Web Page Creator

Ok So I was sent to office depot 5 minutes before lunch started. I decided to swing by the burger place and get some lunch before I go in, and just waste an hour and 15 minutes for lunch instead of my regular hour lunch. I went in to Office depot and gathered all the things I needed into a buggy (office supply junk, paper pens toner ink) and walk in circles for a few minutes. While walking in circles and getting followed around by the depot snipers ( not sure they thought I was shop lifting, so i picked up stuff and would misplace it like crazy) I stumbled on the $9 software bin. While rooting around I saw a “buy one get one free” sign. So I decided to dig around and make sure I find something. Well I found a web page design thingy disk. I pretty much knew it would be crap because it’s price and the fact that the makers say nothing about it’s form or style. Like css,html javascript. Nothing just says something about templates.
The product is made by a company named Cosmi, the product name is “WEB PAGE CREATOR”. there is a circle stamp on the front with a symbol that says “#1” and some stuff in tiny freaking print though I can make out the work “productivity” . Well I scanned it with asquared,virscan.org, norton anti vir and found no reason to freak out.
So today I finally install the software. The actual software they are selling is all of about 10 megs of software, the rest, well, the rest is a 2002 version of open office.
The software they created (I think they created or just downloaded from some poor joke’s website) is just a shell script hand full of short cut links to open office items but named differently in the program. Don’t worry, when the open office items open up they do show their names at the top of the program’s window.
Well My True honest opinion, as far as web design goes, you can do everything this software bundle can do, Simply by using netscape navigator 7.2 suite edition. ns 7.2 suite comes with a program called “composer” and well, you can do the whole “what you see is what you get” web design part of using a program just like you can with cosmi’s erm, uh, java sun system’s? open office program.
plus netscape 7.2 s does not come with netzero crapware like this program does..

My call?
Walk past this thing, sure waste of ten bucks.

TruXter Toolbar With Radio And feeds

Phishing For Suckers

 Ok I got junk mail from a scammer, So I decided to share
this with you. I advise that you do not respond to this
trash in any way shape or form. I surely will not. I hope
you see that I am posting this so you can see a type of
phishing scam that comes up all the time. Never ever do
what they ask, this is total crap. If you have ever
fallen for this scam or one of it's kind Please post here.
I really want to know that you exist.




"Hello Dear Friend,

Your name and e-mail address came up in a random draw conducted by
our law firm, (Adetokunbo & Co. Law Chambers.) in Lagos , Nigeria . I
am Barrister Adetokunbo Kayode (Esq), the legal adviser and counsel
to a deceased expatriate contractor,who used to work with
Chevron/Texaco Nigeria Limited here in Nigeria thereafter shall be
referred as my late client. On the 27th of January 2002, my client,
his wife and their three children were involved in Ikeja bomb blast
here in my country. Hence I contacted you.

Please view these websites below to confirm what I am telling you.
http://news.bbc.co.uk/1/hi/world/africa/2718295.stm
http://news.bbc.co.uk/1/hi/world/africa/2698081.stm

I have contacted you to assist me in repatriating the money and
property left behind by my client before they get confiscated or
declared unserviceable where these huge deposits were lodged.
Particularly, where my client deposited US$3.7Million Dollars. I was
issued a notice to provide the next of kin or have the account
confiscated within two weeks. All I require is your honest co-
operations to enable us see this deal through.

You should send to my private email address  adetokunbo44@gmail.com
Your full names: -
Your private phone number/ fax (if any): -
Your age: -
Your occupation: -
Your home address: -

I am particularly interested in securing this money from the bank,
because they have issued a notice instructing us to produce the
beneficiary of this will within two weeks or else the money will be
credited to the government treasury as per law here. It is my utmost
desire to execute the will of our late client in your favor and
therefore, you are required to contact me immediately to start the
process of sending this money to any or your designated official
account, I urge you to contact me immediately for further details
bearing in mind that the bank has given us a date limit.

Regards,
Adetounko Kayode (Esq)."


Oh, I did report this as phishing to my email carrier.

Domain Split Sorrows

Well i got the new domain name, and my current domain name has been looking a bit a.d.d. for a couple years now. Well I decided to make the iworkwithpeople.com all about just work careers and employment. If you know me you have to be wondering ” How the hell are you gonna restrain and prevent yourself from talking tech there?” Well my friends or just that random dude that ran through here and read this article…… I bought a new domain name, iworkwithtech.com :-D tell me that does not fit ?

Ok now comes the issues… I have to split that. i have no idea where to begin with it. I mean I have so much stuff already indexed in the search engines, Like my busiest page on the iworkwithpeople section, is a grand theft auto on linux . I mean if you search in google this exact phrase ” gta on linux” if I am not still right there on top, I am on the first page.. The way I have things set up now you can get to the exact same pages by replacing the word “people” with the word “tech” and vice versa. My main plain is to jjust stop linking to the popular/tech pages through the work site. I am pretty sure that I ran off alot of people looking for a work related site, because when they got there, it was full of tech tips.

You see I fought for a while trying to get that freaking site noticed and well, now that it’s noticed I am redefining it. I know bold/stupid move. I really have to though because those are two totally different sites and topics. I want them to look exactly the same at all times, because I want it known to those who always go to the “people” domain, that I am still the same dude on the tech domain.

I really love talking tech . I really love it when people listen to me and enjoy my help. I hope you see why I had to do this. Now I have to figure out how to make google and yahoo and msn see me without repeated linking and looking like I am gaming the systems.

TruXter

Owner and writer of :

iworkwithtech.com  and iworkwithpeople.com 

New domain for $5.99

I bought a domain name for $5.99 from netfirms.com

My new domain name, get this is iworkwithtech.com

I will be helping you with what ever tech support I can give.

I am also running a tech news and updates section, along with a tech news posting area that will be ran with php and a forum that will also be ready for your statements news help and of course questions.

I will be welcoming anyone that comes in . I hope you all enjoy my work.

Not such a bad find on the domain name, since I already have iworkwithpeople.com

TruXter

Owner and writer of :

iworkwithtech.com and iworkwithpeople.com

How Can I Use A Hosts File To My Advantage?

[tags]ip adress,malware,virus,trojan,security,computer,hack,intrusion,backdoor,safety,privacy,protection,prevention[/tags]

A hosts file is a file located in the ETC folder of almost every operating system (with some exceptions). The hosts file is a file that is scanned at the first accesses of a network. Be it a program that you expect to go to the internet or not. Your computer will first try and resolve the dns with the host. It does this by checking the hosts file.

In your hosts file, you can tell your computer what IP address to assign web addresses. By doing this, you bypass all network look ups on the internet for specific addresses. It is impossible to knock out every single website there is. You can how ever knock out all sites submitted, reported, and confirmed as malware sites.

You can also stop your kid from hitting sites you do not want her/him going to. The way it works is you move to the lowest section in the hosts file and type in the IP address you would like that website to go to. Like this:

127.0.0.1 a_site_you_do_not_want_to_go_to.com

This blocks that site from ever loading on your computer.

If you have a program that goes to “a_site_you_do_not_want_to_go_to.com” by default, the program will not be able to update. This can be used to your advantage if the site that the program is trying to connect to is a virus site, and the program is a virus, trojan or a malware notification type program (like a spider). We call them adware and spyware these days, the program will not be able to contact it’s owner, this hides you from the owner and increases your security. Some malware updates itself by connecting to its owner’s location, unless it is specificly assigned an IP address to connect to. That, of course, would be a mistake on the writer’s part. Much easier to locate that way, and you could actually block that IP address if you took the time.

I use mvps host because he has a much larger list than I do. I just add my stuff to his when i download it and set up my hosts file. If you have a list of bad sites, do what I and a few others do, email it to mvps site. I do suggest that you read everything on the wiki and mvps site before you do anything to change your hosts. Really, if you block yourself from the interenet (god only knows how that could ever happen) you just clear out all IP addresses and domain names in the list and you are back to the way it was.

If you have any questions related to this topic feel free to ask them.

TruXter

Owner and writer of :

iworkwithtech.com and iworkwithpeople.com

How Safe Is Mobile Internet?

From Whistle Blowers:

“A U.S. government office in Quantico, Virginia, has direct, high-speed access to a major wireless carrier’s systems, exposing customers’ voice calls, data packets and physical movements to uncontrolled surveillance, according to a computer security consultant who says he worked for the carrier in late 2003.”

Verizon has a finger pointed at it.

This information I got from Slashdot Review.

Of course, I followed up with a search in Google.

Doesn’t sound good and doesn’t sound like a right to privacy.

The part that gets me the most is the government’s ability to track you. Then again, it has been able to track your cell phone for years. Maybe, this will just get swept under the carpet, forgotten, and/or never mentioned again. I’m assuming we will hear nothing of this again.

TruXter

Owner and writer of :

iworkwithtech.com and iworkwithpeople.com

Re-Evaluation of Dr.Web

After years of not touching Dr.Web, I could not remember, in full, why I did not like it. I could not remember why I did not trust it. It has been at least five years since I tried it and someone I see is trusted by quite a few people recommends it. I gave it a go. Well the first download is 14 MB. Quite tiny and happens in a blink — although the file downloaded was actually just a tool to download the actual program. After the download was complete and the install was nearly finished, it asked for a verification key (I did not have one). So the program allowed me to press a button and have a key automatically inserted. Why? Dunno. The scan seemed pretty smooth; I didn’t see the scanner get hung up on anything. The list of files being scanned was pretty steady. Boots and reboots of the system were smooth and there was no delay or hang time from Dr.Web.

I consider any program that you have to find a program from a second party to remove to be malware. If the program does not allow me to see the size of the actual install until after it is finished installing (I had to navigate to the folder it was contained in), I consider it to be deceptive.

Granted, this is a workplace computer. I am not the first employee to use this computer and formatting it is not an option. I did find traces of Limewire once installed on this machine, so you should have a pretty good idea how beat down this machine is because of misuse. Since this program found nothing and ran smoothly, I decided to break out some of the tried and true programs: Ad-Aware, Spybot, and A-Squared. All three found something, and no, it was not all cookies. Ad-Aware found what it labeled as a w32.novarg.a@mm (aka MY DOOM) file. A-Squared found a few hijackers, and Spybot found, like, 60 things.

Now here comes the issue. I decided I do not need this program to start when I start my computer. Since it never found anything, I was not impressed enough that I could leave it on the workplace computer throughout the trial period. I went to un-install Dr.Web, but it wasn’t happening. The un-install actually tries to install the program again. I went through the whole step of seeing if it would say “before we can install you must un-install; would you like to un-install?” Never happened. Full install right over the current.

So I did a Google search on it. The best information I found was sad and scary, all in one. Delete all registry entries and then go back to the directory of install and delete all signs of Dr.Web. I really do not suggest you do that. I mean, it did not damage this machine. I booted fine afterwards with no errors, but if you are new to ‘regedit,’ stay out. It is much safer that way.

After 14 years of doing this online and nine years on local networks (before the Internet), you would think I learned my lesson. Well, I have learned that sometimes you just have to try stuff and be prepared to put things back together. Good thing I do and can.

Here’s an alternative.

TruXter

Owner and writer of :

iworkwithtech.com  and iworkwithpeople.com 

What to do when infected with spyware/adware

[tags]adaware, adware, asquared, computer, hijacker, hijackthis, hosts, infected, infection, log, maliciouse program, malware, popup, redirect, scanner, spybot search and destroy, spyware, trojan, virus[/tags]

We all have had infestations, pop ups that never go away, something that changes your home page, or something that redirects the site you type to a totally different site. Even worse than all that, when there is a combination of those problems.

Well, I have some good news and some help for you.

Next time, you might want to consider this stuff first before you even go anywhere on the internet.

For starters, I would begin stopping most malware from even connecting to the net from your computer, this step stops your computer from ever going to the sites where malware is created, uploaded, and/or updated. Fix your “hosts” file by going to MVP’s site and reading up on the subject. I actually just scroll down like 20 lines and he has a zipped file with 5 or so items in it. Extract the contents to the desktop, double click the batch file, and in a blink, I am Protected from tons of malware servers. http://www.mvps.org/winhelp2002/hosts.htm

Please read mvps site to get a full understanding and to be on the same page as me. Yes the hosts project started out as a way to block banner ads, but it was later found that you can do much more. PLEASE READ THE MVPS SITE.

Before installation of new “hosts” file, I head to my existing “hosts” file and open it with Notepad to see if there are any changes made to it that are located here “C:WINDOWSsystem32driversetc”

There is a line that should say “127.0.0.1 localhost” which means local host is YOU. If it says anything other than 127.0.0.1, then your machine has been routed to someone else’s server and everything you do and type is being passed through them first. They filter through it and crack what they want. If you have anything different there, please post it here as a comment so I, and others, can help take care of someone like this.

Next, let’s go scan your machine. If you can, install this, “http://www.emsisoft.com/en/software/download/” and install a-squared Free 3.1

Run that program and remove anything and everything it finds. Let the scan finish before you start the next step. If both scanners try to remove the same files, it could cause problems.

Next, go get Spybot-Search and Destroy, you will find it here “http://www.safer-networking.org/en/download/index.htmlspybot – Search & Destroy 1.5.2

Now, go get Ad-Aware “http://www.lavasoftusa.com/single/trialpay.php

Run Ad-Aware after Spybot. The same rules apply.

If your issue persists, HJT that stands for “hijack this” found here “http://www.spywareinfo.com/~merijn/programs.php

You can join their forums “http://www.spywareinfo.com/~merijn/forums.php” and get help from people who spend all day, every day just helping people decipher what HJT finds in it’s logs. They all will tell you what to keep and what to kill. They are an excellent group.

In most cases, you would have prevented this from ever happening if you would have started with MVP’s “hosts” file. That is a very good practice. Also, it would be wise prevention to not install anything and everything you find on the internet. First thing you must always do when you download anything is scan it with as many virus scanners as possible. I use Jotti’s site for the online single file scanner. It scans with like 20 different virus scanners at one time and shows you a real time results area at the bottom of the page. If you watch the scan result, you can see what scanners are worth a darn and what scanners are worth being cup holder….. AVG is garbage.. See for yourself. “http://virusscan.jotti.org/

If anyone has protection tips of the malware kind, drop a note here ..

Good free firewall to prevent this kind of thing:

Sygate firewall:

http://smb.sygate.com/products/spf_standard.htm

Trojan killers:

http://swatit.org/download.html

Trojan Hunter trial version:

http://www.misec.net/

Do this immediately:

Disabling system restore in Win Xp
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001012513122239?Open&src=sec_doc_nam&docid=2001111912274039&nsf=tsgeninfo.nsf&view=docid&dtype=∏=&ver=&osv=&osv_lvl

More Xp resource:

XP resource info:

www.blackviper.com

http://grc.com/dos/xpsummary.htm

http://www.annoyances.org/exec/forum/winxp
If you do not have SpyBot and Adaware, do this:

Spybot:

Download and Read the SpyBot tutorial here:

http://s89223352.onlinehome.us/mirror/spybot/index1.php

Download it, Unzip the program, and immediately check for updates, install the updates and then do the scan.

Let it fix everything marked in red. Reboot but not with restart, shut it down for two full minutes. You�ve got two measely minutes and it�s worth it, and let Spybot run if it indicates.

To add an item to your �Ignore List� click on the little �+� sign next to the item and left click it to highlight it, then right click it and a menu appears, select the function you want.

When you are done reboot again same way. Two full minutes shut sown is best.

Tea Time discussed by designer here:

http://forums.net-integration.net/index.php?showtopic=13433

Also, go to the update page. Notice 3 icons across the top. Between “Search For Updates” and “Download Updates” there is an icon for the download mirror location. After you click on �search for updates,� the one in the middle will change. If it doesn’t say “Spybot.US by Rootboxen.net USA” click on the dropbox arrows and click on Rootboxen, and use only that one. If you got a “checksum error” trying to download –that’s why.

Ad-Aware:

Download AdAware from http://www.lavasoft.de/

check for updates at “webupdate”.

I use these settings (green check)

From main window click “Start” then make sure ” Activate in-depth scan” has a green check next to it.

Put a black dot nest to “Use custom scanning options� and click Customize” next to it, then green check these options:
“Scan within archives” ,”Scan active processes”, “Scan registry”,
“Deep scan registry” ,”Scan my IE Favorites for banned URL”
“Scan my host-files”

At the top of the �STATUS� page notice the Tweak (gear) icon. Click on it.

The first setting is �Scanning Engine.� Click on the little plus sign next to it, and in the drop-down green check “Unload recognized processes during scanning”, and �include basic Ad-Aware settings in log file�. Next click on the �+� next to “Cleaning Engine” and in the drop-down green check “Let windows remove files in use at next reboot” and Delete quarantine objects after restoring�

Click “proceed”, that will save those settings.

Click “Scan”

When the scan finishes, mark everything for removal and delete it. Right-click the window and choose “select all” from the drop down menu, press �next� and then �yes� to the prompt: �remove all these entries�.

However, if you have certain programs running that will give a false indicator of a browser hijack attempt, such as Script Sentry, which places a monitoring function in the registry and looks like a browser hijacker but is not, then you may want to add that to the ignore list because you want to keep it there to do it�s job. To add an item to the ignore list, put the a cursor on the file it reveals and left click it to highlight it, then right click it and a menu appears. Click on �ignore list.�

Shut down, two minute shut down is best, and let Adaware run on reboot if it indicates.
When you are done all that, go into Safe Mode and run Adaware, SpyBot, and Av. Then go to ‘search files and folders’ and search for the file name of the trojan and delete it in Safe Mode. If you are clean there, that’s about it. Re-enable your system restore.

I also use these:

Spyware Blaster

http://www.javacoolsoftware.com/spywareblaster.html

MRU Blaster

http://www.javacoolsoftware.com/mrublaster.html

and Script Sentry.

Run Adaware, SpyBot and your AV in normal mode. Clean? good. Go here:

Jason�s Browser Security Test:

http://www.jasons-toolbox.com/BrowserSecurity/

Gibson tests:

http://www.grc.com/default.htm

I use LeakTest, DCOMbobulator, ShieldUp, and plugnpray.

Love for the tech community.

Social networks and the people within

Ok, I have been on digg since it came out.

I kinda enjoyed it, but it always left an empty feeling.

I really think that type of social networking is very unsocial.

I mean, you really can’t interact with other people. Now, I just go there to help rate my friends and stuff they produce. I truly believe that the ability to argue opinions is how people actually communicate and create group minds that solve issues. If I can’t tell someone how they are screwing up, then I’m not talking to them, and vice versa. I want to know where and how I messed up.

So, I am at that type of place to give a big “how do” to my buds and their work, but I go to lockergnome and to live.pirillo.com to really talk and hear other opinions.

where do you go?

TruXter

Owner and writer of :

iworkwithtech.com and iworkwithpeople.com

Microsoft can’t be buying Yahoo!

Microsoft put in a bid to purchase yahoo, this was all over the news and the internet but not everyone has heard this yet. What does this say for the current state of yahoo stock ? Did this do anything to Apple stock? There was a crash in Apple stock right at the same time as the offer purchase. Did the Microsoft stock rise? Did everyone bail out on yahoo?

Is google really on top of the game like everyone seems to be saying?.. I think not. I do not think they have the banks behind them financing them as Msn or the big Y!  have behind them.

I do not believe that Google is beating Yahoo or Microsoft at anything. I work on mess loads upon mess loads of computers every year. What I see when I boot up these computers and open the browser is always the same thing. Yahoo for the home page and Yahoo toolbar.

I would even go so far as to say that one in every 20 computers I work on in a year, have something else other than just plain old Internet Explorer. I mean, if more computers used Firefox (which everyone is saying is the fastest growing browser) than what I see, I would assume that more people are using the default Firefox start/home page, but they just aren’t. We all know that all start pages have search boxes.

Do I believe Google has a superior search? Well, no. Not really. It’s not like it finds stuff that the other search engines do not find.

Microsoft used to have chat rooms. These chat rooms where mostly split by the city you live in. Each populated city had a capacity of 50 people per chat room. If the chat room exceeded 50 people, an overflow room would be created. Some days there where up to 15 overflow rooms. In each room there where three advertisements with “rotating banners,” Microsoft created this line of code. The rotating banner means that the ads displayed in the ad-space would change to a new advertisement every 3-5 minutes. Most “chatters” would stay in the chat rooms for hours or days, just leaving their computer on and never exiting from the chat room. This must have been huge revenue for Microsoft, but they shut the doors on the free chat rooms and decided to put a fee on them. People where there for the free place to congregate, not because they where addicted. MSN closed the doors on the whole chat room idea simply because they have the money to toss around like that. The whole idea of being free and meeting local people in a moderated area was dead.

Yahoo, on the other hand, still has chat rooms divided by location, but not in such detail that MSN had. Yahoo divides by state. Yahoo also mandates you use their messenger because the ads are integrated in the messenger. My opinion, this is a bad idea. You can no longer just join the chat room from a link you find on the internet and install a small flash program then be on your way. You now have to download a massive install program with tons of hidden crap that you can opt out of during the install, if you read closely. This, of course, is another nail in the coffin for yahoo chat. People want their chats simple.

If Google made a city chat that was moderated by humans on an I.R.C. service like Wylderide, there would stand a great chance of zero tolerance of porn bots, additionally age verification could be worked out. Google has nothing that keeps people staring at their stuff, just glances. If Google would acquire Chatcity or revive Excite chat, hell even create something new and better, I would have no doubt in Google being on top.

Next time you are in a computer repair shop, ask the guy behind the counter “What is the most common start page and toolbar on computers you fix?” you will have your answer. Oddly enough, I find myself saying what everyone else says “Google” but truthfully it is not the most common. Not by far.

If they change their home page at all from Msn, it’s Yahoo…………………..