Your daily technology class with Professor Randy!!

Randy The Tech Professor

August 20, 2011 at 7:50 am

Are Your Data Packets Being “Sniffed”?

Hello everyone,

Many of my elderly clients do not secure their wireless network. As I drive around my area of service, on any given day and on any given street, I can usually see five or six available wireless networks – all unprotected (unencrypted).

So what’s the big deal? Why is this so dangerous? Consider the following:

All of the data that is being sent over these unsecured wireless networks can be “sniffed” (seen and captured) by using readily available, free tools. Let’s look at two of these free tools.

1) The very popular Firefox browser has a free extension called Firesheep that will intercept unencrypted data and allow the Firesheep user to hijack the logged in session from the original user.

2) Another free software program called Wireshark will also capture and analyze any packets of data that are being broadcast through the air. These unencrypted packets are simply floating by and Wireshark will grab them and tell you what they contain – like usernames, passwords, and email!

So, what’s the solution? Just one word really: Encryption (a process that makes your data unreadable).

By encrypting your data using HTTPS, WPA2, or VPN connections, you will be protected from someone who wants to sniff and analyze your private data.

Professor Randy says: Don’t get sniffed! Foil any would be data packet thief by always using a secure encrypted connection.

 

Tags: , , , , , ,
comments Comments (0)    -
August 16, 2011 at 5:45 am

Fifteen Great Tech Links For Tuesday 8/16/2011

Hello everyone,

Take your pick! Any of these links will take you to some great tech information. Enjoy

1) Why The Government Won’t Protect You From Getting Screwed By Your Cable Company

2) Google Buys Motorola Mobility And Becomes A Handset Maker

3) Firefox 6 ‘Released’ Two Days Early

4) Windows Security Wrap Up: Praise For Vista And A Historic First

5) Your Phone Numbers And Facebook: What You Should Actually Worry About

6) Flickr Is Dead

7) Our Plugged-In Summer

8) Android: Heading For A Fall?

9) Walmart, Unable To Keep Up With iTunes, Shutters MP3 Store

10) Steve Jobs, Please Buy Us A Carrier!

11) 22 Easter Eggs Hidden In Your Favorite Mac And Windows Software

12) Reset Facebook Passwords From Your Mobile Device

13) How To Set Up An Eye Catching Business Page On Facebook

14) How Do I Reset My Router’s Password?

15) Skype Continues To Go Its Own Way (This Time With Video Codecs)

Professor Randy quotes Thomas Jefferson: “In matters of style, swim with the current; in matters of principle, stand like a rock.”

Tags:
comments Comments (0)    -
August 13, 2011 at 10:14 pm

How To Know (For Sure) When Your Caps Lock Is On Or Off

Hello everyone,

It absolutely drives me crazy when I’m typing along only to find out that I have the CAPS LOCK on. My USB connected keyboard has a blue light to alert me when I’m using capital letters, but I can’t always see this light because my keyboard is positioned underneath my raised laptop.

But did you know that you can set the CAPS LOCK key to alert you by making a sound? Yes, every time you press the CAPS LOCK key (whether you mean to do so or not), you can hear a “beep” to tell you when CAPS are on, and another “beep” to tell you when CAPS are off.

Here is what you need to do:

1) In Windows Vista and Windows 7, open the Control Panel and click on Ease of Access Center.

2) Scroll down and click on Make the Keyboard Easier To Use. Then select Turn on Toggle Keys. Hit OK.

In Windows XP just do this:

Open the Control Panel and select Accessibility Options. Then, under the Keyboard tab, check Use Toggle Keys. Hit OK. You will now hear a “beep” to let you know that you are typing in capital letters.

Professor Randy says: Don’t waste precious time! You can know for certain when your typing in CAPS by configuring the CAPS LOCK key to “beep” when pressed. The sound will alert you and you’ll know for sure! How cool is that?

 

Tags: , , , , ,
comments Comments (7)    -
August 8, 2011 at 9:50 pm

Services That You Can Safely Disable In Windows 7

Hello everyone,

I got this comment from Andrei today about one of my previous posts in which I had said that Windows 7 had fewer unnecessary services running compared to Windows XP and Vista.

“I don’t know comparatively if you’re right that the number of running services has gone down in the last few Micosoft O/S releases, but my brand new laptop w/ Windows 7 is running an absurd amount of services, and even when I’m not doing anything 3/4 cores are between 30%-60% usage”.

This was my reply to Andrei (keep in mind that I only addressed the services issue. There may be more things going on with his computer. I don’t know how much RAM that he has nor the programs that he has running/starting up in the background.

Hi Andrei,

Thank you for your comment. These are the services that I recommend to disable:

Bluetooth Support
DHCP
Diagnostic Policy
Diagnostic System Host
Distributed Link Tracking Client
EAPHost
Function Discovery Provider Host
Group Policy Client
IKE and AuthIP IPsec Keying Modules
IP Helper
Microsoft iSCSI Initiator Service
Offline Files
Policy Agent
Routing and Remote Access
SSDP Discovery
Tablet PC Input
Web Client
Windows Search
WinHTTP Web Proxy Auto-Discovery

Thanks again for your comment and best wishes,
Randy The Tech Professor

 

Tags:
comments Comments (0)    -
August 1, 2011 at 2:43 pm

Computer Repair Tools That I Can’t Live Without (Part 2: USB Drive Adapter)

Hello everybody,

In part 1 of this series I talked about my four favorite junk file cleaners. In this post I would like to tell you about a tool that literally changed my computer repair life: A USB 2.0 to IDE or SATA Drive Adapter.

This tool is absolutely “the bees knees”, and I can’t live without it. Here’s why:

1) Lets say that I get a severely infected computer. The computer is so infected that I can’t even boot up the machine into safe mode. The infection has basically rendered the computer useless, and I’ll get nowhere if I keep trying to work on an infected hard drive in an infected computer. What to do?

I take the infected hard drive out of the infected machine and attach it (through the USB Drive Adapter) to a known, good working machine and then do the malware/virus scans. The Drive Adapter allows me to do this by turning any IDE or SATA drive into an external one. Once I have finished doing scans with my antivirus tools, I just put the hard drive back into the original machine and at this point I’m usually able to boot up the computer and continue with the malware removal in normal mode.

2) Let’s say that I get a computer that has a motherboard problem and is “dead as a doornail”. The computer obviously won’t boot up, but the hard drive is still good and stills contains all of the precious data. How do I retrieve my clients data?

Once again, I just take the drive out of the dead machine and hook it up to my good working machine by using the USB Drive Adapter. The drive shows up as an external drive and I simply transfer all files from that drive to my computer. Once I have the defective computer fixed I can restore these files at any time. If my client wants to buy a new computer, I’ll restore the files to the new hard drive and then use the hard drive from the original machine as a permanent external drive.

Now do you see why it’s a repair tool that I can’t live without?

Professor Randy says: By externally connecting any hard drive via USB, you will be able to accomplish various repair/backup tasks with ease. You’re going to love this tool!

 

 

 

Tags: , , , ,
comments Comments (3)    -
July 30, 2011 at 2:01 pm

Fifteen Great Tech Links For Saturday 7/30/2011

 

Hello everyone,

It’s impossible to keep up with all of the latest technology information “out there”, but you can keep up with some of it by visiting any of the links below. Enjoy!

1) The Honeymoon’s Over For Google+

2) Video: Microsoft’s SkyDrive Starts Streaming Music On WP7

3) Samsung Is Only Tablet Maker Giving iPad 2’s Display A Run For Its Money

4) Thinking About Email Consolidation Strategies

5) Internet Withdrawal Leaves Those Who Are Always On ‘Upset And Lonely’

6) Netflix: 75 Percent Of New Customers Signing Up For Streaming-Only Plan

7) Why Microsoft Won’t Dump Bing

8) The Roku 2 Review

9) How The Editor Of Windows Magazine Became An Apple Fanboy

10) Samsung May Have Surpassed Apple, Nokia In Second-Quarter Smartphone Sales

11) The Expert Guide To Choosing A 4G Wireless Service

12) Facebook Investor Roger McNamee Explains Why Social Is Over

13) Dell Dupes Elderly Lady Into Installing System Mechanic ($131 For Three Years)

14) Thinking About Digital Music Services

15) What’s The Difference Between A Mac Address And An IP Address?

Professor Randy quotes Tony Robbins: “A real decision is measured by the fact that you’ve taken a
new action. If there’s no action, you haven’t truly decided.”

Tags:
comments Comments (0)    -
July 28, 2011 at 7:23 pm

Dell Dupes Elderly Lady Into Installing System Mechanic ($131 For Three Years)

Hello everyone,

About a week ago a very nice elderly couple asked me to set up their brand new Dell computer system. The couple were extremely excited about their new purchase (Dell Inspiron 560, Dell 20″ Monitor, Dell Printer, Dell Speakers, Dell Wireless Keyboard & Mouse – the whole works!).

I went through the entire setup process with great care and the couple was very happy with the results. I gave them an initial tutorial on Windows 7, made sure that they knew how to access their files and emails, carefully pointed out the new antivirus (Microsoft Security Essentials), and answered any questions that they had. The new computer was in pristine condition! I agreed to return for another tutorial the following week.

Sometime during the week the very non-tech savvy lady had a question about something and decided to call Dell support (she said she thought about calling me but didn’t want to be a “bother”). The Dell support representative asked the lady if he could remote into the computer. The eighty year old lady didn’t know any better so she allowed this request.

After some remote investigating and searching around, the Dell tech told the lady that the computer was in great danger!! No antivirus had been installed and the computer was wide open to malicious malware attacks!! “If something wasn’t done soon the computer would become infected”, he said.

As you can imagine the poor old lady was frightened and didn’t know what to do. The valiant Dell tech came to the rescue however and offered three years of System Mechanic for only $131.00. “System Mechanic is all you need for any kind of computer problem”, he said. What a deal!

The lady, not knowing any better gave her credit card number to the Dell representative and the dastardly deed was done: The Dell tech had deceived the nice old lady by remoting in, uninstalling Microsoft Security Essentials, and then scaring her into spending $131.00 for three years of System Mechanic (wanna bet that there was a little commission there?).

So there you have it. I’m outraged and the poor lady feels stupid and embarrassed. She trusted Dell. I told her to stop payment on the credit card and she said that she was going to call Dell and “give them an earful”. Good for her!

Professor Randy says: Since elderly people didn’t grow up with computers, they have a harder time getting accustomed to them. The last thing they need is to be “preyed upon” by unscrupulous tech representatives who are out to make a buck!

 

 

Tags: , ,
comments Comments (1)    -
July 26, 2011 at 12:13 pm

Computer Repair Tools That I Can’t Live Without (Part 1: Junk File Cleaners)

Hello everyone,

Where would a plumber be without his plumbing tools? Where would a carpenter be without his woodworking tools? And where would I be without my computer repair technician tools?

In my next few posts I’m going to list and explain the repair tools (both software and hardware) that I can’t live without. I use these tools everyday, they are my favorites, and I would heartily recommend them to anybody interested in repairing or optimizing their computer.

1) Cleaning Tools: Assuming that I can boot into the Operating System, the first thing that I usually do is get rid of all the unnecessary, junk files that have accumulated. I use four software “cleaners” to do this and even though it’s a bit of overkill, each program finds different files. The order of running these programs is unimportant.

A) CCleaner: I run both the file cleaner and the registry cleaner. This is a very well known program and does a good job. Beware of the “additional installs” that want to piggyback along with CCleaner. I have never had any issues with using the registry cleaner (it’s not overly aggressive).

B) PureRa: Another great small program. Cleans out some files that CCleaner doesn’t get to.

C) CleanUp: Cleans out the invisible Content.IE5 folder. I have seen it clean out as many as 6GB from this folder.

D) Revo Uninstaller: I use the free version and in the tools module there is a “junk files cleaner”. Revo gets many temp files that other cleaners miss. Along with the “junk files cleaner”, Revo is my favorite uninstaller in the whole wide software world!

Professor Randy says: Using the best tools will make all of the difference when repairing a computer. I have tested these tools time and time again where “the rubber meets the road”. Try them, you will love them!

Tags: , , , , ,
comments Comments (5)    -
July 20, 2011 at 11:45 am

Fifteen Great Tech Links For Wednesday 7/20/2011

 

Hello everyone,

Stay up to date with the latest tech news by clicking on these links. Enjoy!

1) Comcast Shuts Down Customer That Exceeded Bandwidth Cap

2) What The Police Can Learn From Your Smartphone

3) New York Times Continues Bizarre Anti-Microsoft, Pro Apple Bias

4) 55 Percent Ditching Netflix Over Price Hikes

5) Internet Explorer 9 Utterly Dominates Malware-Blocking Stats

6) BYTE Magazine Returns, With Foot In Mouth

7) Updated: Images Of Apple Products Upcoming Hardware Refresh

8) iPad 2 And Verizon iPhone Take Some Wind Out Of Android’s Sail

9) Hotmail Bans Common Passwords And Introduces Hacking Alert System

10) Microsoft Envisions A Universal OS, But It Might Not Be Called Windows

11) Dancing To The Drumbeat Of HTML5, New Pandora Is Brilliant, Beautiful

12) Spotify Review

13) 10 Essential iPad Apps For Computer Consultants

14) Facebook Scam Pretends To Connect You With Video Calling [WARNING]

15) Don’t Pay For Software You Don’t Need (Part 3)

Professor Randy quotes H.T. Leslie: “The game of life is not so much in holding a good hand as
playing a poor hand well.”

Tags:
comments Comments (0)    -
July 17, 2011 at 12:37 pm

Cell Phone Technology: How To Understand 3G, 4G, WiMax, EVDO, LTE, etc.

Hello everyone,

The cell phone scenario is quite confusing these days. Cell phone service providers want you to be uninformed so that they can manipulate you with big, impressive sounding tech words. Don’t be fooled – check out this great Hak5 video and “arm yourself” with the truth about cell phone network protocols:



Professor Randy says:
Don’t be a “sitting duck” for the cell phone service providers. A basic knowledge of cell phone network technology will allow you to avoid being taken advantage of!

Tags: , , , , , , ,
comments Comments (0)    -