Tuesday, May 26, 2009

50 Top Text Acronyms you should be aware of...

Here's a link to some acronyms that kids are using today...WARNING..some of these are descriptive!

http://www.myfoxatlanta.com/dpp/news/fox_5_links/Top_50_Text_Acronyms_Parents_Should_Know_052009

-SuperDale

Friday, May 15, 2009

Holy Swap-File, Batman!

One method of increasing your system performance and increasing your security, is to…(are you a ready for this one!)…delete the Swap-File (also known as the PageFile).  Now I’m not saying to permanently remove the swap-file, that would be VERY bad…but rather remove it as the computer shuts down and recreate it as the computer reboots… WHY? you ask.. couple of reasons.

  1. Sensitive information may have been temporarily stored in the virtual memory pagefile. For this security reason and others, it may be a good idea to enable this setting to clear the virtual memory pagefile occasionally or when you suspect this. When this setting is enabled it will clear the virtual memory pagefile, and the hibernation file only on a portable computer, when you restart or shutdown the computer.
  2. If you leave the file in place…over time it get “fragmented”, which makes the system work harder to find the files it needs…by deleting it, and restarting the computer, a NEW and IMPROVED swap file is created, which is not fragmented.

So how do you do this?….It’s a little “Geeky”, but here you go:

WARNING: THIS METHOD ONLY WORKS ON VISTA ENTERPRISE, BUSINESS, AND ULTIMATE…for Vista Home and Preium, look towards the bottom of this article for section 2.

Section 1)

Open the Local Group Policy Editor.
2. In the left pane, click on Computer Configuration, Windows Settings, Security Settings, Local Policies, and Security Options. (See screenshot below)

image
3. In the right pane, right click on Shutdown: Clear virtual memory pagefile and click on Properties.
4. To Enable Clear Paging File at Shutdown -
A) Select (dot) Enabled and click on OK. (See screenshot below step 5A)
B) Go to step 6.
5. To Disable Clear Paging File at Shutdown -
A) Select (dot) Disabled and click on OK.
image
6. Close Local Group Policy Editor window. Your done.
7. If you enabled this setting, then restart or shutdown the computer to clear the Virtual Memory Paging File.

 

Section 2)

1. To Disable Clear Paging File at Shutdown -
A) Click on the download link below to download the
Disable_Clear_Page_File.reg file.
B) Go to step 3.
2. To Enable Clear Paging File at Shutdown -

A) Click on the download button below to download the
Enable_Clear_Page_File.reg file.


3. Click on Save, and save the .reg file to the Desktop.
4. Right click the .reg (On Desktop) file and click on Merge.
5. Click on the Run button for Security Warning pop-up.
6. Click on Continue (UAC), Yes, and then OK when prompted.
7. When done, you can delete the .reg file (On Desktop).
8. If you enabled this setting, then restart or shutdown the computer to clear the Virtual Memory Paging File.

-SuperDale (http://myfamilysafety.blogspot.com)

(Note: I’m not responsible for any issues that these files may or may not cause…there’s my disclaimer)

Thursday, May 14, 2009

Lying Low on the Social Networks…

Here is a GREAT article by Kim Komando (A nationally talk radio show about computers).

Good rules to live by…http://www.usatoday.com/tech/columnist/kimkomando/2009-04-30-facebook-privacy_N.htm?csp=34

-SuperDale

More Sexting information

An article in today’s Washington Post about sexting  (sending sexually explicit photos by cell phone) accurately portrays the difficulties schools, law enforcement, and prosecutors have when new uses of technology don’t necessarily fit into laws and polices already on the books.  Often young people embrace technology and find new, and sometimes negative uses, before parents, schools, and the community have the opportunity to proactively respond.

One paragraph in the story particularly caught my attention:

Sexters are often "the good kids” police said, with strong grades, involved parents and no criminal history. Many send photos without grasping that they could be widely circulated or posted on the Internet in view of strangers, predators and potential colleges and employers.

It’s that last part that I actually think we can do something about. Young people in America should not grow up without a grasp of how the Internet works, the longevity of images and text in cyberspace, or the impact and ethical considerations of sending, receiving, or distributing explicit photos.

Sharing explicit photos most certainly did not start with the Internet. However, the Internet is an accelerator button that has few brakes and a memory that lasts forever. The responsibility of teaching young people about the safe and secure use of technology belongs to all of us—parents, teachers, uncles, aunts, grandparents, industry, and government.

Learning to use technology responsibly in a civil society is not even about the technology.  It is about learning the universal behaviors that are relevant, whether you are using a megaphone, email, social networking, texting or even just word of mouth.  Young people need to understand the consequences of behavior, appreciate the rights and feelings of others, and be aware of the lasting impact of their actions. By learning these life lessons young people will be prepared to safely and securely integrate every new technological bell and whistle, and harness the power of technology to enhance their lives.

Here’s the kicker…the article goes on the say that “ In Loudoun County, Ting-Yi Oei, 60, an assistant principal at Freedom High School, said he had never heard the term when he and a school security specialist investigated a teacher's report in March 2008 of a risqué photo being circulated by students.”   READY…..”Ultimately, Oei was arrested on child pornography charges for possessing the photo he had investigated.”!

Please…let’s all sit down with our kids (yes, there are reports at the elementary school level)…talk about what’s wrong and right.  Let them know they don’t have to do something like this to be popular, or to get someone to “like” them.

It’s a NEW world!

-SuperDale

Friday, May 8, 2009

Look out! You think the Swine Flu is bad!

There's a new series of email messages going out, numbering in the millions. Many of them have links to Web sites and those Web sites seem vaguely official.

When you click on the link in the email, you're taken to these official-looking sites, where you're told your version of Flash or your version of Acrobat isn't up-to-date and they offer you the opportunity to download an updated version.

Guess what…the software you download isn't Flash or Acrobat, it's something designed to infect your computer. The trojan attempts to steal confidential information from the computer and upload it to a server in Ukraine.

So let's go over our list of cautions once again, but we'll lead this time with Acrobat and Flash.

Never, ever, ever install Flash or Acrobat from a Web site you're visiting because the site says you need to. If you're not sure you're running the latest version, type http://www.adobe.com directly into your browser's address bar, go to Adobe's site, and download from them.

Downloading Flash and Acrobat from Adobe.com is safe. Downloading these files from anywhere else is not.

Just because repetition often leads to learning, let's go over our steps for safe computing once again:

  1. Never, EVER open email attachments UNLESS you’re expecting something from someone….Ever!
  2. Update your computer using Windows Update whenever you're told updates are available.
  3. Make sure your virus definitions are updated daily.
  4. Update your anti-spyware definitions daily.
  5. Update your browser to Internet Explorer 7/8 or Firefox 3. These have much better anti-phishing protections.
  6. Use a router or firewall. If you don't know what this is, call your ISP and ask them for help. Shouldn't cost you more than $50 and can help keep you safe.
  7. NEVER, NEVER, NEVER (I’ll come over to your house and slap you, if you do) give your personal information to ANYONE on the internet.  Your bank, Ebay, Paypal and anyone else you can think of will NEVER ask for your info from a email (even if it direct you to a “official looking” site)…if they really do, drop them FAST!
  8. This is a big one…”Lunch is NEVER FREE”!  You DID NOT win a lottery in Africa, you did not loose an millionaire Uncle in South America who left you millions and there is no FREE XBox, FREE Ipod, Free Flat Screen TV….STOP ALLOWING GREED TO JEOPARDIZE YOUR SAFETY AND INDENTITY!

And, once again, don't download Flash or Acrobat from sites other than Adobe. Don't download QuickTime from any site other than Apple.com. Don't open email attachments.

Don't open email messages that look like they're just baiting you. Don't go to questionable Web sites. Don't put your credit card into any site you're not already very comfortable with.

Do visit this site! ;-)

-SuperDale (http://myfamilysafety.blogspot.com)

Thursday, May 7, 2009

How do I configure my router for my families safety?

If you don't know the ip of the router you can try clicking start-->run-(“start search” if you’re using Vista)

Type cmd and click "OK". In the command prompt type: ipconfig and press "Enter" on the keyboard. If there's a "gateway address" that will the the number to type after http:// in your browser.

Ethernet adapter Wireless:
Connection-specific DNS Suffix . :
IP Address. . . . . . . . . . . . : 192.168.1.101
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1

You’ll have to type in the username and password.  If you haven’t changed it from the defaults (SHAME ON YOU!), try looking at your manual.  Once in, you should see a website with different settings.

If you want to configure your router, for OpenDNS, go to this website first (http://www.opendns.com/support/videos/getstarted/) and watch the video on getting started.  After you’ve followed the video, go to this site (https://www.opendns.com/start/router/), select what your router looks like and follow the directions.

Last thing…if you have wireless on your router, PLEASE change the SSID to something that someone won’t be able to identify as coming from your home….I’m a BIG fan of “misdirection”.  On a Linksys router…change the SSID to “belkin” or “dlink”.   This will make someone think (and possibly try to hack) your wireless network is something it’s not.

-SuperDale (http://myfamilysafety.blogspot.com)

Tuesday, May 5, 2009

The FREE Version of “LifeLock” ;)

 
You know me…always trying to share information

I’m sure we’ve all heard about Life-Lock.  A service (for only $10 a month) will  quote “Protect your identity from being stolen”

Well….here’s the skinny:

First you might want to note that the owner, who advertises his SS#, has had 87 attempts on his identity…and guess what…someone was successful

(see: http://www.foxnews.com/story/0,2933,357090,00.html)

Q; Life-Lock DOES offer $1,000,000.00 guarantee….

Read the small print…their guarantee “only covers a defect in LifeLock's service,”…AZ and CA are currently suing the company for misleading customers.

So…here comes SUPER-DALE! 

What LifeLock does…only Free - A 10 min guide to save $10 a month

We’ve all seen the very catchy ads from LifeLock - “I’m Todd Davis and this is my social security number….” It doesn’t get much better than the president of the company plastering his social security number on billboards, banner ads, full page ads in the Wall Street Journal, and everywhere else in between. The concept is simple, take as many steps as possible to reduce the chance of identity thieves working you over. LifeLock’s execution and timing have been excellent. The only catch is you’re not paying for an exclusive LifeLock service. Instead, you’re paying for LifeLock to take care of a government mandated resources that you can do for free. Thus, you’re really paying to save a few minutes of your time. Of course this certainly isn’t a bad thing. We all can only do so much. The question becomes is it worth $10 a month for the next 20 years? For me, it’s not. Therefore, I put together a quick cheat sheet on how to protect your identity for free.

Here’s a breakdown of what LifeLock provides so you can do it yourself. If you think the $10 a month is worth it, visit LifeLock and sign up.

1. Set a credit fraud alert. This is really a new credit request alert that lets you decide if you are the victim of fraud or not. The simple way is to fill out the online form every three months. You can also fill out a letter and mail it in to get coverage for several years. Go the easy route like LifeLock and do the 90 days online. To place your credit fraud alert go to the link below at Equifax which also alerts Transunion and Experian (the three major credit reporting agencies). Here’s the link https://www.alerts.equifax.com/AutoFraud_Online/jsp/fraudAlert.jsp

2. Do step 1 Again in 90 days. Unless you print out the form from the link above and send it into the credit bureau you have to resubmit the form every 90 days to keep the credit fraud alert active. Set an Outlook or Google calendar reminder to go to that link again in 3 months and fill out the form again. Simple. And by doing it yourself you’ll be saving $30 a pop (3 months of monitoring for each submission). That’s enough to keep my subscription to HBO going for the upcoming season of Entourage.

3. Reduce junk mail (most importantly preapproved credit card offers). There’s really three benefits to this. First, you are reducing landfill waste, pollution from the dyes that are used, and junk mail transportation costs. Second, you’re reducing the time you spend shredding the offers. Third, you are reducing the opportunities credit thieves have to fill out a new credit card requests in your name.

To reduce junk mail and preapproved credit card offers go to the Federal Trade Commission’s(FTC) website http://www.ftc.gov/bcp/conline/pubs/credit/prescreen. shtm the specific page to opt out is https://www.optoutprescreen.com/

4. Order free credit reports. By law, all of the credit bureaus must provide you with a free credit card report once a year. Of course, they always try to up-sell you on more advanced features which you often do not need. To get the federally mandated free credit report just go to https://www.annualcreditreport.com/cra/index.jsp

5. LifeLock’s WalletLock. This service just contacts the credit bureaus when you lose your wallet. Here’s an easier and better way to do it. First, keep the credit cards you carry in your wallet to a minimum (sounds simple but a lot of people carry all of their cards in their wallet). Second, for the cards you do carry keep the phone numbers for the banks in your phone or somewhere else that is readily accessible. Obviously, as soon as you lose the wallet you’ll want to contact the banks to cancel the cards. You’d be surprised at how hard it is to track down the right department when you don’t have the exact number that is printed on the back of your card. So keep the numbers handy. When the card is lost first cancel the credit cards then contact the credit bureaus. Third, since closing down credit card accounts hurts your credit, keep the accounts open but shred the cards. Just in case someone breaks in to your house, they won’t have any cards to steal. Fourth, keep you important personal documents safely hidden e.g. your birth certificate, social security card, etc.

6. Insurance. Since this is a free post I’m sure as hell not going to offer insurance for your identity theft. But if you follow the steps above the chances of having your identity stolen are significantly reduced. Is $10 a month worth the insurance? Not for me.

7. Bonus link - National do not call list. Get rid of telemarketers fast. Go to https://www.donotcall.gov/

Summary - 10 minutes to save $10 a month

Is LifeLock worth it? Maybe for some. But the above links detail what they do for you so it’s your call. To LifeLock’s credit they are very clear that the steps LifeLock takes to protect your identity can be done for free. Go through the steps above then ask yourself is it worth $10 a month for the next x number of years?

Oh, and I won’t charge you $10 a month…but if you want to slide me a couple of Diet Cokes (I’ll take dollars as well ;) ) for the info… I won’t complain!

Have a GREAT DAY!

-SuperDale

Monday, May 4, 2009

Sexting – Concern for your kids

sexting1228917187

A new, dangerous trend is growing among teenagers: text messaging explicit photos of themselves, also known as sexting. Students as young as 12 are exchanging salacious pictures and messages through their cell phones.

"A picture got out of somebody else's older sister and that kinda spread like wildfire through our school," said a tenth grader.

 
The phenomenon is raging as wildly as their hormones. It's known as sexting or sex texting, sending lewd messages and pictures through a cell phone. "Nude body pictures, topless, bottomless, poses, inappropriate," said one tenth grader.

Its invaded middle schools as well. A seventh grader said, "It's not usually strangers. It's just somebody you've been talking to lately and they want to see more of you... literally."

Almost half of all 12 year olds have heard of this happening in their school.  Both genders agree the boys are the instigators, but some girls play along.

"I think the girls, they just want to get their attention and usually it works," said an eighth grader. Another student in the same grade said, "Sometimes they'll say, 'Send me a picture of your boobs' or 'Send me a picture of your butt.'"

The risqué game has very real consequences. "The phones these days are like very good so they can just like send it to the Internet and they can put it on MySpace and other people can save it so it's like all over the place," said a seventh grader.

The National Center for Missing & Exploited Children said, "Once it's out there, while they might think it's just their classmates looking at these images, well, it's also the dirty old men. It's the pedophiles. It's those that want to sexually prey on children who take these images, who collect them and spread them worldwide."

It's a very real fear for parents. "It's alarming. They're not protected." "It's really disappointing! It's hard to be a parent today."

The kids said very often it starts as a girlfriend sending a boyfriend a picture, but then they break up, he shows a friend and it quickly gets forwarded around. It's a felony for children under 18 to not only receive one of these pictures on their phone, but taking a photo and sending it could lead to pornography production and distribution charges.

The National Campaign to Prevent Teen and Unplanned Pregnancy reported last month that a survey of 1,280 teens and young adults found that 20 percent of the teens said they had sent or posted nude or semi nude photos or videos of themselves. That number was slightly higher for teenage girls — 22 percent — vs. boys — 18 percent.

Make sure you talk to your kids about this…it’s effect on them, and their friends.  Several kids nationally are being charged and listed as a “Pedophile”. 

One of my suggestions is to do “random” inventories of your kids phones.  Check with your carrier to see what (if any) parental control features they offer… you can also lock up you child until they’re 18 ;)

-SuperDale (no relation to SuperDell!)

Holy Archive, Batman!

Many of us are concerned about the loss of important and sometimes irreplaceable information and files.  I’ve actually had the thought of, “If a fire burnt down my house…what would I be heart-sick over loosing?”.  Nope, it’s not my comic book collection, my computers, my movie sword collection (I know…nerdy huh?)…it would be my pictures, my letters from Santa to the kids, tons of stuff that I store digitally.  The one thing we tend to forget over look is: “What If?”. 

OK…here’s the stats… 1 in 8 computers  will have some sort of data failure…Well, I have 5 computers…so I’ve got some pretty good odds working against me…that or my neighbor is about to have a bad weekend ;).  I’m not worried…I found a solution that I’m REALLY happy with.

I’d like to introduce you to “Carbonite”. 

Online backup software from Carbonite

Boston based Carbonite is the closest to perfection I’ve seen so far. It requires a simple installation, and users choose to back up their entire hard drive or just parts of it. Carbonite then begins the backup process, uploading your files until finished. Files are encrypted, and there is no limit on total storage. 

If you delete a file, Carbonite keeps it stored for 30 days in case you change your mind. Carbonite monitors files that are changed and backs them up right away.

And if you have a problem and need to get the data downloaded to a reformatted hard drive or new computer, Carbonite will download at up to until your system is restored.

Carbonite says that one in eight computers have some sort of data failure. The number one reason is user error, although crashes, fires, floods, theft and viruses all play a part as well. The 30 day cache solves the user-error problem and the fact that data is stored on the Internet solves the fire/flood/theft issue (where USB or network drives may also be affected).

I know, “how much Dale?”  For 1 year of a secure backup of all your data (did I mention there’s no limit to how much you save?  I’m up to almost 900GIGs..Pictures, MP3, Documents, etc.) is only $55!  Plus, you can “Try before you buy” for 15 days. 

I’ve been using it for over a year now…and I sleep a lot better.

Website: http://www.carbonite.com

-Dale Meredith