The February newsletter is out. It’s how best to NOT use Notifications, Add-Ons, and fake tech support phone numbers. You can protect yourself from constant popups and slow computers, and outright fraud, by learning what it is you’re clicking on, and knowing when to be suspicious.
Back to Basics: a phish is an email
that’s ‘fishing’ for you to click a link or take an action that hooks
you into a scam, either to take your cash or control your online
accounts, or convert your computer into an online employee (‘bot’) of
the phish-sender (the ‘botnet herder’).
And a ‘spear phish’ is a targeted
phish, customized to just one recipient, frequently with scary amounts
of inside knowledge, like the names of coworkers, where you bank, and so
on. In-between, there’s just a rough attempt to make the message look
personal, usually by taking the domain from your email
(yourbusiness.com) and using it throughout the email. It’s rarely a true
one-recipient spear phish, unless you are a public officer of a large
corporation, or a ‘target of value.’ Some of the Democrats hacked during
the last election were attacked using spear phish emails. For most of
us, we’ll just see phish with some mail-merge insertions of our email
addresses in a few spots.
So, do you believe that the email shown below is real? Did I win the lottery?
I hope there were only ‘no!’ answers
for that. The “UNITE STATE” company mentioned, Facebook, is made to
appear to have a Canadian address, a South African bank, and a FREE
email address from Yahoo of Japan, and a phone number with a South
Africa country code of 27. And they’re asking for enough information,
with that driver’s license, to run a credit check or apply for a loan.
So, clearly I did not win a lottery that I never entered in the first
place.
So, if no one believes that phish, why
is this one so convincing? It’s a new version, just showing up this
month in very large numbers, somewhat shortened because the original
content is far too crude to include here:
Hello there, Hope u do not mind my english sentence structure, because i’m from Germany. I contaminated your machine with a malware and im in possession of all of your personal data from your operating-system… (vague threats of web site history recordings here) After some time additionally, it pulled out every one of your social contacts. If you ever would like me to remove your everything i currently have – transmit me 790 us in btc it’s a cryptocurrency. Its my account transfer address – 141… At this moment you will have 26 hours. to make up your mind Once i will receive the transaction i’ll eliminate this video and every little thing thoroughly. Or else, please remember this evidence would be sent to your contacts.
Some of these show up with your own email address as the ‘from’ or ‘reply-to’ address. It’s faked. Scammers who have your real email login information use it to send bulk mail, not ask for Bitcoin.
There have been a lot of these for the last two months, blackmail letters with Bitcoin payment demands and claims about webcams. Bitcoin is difficult to trace and impossible to call back. Delete these hoaxes. Some of them include real passwords-mine included a password for a video website I visited 6 years back, so I know that “learntoprogram.tv” was hacked and lost their user list.
I know that site was hacked because I
gave it a unique password. No passwords used online should be used in
more than one location, because once a site owner realizes that they’ve
been hacked, they don’t tell you. They just set the database for
everybody to “lock out user until they request a ‘forgot my password’
reset link.” But if they were hacked, that means that some hacker has
your email address and a password that you have used, somewhere, at
least once. So they’ll start bulk attempts to use their new
million-address database of stolen email and password pairs to log in at
the top 50 banks, Amazon, the Apple Store, even some online games where
you’ve built up a powerful character to take over. They’ll attempt to
log into anything with digital resale value or a cash equivalent. If
they succeed, they can take over that account, and whatever it contains.
Again, don’t re-use passwords. When they’re hacked on one site, they’re tested elsewhere and everywhere.
The best explanation for why Windows is
slow that I’ve heard was an explanation of ‘building funnels” from a
state highway engineer. Roughly: “That commuting route is beyond planned
capacity. Yes, we could add lanes to it and increase the capacity, fit
more cars, and even increase the speed limit if we make it limited
access. No problem there. But these commutes don’t end in highways, they
end in neighborhoods, in areas we can’t control, county roads and other
states. So adding capacity encourages more use, which results in
building funnels at both ends of the commute where the extra lanes are
taken away, and the funnel and resulting merges back up the traffic.”
And then, darker, “Sure, we could
co-ordinate work with other states to extend things, but why should we
invest anything to encourage building in areas that don’t give us any
tax revenues but add to our highway costs? And worse, developers build
homes on a much shorter timeline than we can plan state highways, let
alone fund them and build them.”
Of course, the people who live
alongside these racetrack routes, the worst of the commuter single-lane
state highways, have things to say on these topics.
But back to technology. This is the
classic Windows stupidity of running background tasks when the system is
slow, but not in sleep mode. So let’s set a service, we’ll call it
“Street Cleaning” just to make it non-techy, and say “We don’t want that
to run during rush hour. Let’s have it run whenever the controller sees
that traffic is low. Can’t do it when there is no traffic at all,
because we’re turning off the streetlights when nobody’s on the road. So
when the streetlights come on, check recent traffic, see that it’s
zero, and start cleaning the streets. Excellent.”
This, of course, turns on the streetlights based on a motion sensor, and sequentially starts “Street Cleaning” at the moment that a car enters the parkway. Or triggers some service to start doing complex background stuff because you woke the computer and started typing. Or set twenty to fifty services to start running and phoning home for updates when the computer is first turned on. Which leads most users to start the computer, and then start the coffee pot, and not come back until both computer and operator have been thoroughly woken up.
Preventing Startup Buildup
Old computers aren’t always slow
because they’re old. If they were not budget computers on day one, they
shouldn’t act like junk in year three. If they do, and the hardware
tests out OK, the remaining cause for ‘slow’ or ‘erratic’ is generally
“too much software trying to run at the same time.” That’s a traffic
condition, background junk that does not need to be there. Some of it is
malware, and a lot of it is just un-needed junk that is not remotely
evil. But all auto-starting software adds to startup time.
So, to prevent that, you have to avoid
software that adds auto-starting stuff to the system. I’ve told many of
you this before, here it is again. It’s important: When you install
software, always choose the Custom install. Always. Even if you have no
plans to change anything, even if you’re afraid of even touching it.
Always. And then read the screens during the setup, and pay attention to
the options. The default options will work, they’re tested heavily, but
they were not tested on every possible computer configuration.
What you’re looking for in those option screens are the choices that mention “Also install this…” or “Start with Windows”. Those always require a moment of asking why would that be a good thing? Why allow that? Why allow a Hewlett Packard printer to run a program at startup that phones home to Hewlett Packard for a new driver, waiting for an overloaded server to respond, for the life of the computer? Think about that–not the life of the printer, and not the life of the printer warranty, but forever. Now multiply that by a dozen, and that’s a typical HP printer setup.
Now all of these startup items are not
available to “just say no” to during setup, and I can follow up later
during a tuneup to remove the useless autoplays, but for those choices
that appear, if you won’t need a listed feature, don’t install it. And
if it’s a third-party program, as in “we also recommend,” that’s a
malware installation tactic. While not all software that arrives in that
way is evil, you didn’t go looking for it, so you don’t need it, so
don’t let it install.
There are a lot of small utility
programs that suggest ‘Run with Windows.’ OK, let’s see, it’s a little
utility that you have never needed before, that converts something to
something else, and it wants to start with Windows because you will need
it every day, forever. No. Just say no.
As the Printers Die
Reminder: If you bought a new printer
to replace another, go to Control Panel, Uninstall a program, and remove
the software that installed with the former printer. Also check the
printer list, in Settings, Devices, Printers & scanners, and remove
the old driver there. It’s easier to do that before installing the new
software, especially if the new and old printers are the same brand. The
rule is like any other cleanup rule: Demolition before rebuilding. Make
space before organizing. Remove that old plumbing before adding the new
pipes. Or wires, or software. That helps you identify the old stuff,
wipe it out before adding the new stuff.
Other old software should also be
removed. Any program that has an annual version can cause problems, so
don’t allow them to build up forever. If you will never use these
products past, say, year 3, then delete the “three years back” version
when you add the latest version.
Do Hard Drives Fill Up?
The answer is generally “not from
saving documents.” But software can fill them, as can video editing in
high resolution, or Windows errors that cause log files to never ever go
away–that’s currently a recurring issue in Windows 7. If there is very
little software on your system, but there are ‘full’ warnings in
Windows, it can be the log files–call for a cleanup.