Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,800 Topics
- 12,154 Replies
Fact or Myth: Good security software should detect WiFi Intruders
This is very much a myth. Some security suites crow about blocking WiFi Intruders and tout this as a critical function. In reality, not only is it Mostly Useless™, but it can have some seriously bad unintended side effects. A WiFi Intruder is a device connected to your private Wireless network without your permission. While it SOUNDS scary, and actually is dangerous, there are a lot of things to consider before taking action. First and most important, the chances of having an intruder when your router is properly secured are next to none. Open WiFi or WEP encryption do not count as “properly secured” and WPA is not quite as good as WPA2. With WPA2 encryption, somebody would need to work very hard to get into your network and would need to really know what they’re doing. It’s not an easy (and often not even possible) process. If they know how to do that, nothing but shutting down your computer will help. But you’re also more
Anybody tried Googling "Zerg Rush" lately?
Starcraft players will find Google's new easter egg quite amusing. Zerg Rush is also a term used in rooting an Android. I actually used Zerg Rush myself when rooting my Samsung Conquer. I love Google's easter eggs. I only know of a few others though. Has anybody seen any other ones?
Berkeley Freshman Transforms Dorm Room into Futuristic Bachelor Pad
Hey Guys, I just stumbled upon a fairly cool article on Yahoo about (see title), so I thought I'd share it: [url=http://news.yahoo.com/ridiculously-automated-dorm-room-draws-official-school-inquiry-170317304.html]Sweet Dorm Room![/url] Just in case you don't feel like reading much, here's your brief synopsis... Armed with a Mac Book Air, iPad, iPhone, and about $200 worth of store-bought electronic equipment, Cal Berkeley Freshman Derek Low decked out his dorm room to cater towards today's technology standards (modestly speaking). Dubbed "BRAD" (Berkeley Ridiculously Automated Dorm), the room features an array of futuristic amenities such as automatic window shades, voice-activated lights (which can be set to different modes like "sleep", "homework" and "romantic"), and an "emergency party button", which I am sure is the college crowd pleaser. And BRAD's idea of an alarm combines drawing back the curtains and turning on the ligh
Fact or Myth? "My password is fine, and doesn't need to change."
[b]Myth![/b] While “%14lugnut_(1776)-tutu” is better than “pass*word,” you’re still not completely safe. No matter how creative or intellectualized your password, there’s someone (or something) out there devoting 24 hours a day, 7 days a week, to breaking your weak code. Hackers also use [url=http://blog.webroot.com/category/malware/keyloggers/]keyloggers[/url], which can snatch and monitor keypad activity. Encrypt all you want – there’s still a chance your password will be passed along. [u][b]If you want some password help, check out these 3 options:[/b][/u] [b][/b] 1. Use phrases These examples let you use phrases that either mean something to you, or you associate with a type of website. For example: [i]2BorNot2B_ThatIsThe?[/i] (To be or not to be, that is the question – from Shakespeare) 2. Use your artistic side You don’t have to think of it just as the numbers you see, it can also be a canvas to draw on. [i]1qazdrfvgy7[/i], is really
Fact or Myth? "I already have antivirus software and don’t need more"
[b]Myth! [/b] [url=http://www.webroot.com/En_US/consumer-products-antivirus.html]Antivirus protection[/url] is a slicker in the storm and it’s great that you have it for inclement “conditions.” However, a new virus enters the web-o-sphere quicker than you can say, “Trojan-says-what?” Buy software that updates definitions regularly, preferably automatically. Also, antivirus software only stops viruses from infecting your system while you browse, which is great, but it’s not going to save you from a hacker’s super-smart coding hat trick. Get a multilayered solution that sweeps, firewalls, and safeguards.
Fact or Myth? "Only adult sites are dangerous."
[b]Myth![/b] More than [url=http://www.sophos.com/medialibrary/Gated%20Assets/white%20papers/sophosmythsforsafewebbrowsingwpna.pdf]83 percent of malware hosting sites[/url] are “trusted.” You’re more likely to be attacked by visiting a legit shopping or general lifestyle site than you are an adult or gambling site. Go ahead and do whatever you need to do with this information, but do it safely. If you're in need of protection, click on that fancy Webroot logo at the top of your screen and view our products.
How to Protect Your Personal information: Mobile Devices
[b]As the mobile device industry continues to boom, we should all take a moment to make sure our devices and personal information are secured from threats.[/b] Here are some basic steps to get you started: [b]Smartphones need to be updated when security fixes are developed[/b]. Though basic phones generally don’t get updated, smartphones are essentially computers and they may need updates. While some updates simply provide you with cooler functionality and upgraded features, others fix critical security vulnerabilities that you do not want to be exposed to. Your service provider should notify you whenever an update is available; ignore these at your own peril. [b]Security software is a must for smartphone users.[/b] The mobile malware market is booming -and because few users protect these devices they are particularly attractive to hackers and cybercriminals. The fixes phone manufacturers make to their operating systems do not protect you from other types of m
Spring Break Security Tip #3: Back Up Everything
[b]Back up everything on any device you intend to bring[/b] Laptops aren’t the only data-rich devices we carry around anymore. Increasingly, we’re carrying sensitive data on our MP3 players, portable hard drives and thumbdrives, and smartphones (and the tiny memory cards inside of them), simply because it’s convenient to do so. Don’t wait until disaster strikes and you realize you’ve left your iPhone in a taxi in another state (or worse, another country). [url=http://www.webroot.com/En_US/consumer-products-secureanywhere-complete.html]Back up everything[/url], as if you might never see the device again, before you hit the road. You should also password protect your devices. If you have a laptop, set up a login to access your desktop. If you have a mobile device, set up your access code. It may also be a good idea to install an app that [url=http://www.webroot.com/En_US/consumer-products-mobile-security-android-phone.html]remotely wipes[/url] your data—just in case
An ounce of prevention is worth a pound of cure
If your computer is connected to the internet, you have probably noticed Windows Update notifications in your system tray. While you may understand the necessity of Windows Updates, many people are unaware that Adobe and Java updates are just as important for your computer's function and security. In a recent post to the [url=http://blog.webroot.com/2012/01/11/adobe-issues-a-patch-for-critical-security-holes-in-reader-and-acrobat/]Webroot Threat Blog[/url], our Internet Security Experts recommended downloading Windows, Adobe, and Java updates as soon as they are available. Malware writers are always looking for easy ways to get around your computer’s security. According to a study by [url=http://www.theregister.co.uk/2011/09/28/window_malware_infection_exposed/]CSIS Security Group[/url], 99.8 % of all virus/malware infections can be attributed to un-patched Adobe, Java, QuickTime, Internet Explorer and Windows updates. They exploit common 3rd-party plugins, including those mention
Spring Break Security Tip #2: Auto-Pay
[b]Set up automatic bill-pay for your regular bills before you leave[/b] Being able to pay all of your bills online may leave you complacent about doing so in a public place, but you really shouldn’t be logging into your bank and cutting electronic checks for your utility bills while you’re on the road. Most banks offer free automatic bill payment services. Take advantage of them if they’re available, so you don’t miss a monthly charge. If, for some reason, you can’t set up automatic bill payment, try paying off your bills just before you leave, or pay more than the monthly total if you’ll still be travelling during the end of your next billing cycle. If you must pay a bill online while you’re on vacation, create a temporary password and change it as soon as you return home. ([url=http://community.webroot.com/t5/Rumors-and-Myths/Fact-or-Myth-quot-My-password-is-fine-and-doesn-t-need-to-change/m-p/524/highlight/true#M12]Click here for help with passwords[/url])
Spring Break Security Tip #1: WiFi
It can be tempting to take advantage of free WiFi access points in airports, hotels, or in cafes, but resist the urge to use those connections to do anything other than browse for a map or train schedule. Unsecured wireless connections — such as the open ones that some businesses provide as a service — can also leave you vulnerable to wireless snooping of your logins, email messages, or instant messages by other travelers or guests. The same can be said for untrusted computers in hotel business centers or cybercafés, which are magnets for data-stealing malware. If the connection doesn’t ask you to provide a WPA key, assume the connection is not secure, and treat it as such. If you must use a free wireless connection, turn off any programs that automatically connect to the Internet (such as email clients or file-sharing tools) before you hook up, and try to access sites by typing “https” at the beginning of the URL. Lastly, please don’t use the untrustworthy PC in t
Fact or Myth? "It's okay to post travel plans on social networks."
[b]Myth![/b] It may seem fun to brag to friends and acquaintances on social networks about your upcoming trip to a beach-party paradise, but you might want to resist the temptation to call too much attention to the fact that you’re leaving behind an empty, unattended apartment or house for weeks at a time. Burglars have already begun to turn to Facebook and Twitter to find homes that may be vacant during a holiday absence. Don’t make their job any easier for them by giving them your travel itinerary. Of course, if you feel compelled to post vacation snaps on the road, modify your privacy settings so only your closest friends see those notifications. At least then you’ll have a starting point for the police when they begin investigating the burglary of your home. And speaking of social networks, it’s a best practice to copy and paste links instead of clicking on social sharing icons while you’re on vacation. Using these icons opens the risk of [url=http://blog.webro
Digital Literacy: Let's Start from Square 1
Today's work environment demands at least a basic understanding of computer skills ([url=Read the fact sheet on digital literacy here: http://www.digitalliteracy.gov/sites/digitalliteracy.gov/files/Digital_Literacy_Fact_Sheet_051311.pdf]check out this fact sheet[/url]). And it's never too late to learn these skills, no matter what age you are. If you or someone you know would like to learn the basics of digital literacy - right down to the mouse click - there is a great place to start. [url=http://www.digitalliteracy.gov/content/learner]DigitalLiteracy.gov[/url] is collaboration of government and other entities that aim to "enhance the tools necessary to learn computer and Internet skills needed in today’s global work environment." Among the many tools available, you can also find [url=http://www.digitalliteracy.gov/content/workforce]job resources[/url] and even an [url=http://tech.tln.lib.mi.us/tutor/]online user tutorial[/url] to walk you throug
Web Based OS - Boot to Gecko
Just an interesting article, I am not really for or against, just an interesting concept. As with all tech, it may go no where or it might actually gain some traction. If it does gain traction, the need for Security will be higher than ever! [url=http://money.cnn.com/2012/02/28/technology/boot_to_gecko/index.htm]http://money.cnn.com/2012/02/28/technology/boot_to_gecko/index.htm[/url] -Keith
How do I delete search browser hijacker? search-milk.net
Anyone know how to get rid of the search browser hijacker? It is search-milk.net. I downloaded Webroot Anywhere 2012 last week, but I can't get it to find it...wondering if it I need an additional program from Webroot? The reading I have done thus far, has said this is a bad malware/spyware program. Help.
Fact or Myth? "Android is the most targeted mobile platform."
[b]Fact![/b] According to our partners at the Juniper Networks Mobile Threat Center, there was a 3,325 percent jump in malware targeting the Android platform over the last 7 months. To find out where the majority of malicious apps were found and which malware type was the most popular, read the full story from the Webroot Threat Blog. [url=http://blog.webroot.com/2012/02/17/report-3325-increase-in-malware-targeting-the-android-os/]>> Read More[/url]
How Not to Destroy a Kid's Online Reputation
Online browsing and social media sites [url=http://www.pewinternet.org/Reports/2010/Reputation-Management.aspx]play a central role[/url] in building your identity online. This means that kids are especially susceptible to publishing regrettable content online. If you have a teen who is active online, here are some way to keep them from crossing over to the proverbial Dark Side: [b][u]Teach them that they are searchable online[/u] [/b]The Pew Internet Project found that “two thirds of online teens are content creators–meaning they create videos, post photos, write blogs and message boards." While these activities serve as a way to participate in social networking, teens run the risk of posting something they might later regret. According to one study, 19% of adults use search engines to discover a person's professional contacts (coworkers, competition, etc), and 11% use Google as a tool to weed out applicants for jobs. The bottom lin
Before you buy from an online classified ad
Purchasing items through an internet classified site is a great way to find the items you’re looking for at a terrific price, but there are risks you take when you do. Your first line of defense is to use reputable services and follow closely any advice the site gives about buying safely. [b]How to respond to an ad[/b] [list] [*]If the ad seems too good to be true, it probably is. There is a fine line between a great deal, and getting scammed or stuck with stolen goods. If the site allows you to see seller reviews, check these out and avoid anyone with a questionable sales history. [*]If you want the convenience of allowing the seller to call you (as opposed to responding by email through the service), provide a free disposable phone number. You can get one easily by searching on ‘disposable phone number’ and selecting from one of several companies that provide this service. Don’t put your personal phone number in your response to an ad – you don’t want people to be able to har
10 Helpful Pointers for Selling Items Online
[list=1] [*]Stick to the facts of the item being sold. Leave out personal information, including your email and phone number, if you can help it [*]Look hard at any photo you post. You don’t want it to include house numbers in the background, or license plate numbers, family members, etc. [*]Understand that many out-of-area buyers are associated with fraudulent deals [*]If anything feels “off,” stop contact. It’s always a good idea to chat on the phone for a bit about the item for sale and be wary of erratic or nonsensical behavior on the phone [*]Make it clear that you will only accept cash for the item. Other forms of payment are highly likely to be fraudulent [*]Don’t accept partial payment or anything other than cash for the transaction. If the method of payment changes from your previous agreement, walk away from the deal [*]Agree to meet during daylight hours in a public place and bring a friend to accompany you. With high profile items, it’s okay to ask for proof of identity suc
How to Secure Your Mobile Device
People ask us all the time, "What are some basic ways to keep my personal data safe on my smartphone or tablet?" And it's a great question, since mobile devices are exploding in popularity. To that end, here are some basic, need-to-know tips for securing your mobile device: [b]Know your apps:[/b] Download apps only from a trusted source, like the Google Market, Apple App Store or Amazon App Store. Closely scrutinize the permissions the app requests, and don't install it if it wants to access certain functions that it doesn't need, such as the ability to send SMS messages. User reviews are also helpful. [b]Lock your device:[/b] Most smartphones and tablets give you a choice of locking the device with a password, numeric code or pattern. Take advantage of this – if nothing else, you'll prevent practical jokesters from emailing your boss if you leave your device unattended. [b]Explore mobile security services:[/b] Mobile security apps provide lost de
Child Safety Online: What Every Parent Should Know
Apart from grounding your kids or having the awkward “we need to talk” talk, there are some serious risks for kids who are connected all the time. The truth is, even if parents trust that their kids are making the right decisions online, threats such as online predators, inappropriate content, and cyberbullies are real. The Internet safety for children advocacy group, [i]ikeepsafe.org[/i], brings to light three main risks associated with all connected technology: [b]Inappropriate Contact[/b],[b] Content[/b], and [b]Conduct[/b] (the 3 C’s). [b]Inappropriate contact[/b] occurs when strangers or predators online reach out to kids to establish new relationships or to engage in regular communication. “The Internet is a place to enhance existing relationships, not a place to meet new people,” warns the organization. And it happens more than we would like to think. A recent study done by [url=http://www.redorbit.com/news/technology/2065158/study_examines_online_beha
Fact or Myth? "I can still get infected, even if I don't download files."
[b]Fact![/b] Back in simpler times, you had to keep a close watch on .exe files. Now, malware infections can occur through “[url=http://en.wikipedia.org/wiki/Drive-by_download]drive-by[/url]” downloads. The malicious code lurks on seemingly innocent content, which then executes automatically via vulnerabilities in your browser without your knowledge. In other words, you never know what hit you. Cybercriminals are even using advanced distribution platforms to deliver their drive-by exploits. Webroot Threat Researcher, Dancho Danchev, recently gave us a glimpse into one of these platforms, a Java-based platform called AnonJDB, which you can read about [url=http://blog.webroot.com/2012/01/17/inside-anonjdb-a-java-based-malware-distribution-platforms-for-drive-by-downloads/]here.[/url] [url=http://www.infosecurity-magazine.com/view/19909/black-hat-2011-google-android-as-vulnerable-to-driveby-downloads-as-pcs-claims-dasient-research/]Research[/url] also suggest
Fact or Myth? "There is nothing valuable on my computer."
[b]Myth![/b] [b][/b] [b][/b]So you don’t have major financial institution spreadsheets on your hard drive or a database of Beverly Hills socialites’ social security numbers. You probably do have an email password, access to at least one [url=http://protectme.webroot.com/articles/sure-footed-social-networking.html]social networking[/url] site and a resumé in your documents folder, which are all someone needs to steal your identity. Think about it – all your juicy lifespan details are listed: your alma mater, work timeline, etc. See, you do have something valuable on your computer – and it’s worth protecting.
How to Outsmart Online Tax Scams
Online tax season is rife with phishing scams as cybercriminals try to fool us into giving away our private information. Make sure you stick to the following 5 tips, before you file, to outsmart their antics: [b]1. Outsmart email scams[/b] Imposters might solicit information from you through email. Scam messages typically contain dire warnings or outrageously large promises for a refund. The messages often are presented as if they originate from the IRS, HMRC, or the Social Security Administration but contain links leading to phishing Web pages (where your banking, credit card, and personal details are stolen), or malicious attached files instead. It’s important to know that the IRS does not discuss tax information via email, nor do they ever send warnings, advice, links to their website, or ask for information through email. [b]Tip: [/b]If you receive such a message, don’t reply to the sender, don’t open any attachments, don’t email your personal informatio
4 Ways to Backup Your Music
Here are 4 simple ways to backup your music (and prevent headaches down the road): [b]1. Use External hard drives[/b] This portable storage device gives you the freedom to back up more than one computer. It’s user-friendly and you can get 1 Terabyte (about 250,000 or more songs) for way less than you paid for your [url=http://www.8-track-shack.com/blog/2009/12/worlds-largest-8-track-tape-collection/]8-track collection[/url]. However, external hard drives, like the hard drive on your computer, can crash; you may also lose the device as it’s quite sleek and inconspicuous these days. [b][/b] [b]2.[/b] [b]Use CDs/DVDs[/b] This is another convenient and popular backup option for digital files. If you have the time, you can burn your entire collection to discs and keep them in a safe place. The challenge with this method is that they can get scratched easily, and it’s kind of like taking a step back, frankly. A major advantage to owning digital files is that they create less dis
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.