Billps Tudios

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 19 February 2012

Legitimate Software Still Sneaking on Crapware

Posted on 12:29 by Unknown

I’m very lucky to have what might be considered a cult following for WinPatrol.  It’s essential since we don’t advertise and depend on word of mouth to let people know they should download WinPatrol and upgrade to WinPatrol PLUS. The few people who upgrade to PLUS allow us to continue giving away a free version.

One of the positive elements of our software is that we’ve never included 3rd party crap software like toolbars in our setup program. I consider this an insult to our users and while I could make a lot of money it’s just wrong. Many of you have read about my constant battle with Ask.com(IAC) who thinks WinPatrol should include a custom version of their search toolbar.
Read: Would you like Toolbar with your Software Order?

I continue to get requests from companies who say they want to do business with me.  They don’t take no for an answer and don’t realize one of the main reasons to have WinPatrol is to remove their junk software which sneaks on to computers. It’s bad enough when software like MP3 players or Image editors install software you didn’t ask for but when security vendors push unnecessary additions it’s bad news. Still, once a day I get an offer to be rich by including their software.

There are some online good guys who keep track of unacceptable installs and document the bad guys. One of the best sites is known as the “Calendar of Updates”.  COU also lets users know when there’s a new version available of their favorite legitimate software.

Recently we lost one of the founders of Calendar of Updates. Donna Buenaventura consistently won a “Most Valuable Professional” award from Microsoft and helped thousands of computer users asking nothing in return.  Donna also introduced me to the “Installers Hall of Shame”.  A quick look at this list shows you just how many vendors are more interested in profit than keeping you as a customer.

donna Donna Buenaventura was certainly one of good guys who won’t be forgotten. Donna may not have been wealthy when she passed but she was rich with love from the folks she helped.  I hope to be as lucky when my time comes.

Read More
Posted in | No comments

Wednesday, 1 February 2012

The Most Dangerous Words on the Internet

Posted on 15:11 by Unknown

There are many forms of security intrusions on your computer and you should be aware of all of them. Sometimes you don’t have to do anything you would normally think would infect your computer. Infiltrations can happen without any action on your part. You don’t have to click or download programs to lose control of your system.

Here’s a tip you may not have heard. Don’t click on any ad. In your Email, on Google or even Facebook don’t click on advertisements. You’d think big companies like Google or Facebook review advertisements that appear on their websites. You’d be wrong. Some of the most dangerous links appear as advertisements that look like search results on Google or product recommendations by your friends on Facebook.

If you click on an ad the most danger words you’ll ever see online are “FREE, You may be a winner”. If you see those words or anything similar use Ctrl-All-Del and close your browser. Web sites don’t give away Apple iPads. If they do the chances you’ll win isn’t worth the risk.

freeMy mother always said, “You get what you pay for”.   She was a smart lady.  She also said, “If it seems to be good to be true, it probably is”.

abort
If you see this message, press Ctrl-Alt-Del and kill your
browser. There’s no other safe way out of this dangerous message.

What you always need to do is take security seriously. Pay attention to any changes in behavior and make sure you have updates to all your software including system updates. Pay special attention to updates from third party software from companies like Apple and Adobe.

You may not care if your computer is infected but here are some examples of why you still need some kind of security on your computer.

  1. Sensational Headlines
    You were tempted by a salacious headline. What happened when you clicked may vary but everyone in your contact list will receive the same headline and they’ll want to click. If they do, they’ll get the same attack you received and all their contacts will get the message as it spreads to all everyone’s friend. If you’re a Facebook user I’m sure you’ve seen this happen more than once.

  2. Key Loggers
    There’s a program running on your computer that tracks each mouse movement and keystroke and sends it to an online server that may be monitored by many of the bad guys. This kind of infection is often called a key logger. In some cases a key logger may be installed by a controlling domestic partner or even your boss.  Key logger programs are sold openly disguised as ways to monitor your children. Everyone knows these programs are misused and often used in domestic violence cases.

  3. Bots
    There’s a program running on your computer called a “bot”. You may never know it’s running. It just uses your computer as a tool so a police investigation will be directed to your house and not someone on the other side of the world. Someone controlling the bot could do everything from participate in denial of service attacks to hack into someone's bank account.  Don’t expect a CSI team to come in and clear you.  Not long ago bots were used to shut down nuclear computers in Iran. Chances are in our future they’ll be used against more sensitive sites in the U.S.

  4. Credit Card Info
    You sent your credit card to a popular online store that doesn’t have the best security plan.  The latest example of this came from online store Zappos. This happens more than you can imagine and on rare occasions companies like Zappos will make the effort to let their customers know and encourage them to change their passwords. While most people fear credit card information will be stolen using the internet, an equal danger exists calling a company on the phone and giving them your credit card number. Monitor your credit card usage regularly and keep track of your purchases.

  5. Scareware
    According to security friends rogue software or “scareware” is now the most common security threat. A message appears letting you know your computer is infected and for a fee they’ll remove all the viruses, Trojans horses, and tracking cookies that supposedly exist. 
    rogue1
    No matter how much you pay you won’t receive any help. As time goes on the infection will get worse and your computer will only get slower and slower 


So what else can you do?  Most people blame it on their kids or spouse. Many install 3-4 different anti-virus programs because they think the more protection they have the better. When it comes to security programs, I usually recommend one good AV scanner to back up WinPatrol and help clean up any garbage left by the infection.

When it comes to real “protection” I continue to stress a single, regular solution that will provide multiple solutions. Backup, Backup, Backup!
It’s that time of year when I remind readers they need to take doing regular backups seriously. Instead of blindly depending on security software invest your money in a good backup plan.

If you haven’t reviewed backup solutions in a while you’ll be surprised at what’s available. While I don’t currently recommend any single solution check out cloud backup services or invest in a media safe that keeps media protected during the hottest fire. Create a good backup policy and you will be a WINNER!

Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Support for Downloads without Surprises
    Last week I posted a message about the  packaging of ad supported programs along with popular software. It appears to be a common practice t...
  • Employee Manual to Prevent Cryptolocker and More
    A common way computers are infected or compromised has always been a simple yet well thought out deception. It can happen to anyone and the ...
  • What on Earth is “Cloud” Computing
    The new big buzz word in the computing world is “Cloud” computing. In the past I’ve been critical of the concept and even poked fun at Cloud...
  • Why Dancing with the Stars is #1
    Are you wondering why the heck I’m talking about TV Shows? Well, it’s still a little all about tech and some of my past experiences. In the ...
  • WinPatrol Cloud Edition Public Beta
    WinPatrol Adds the Newest Technology Available. You’ll now have access the knowledge of thousands of WinPatrol users shared in real-tim...
  • SQLite C Code to Read Cookies
    While most of the technology leaking from my brain is for a wide audience, today’s post is very technical in nature. I expected the informat...
  • Free #1 Tweak to Improve Windows Performance
    Every year billions of dollars are spent by folks just trying to improve the performance of their computers. Over the last couple years ther...
  • Forget the DVD & Save on your New Laptop
    I’ve written before about the coming death of the CD/DVD ’s for data storage.  While that time hasn’t come yet for desktop there is one real...
  • TWITTER ALERT
    Anyone who uses Twitter, DO NOT use the Twitter web interface until further notice. There is a code injection vulnerability being used tha...
  • Security Software Doesn’t Fix Human Nature
    If you’re interested in PC Security, you’ll want to check a look at research recently compiled by the folks at PC Pitstop. Even I was surpri...

Categories

  • 2007
  • 3G
  • AAPL
  • ABC
  • accelerometer
  • Achilles
  • Acrobat
  • Activex
  • adobe
  • Ads
  • advertising
  • Adware
  • Adwords
  • Airlines
  • Albany Medical Center
  • algorithm
  • Amazon
  • amber alert
  • AMUST
  • Animation
  • antimalware
  • Antivirus 2009
  • antivirus2008
  • AOL
  • Apple
  • applets
  • AQuantive
  • archive
  • Aruba
  • ASC
  • Ask.com
  • ATI
  • Audio
  • Autorun
  • AutoUpdate
  • autoupdates
  • AVG
  • Azure
  • backup
  • badware
  • Bakugan
  • Baseball
  • battery
  • Ben Edelman
  • Beta
  • BillP
  • Birthdayware
  • Bitlocker
  • Blackberry
  • BlackViper
  • bloatware
  • Blogger
  • Blogs
  • Blogspot
  • Blu-ray
  • Bluehoo
  • bluetooth
  • boinc
  • Bonjour
  • Brazil
  • break
  • Breakaway games
  • Brookman
  • Browser wars
  • C64
  • camera
  • Carpal Tunnel
  • CBS News
  • cell phone
  • CES
  • charity
  • Child Safety
  • chinese
  • Chris Cook
  • Christmas
  • Chrome
  • CIPAV
  • clampi
  • Cloud
  • CNet
  • codec
  • comodo
  • conficker
  • Control Panel
  • copy
  • coupon
  • craplets
  • crapware
  • Crawford
  • credit
  • credit card
  • credit cards
  • ctfmon
  • daylight savings time
  • Dell
  • demo
  • Discount
  • Disney
  • DNS
  • Dollar
  • Domain
  • Donna
  • Doubleclick
  • Downadup
  • Dreamscene
  • droid
  • DVD
  • Dvorak
  • Easter egg
  • eclipse
  • Ed Bott
  • Edelman
  • egreeting
  • Email
  • Environment
  • Epilepsy
  • EU
  • eWeek
  • explorer
  • facebook
  • false positive
  • false-positive
  • FBI
  • file types
  • finnish
  • FiOS
  • Firefox
  • fireworks
  • fix
  • flash
  • Flashpix
  • Fort Drum
  • foxit
  • fraud
  • FTC
  • games
  • garmin
  • Gateway
  • GE
  • George Bush
  • Germany
  • global
  • Godmode
  • Google
  • Google Research
  • GotoMyPC
  • gps
  • green
  • Groceries
  • Habitat
  • Hacks
  • hallmark
  • Halo
  • hard drive
  • Harry McCracken
  • Harry Potter
  • Harvard
  • HD-DVD
  • help
  • hidden files
  • Hijack
  • History
  • Hiton
  • homeland security
  • Honor Flight
  • hosts
  • Hubble
  • IAC
  • ICANN
  • IE
  • IE6
  • IE7
  • IE8
  • installers
  • interface
  • Internet
  • IPAddress
  • iPhone
  • iPod
  • Iraq
  • iTouch
  • iTunes
  • java
  • Kaspersky
  • Kazaa
  • kenmore
  • key logger
  • keygen
  • Keylogger
  • Kosovo
  • LA
  • lady chalupa
  • langa
  • Laptop
  • lawsuit
  • Legoland
  • Levar Burton
  • Linksys
  • Little League
  • Live Writer
  • Live.com
  • localize
  • Logo
  • London
  • LOP
  • lottery
  • Lucasfilm
  • Macintosh
  • Malware
  • Marie Domingo
  • Mary
  • McCracken
  • Media
  • Memorial Day
  • mgrs.exe
  • Micosoft
  • Microsoft
  • Microsoft Surface
  • MiFi
  • mit
  • moon
  • Mossberg
  • Mothers Day
  • MPack
  • MSFT
  • msn
  • MTV
  • Multicore
  • Music
  • MVP
  • MVP09
  • nasa
  • NBC
  • Nero
  • Netbook
  • Network
  • network solution
  • New York
  • newsletter
  • Nintendo
  • Nintendo Wii
  • NNEDV
  • Norton
  • NYAG
  • OAuth
  • obama
  • Office
  • OLPC
  • Olympics
  • OpenDNS
  • oprah
  • optimize
  • optout
  • Paperghost
  • passwords
  • Patch
  • Patriot Flight
  • PC Guy
  • pc pitstop
  • PC World
  • pcmag
  • PCWorld
  • PDC
  • PDF
  • pedipaws
  • performance
  • phishing
  • photos
  • Photoshop
  • Pinnacle
  • Piracy
  • Pirillo
  • pogue
  • Porn
  • pornware
  • postcard
  • prediction
  • prefetch
  • Preview
  • Price
  • privacy
  • Prodigy
  • Programming
  • PSP
  • Public Relations
  • Pytlovany
  • Q-Link
  • Quicktime
  • quotes
  • radio
  • realnetworks
  • realplayer
  • RegCleaner
  • RegCure
  • regedit
  • Registry
  • registry cleaner
  • Release
  • remove
  • Research
  • return policy
  • review
  • RIAA
  • Rivera
  • RMS
  • Road Runner
  • rogue
  • router
  • RTM
  • Rumor
  • safari
  • safety
  • sale
  • Sales
  • Santa Monica
  • scam
  • Schenectady
  • Scoble
  • Scott Dunn
  • Scotty
  • sd
  • Search
  • Sears
  • Security
  • Services
  • seti
  • ShellExecute
  • Shirt
  • SimCity
  • site advisor
  • slingbox
  • snopes
  • social engineering
  • social network
  • solid state disk
  • Sounds
  • Sp3
  • space station
  • SPAM
  • spamhaus
  • Special
  • speedtest
  • Spyware
  • SSD
  • Startup
  • Stats
  • Steve Bass
  • stopbadware
  • storm
  • STS-125
  • Sugar
  • Sunbelt
  • support
  • Symantec
  • tagged
  • Task Catcher
  • Task Scheduler
  • taskbar
  • Tax
  • Techorati
  • techwatch
  • teens
  • temp
  • Thinkpad
  • Thurrott
  • tinyurl
  • Tips
  • TiVo
  • TLD
  • Today Show
  • Toolbar
  • toolbars
  • top ten
  • topten
  • toys
  • Translator
  • transunion
  • Tree
  • Trend Micro
  • tricks
  • trillian
  • Trojan
  • tweaks
  • twitter
  • UAC
  • UI
  • Ultimate
  • Unbox
  • Unboxed
  • update
  • Updates
  • upgrade
  • url
  • USB
  • Utility
  • Valentine
  • Verizon
  • versions
  • Veteran
  • Video Games
  • Vista
  • Vulnerability
  • wall-e
  • war
  • Washington
  • web2.0
  • Webslice
  • WGA
  • Widget
  • WiFi
  • Wii
  • WiiItis
  • wiimote
  • Win7
  • Windows 7
  • Windows Secrets
  • Windows Update
  • Windows7
  • WinPartrol
  • WinPatrol
  • winpatrolflash
  • WinPatrolToGo
  • Winter
  • Wireless
  • Wristband
  • WSJ
  • WWII
  • x64
  • Xbox
  • XO
  • XO Laptop
  • XOActivity
  • Xobni
  • xolaptop
  • XP
  • XP SP3
  • xp3
  • Yahoo
  • Zero Day
  • Zone Alarm
  • Zwinky

Blog Archive

  • ►  2013 (31)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (5)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (5)
    • ►  January (5)
  • ▼  2012 (30)
    • ►  December (3)
    • ►  November (3)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (3)
    • ►  June (2)
    • ►  May (1)
    • ►  April (4)
    • ►  March (4)
    • ▼  February (2)
      • Legitimate Software Still Sneaking on Crapware
      • The Most Dangerous Words on the Internet
    • ►  January (2)
  • ►  2011 (28)
    • ►  December (4)
    • ►  November (2)
    • ►  October (4)
    • ►  September (2)
    • ►  August (2)
    • ►  July (2)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (2)
    • ►  February (3)
    • ►  January (1)
  • ►  2010 (44)
    • ►  December (2)
    • ►  November (3)
    • ►  October (3)
    • ►  September (4)
    • ►  August (3)
    • ►  July (3)
    • ►  June (3)
    • ►  May (4)
    • ►  April (4)
    • ►  March (3)
    • ►  February (3)
    • ►  January (9)
  • ►  2009 (90)
    • ►  December (6)
    • ►  November (8)
    • ►  October (6)
    • ►  September (4)
    • ►  August (4)
    • ►  July (12)
    • ►  June (6)
    • ►  May (11)
    • ►  April (7)
    • ►  March (9)
    • ►  February (9)
    • ►  January (8)
  • ►  2008 (122)
    • ►  December (9)
    • ►  November (11)
    • ►  October (14)
    • ►  September (6)
    • ►  August (9)
    • ►  July (9)
    • ►  June (10)
    • ►  May (13)
    • ►  April (8)
    • ►  March (10)
    • ►  February (10)
    • ►  January (13)
  • ►  2007 (155)
    • ►  December (15)
    • ►  November (14)
    • ►  October (12)
    • ►  September (14)
    • ►  August (12)
    • ►  July (13)
    • ►  June (11)
    • ►  May (19)
    • ►  April (17)
    • ►  March (21)
    • ►  February (7)
Powered by Blogger.

About Me

Unknown
View my complete profile