<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Field Reports &#8211; Startupware: Managing Startups</title>
	<atom:link href="https://www.startupware.com/category/field-reports/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.startupware.com</link>
	<description>Autorunning Software &#38; Running a Software Business</description>
	<lastBuildDate>Fri, 10 Oct 2025 15:10:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Windows 10 Ends Today: October 14th, 2025</title>
		<link>https://www.startupware.com/field-reports/windows-10-ends-today-october-14th-2025/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Tue, 14 Oct 2025 11:00:00 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<category><![CDATA[end of patching]]></category>
		<category><![CDATA[end of security]]></category>
		<category><![CDATA[ESU]]></category>
		<category><![CDATA[Extended Security Updats]]></category>
		<category><![CDATA[free]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=2719</guid>

					<description><![CDATA[<p>Windows 10 Security patching ends today, when the last set of scheduled patches arrives sometime in the afternoon. Really? No. Windows 10 will still receive updates to Microsoft software installed within, mostly Office, but other software, probably Edge, will get updates, for now. And &#8216;Extended Software Updates&#8217; are available until Patch Tuesday of October 2026. &#8230; <a href="https://www.startupware.com/field-reports/windows-10-ends-today-october-14th-2025/" class="more-link">Continue reading <span class="screen-reader-text">Windows 10 Ends Today: October 14th, 2025</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/windows-10-ends-today-october-14th-2025/">Windows 10 Ends Today: October 14th, 2025</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="800" height="566" src="https://www.startupware.com/wp-content/uploads/2025/06/Old-and-new-windows-1-5-8c.png" alt="" class="wp-image-2674" srcset="https://www.startupware.com/wp-content/uploads/2025/06/Old-and-new-windows-1-5-8c.png 800w, https://www.startupware.com/wp-content/uploads/2025/06/Old-and-new-windows-1-5-8c-300x212.png 300w, https://www.startupware.com/wp-content/uploads/2025/06/Old-and-new-windows-1-5-8c-768x543.png 768w" sizes="(max-width: 800px) 100vw, 800px" /></figure>



<p>Windows 10 Security patching ends today, when the last set of scheduled patches arrives sometime in the afternoon. Really? No. Windows 10 will still receive updates to Microsoft software installed within, mostly Office, but other software, probably Edge, will get updates, for now. And &#8216;Extended Software Updates&#8217; are available until Patch Tuesday of October 2026. See how to sign up for ESU, and if it&#8217;s even worthwhile, in the free <a href="https://startupware.com/PC410_Newsletters/2025-10_PC_Updater_News-Old_and_New_Windows.pdf" target="_blank" rel="noopener">October issue of PC Updater News</a>, or <a href="https://startupware.com/news" target="_blank" rel="noopener">see back issues and signup</a> to get the news every month.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/windows-10-ends-today-october-14th-2025/">Windows 10 Ends Today: October 14th, 2025</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/windows-10-ends-today-october-14th-2025/">Windows 10 Ends Today: October 14th, 2025</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Equifax&#8217;s Technology: What Happened?</title>
		<link>https://www.startupware.com/field-reports/equifax-technology-what-happened/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Wed, 25 Oct 2017 12:27:27 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1789</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/equifax-technology-what-happened/">Equifax&#8217;s Technology: What Happened?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p><center><img decoding="async" src="https://www.startupware.com/wp-content/uploads/2017/10/x9fg74h7.bmp" alt="" width="500" height="333" size-full wp-image-1788" /></center></p>
<p><em>by Jerry Stern, PC410.com</em></p>
<p>I’ve been asked many times “Can I be hacked?” The answer is “generally not without your help.” Hackers of low-value targets (any small business) are sending you links to malware and hoping you’ll click into something that installs software that will search and monitor your computer and online activity for email account logins and credit card numbers. That’s pretty-well blocked by good ‘antivirus’ software, unless you click to let it in. Hack attempts for high-value targets, like global companies and government angencies, are custom-tailored hack attempts, and they&#8217;re looking for network access to a lot more than an email account or credit card. Both of these situations are hack attempts at the level of a worker&#8217;s computer.</p>
<p>That’s not what happened at Equifax. They had unpatched software (“Apache Struts”) on a web server, open and available to the outside world through their set of web sites; Apache Struts was widely-installed, with a patch available on March 7th, but not installed at Equifax. Once the patch was announced by Apache, the hackers knew where the problem was on many servers, and some time later, found that issue at Equifax, and used it to gain access to Equifax servers.</p>
<p>Web sites are scanned by hackers continuously for known security gaps, and that’s what happened to Equifax. They didn’t monitor, patch, or detect the problem, the invasion, or the downloads in a way that any other company in financial services would have. If we were their customers, we would leave, and they would be gone. That’s not the case here. They sell their services to banks and other credit monitoring companies, not us. We are a commodity, not a client.</p>
<p>Put simply, Equifax profits from the breach. They are.offering free credit monitoring to anyone impacted by the breach. That credit monitoring won&#8217;t be free forever, although their sign-up page is not currently asking for any card numbers. BoingBoing.net estimates that if 1% of the free users continue their monitoring next year, Equifax will make an extra $200 million per year. Equifax will also receive millions from other credit monitoring companies that pay Equifax for credit reports, and from the Federal government, who pays Equifax as the exclusive provider of identification confirmation services. Here’s their analysis:<br />
<a href="http://boingboing.net/2017/10/05/failing-up-and-up.html" rel="noopener" target="_blank">http://boingboing.net/2017/10/05/failing-up-and-up.html</a></p>
<p><strong>What To Do</strong></p>
<p><a href="http://www.barehamcpa.com/news/equifax-data-breach-historic-data-disaster/" rel="noopener" target="_blank">Andrew Bareham</a> has listed the financial steps above. Remember that the stolen data doesn’t expire. Prevention is key; cleaning up after identity theft takes years. Freezes are less hassle than cleaning up later.</p>
<p>For better protection against hacks that happen on your own systems, there’s a one-page document from KnowBe4.com that summarizes what you need to know about social engineering. That’s the set of tricks used to convince you to click a fraudulent message.<br />
<a href="http://cdn2.hubspot.net/hubfs/241394/Knowbe4-May2015-PDF/SocialEngineeringRedFlags.pdf" rel="noopener" target="_blank">http://cdn2.hubspot.net/hubfs/241394/Knowbe4-May2015-PDF/SocialEngineeringRedFlags.pdf</a></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/equifax-technology-what-happened/">Equifax&#8217;s Technology: What Happened?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/equifax-technology-what-happened/">Equifax&#8217;s Technology: What Happened?</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AntiVirus Software EPIC FAIL by Design</title>
		<link>https://www.startupware.com/field-reports/antivirus-software-epic-fail/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Mon, 08 Aug 2016 13:53:37 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1523</guid>

					<description><![CDATA[<p>Got an invoice in the mail this morning. A company I never heard of, with this message: Here is your bill. Waiting for your answer Risus Incorporated Lev Mckenzie (896) 756-0588 The attachment is named &#8220;Risus Incorporated.bill42zo.06.p24me38i.rtf&#8221;. So what&#8217;s wrong with that? I have no business relationship with any of those names. The company name &#8230; <a href="https://www.startupware.com/field-reports/antivirus-software-epic-fail/" class="more-link">Continue reading <span class="screen-reader-text">AntiVirus Software EPIC FAIL by Design</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/antivirus-software-epic-fail/">AntiVirus Software EPIC FAIL by Design</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p>Got an invoice in the mail this morning. A company I never heard of, with this message:</p>
<pre>Here is your bill.

Waiting for your answer

Risus Incorporated
Lev Mckenzie
(896) 756-0588</pre>
<p>The attachment is named &#8220;Risus Incorporated.bill42zo.06.p24me38i.rtf&#8221;.</p>
<p>So what&#8217;s wrong with that?</p>
<ul>
<li>I have no business relationship with any of those names.</li>
<li>The company name doesn&#8217;t match the email domain.</li>
<li>896 is a fake area code.</li>
<li>That last name is odd&#8211;that &#8216;k&#8217; in &#8216;Mckenzie&#8217; should be capitalized. Who misspells their own name?</li>
<li>The web site matching the email address that appears to have sent the email is the &#8220;Arab Real Estate Company&#8221;, with what appears to be a legit web site in Arabic.</li>
<li>The &#8220;invoice&#8221; is a RTF file, also known as a &#8220;Rich Text File&#8221;; that&#8217;s what we programmers used to use to create help files, so it is very capable of holding scripts and program code, but it&#8217;s a horrible choice for sending an actual invoice.</li>
</ul>
<p><img decoding="async" class="alignleft size-full wp-image-1528" src="//www.startupware.com/wp-content/uploads/2016/08/Cartoon_Piranha_Fish_clip_art_medium.png" alt="Phish" width="300" height="149" />So it&#8217;s an obvious fake: a phish, an attempt to get me to open something I shouldn&#8217;t. OK, with caution, I looked inside. (Don&#8217;t do what I do. I&#8217;m a professional, and I don&#8217;t just double-click to see if anything explodes.) Inside there are multiple pages of this:</p>
<p>&nbsp;</p>
<pre>valvular wishbone sallymen poop gyn underdepth fearfulness feistiest vapulate gigsmen hemagglutinate bridoon diactinism shiplet subintegumental marliest vagabonding proamateur atamasco supracargo teleplay spherify rhytidome unheart verifiably neobotany horizontalism presbyterianism fatigues reconsign ower incontrollable gangliglions externa allopathically creep witches cicatrices scrappiest hardfistedness harakiri subcortically privily sappily intendence nearshore hypereutectoid chylidrosis metosteal sarcasm's dropsied earthing devour patashte stereoelectric brattie counterprove adventure resprout hyperparasitize humanised unevil pinyin prerighteousness pidgized shellful recompute ultrafiltration masslessness spig expectance voidance multipartisan fin mandrin mezair wastes audiotapes contrariness nonrefractional abnormalise wrihte morphonemics splenetive utilize goniostat chondrocranium</pre>
<p>Well, that&#8217;s just a paste of words, mostly from a scientific dictionary, in random order, probably chosen because scientific terms are basically international, and would not trigger a &#8220;Wrong language&#8221; alert in an automated scan.</p>
<p>After a lot of that, I can see function calls to Windows libraries. In other words, yes, it&#8217;s a program or a script. Beyond that, I leave it to the malware labs, and yes, I sent a copy to one of the top providers, and they will share it with the other anti-malware companies.</p>
<h3>FAIL</h3>
<p>And here&#8217;s the issue. The computer that this arrived on has in excess of 12 layers of security filtering, between software, settings, and plugins that block evil activity, and is 100% up-to-date, confirmed with three different products. The message wasn&#8217;t flagged by Clam Antivirus on the mail server. And on arrival, I saved the attachment, and manually scanned it with three anti-virus and anti-malware products.</p>
<p>There were NO ALERTS AT ALL. Why? Because these anti-malware products are based on a spell checker. They do a mathematical calculation of the contents of a known-evil sample, and come up with a long number that identifies exactly that file, and they save that and send it out to all the computers running that AV product. <strong>Takes three days from submission to prevention.</strong> But this sample is full of dictionary words. Well, if the malware authors are generating new random pages of word scrambles in each attached RTF file, not one of their &#8220;invoices&#8221; will ever be detected. <strong>EPIC FAIL.</strong> Even if they don&#8217;t send you a dictionary, there&#8217;s a three-day lag time, and until then, the malware is undetectable.</p>
<h3>The Fix</h3>
<ul>
<li>Educate your users.</li>
<li>Don&#8217;t open suspicious attachments.</li>
<li>Keep your patches up-to-date. Automate it, so that published security holes used by the bad guys aren&#8217;t available on your systems.</li>
<li>Use ONLY non-Administrator accounts on your computers.</li>
<li>Uninstall software that connects to the internet when it&#8217;s no longer needed, to reduce attack surface and reduce needed patches.</li>
</ul>
<p>So there&#8217;s no infection here. I didn&#8217;t open the invoice. I don&#8217;t owe money to a real estate company in Saudi Arabia. Deleted. And you don&#8217;t need software to tell you when an email is just plain impossibly wrong.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/antivirus-software-epic-fail/">AntiVirus Software EPIC FAIL by Design</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/antivirus-software-epic-fail/">AntiVirus Software EPIC FAIL by Design</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Windows 10 Upgraded? Check Your Backup Software!</title>
		<link>https://www.startupware.com/field-reports/windows-10-upgraded-check-backup-software/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Sat, 30 Jul 2016 13:29:14 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1515</guid>

					<description><![CDATA[<p>The free upgrades to Windows 10 ended this morning, around 6am Eastern, or midnight at the International Date Line. What to do now? Well, hold on tight for the &#8216;Anniversary Update&#8217;, coming next week. And you can tweak Windows 10 to skip showing ads; look for &#8216;Windows ppotlight&#8217; in Settings, Personalization, Lock Screen, and choose &#8230; <a href="https://www.startupware.com/field-reports/windows-10-upgraded-check-backup-software/" class="more-link">Continue reading <span class="screen-reader-text">Windows 10 Upgraded? Check Your Backup Software!</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/windows-10-upgraded-check-backup-software/">Windows 10 Upgraded? Check Your Backup Software!</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" src="//www.startupware.com/wp-content/uploads/2015/07/Win10Downloading-small.png" alt="Windows 10 Download Status" width="611" height="397" class="size-full wp-image-1337" srcset="https://www.startupware.com/wp-content/uploads/2015/07/Win10Downloading-small.png 611w, https://www.startupware.com/wp-content/uploads/2015/07/Win10Downloading-small-300x195.png 300w" sizes="auto, (max-width: 611px) 100vw, 611px" /> </p>
<p>The free upgrades to Windows 10 ended this morning, around 6am Eastern, or midnight at the International Date Line. What to do now? Well, hold on tight for the &#8216;Anniversary Update&#8217;, coming next week. And you can tweak Windows 10 to skip showing ads; look for &#8216;Windows ppotlight&#8217; in Settings, Personalization, Lock Screen, and choose a picture instead. And turn off &#8220;Get fun facts, tips, tricks and more on your lock screen.&#8221; At best, it&#8217;s clutter on a locked computer&#8217;s screen, at worst, well we&#8217;ll see how that develops.</p>
<p><strong>Backups Still Working?</strong></p>
<p>More important than the inevitable new-software tweaks, however, are to check your backup software. That means start the program, and see if it works; some older versions of backup software are being detected as dangerous in version 10. Update to the current version as-needed. </p>
<p>Now go and look at the actual backups, and restore a few files. Does it still work as it should? </p>
<p><img loading="lazy" decoding="async" src="//www.startupware.com/wp-content/uploads/2016/07/Clocktray.jpg" alt="Notifications icon in Windows 10" width="140" height="41" class="alignright size-full wp-image-1516" />Operating system updates are a big deal. Windows deleted some programs and apps during the upgrade. Some of them, it warned you, well, after the fact, that it had removed them, by a chirp and a notification in the bottom-right of the screen. You can read those again&#8211;click the notifications icon, immediately left of the clock. </p>
<p><strong>Missing Stuff?</strong></p>
<p>Most of the deletions that I&#8217;ve heard about or seen have been software tools used by repair techs and consultants like myself. Anyone using those won&#8217;t have a problem reinstalling the latest version. But XP Mode is gone! That&#8217;s not news, XP Mode wasn&#8217;t available in Windows 8 or 8.1, either, but it was a separate downloadable add-on for Windows 7, from Microsoft, and there&#8217;s no notice that it was removed. </p>
<p>XP Mode was basically Windows XP in a box. It was handy for running an old program that isn&#8217;t compatible with Windows 7. If you lost XP Mode, switch to Oracle VirtualBox instead. It&#8217;s free, faster, and runs in Windows 10. You have to provide your own operating system to load inside VirtualBox; there are plenty of online guides on how to do that.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/windows-10-upgraded-check-backup-software/">Windows 10 Upgraded? Check Your Backup Software!</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/windows-10-upgraded-check-backup-software/">Windows 10 Upgraded? Check Your Backup Software!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>So Who are these Black Swans, Anyway?</title>
		<link>https://www.startupware.com/field-reports/black-swans/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Sat, 09 Jan 2016 21:38:59 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<category><![CDATA[black swan]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1460</guid>

					<description><![CDATA[<p>You plan for what you know about. For computer disaster preparation, you plan for hard drive failures, lightning strikes, burglaries. Floods in wet areas, exploding sprinkler heads in cold areas. Tornadoes in Kansas. But there's no way to know what your black swan event may be; if you knew what it was, it would not be a black swan. </p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/black-swans/">So Who are these Black Swans, Anyway?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-1461" src="//www.startupware.com/wp-content/uploads/2016/01/11741-a-black-swan-500.jpg" alt="Black Swans" width="295" height="500" srcset="https://www.startupware.com/wp-content/uploads/2016/01/11741-a-black-swan-500.jpg 295w, https://www.startupware.com/wp-content/uploads/2016/01/11741-a-black-swan-500-177x300.jpg 177w" sizes="auto, (max-width: 295px) 100vw, 295px" /><br />
Black Swans are like Monty Python&#8217;s Spanish Inquisition: NO ONE expects it. You&#8217;re watching birds on a lake. There are ducks. Geese. Maybe a pink heron. Based on where you are, you can guess what birds could show up. Some are rare, most aren&#8217;t. But no one expects the Black Swan. So in military tactics analysis and business continuity planning, it&#8217;s the attack or the failure that statistically wasn&#8217;t even calculated; it just wasn&#8217;t even considered.</p>
<p>You can&#8217;t plan for a Black Swan. For computer disaster preparation, you plan for hard drive failures, lightning strikes, burglaries. Floods in wet areas, exploding sprinkler heads in cold areas. Tornadoes in Kansas. But there&#8217;s no expecting a black swan event; if you knew what it was, it would not be a black swan event. The overall problem is this: You know what you know. You have no clue what you don&#8217;t.</p>
<p>Superstorm Sandy? Yes, to some extent. Hurricane planning covered that for all but the areas hit hardest&#8211;it was close enough that for all but the worst-hit areas, a hurricane plan covered it.</p>
<p>Snowmageddon I and II ? Well, central Maryland clearly didn&#8217;t plan for over 7 feet of snow during serial blizzards. Snow-induced roof collapses aren&#8217;t typical around here. No, that&#8217;s <em>weren&#8217;t</em> typical. We&#8217;ve had <a href="//www.startupware.com/field-reports/snowmageddon/">practice</a> now, might be ready next time.<br />
<img loading="lazy" decoding="async" src="//www.startupware.com/wp-content/uploads/2014/09/snowplow-CPC4101.png" alt="Snowmageddon I" width="500" height="321" class="aligncenter size-full wp-image-1229" srcset="https://www.startupware.com/wp-content/uploads/2014/09/snowplow-CPC4101.png 500w, https://www.startupware.com/wp-content/uploads/2014/09/snowplow-CPC4101-300x192.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /><br />
So how do you plan for a generic group of natural or man-made disasters that you can&#8217;t plan for? You have to make a few assumptions:</p>
<ul>
<li>Management and staff of the business will survive, mostly, but transportation and communication may not allow you to evaluate that.</li>
<li>The local business environment for the business will be viable after the event, at some point.</li>
<li>Suppliers and service providers will be up and running, if remote enough.</li>
</ul>
<p>With these assumptions, which by the very nature of black swans, may be completely wrong, we could have some starting points:</p>
<ul>
<li>Your staff should know to call in as &#8220;can&#8217;t make it in&#8221; even if it&#8217;s obvious that &#8220;there&#8217;s no way anybody could ever make it in. Period.&#8221; and they should know in advance who to call at home to check in, and who is the backup person to call at home. Or better yet, the out-of-state contact person collecting and relaying messages.</li>
<li>If the business location still exists, and still has power and communications, planning in advance for teleworking would have been a good idea, if you had planned for the black swan of all mothers of blizzards to park on top of you. In good times, telework is an employment perk. In bad times, it&#8217;s business survival.</li>
<li>If you had set up telephone forwarding options in advance, that can be turned on remotely, you would be less miserable now. If your plans were flexible enough to work when the cell towers have no power or are overwhelmed with traffic, even better.</li>
<li>Computer data backups that can be accessed remotely are ideal. Some cloud systems can do that, others can&#8217;t. But the black birds on your roof won&#8217;t let you go set it up right now. (It&#8217;s crows this time, maybe a vulture&#8230;) Plan ahead.</li>
</ul>
<p>Computer data backups that are in your office, if said office still exists, have all the hypothetical power of Schrödinger&#8217;s Cat. They may (or may not) be there, or be wet/frozen/fried/zapped, or liquified. They might wait for you. Might currently be migrating across the ocean on a garbage island floating away from the Fukushima Daiichi Nuclear Power Plant, along with a flock of blackened sea gulls. Cloud backups would be a better choice, if they&#8217;re really, really &#8216;cloud&#8217; and set up in advance.</p>
<p>So let&#8217;s pause and explain what a &#8216;cloud&#8217; is. In scientific terms, a cloud is a geographically-redundant and geographically-distributed set of computer servers for some combination of either storage or computation. &#8220;A server in Cleveland&#8221; is not &#8220;the cloud.&#8221; A SET of backup servers in at least two locations, with automatic fail-over and duplication, is minimally a cloud. The internet is not the cloud any more than the moon is the solar system. There are many moons in the solar system, but the parts are not individually the sum. So if you hear &#8216;cloud&#8217;, ask &#8216;how many continents are the servers on?&#8217; You will likely hear a reply of either zero content, like &#8220;it&#8217;s all up there somewhere&#8221;, or &#8220;the data is stored in our own data centers based in these three cities, and they&#8217;re in different time zones.&#8221; If that scale is appropriate for the scale of your operations, great. If not, get a real cloud service provider.</p>
<p>So can you plan for the bird that doesn&#8217;t exist? We might hope for some other bird, maybe the Bluebird of Happiness, instead, but dealing with good things doesn&#8217;t require dark thoughts and redundant data storage. Black Swans can be planned for, by being ready for all the little disasters we understand, and guessing they&#8217;ll stack up someday. The really big black swan? Well, we won&#8217;t ever really know about that one until it arrives.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/black-swans/">So Who are these Black Swans, Anyway?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/black-swans/">So Who are these Black Swans, Anyway?</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phone Call from Microsoft India. Oops. NOT!</title>
		<link>https://www.startupware.com/field-reports/phone-call-from-microsoft-india-no-i-mean-microsoft-oops/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Mon, 06 Oct 2014 21:49:12 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<category><![CDATA[#malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[viruses]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1243</guid>

					<description><![CDATA[<p>Apparently international phone calls now cost nothing. And labor is effectively free, too.<br />
So when Microsoft called... Well, maybe when I got the call from India that said it was from Microsoft, telling me about all the viruses in my computer, I answered the call. And wasted his time. When they call you, hang up. Don't try this stuff at home.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/phone-call-from-microsoft-india-no-i-mean-microsoft-oops/">Phone Call from Microsoft India. Oops. NOT!</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p>Apparently international phone calls now cost nothing. And labor is effectively free, too.<br />
So when Microsoft called&#8230; Well, maybe when I got the call from India that said it was from Microsoft, telling me about all the viruses in my computer, I answered the call. And wasted his time. When they call you, hang up. Don&#8217;t try this stuff at home.</p>
<p><iframe loading="lazy" title="Fake Cleanup Phone Call, from Microsoft...NOT." width="604" height="453" src="https://www.youtube.com/embed/TVJ0S55lPOk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/phone-call-from-microsoft-india-no-i-mean-microsoft-oops/">Phone Call from Microsoft India. Oops. NOT!</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/phone-call-from-microsoft-india-no-i-mean-microsoft-oops/">Phone Call from Microsoft India. Oops. NOT!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phony Phone Calls, Fake Tech Support</title>
		<link>https://www.startupware.com/field-reports/fake-tech-support/</link>
		
		<dc:creator><![CDATA[Mike Drisgill]]></dc:creator>
		<pubDate>Wed, 27 Aug 2014 17:04:33 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1219</guid>

					<description><![CDATA[<p>Several international fake tech support companies have recently been ordered to pay more than $5.1 million for their acts against unaware computer users. The charges against these fake tech support companies were invoked after they impersonated major companies such as Dell, Microsoft, McAfee, and Norton. The operations were mostly based in India and targeted countries &#8230; <a href="https://www.startupware.com/field-reports/fake-tech-support/" class="more-link">Continue reading <span class="screen-reader-text">Phony Phone Calls, Fake Tech Support</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/fake-tech-support/">Phony Phone Calls, Fake Tech Support</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p>Several international fake tech support companies have recently been ordered to pay more than $5.1 million for their acts against unaware computer users. The charges against these fake tech support companies were invoked after they impersonated major companies such as Dell, Microsoft, McAfee, and Norton. The operations were mostly based in India and targeted countries with English-speaking consumers, tricking them into believing that their computers were teeming with malware. The fake tech support companies, impersonating well-known companies, charged consumers hundreds of dollars to remotely access and “fix” their machines.</p>
<p>The fake tech support companies currently facing Federal Trade Commission charges are:</p>
<p>Pecon Software Ltd. Et al.</p>
<p>Marczak et al.</p>
<p>PCCare247 Inc. et al.</p>
<p>Finmaestros, LLC et al.</p>
<p>Lakshmi Infosoul Services Pvt. Ltd. Et al.</p>
<p>Zeal IT Solutions Pvt. Ltd. Et al.</p>
<p>If you receive a phone call about malware on your device, don&#8217;t be fooled.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/fake-tech-support/">Phony Phone Calls, Fake Tech Support</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/fake-tech-support/">Phony Phone Calls, Fake Tech Support</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Says Malware is in my Computer. Which One?</title>
		<link>https://www.startupware.com/field-reports/microsoft-says-malware-computer-one/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Thu, 07 Aug 2014 22:01:05 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1215</guid>

					<description><![CDATA[<p>I wonder just how big the call center is that’s calling every phone number in the USA and saying these words…<br />
“Hello. My name is Mike”<br />
(Sounded more like his name was anything but Mike, actually.)<br />
“I am calling from the Microsoft. We have for last fours weeks now see malware in your computer.”</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/microsoft-says-malware-computer-one/">Microsoft Says Malware is in my Computer. Which One?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p>I wonder just how big the call center is that&#8217;s calling every phone number in the USA and saying these words&#8230;</p>
<p>&#8220;Hello. My name is Mike&#8221;<br />
(Sounded more like his name was anything but Mike, actually.)<br />
&#8220;I am calling from the Microsoft. We have for last fours weeks now see malware in your computer.&#8221;<br />
Me: Hello, Mike!<br />
&#8220;Hello?&#8221;<br />
Me: Well, that&#8217;s OK. My computers get messed up a lot. Kids.<br />
&#8220;Well, yes, we now see malwares in your computer, and we can fix&#8230;&#8221;<br />
Me: Which one?<br />
&#8220;What?&#8221;<br />
Me: Which computer is it in? I have eleven.<br />
&#8220;How many computer you have?&#8221;<br />
Me: Eleven. All the kids have at least one, and a school notebook. Tell me the name of the sick one, or the user name, and I&#8217;ll let you fix it.<br />
(long silence. quiet hangup, really)</p>
<p>Remember, fraud implies trust. Your trust. When in doubt, ask lots of basic questions. Of course, &#8220;Mike&#8221; is no more of a Microsoft employee, contractor, or affiliate than any other con artist. The numbers were in his favor that I would have a Windows-based computer. When you get the call, or the new version when this one stops paying off, just ask nice dumb questions, and it will become very clear, very fast, than the caller isn&#8217;t what he claims. Then either hang up, or explain to Mike that there are better phone bank jobs in answering tech support calls than in dialing out for fake malware cleanups.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/microsoft-says-malware-computer-one/">Microsoft Says Malware is in my Computer. Which One?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/microsoft-says-malware-computer-one/">Microsoft Says Malware is in my Computer. Which One?</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nigerian Letter? No, it&#8217;s a Hopeless Dream!</title>
		<link>https://www.startupware.com/field-reports/nigerian-letter-united-nations/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Wed, 16 Jul 2014 14:41:55 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1206</guid>

					<description><![CDATA[<p>Here&#8217;s the latest twist on the now-classic Nigerian Letter. The names in this letter are real people who really do hold jobs in the United Nations, but don&#8217;t blame either of them; they didn&#8217;t send this letter&#8211;it arrived today from an email service in Italy! (Ms. Lapointe is Canadian.) And yes, the letter does admit &#8230; <a href="https://www.startupware.com/field-reports/nigerian-letter-united-nations/" class="more-link">Continue reading <span class="screen-reader-text">Nigerian Letter? No, it&#8217;s a Hopeless Dream!</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/nigerian-letter-united-nations/">Nigerian Letter? No, it&#8217;s a Hopeless Dream!</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here&#8217;s the latest twist on the now-classic Nigerian Letter. The names in this letter are real people who really do hold jobs in the United Nations, but don&#8217;t blame either of them; they didn&#8217;t send this letter&#8211;it arrived today from an email service in Italy! (Ms. Lapointe is Canadian.) And yes, the letter does admit that it&#8217;s all a Hopeless Dream. (1st paragraph, below)</p>
<p>For those who don&#8217;t know&#8211;it&#8217;s a scam. They want fees to send inheritance or winnings, or want you to cash a counterfeit check for them. More information is available at the Internet Crime Complaint Center, here:<br />
<a href="http://www.ic3.gov/crimeschemes.aspx" target="_blank" rel="noopener">http://www.ic3.gov/crimeschemes.aspx</a><br />
(Scroll down to the section &#8220;Nigerian Letter or &#8216;419&#8217;&#8221;)</p>
<blockquote><p>
From: Ms. Carman L. Lapointe.<br />
UNITED NATIONS OFFICE OF INTERNATIONAL OVERSIGHT SERVICES<br />
Internal Audit,Monitoring,Consulting And Investigations Division.</p>
<p>My name is Ms. Carman L. Lapointe, from the United Nations. It is a distinct pleasure to write you again and as you are well aware many foreigners have invested thousands of United States Dollars into Nigeria transactions in Hopeless Dreams to have none of them become a reality.</p>
<p>Right now, as directed by our secretary general Mr.Ban Ki-Moon, We have agreed with the Nigeria Government that US$100,000.00 (One Hundred Thousand United States Dollars Only) would be paid to you through the Western Union Money Transfer Via special arrangement as first installment.</p>
<p>This is to enable you have enough funds to pay for the Tax Clearance and bank charges before you will receive the balance of US$4.1M (Four Million One Hundred Thousand United States Dollars Only). Please take note that you will pay US$185 only, being Notarization fee and this is the only financial obligation that you will undertake to receive the US$100,000.00 (One Hundred Thousand United States Dollars Only) through the Western Union Money Transfer.</p>
<p>Lastly,i will like you to reconfirm your information to me such as your full name, address and telephone number so that I will proceed with your Western Union Money Transfer within the next 24 hrs and the transaction information will be released to you.</p>
<p>I await your response for further proceedings.</p>
<p>Sincerely yours,</p>
<p>Ms. Carman L. Lapointe<br />
{Under-Secretary-General}<br />
United Nations
</p></blockquote>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/nigerian-letter-united-nations/">Nigerian Letter? No, it&#8217;s a Hopeless Dream!</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/nigerian-letter-united-nations/">Nigerian Letter? No, it&#8217;s a Hopeless Dream!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Careful again: FedEx Doesn&#8217;t Leave Your Package at the Post Office</title>
		<link>https://www.startupware.com/field-reports/careful-again-fedex-doesnt-leave-your-package-at-the-uspse/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Tue, 03 Sep 2013 13:26:54 +0000</pubDate>
				<category><![CDATA[Field Reports]]></category>
		<category><![CDATA[#FedEx]]></category>
		<category><![CDATA[#malware]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1137</guid>

					<description><![CDATA[<p>Here&#8217;s another sample of what&#8217;s not safe to open. Again, the clues are clear, if you&#8217;re careful before you click: There are punctuation and grammar errors in the message. The link that you&#8217;ll see when floating the mouse over that &#8216;Print Label&#8217; link doesn&#8217;t match the &#8216;from&#8217; domain, and isn&#8217;t Fedex.com. European date format used &#8230; <a href="https://www.startupware.com/field-reports/careful-again-fedex-doesnt-leave-your-package-at-the-uspse/" class="more-link">Continue reading <span class="screen-reader-text">Careful again: FedEx Doesn&#8217;t Leave Your Package at the Post Office</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/careful-again-fedex-doesnt-leave-your-package-at-the-uspse/">Careful again: FedEx Doesn&#8217;t Leave Your Package at the Post Office</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here&#8217;s another sample of what&#8217;s not safe to open.<br />
Again, the clues are clear, if you&#8217;re careful before you click:<br />
<img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1139" src="//www.startupware.com/wp-content/uploads/2013/09/Fake-Fedex.png" alt="Fake FedEx notice" width="524" height="382" srcset="https://www.startupware.com/wp-content/uploads/2013/09/Fake-Fedex.png 524w, https://www.startupware.com/wp-content/uploads/2013/09/Fake-Fedex-300x218.png 300w" sizes="auto, (max-width: 524px) 100vw, 524px" /></p>
<ul>
<li>There are punctuation and grammar errors in the message.</li>
<li>The link that you&#8217;ll see when floating the mouse over that &#8216;Print Label&#8217; link doesn&#8217;t match the &#8216;from&#8217; domain, and isn&#8217;t Fedex.com.</li>
<li>European date format used by a US-based company.</li>
<li>The logo is a bad jagged paste, and is missing the circle-R symbol for &#8216;registered trademark&#8217;.</li>
<li>FedEx has no pickup service at their competitor, the &#8220;nearest&#8221; US Post Office.</li>
</ul>
<p><span id="more-1137"></span></p>
<p>Now, that&#8217;s already enough information to make me delete the email, but I&#8217;ll look a little deeper:</p>
<p>I downloaded the &#8220;label&#8221; to look&#8211;it was &#8220;Shipping_Label_US_Westminster.zip&#8221; and it held one file, &#8220;Shipping_Label_US_Westminster.exe&#8221;.</p>
<p>The antivirus I&#8217;m running didn&#8217;t object to either file; it probably can&#8217;t detect today&#8217;s variation yet.</p>
<p>I looked inside that file with an extraction program, and found a .rsrc folder, and files .text, .rdata, .data. Inside the folder there were two .ico files, basically desktop icons.</p>
<p>That&#8217;s enough to tell me that it appears to be a script to install software. It&#8217;s clearly not a label&#8211;that would be a PDF or a JPG image.</p>
<p>IMO, the most-likely payload would be a rogue/fake security program, either scare-ware or blackmail-ware. The message itself isn&#8217;t infectious, just don&#8217;t click that link.</p>
<p><a href="https://sciencetranslations.com" target="_blank" rel="author noopener noreferrer">Jerry Stern</a> is webmaster at <a title="PC410.com" href="http://www.pc410.com" target="_blank" rel="noopener">PC410.com</a> and <a title="Startupware.com" href="//www.Startupware.com">Startupware.com</a>.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/field-reports/careful-again-fedex-doesnt-leave-your-package-at-the-uspse/">Careful again: FedEx Doesn&#8217;t Leave Your Package at the Post Office</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/field-reports/careful-again-fedex-doesnt-leave-your-package-at-the-uspse/">Careful again: FedEx Doesn&#8217;t Leave Your Package at the Post Office</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
