuration Guides



Impressive looking banner huh? It looks like the NSA finally decided to fill the void long left by the "Rainbow Books" and re-establish some basic security standards. Topics cover Operating Systems, Applications and Network Gear settings.

Most of the information is dated 2008. Hopefully the NSA will take this resource seriously and keep it update better than the "Rainbow Book" series.

Below is a short list of what is available:

Operating Systems
Apple - Mac
Linux
Windows
Solaris

Applications
MS Office
MS Exchange

Supporting Documents

False Sense of Security



I kept running into this truck in Hillsboro, OR. Something just was not right about it. Keep looking...




Notice the gate latch securing the door?

I know, there are multiple locks on the doors, but it is a vivid reminder as to how important perception it to our work.

Opting Out of the Anti-Virus Madness



It is time to end the Anti-Virus (AV) madness. I am not sure why this is such a big secret, but... Microsoft provides a FREE, YES FREE anti virus for all of their desktop operating systems. Why Microsoft does not have it in their product as a standard feature? I will leave that question to the conspiracy theorists.

I suppose the bigger question is why is the Microsoft operating system so susceptible to attacks? Yes, Microsoft drones claim that it is market numbers, but if you follow their logic, and actually run the numbers, the results are still WAY out of whack.

Rant over.

If you are not locked into a specific Microsoft Based products, there are several alternatives. The 1st is Apple. They have made real progress into the home and business market in the last few years. A close 2nd is the Ubuntu project. If you are considering migrating to another platform, please give me a call.

Don't worry, I intend to continue supporting Microsoft products. After using Microsoft products for over 27 years, it is a hard habit to break. I look at it more like acquiring tools over the years. My collection has become quite extensive.

Project - Untangle


I thought I would do a quickie write-up on the Untangle project. I have ben using his wonderful product for over two years now and I am still just as pleased with it as the day I started.

A Brief History

Back in 2008 I ran into a brick wall. Netgear Prosafe routers were being managed by a bunch of monkeys with broken typewriters. Buggy firmware, unusable VPN, slow speed. My Sonicwall clients were suffering the same fate, with the added insult of having to pay annual "Service Fees" for the privilege.

Frankly I was so upset, I could not see straight. Phone calls to the manufacturers were totally unproductive despite my being level-headed in the matter. They just did not care.

After about a week of research, I came across the Untangle project. It exceeded all of my client needs and has ben a rock-solid platform. So far there is 10+ units deployed with varying amounts of client participation in their management.

The Down Side

Untangle is too good. My router / firewall call-outs have tanked. The service van spends more time in the driveway than on client sites. (Note GoToExpress posting). Now I have more time to keep my forensic and security skills up.

Security Clearance - All Stop


Well... The local SBA office got back to me. They can't help. Despite my objections to not being able to fully participate in the government SBA program without a current security clearance.

In my field, 100% of the opportunities with government contracting have required a clearance. I also have a Navy buddy just starting his own business that is in the same boat. I refuse to believe that I am the only business that has experienced this fiasco.

So, the next time you hear the bureaucrats saying that they have done such and such to help veterans and small business, realize that 1/2 of the allotted money goes into administration and the other half does not get allocated to its intended audience. I am not asking for a grant, loan or special treatment, I just want a fair shot in the Government procurement program.

I have a complaint registered with the Abudsman's Office clearly stating this issue. Not much hope there, just an automated response to the form I filled out on line on their site.

Update: Over two years and still no word from the Abudsman's office. And we expected?

Security Clearance Application



I may have made a breakthrough in getting a security clearance for both Datajockeys (as a company) and for myself (personal). The SBA has a program to help small business get listed in the federal government Central Contractor Registration (CCR) and from there it may be possible to get a clearance.

The paperwork is completed and Datajockeys, LLC is now registered in the CCR, so we can accept government contracts and bill accordingly. Once the registration is propagated, we will pursue the clearances.

Update: We no longer accept Government work orders. Several man weeks have cone into signing up for this program prompted by promises from the SBA that this is where we need to be. In five years we have gotten zero work from this venue. Despite the promises of politicians to direct government contracts to small business, this is just not happening. It has even gotten to the point where major government contractors have received waivers so they can bid on work set aside for small business. There is just no way for small business to compete in this environment.

Security Clearance Management

When I was honorably discharged form the service, there was hardly any market for IT security professionals. Either you worked as a government contractor or as a government employee. Sad part is that with my rank and credentials, I would have entered into the federal employment arena as a GS9-GS11 range. Good luck there. There is a real negative bias in government hiring of outside labor coming in at anything other than a GS4-GS6 range.

Yes, I am more than a little miffed that my clearance lapsed and it is a REAL pain in the backside to get another one today. It is the chicken and the egg ting. To get the good paying security jobs, you need a clearance, to get a clearance you need a sponsor (employer) that is willing to handle your clearance. The other sucky part is that most clearance related jobs require immediate employment. They can't wait 6 months for your TS / SBI to go through the system.

My suggestion to ANYONE getting out of the military or a government job. Make sure you can transfer your clearance and do what you can to keep it active. Find a job before your contract ends and make sure your new employer is capable of keeping your clearance up to date. Don't take anyones word for it, check on it regularly yourself.

Security Credentials

I just got an earful from one of my legal clients. Apparently I have been remiss in listing my security credentials.

I was trained in a security-minded atmosphere. Everyone in my shop had a Top Secret clearance or higher. I had a Top Secret / SBI, the highest you can get. People went to jail for not keeping information secure. No hand slap, or being put on report. You went to the brig, then a trial of some sort and off to federal prison. FYI: Federal prison does not do any form of parole or early release, you serve your whole sentence.

Now it seems like certifiable, credible people are few, and the demand is increasing. I researched the subject for about three days. Small Business owner looking to get a security clearance (My old one expired so long ago, they laughed when I asked to have it reinstated.). Nothing but brick walls. If you don't work for a government contractor or for the government, you can forget it.

I have not given up yet, I have some feelers out. An alternative seems to be some sort of background check certification. The companies I found seem shady and more focused on artificially pumping up their credentials than providing a viable service. I really didn't feel comfortable giving ANY of these over-marketed institutions my background information to have them go poking around.

If anything pops up, I will update this post.

NIST Bulletins



NIST has been updating their Information Technology Library (ITL) documents lately. Most of it is repackaged procedures from the mainframe days, but updated. The information is extremely relevant in todays cybercrime environment.

Recommended Reading:
Secure Management Of Keys In Cryptographic Applications: Guidance For Organizations
Cybersecurity Fundamentals For Small Business Owners
Protecting Information Systems With Firewalls: Revised Guidelines On Firewall Technologies And Policies
Risk Management Framework: Helping Organizations Implement Effective Information Security Programs
Security For Enterprise Telework And Remote Access Solutions
Security Of Cell Phones And PDAs

http://csrc.nist.gov/publications/PubsITLSB.html

There is a lot more information, but it is over 2 years old and needs to be reviewed.

Employee Termination

imgres

I need to pound on HR for a bit. Before an employee is terminated, CONTACT IT AND GIVE THEM A HEADS-UP! There has been several instances when disgruntled employees have damaged systems before being shown the door. Don't look for details here, I don't want to provide a to-do list for miscreants.

IT, this should be part of your "Employee Termination Procedure(s)":
  1. Grab a forensically sound image of all media that the soon-to-be-terminated-employee has had access to. This is necessary in our litigious times. Contact your legal resources to get feedback on how long to retain the image(s).
  2. Zero wipe any computer before re-tasking it. I know it is a pain, but you cannot have any crud being passed on to a new user. It will also validate step #1.
  3. Don't delete user accounts... suspend them. You may need to access information contained in user profiles or on the network in as native a format as possible. Once the account is deleted, recovery is a pain in the backside. Again, check with legal to see how long to keep the accounts on the system.

Current Threats to Your PC

imgres

Q1 of 2010 was crazy with infected computers. It was so bad that I went on a local news broadcast to spread the word bout the threat. The interview was great. I thought I was brilliant and watched with eagerness as the whole episode was butchered into incoherence by the producer. Lesson: Don't count on the media to get anything right, even when you hand them a story. They want crying victims, not prevention.




There are three steps that MUST be done to keep your Microsoft-based PC happy:
  1. Run "Windows Update" on a regular basis. Be sure to choose the "Custom" option to get all of the updates needed for your PC. Do this weekly.
  2. Use either AVG (for servers) or Microsoft Security Essentials (for workstations) to protect your PC. AVG costs money, but is a heavy-duty product. The Microsoft product is free and is well maintained. Be sure to do full security scans weekly, and that the program is set to update itself daily.
  3. If weird security windows or product update notices start popping up, turn off your PC IMMEDIATELY and contact a professional.