Fake and Phishing emails this one “from” FeDex

While I am upset with FedEx, I am even more upset with FeDex!

Just a reminder for you to not open all email you receive. This is a malware attachment. The real FedEx knows about these. http://www.fedex.com/us/security/prevent-fraud/email.html and http://www.fedex.com/us/update2.html

Instead of delving into the type of scam this is, Phishing, and instead of talking about the malware inside the zip file, I want to tell you to “just say no” and don’t open such emails.

Not so right email header

Not so right email header

Continue reading

Building a PC Part 3 – Software: Windows, 3rd party SW, Anti-Virus and Security software.

In this most recent series I have been going over the parts for building a PC, what I use and why.

In this exciting fun filled episode, I want to go over some of the software we use when building a computer. Let’s start with the most important part, the Operating system. I recommend Windows.

Win10

I know a bunch of you Linux people just started yelling at your screens. Don’t have a tizzy!

SadLinux

I learned on UNIX based systems back in the 80’s and from 2003 to 2006 I promoted, through free training, and on this blog several flavors of Linux. My issue with Linux was and is the “my version is better than your version” attitude while leaving the end user out of the equation. At one point Red Hat had their version of “automatic updates”. That was a good idea. They stopped doing that. Others instead of making a universal way to update and patch quarreled and squabbled, leaving those that just needed an operating system to run their business or home computers, out. Microsoft has one way to update and patch. Good for them. Continue reading

Physical Security on a Budget – Securing Your Home Internet

For updated comments et al visit our other blog at http://www.the22man.com/2016/03/start-your-physical-security-on-a-budget/

This is a no cost solution to increasing your personal security, and we all like that four letter word “FREE”.

I was working on this as a subject not only for TWG, but also for a book that was written by Matt Canovi. The problem is I was on page 3 and just showing you how to log onto your router. That may be alright for a book however it is unacceptable for a blog. I will let you know when I either joint publish in the 2nd edition of Canovi’s book or have this published in depth elsewhere. Continue reading

The actual steps to cleaning malware from your computer

It has been a while since I put out a “technology” article and figure it is way past time to. I have been working on a couple reviews on the Galaxy S-5 phone, the Samsung SM-W750v (Windows phone), on a Jabra headset/Bluetooth, and my Lenovo IdeaPad Yoga. But as for the tech tips and how to’s I just have no excuse for not writing on them.

In this article I want to go over how I cleanup malware, spyware, crapware, worms, viruses, Trojans, rootkits and other infections. Partly because I have had a wave of them come in (customers get infected) and because you probably go new devices for Christmas and or got bored over the Holiday’s and surfed around and got infected. Continue reading

It’s not their fault, really

I have spoken and written about technology for many years now. One of the common themes I try to insist is that it is not always someone you can blames fault.

Very specifically, Worms, Trojans, Viruses and other malicious software is not often intentionally put on your computers or networks by a user or web site. There are these infections, literally living on the world wide web. The only way to “kill” them it to turn the entire internet infrastructure off and reset every device back to hardware level. Continue reading