twesbutler's posterous http://twesbutler.posterous.com Most recent posts at twesbutler's posterous posterous.com Wed, 30 Dec 2009 21:24:22 -0800 The First Step to Maximizing Your Desktop Computer Security http://twesbutler.posterous.com/2009/12/30/the-first-step-to-maximizing-your-desktop-computer-security http://twesbutler.posterous.com/2009/12/30/the-first-step-to-maximizing-your-desktop-computer-security In 2004, Microsoft estimated that 50% of all PC crashes are a result of spyware! It doesn't take too much time on the 'Net to see that virus, trojans, worms, spyware, malware, etc are an always-present and ever-growing problem for home users and corporations. No one who travels on the 'Net is immune from these dangers, regardless of age, race, or position. Every computer user who works or plays on the Internet needs some type of desktop computer security program installed. So what about you? Do you have an antivirus and/or antispyware security product installed on your computer? If so, then good for you! You are already on the road to maximizing your desktop computer security. If you don't have an updated antivirus and antispyware software program then you need one! You know the story. It can happen to the best of persons. We get busy and forget, or intentionally forget and hope the problem will go away or auto-magically fix itself. In fact, I have trained hundreds of adult college students how to disinfect and keep their systems spotless clean and spyware-free by using FREE SOFTWARE! And not only getting their systems clean but keeping them clean and even more secure than by simply installing a purchased version and letting it do its thing! So what do you do first? First, you need to locate a solid and reputable and freely available antivirus and antispyware program. I am NOT asking you to whip out your credit card and purchase a year subscription for another year's updates for every computer security product you have installed! There is a better way - FREE! Expert Recommendation: "The Best Free Desktop Computer Security Products for 2010". 1. AVG Antivirus Free Edition 9.0 2. Malwarebytes 3. Comodo Internet Security How To Install: 1. Download and install AVG Antivirus Free Edition 9.0. (See link above) 2. Download and install Malwarebytes Anti-Malware (See link above) 3. Download and install Comodo Internet Security with Personal Firewall option only. Caveat: Do not install 2 antivirus products on your computer at the same time, for example AVG Antivirus and COMODO Antivirus. When you install the Comodo product just install the personal firewall only. If you do install two antivirus engines on the same system they may fight for position to the extent that they drag your computer down to a halt! To Summarize: 1. Download the software using the link I shared above... 2. On the website locate the free software download link... 3. Install the software by double-clicking the file that you downloaded. 4. When you install, accept the default settings that are recommended for you. Please, please, please do not surf the 'net without having some form of virus and spyware protection that you keep updated on a regular basis. If you are traveling the 'net without protection you are doing yourself a disservice and putting other computers in your home computer network at risk. Surf safely!

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Mon, 14 Dec 2009 00:40:04 -0800 Free "Online Security Scan” Could Cost You... http://twesbutler.posterous.com/2009/12/13/free-online-security-scan%e2%80%9d-could-cost-you http://twesbutler.posterous.com/2009/12/13/free-online-security-scan%e2%80%9d-could-cost-you When you get a warning message that you to update the security software for your computer you read a little further.  “Why not?” you think because of all of the pop-ups, email warnings, and threats of malicious software lurking on the ‘net, you proceed and click “Scan”   Five minutes later you wish you could “undo” what has just happened. The free scan claims to discover a variety of issues, and within a matter of seconds, you’re getting a host of other warnings to purchase this security software.  After shelling out about $35 or more for the software, the software claims that your issues are fixed.  The reality:  nothing was wrong in the first place.  The worst news, however, is that the program now installed on your computer could be destructive. According to the FTC attorneys, scammers have found unethical ways to create realistic but phony “security alerts” that look like they’re being generated by your computer, but they actually are created by a con artist and sent through your Internet browser.  These, by the way, are not specific to Internet Explorer, Mozilla Firefox, Opera, or Safari.  No browser is immune.

How To Identify These Scammers!

The new term is “Scareware”.  These types of programs take advantage of a person’s fear of online malicious software.  The scam has many variations, but here are some more common symptoms.  For example:
  • you may get ads that promise to “delete viruses or spyware,” “protect privacy,” “improve computer function,” “remove harmful files,” or “clean your registry;”
  • you may get “alerts” about “malicious software” or “illegal pornography on your computer;”
  • you may be invited to download free software for a security scan or to improve your system;
  • you could get pop-ups that claim your security software is out-of-date and your computer is in immediate danger;
  • you may suddenly encounter an unfamiliar website that claims to have performed a security scan and prompts you to download new software.
Purveyors of this fine software go to great lengths to help convince people that their product is valid.  For example, if you buy the software, you may get an email receipt with a customer service phone number.  If you call, you’re likely to be connected to someone, but that alone does not mean the company is legitimate.  These scammers are very intellingent and have spent many hours organizing these well-designed and profitable schemes designed to steal people’s money and leave them stranded with no recourse but to cry “HELP!”

How Do these Con-Artists Do It?

First, these individuals buy ad space on trusted, popular websites. These advertisements may look legitimate and helpful to the user, but they actually redirect the unsuspecting user to a fraudulent website that performs a bogus security scan. The site then causes a barrage of urgent pop-up messages that pressure users into downloading worthless software. One visit to a website promoting AdawareAlert took me to a flashy, attractive site but following the links to customer support… the links were not there.  Not only that but my malware software called “Malwarebytes” detected this communication into my computer via browser was malicious.

What to Do?

If you’re faced with any of the warning signs of a scareware scam or suspect a problem, shut down your browser. Don’t click “No” or “Cancel,” or even the “x” at the top right corner of the screen.  Some scareware is designed so that any of those buttons can activate the program.  One sign that you might want to leave the session is if you try to click your “back” button trying to escape by going back in history, you find that the software will not let you but wants you to “stay for a little infection session”. In this case, force yourself out of your browser by clicking “Alt-F4”, no matter what browser you use. If you get an offer, check out the program by entering the name in a search engine. The results can help you determine if the program is on the up-and-up.  But beware, many articles exist that promote said software as being “reputable” but in reality it is not.  Do your homework! The last resort is to visit the FTC.gov website or call by phone at 1-877-FTC-HELP to report fraudulent acts.  Investigators would need to know details about the purchase and on what website on which it was purchased.  .

Good Security Practices!

Check that your security software is active and current: at a minimum, your computer should have anti-virus and anti-spyware software, and a firewall.  A program called “Malwarebytes” is a comprehensive free tool that you can use which is very popular and highly rated.  You can buy stand-alone programs for each element — or a security suite that includes these programs — from a variety of sources, including commercial vendors and your Internet Service Provider.  There are also many reputable free versions of security software that you may use as well. For a free mini-course that will help you protect your home computer network from malicious software visit  http://nospyware4me.com.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Mon, 14 Dec 2009 00:32:55 -0800 It's Easy To Block and Unblock Internet Sites (For Free!) http://twesbutler.posterous.com/2009/12/13/its-easy-to-block-and-unblock-internet-sites-for-free http://twesbutler.posterous.com/2009/12/13/its-easy-to-block-and-unblock-internet-sites-for-free Even the best antivirus and antispyware products cannot help users block or unblock offensive or unwanted websites. The solutions that exist that may help users to block unwanted or offensive websites usually cost or require an annual subscription to be purchased. For many users this is not an option. This article will help you learn that it is easy to block and unblock websites without purchasing annual subscriptions or additional software. Some of the best protection comes from free computer security software. This method involves a file that already exists on your computer. It is called the "hosts" file. The "hosts" file actually resides on almost every operating system including Windows, Macintosh, Linux, Unix, and Solaris. The "hosts" file has existed on computers since the early days of the Internet. It was used to direct users to other computers using more user friendly names than the address of the other computer. Now, the "hosts" file is seldom used for those purposes, however many users are using the hosts file to prohibit or block users from being able to access unwanted or offensive sites. For Windows XP systems and newer, the "hosts" file is located at C:\Windows\system32\drivers\etc\hosts. Windows NT/2000 systems use C:\WINNT\system32\drivers\etc. Windows 95/98/ME users use C:\Windows. Now open "My Computer", C: drive, Windows directory, and drill down to where the hosts file is located. Double-click the file and Windows will ask you how you want to open the file. Choose "Notepad" and proceed with opening the file. (Some operating systems and computer virus protection products block these types of files from being changed without an administrator's permission, so you may have to get the administrator's permission before moving on.) When you open the "hosts" file you will notice the line at the bottom: 127.0.0.1 localhost. 127.0.0.1 is the internal IP address of your computer. "Localhost" is another name for your computer. Do not change this entry! Let's say for example you want to block www.google.com. Now with the "hosts" file still open in Notepad enter this right below the 127.0.0.1 line: 127.0.0.1 www.google.com Now save the file. Windows will ask you what name to save the file and in the "File Name" box make sure it says "hosts" without quotes and no other text. In the "File Type" field make sure you choose "All Files", then click "Save". Windows should warn you that the hosts file already exists, Do You Want To Replace It?. Click "Yes". Now you can close the file. Make sure the file is not saved as "hosts.txt", this will not work. The file must be named "hosts" and in the directory C:\Windows\System32\Drivers\Etc. Next, you have to make these changes effective. If you have Windows 2000, XP, 2003 Server, 2008 Server, Vista, or 7, then go to "Start, [All] Programs, Accessories, Right-click "Command Prompt" and select "Run as administrator". Then your command line should display. At the command prompt type (without quotes or comma) tskill explorer, then Enter. You will notice your desktop icons will flash off and back on, but this is just your desktop resetting itself. Now you can close your command line. Now open your browser (Internet Explorer, Mozilla Firefox, Opera, or Safari) and type in the address bar www.google.com. What to you see? You shouldn't see google. Before we proceed, let's reverse the changes we made earlier so that we don't forget. To reverse these changes, go back to your "hosts" file in Notepad. "File", "Open", C:\windows\system32\drivers\hosts, make sure file type is selected to "All files" or you will not see the "hosts" file, "Open". Now that you have the "hosts" file open then edit out the last line 127.0.0.1 www.google.com, and save the file. Make sure that the file is saved as "hosts" and NOT saved as "hosts.txt"! You may want to block other types of sites such as tracking sites, trojan downloaders and dialers, annoying pop-ups, spyware, etc. Fortunately, there have been others who have compiled their own lists of offensive sites and made their lists available to download for free. Some of these are www.mvps.org/winhelp2002/hosts.htm, http://someonewhocares.org/hosts/, and http://www.hosts-file.net/?s=Download. If you are interested in decreasing the chance you will get infected by unwanted or malicious software, then you will want to check out these sites to download the hosts file of your choice. Beware that many of these sites listed in those hosts files WILL INFECT your computer if you visit them without this populated hosts file installed first! The hosts file can block sites but can also provide that extra layer of protection in case your antivirus software expires or becomes disabled. Here is one example where the hosts file cannot stop the intrusion from coming in but can stop or slow down the malicious software from going out. For example, if a trojan comes through and does land on a system, and if the returning site is listed in the hosts file, then the trojan or spyware in question will not have the damaging power it would have had because it is actually reporting "nowhere" (127.0.0.1). This is the way that unwanted or malicious software is stopped in its tracks. Please understand that the populated hosts file is not meant to replace your computer virus protection product, but it is meant to work to complement your software. This article has given you a free and easy way to block unwanted and even malicious Internet sites. Even the best computer virus protection products are 100% foolproof, therefore installing a populated "hosts" file would be an additional, wise, and free level of protection to help defend against unwanted websites and malicious software. Visit http://nospyware4me.com for a free mini-course "5 Steps to Maximum Desktop Computer Security Using Free Tools".

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 02 Dec 2009 02:35:40 -0800 How Can You Protect Yourself From Malicious Software? http://twesbutler.posterous.com/2009/12/01/how-can-you-protect-yourself-from-malicious-software http://twesbutler.posterous.com/2009/12/01/how-can-you-protect-yourself-from-malicious-software Are you frustrated because last year you paid a computer professional repair shop WAY TOO MUCH MONEY over the course of the year to clean your computer from being attacked by malicious software? Are you worried because you estimate for this next year that you may have to spend the same amount as last year, perhaps more, to keep your computer optimized to it's maximum potential with minimal downtime?   If you answered "yes" to either of these questions then you are not alone. One way the common family can cut back on expenses is by taking a more proactive approach to protecting their own home computer network. This measure alone could easily save on the bottom line in a number of ways and provide a greater peace of mind for every end user in your family. Of course, some computer repair professionals would like you to believe that you are not capable of such a task. Most computer repair professionals truly care about the end-user, but many simply care more about running a personal antivirus program, collecting the service fee, and betting on when you will be back in the future. There are professionals galore who do just enough to clean, repair, and optimize your computer and (maybe) bring your computer back to a usable state ... but not enough to help protect you to a greater degree in the future. My name is Todd Butler and I teach families how to protect themselves from malicious software on the 'net, preferably using free tools. Remember the adage, "Give a man a fish and feed him for a day. Teach a man to fish and feed him for a lifetime"? Let's apply this to you as you pro-actively protect your home computer network. "Give a family clean data and clean operating systems and let them travel the 'net safely and securely for a day. Teach a family to protect themselves, their data and computers free from malware and let them travel the 'net safely and securely for a lifetime." I developed a multi-layered approach to protecting home computers as I was engaged as a Computer Technology instructor and IT professional over the last 10 years. Some of these concepts are well known strategies but a few of these concepts are virtually unknown to home computer network end-users. What I have found is that by practicing a multi-layered approach to home networking the amount of time I spend with the "home computer repair man" hat at home is next to nil. Right now I help family members and friends (and their friends) with cleaning their computers after a malware attack, and I find that having implementing these simple steps they have (1) saved their money from having to pay me or another computer professional to clean their computer, (2) saved huge amounts of time by not having to wear the "home computer repair man" hat to keep their computers free from malware, and (3) saved tons of stress from having accomplished the first two steps. Of course, there are some things that only the professionals can do like replacing faulty hardware, etc. But there are many basic techniques the end-user can do for themselves using FREE tools, specifically installing and maintaining a free personal antivirus program. What better way to protect yourself from malicious software than by using FREE Software and FREE tools? I have a special FREE mini-ecourse that goes into depth about how to use these free tools in the multi-layered approach. To enroll in the FREE mini-ecourse, visit http://nospyware4me.com.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 02 Dec 2009 02:09:25 -0800 The Best Computer Virus Protection Products For Free http://twesbutler.posterous.com/2009/12/01/the-best-computer-virus-protection-products-for-free http://twesbutler.posterous.com/2009/12/01/the-best-computer-virus-protection-products-for-free More families are wading into the personal computer world using their computers for work and play. For many the home computer is not an exception or luxury but a vital part of family income, leisure, and everything in between. Since most if not all of these families are on networked through the Internet, by nature these families have a home computer network to maintain and supervise. On top of that consider all of the destructive malware that threatens the most casual users. Protecting your home computer network is a new phenomenon that parents and children have to be concerned with. Malware has caused much home computer network downtime that has contributed to much headache, lost time, increased expense, and much frustration for the average family. However, protecting your home computer network does not have to be a chore or headache like it used to be. Too much time and money and energy has been wasted by hard-working parents and their children trying to disinfect and clean their home computers from damage due to malware infection. People are fed up with trying to trying to fight this war alone. Antivirus and Antimalware companies would like you to use and purchase their computer virus protection products. Computer repair professionals would like you to hire them to disinfect your home computer network. Purchasing the top rated computer virus protection should help. Purchasing the best virus and spyware protection service for your home computer network should help as well. However, the best home computer network defense lies not in the products per se, but rather in the strategy you use to protect your entire network. A solid home computer network strategy can be developed using the best free internet antivirus and anti-spyware products and free tools. This saves both time, energy, and pain for the end-user. My name is Todd Butler and I teach families how to protect themselves from malicious software on the 'net. There are simple strategies that the end-user can easily learn and apply to their home computer network that will save them time, money, and headache in the future. Familes can not only teach themselves these strategies but are encouraged to help others do the same. I developed a multi-layered approach to home computer network security after implementing it via trial and error while teaching Computer Technology classes at a local college over a 9 year span. Since then I have seen a massive amount of end-users truly frustrated after spending hard-earned money for the latest and greatest computer antivirus protection products only to find that they have bloated thier operating system so much that computer preformance is horrible. No one wants to trade high security for high performance. Some people will pay for both, but in reality the end-user can get high security without sacrificing performance. I have developed a FREE mini-ecourse that begins to uncover some of these strategies and helps the end-user learn to improve the performance and the security of their home computer network at the same time. You can protect yourself from malicious software by using FREE Software and FREE tools! To sign up for the FREE mini-ecourse, please visit my website at http://nospyware4me.com.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler
Wed, 02 Dec 2009 02:05:33 -0800 Free Home Network Computer Virus Protection http://twesbutler.posterous.com/2009/12/01/free-home-network-computer-virus-protection http://twesbutler.posterous.com/2009/12/01/free-home-network-computer-virus-protection Are you upset over having to spend SO MUCH MONEY to keep your home network of computers clean and optimized and free of malware? Are you struggling to find a way to maximize your network's uptime and minimize downtime for as little investment as possible using some of the best free internet antivirus and anti-spyware? Who wouldn't want a safer home comptuer network while spending less money, saving more time, and leaving the stress behind! The first step outlined by Stephen Covey in "The Seven Habits of Highly Effective People" is "Be Proactive". What if this were applied to you and your family in your home computer network? Yes, but who has time time? Good question! What if you were to learn some proven and tested principles that you could apply to your home computer network using the best free internet antivirus and anti-spyware programs and FREE tools that would actually save you time and money and stress in the long run? Would you be interested? My name is Todd Butler and I teach families how to protect themselves from malicious software on the 'net. The old adage, "Give a man a fish and feed him for a day. Teach a man to fish and feed him for a lifetime" can be adapted and applied to your home computer network. "Give a family a clean home computer network and let them travel safely on the 'net for a day. Teach the family how to keep their home computer network clean and let them travel safely on the 'net for a lifetime." Over the last 10 years, as a former Computer Technology instructor and current IT professional, I developed a multi-layered appraoch to home computer network security that has proven to save time, money, and stress for those who use it. In the early days I searched for the best computer virus protection products that would do it all for me, so I could "set it and forget it" and go on my merry way. Well, I learned that this was not possible. As much as antivirus and antimalware companies want you to believe that, it simply is not true. The more software that a company integrates into a total antivirus and antimalware solution, the more it bogs the computer down and starts to immediately become an annoying and regretful experience for the end-user. What makes my technique so practical is that it is simple, yet comprehensive, and everything is accomplished by using FREE software and FREE tools. But just because you use free computer virus protection products does not automatically keep you safe. You have to plan your strategy so that if one tool or program fails to detect a malicious piece of software then another tool on another layer will help stop the malicious activity. I have developed a FREE mini-ecourse that begins to cover some of these strategies and helps the end-user practice being proactive with their home computer network. Yes you can protect yourself from malicious software by using FREE Software and FREE tools! To sign up for the FREE mini-ecourse, please visit my website at http://nospyware4me.com.

Permalink | Leave a comment  »

]]>
http://files.posterous.com/user_profile_pics/685306/me.jpg http://posterous.com/users/4wjK2B6iUf4d Todd Butler top-rated-anti-malware Todd Butler