Friday, September 24, 2010

Facebook password scam warning!

If you get an e-mail telling you your Facebook password has been changed and a new one Is attached, delete it immediately -- it's the latest Facebook scam, according to an alert from the Better Business Bureau.

Here's what it looks like:

From: Facebook, Artemus Rubert [mailto:amazor@facebook.com]
Sent: Wednesday, September 22, 2010 2:48 AM
To: MY EMAIL ADDRESS DELETED
Subject: Facebook password has been changed.

Dear user of facebook.
Because of the measures taken to provide safety to our clients, your password has been changed.
You can find your new password in attached document.
Thanks,
Your Facebook.


"With 500 million users, Facebook is one of the largest breeding grounds on the Internet for 'phishing' scams," said BBB President Tom Bartholomy in a statement. "Scammers are looking for any hook to get you to click on their links or attachments so they can get to your personal information."

The BBB warning comes exactly one day after their last Facebook scam alert, cautioning users to beware of another phishing scam known as "clickjacking," which tricks users into clicking on a link that triggers a program bombarding their e-mail accounts and everyone in their address books with spam.

Although Facebook did not immediately respond to a request from Consumer Ally to comment, these scams are literally becoming a daily occurrence, due primarily to the extraordinary amount of Facebook users, which at half a billion, exceeds the population of every nation on earth -- apart from India and China.

If Facebook's rapid growth continues, it's on course to exceed the total number of Internet users in China, which the Economist places at 420 million. According to Facebook, more than 50% of its 500 million active users log on in any given day and spend more than 700 billion minutes per month on the social networking site.

Apart from the enormous target of opportunity presented by the sheer number of Facebook users, scammers are undoubtedly aided by the fact that many Facebook users are young, and as such, probably more gullible and prone to click before they think.

The BBB urges Facebook users to be on the alert for the following red flags to avoid becoming a victim of identity theft:

Password changes -- Facebook is NOT going to send you an e-mail with a new password. If Facebook suspects fraudulently activity with your account, it will send a direct message to your Facebook account, and instruct you to go to your "Settings" button to change your password yourself.

Attachments/Links -- You should always be suspicious of e-mails that instruct you to download an attachment or click on a link. Attachments and links are the primary methods by which viruses, spyware and malware are spread.

E-mail address – If you only have your personal email address on your Facebook account and you get a "Facebook" e-mail on your business account, you should be suspicious and not open the e-mail.

Grammar, punctuation and typos – The grammar and incorrect punctuation used in the latest e-mail scam indicates that English is probably not the sender's first language. "Dear user of Facebook" is an example. In American English, it would more likely be "Dear Facebook User." Grammatical errors and awkward phrasing are tip-offs that the sender is probably in another country and that the e-mail is a scam. This is a red flag for any suspect e-mail you get, as most corporations will have any written information they send out to users and clients professionally copy edited.

The BBB also offers this general advice to stay safe online:

Delete any suspicious e-mails as soon as you receive them.
Do not click on any links.
Do not download any attachments.
Do not call any telephone numbers that may be in the e-mail.
Protect your computer with a good quality, up-to-date, anti-virus software program.
Since many Facebook users are young people, parents should talk to their children about Facebook scams and how to spot them. Young people are very computer savvy, but may not be scam savvy.

Tuesday, August 17, 2010

Danger: Facebook 'Dislike Button' Is Just Another Scam

Not to be party poopers or anything, but you know all those statuses you've seen on your friends' Facebook profiles, claiming to have finally installed that elusive 'Dislike Button?' Totally fake. Tragic news, we know, but, as of now, there's still no official dislike button, and anyone with a status claiming otherwise is just another victim of the latest scam to hit Facebook. As Sophos explains, the scam seems to be spreading through status updates that read, "I just got the Dislike button, so now I can dislike all of your dumb posts lol!!" or, alternatively, "Get the official DISLIKE button NOW!" Both versions, predictably enough, are followed by a link.

Of course, you're not gullible enough to actually click on the link, because if you did, you'd end up on a page asking you to 'install' the button. At this point, your internal alarms should go off, because if the dislike button were real, Facebook would've just automatically added it to your profile. If, on the other hand, you go ahead and click through the installation process, you'll have to first grant the app permission to run on your profile. The app will then automatically post the same link and message to your profile, before asking you to fill out a survey in order to complete the installation. Upon filling out the survey, you'll land on a Firefox add-on called FaceMod, which offers something called the "Facebook Dislike Button (the Original)."

At this point, it doesn't seem like the FaceMod add-on has anything to do with this scam, aside from providing a convenient cover for whoever's trying to make a few cents off these surveys. There's also no indication that the add-on is corrupt or malicious -- but it's definitely not official. So if you want to install FaceMod's button, you should probably do so directly from Mozilla's add-on site, and not through some suspicious link you find on your Facebook feed. For our money, though, we'd recommend holding off until an authentic dislike button comes along -- even if it means waiting for a long time.

Friday, July 2, 2010

How to Tighten Your Browser's Security

One of the most basic ways to protect your computer from potentially harmful online content or malicious software is easy, fast and free. How? Just make sure your browser's security settings are set at the appropriate level.

No matter which browser you use, always follow these top five security tips:

1. Delete spam messages without opening them or replying to them.
2. Use great caution when clicking on links sent to you in e-mail or text messages.
3. Do not open e-mail attachments unless you know the sender and you're expecting the attachment.
4. Create strong passwords. Use different passwords for your online banking accounts.
5. Make sure you use a firewall, as well as antivirus and antispyware software that is automatically updated.

What are the security settings on your browser? Here's how you can find out in Internet Explorer and Firefox.

How to check your Internet Explorer security settings:
1. Open Internet Explorer.
2. Click the Tools button and then click Internet Options.
3. Click the Security tab.

You will see four security zones:
• Internet: The level of security for the Internet zone is applied to all Web sites by default. The security level for this zone is set to medium-high, but you can change it to either medium or high. The only Web sites for which this security setting is not used are those in the Local Intranet zone, or sites that you specifically entered into the Trusted or Restricted Site zones.

• Local Intranet: The level of security for the Local Intranet zone is applied to Web sites and content that is stored on a corporate or business network. The security level for the Local Intranet zone is set to medium, but you can change it to any level.

• Trusted Sites: The level of security for Trusted Sites is applied to sites that you have specifically indicated to be ones that you trust not to damage your computer or information. The security level for Trusted Sites is set to medium, but you can change it to any level.

• Restricted Sites: The level of security for Restricted Sites is applied to sites that might potentially damage your computer or compromise your personal information. Adding sites to the Restricted zone does not block them, but it prevents them from using scripting or any active content. The security level for Restricted Sites is set to high and cannot be changed.

As you move around the Internet, IE automatically changes the security zone as needed and sets your security level for each Web site by default, ranging from low or medium-low for a corporate Intranet site, to high for a restricted site.

How to view or change the security settings on Internet Explorer 7/8:
In addition to these default security levels, you can customize individual security settings.

1. Open Internet Explorer.
2. Click the Tools button and then click Internet Options.
3. Click the Security tab.
4. Click the "Custom level..." button.
5. At the bottom of the pop-up box, you can reset the security setting to something higher or lower. Settings that are not at recommended levels will be highlighted in red.
6. If you modify your security settings and want to change them back to the default level, follow the above instructions through step 4. Then click on the "Reset all zones to default level" button.

How to view or change the security settings in Firefox 3x:

To make sure your security settings offer you the most protection, do the following:

1. Open Firefox.
2. Click on the Tools button and then click Options.
3. Click on the Security tab.

Step 1: Make sure the first three blocks are checked:

• Warn me when sites try to install add-ons.
Firefox will always ask you to confirm installations of add-ons. To prevent unrequested installation prompts that may lead to accidental installations, Firefox warns you when a Web site tries to install an add-on and blocks the installation prompt.

• Block reported attack sites.
Firefox will check whether the site you are visiting may be an attempt to interfere with normal computer functions or send personal data about you to unauthorized parties over the Internet.

• Block reported Web forgeries.
Firefox will actively check to determine whether the site you are visiting may be an attempt to mislead you into providing personal information, often referred to as "phishing."

Step 2: Passwords

Firefox saves your passwords by default, but if anyone else ever uses your computer, turn this feature off to protect your password security. To do this:

1. Open Firefox.
2. Click on the Tools button and then click Options.
3. Click on the Security tab.
4. Uncheck "Remember Passwords for Sites."

If you share your computer with others, you can set a Master Password in Firefox. This allows you to keep secure the username and passwords of Web sites you visit so no one else but you can access this information. To set a Master Password:

1. Open Firefox.
2. Click on the Tools button and then click Options.
3. Click on the Security tab.
4. Click "Use a master password." You'll be prompted to enter a password. (You can also follow these steps to change your Master Password.) A password-quality meter will judge the security of the password you have chosen.

IMPORTANT: Make sure you remember your Master Password! Without it, even you will not be able to access any of the information it protects or change the password.

Step 3: Warning Messages
1. Open Firefox.
2. Click on the Tools button and then click Options.
3. Click on the Security tab.
4. Click the Settings button that appears to the right of "Choose which warning messages you want to see while browsing the web."
5. At minimum, make sure the box is checked for "I am about to view a page that uses low-grade encryption."

Monday, June 14, 2010

Safe Surfing this Summer

• Use security software that updates automatically.

Anti-virus software protects your computer from viruses that can destroy data, crash your computer or slow it down tremendously. Viruses can even allow spammers to send e-mail through your account. Anti-virus works by scanning your computer and your incoming e-mail for viruses, and then deleting them.

Anti-spyware software detects software that has been installed on your computer without your consent for the purposes of monitoring and/or controlling your Internet usage. Spyware can send pop-up ads, redirect you to websites you never intended to visit, and capture your keystrokes. All of this may be done to steal your identity or other personal information.

Firewalls guard against attempts to send your personal information out from your computer without your permission. A firewall will block communications to and from sources that you don’t permit.

• Be sure to use the privacy settings provided by your social network provider. Facebook, MySpace and other sites provide security settings. It’s up to you to use them.

In addition to technical protections, you should also take some physical precautions when traveling to protect electronic devices – both personal and company-assigned.

• Don’t let your PC or other mobile device out of your sight. You never know who is watching. Airports, coffee houses and other hot spots are perfect locations for someone to pick up and walk off with your device.

When traveling by air – don’t store your devices in checked luggage. You should always carry it on. Luggage is often damaged, misdirected or lost. If your device is with you at all times, you minimize that risk.

When traveling by vehicle – remember that parked cars are a popular target for theft. That’s especially true if merchandise or electronic equipment is visible through windows. If you must leave your device in the car, keep it out of sight.

In coffee houses and restaurants – don’t leave your device “just for a minute.” As quickly as you turn your back, someone could swipe your PC, BlackBerry or iPad from the table and exit the building.

In hotel rooms – try not to leave your electronic devices behind. If you must, use the in-room safe to store your belongings. You may also consider using the “Do Not Disturb” sign to discourage anyone from entering your room.

Taking just a few precautions will help ensure a summer of safe surfing . . . Web surfing, that is.

Wednesday, May 12, 2010

My Computer Takes Forever to Boot Up!

A friend calls -- did you get my email? Did you see that hilarious video? Have you heard that new song? You turn your computer on, eager to see what the fuss is all about … and wait. The little hourglass taunts you, tempts you, but you know clicking won't help. The hard drive grinds away. Speaking of grinding, maybe it's time to get a cup of coffee. Sigh.
One of the most common complaints we hear is how long it takes to start up a computer. In some cases it can take as long as 20-30 minutes before a PC is really ready to go. Some choose to get around that problem by leaving their computers on all the time, but that's a waste of electricity, and it may not be good for the overall health of a home computer to be left running 24/7. Isn't there a better way?

Older computers are, of course, more likely to suffer from these symptoms. But simply buying a new computer isn't a feasible solution for everyone, especially when times are tough. Nor is cracking open your PC's case to add memory. Rather, there are steps one can take without spending a lot of money -- and without using a screwdriver -- that can help reduce the time it takes to start up.

A Word About Anti-Virus Software

Before we begin, we would be remiss if we didn't mention anti-virus software. It's true that running anti-virus software will cause some delay in startup. But we do NOT recommend removing anti-virus software to improve startup speed -- such protections are a crucial defense against online threats. Rather, we recommend that you ensure you're running updated security software -- newer versions tend to be better about hogging system resources. For more information, look at previous issues of our blog or visit us at facebook.com/WebAddo.

Startup Slowdown

One of the primary culprits on a slow-starting PC is the array of junk that has been placed on the machine by the programs we use (and don't use). Many of the programs installed on our computers require the PC to do something at startup so they'll load more quickly when you want to use them. But often there are programs we no longer use, or use rarely, that are bogging down boot-up.

You can see what programs are on your computer's startup list by clicking the Start button, then Run, then typing MSCONFIG, then pressing Enter. The System Configuration Utility appears -- click the Startup tab. This displays everything that loads in the background when you start your computer. If it's a very long list, it's probably slowing you down.

Look through the list and see if you recognize anything you don't or rarely use. Be careful -- you don't want to remove everything! We recommend leaving any drivers for your graphics/video controller and other peripherals, as well as any antivirus or firewall software. But if you look closely you can probably spot unnecessary extras that could be eliminated.

A process library site (which you can find in Search) can help explain what individual startup items do and if they are needed. If you find a program you can live without, uncheck it on the list; when you're done, click OK and you will be prompted to reboot.

Font Fog

Another little-known trick is to remove fonts. Each time Windows starts up, it loads every font on your machine. The more fonts you have, the longer it takes. Most of us tend to use the same few fonts for almost everything we do, so if you find your computer has more than a few hundred installed, you may want to consider cleaning out the list.

The steps for removing fonts varies by the version of Windows you're using, but here are instructions for Windows XP from Microsoft Support. One thing to consider before you remove any fonts is whether you might want them back one day. If that's the case, you can remove fonts from the Fonts Folder and copy them elsewhere on your hard drive; doing so will prevent the fonts from loading at startup, but make it easier for you to restore them if you change your mind down the road.

Other Ideas

A little "spring cleaning" on your computer often helps improve performance. Getting rid of old files, cleaning and defragmenting your hard drive, removing viruses and spyware, and uninstalling software you no longer use helps your machine run more efficiently. For tips and tricks to help speed up your PC, click here.

Finally, if you're not sure about making these kinds of changes on your own, there's software that can help do it for you. AOL offers System Mechanic and PerfectSpeed, both of which help speed up a struggling PC by removing unnecessary startup items, cleaning your hard drive, updating your Windows registry and more.

Tuesday, April 20, 2010

New porn virus holds your browsing history hostage

In the beginning, most computer viruses were simply aimed at causing trouble for users and giving the virus creator bragging rights. But increasingly, these individuals and organizations are writing viruses aimed at making them rich. The most recent example is a virus that threatens to publish your browsing history online unless you pay a ransom of $15.

The virus which is reportedly the work of a Japanese gang, infects computers that connect to a Winni, a popular file-sharing site in Japan that claims up to 200 million users, and enables the download of an illegal game file. Once users download the infected file, the program takes a screenshot of the the sites they have visited online, often including sites that users wouldn't want their spouses, family, friends and employers learning about; and puts it online under their name.

If the user doesn't pay $15 U.S. immediately, the file will go live online and eventually be picked up by Google and incorporated into search results. With more employers turning to Google for a look at job candidates, this type of information could be a deal breaker if you've been surfing the seedier side of the Web.

In the instance of the Kenzero virus, the BBC reports that 5,500 individuals have already admitted to being a victim of the virus, which was distributed in a target-rich environment. The Winni file-sharing site is known for, amongst other file types, pornographic material. Combine the potential for embarrassment with the relatively low ransom and the virus-writing gang has the potential to make a significant amount of money (and gather credit card details as well).

The easiest way to avoid viruses like this is to avoid downloading copyrighted material illegally. In addition, you should also be sure to have an up-to-date antivirus program like AVG Free or the reputation-checking Norton 360, to keep you protected from viruses that make their way to your computer. If you do become the victim of a ransom-ware virus, don't give the criminal your credit card number, unless you want that information sold to the highest bidder.

While you're at it you should look at using your browser's private browsing mode when you are visiting sites that you don't want to share with other users of your computers, or in this case the world. In private browsing mode, the browser doesn't store information about the sites you visit. Here's how to turn on private browsing in Firefox, Google Chrome, Safari and Internet Explorer.

Now go out and surf -- but be careful out there!

Never Say THIS on Facebook or Twitter

The most dangerous thing you can post to your Facebook page or Twitter account is information about where you're going when you are not at home.

By telling the world you are on vacation in the Bahamas, or even just eating at your favorite local restaurant, you're letting potential thieves know that you're not at home.

Financial writers Ken and Daria Dolan warn that how you use Facebook and Twitter can be hazardous to your wealth!

"Burglars are fond of your constant updates," the Dolans told AOL. "Would you stand up in the middle of a crowd of strangers and announce that you're leaving on vacation for three days and then tell everyone your address? Of course not, but that's exactly what you are doing if you share such information online."

They cite the case of an Arizona man who told his 2,000 Twitter followers that he was leaving town. When he returned, he found his home had been burglarized and video equipment, worth thousands of dollars, had been stolen. "Even saying you are running to the mall, going out to dinner...is too much information," the Dolans explained to AOL.

One Web site recently found itself in the news for bringing attention to the problem. The site pleaserobme.com was designed to show how easy it is for anyone to sift through Twitter updates for a "feed" of people's current locations. The recent buzz caused confusion, because of course the site was not intended to give criminals the keys to your home. But it did achieve its goal of bringing much-needed attention to the potential danger.

Some insurance companies are catching on.
Legal & General Insurance in New England says Facebook and Twitter users could be hit with higher homeowner's insurance premiums. Why? All that blabbing about activities away from home means they face a higher risk of burglary.

The company thinks burglars are actually "shopping" for victims on social media sites, looking not only for an indication you're not at home, but also photos of your home and valuables. That cute picture of your son hugging the dog? A burglar is looking in the background, eyeing your big-screen TV and new stereo system.

And it's not just adults. Teenagers are even more likely to post personal information, so Legal & General has warned that parents who aren't even online themselves could face higher homeowner's insurance premiums if their children are online.

Thursday, March 4, 2010

Five Things to Consider When Buying a Computer

#5: Software

When it comes to purchasing pre-loaded software with your computer, our advice is to avoid it at all costs. Most companies, like Dell and HP, will allow you to decline at least some of the crapware that comes loaded on a PC, but only Sony offers the option of getting an unmolested Windows 7 install. While it's tempting to have Microsoft Office and security software (a necessity on a Windows machine) preloaded on a new PC, you can often save yourself time and money by buying exactly what you want elsewhere and installing it yourself. In fact, you can save hundreds of dollars by skipping over Microsoft Office when ordering a PC. For one, it can be had for steep discounts through schools and employers, and, unless you absolutely need all of the advanced features of Excel, can be replaced by other tools like Open Office, Google Docs, AbiWord, or iWork.

Microsoft offers free downloads of video editing software, photo management tools, and security software. When combined with Windows Media Player, those programs comprise a suite comparable to Apple's iLife in terms of functionality, if not quality. Most Linux distributions also come with similar collections of software installed. For example, the popular (and Switched recommended) Ubuntu ships with Open Office, Rhythmbox Music Player, and F-Spot Photo Manager. There are, of course, plenty of other free and commercial software options that don't come with your OS.

The volume of options out there might make shopping for a new computer seem intimidating, especially when you're looking for a Windows PC. But don't freak out; it's just a matter of identifying what's important and how you'll use it. Once you've got that figured out (with a little help from us of course), picking out a PC isn't any tougher than buying any other gadget. All it takes is a little patience and some common sense.

If you have any questions about what kind of equipment to buy for your business, call WebAddo at 770-217-7350.

Tuesday, March 2, 2010

Five Things to Consider When Buying a Computer

#4: Extras

At this point, USB ports and Gigabit Ethernet are standard features in desktops and laptops alike, so we won't waste your time talking about them. There are still a few hardware options worth mentioning, though.

Wireless

If you're getting a laptop, Wi-Fi is a given. You'll want to make sure you get one with an 802.11n card in it. Wi-Fi is less important in a desktop machine that won't be moved much, but, if you don't want to place it near your modem or router, you may want to consider wireless.

Bluetooth is also worth considering if you want to sync a smartphone, or use a wireless headset with Skype. Lastly, serious road warriors will want to consider a dedicated 3G WAN card for getting online when Wi-Fi isn't available.

Printer

If your aging printer is up for replacement, you can snag a great deal (or free printer) when buying a new computer package from many stores. Those that print a lot of text documents will want a laser printer, while users who only occasionally print charts, graphs, and Web content would benefit from an ink-jet. Shutterbugs may want to consider a dedicated photo printer.

Monitor

If you bought a desktop, you'll probably need a monitor (or two). Go with a 20-inch model or larger (any smaller and you might as well have gotten a laptop) with at least a 1600x900 resolution. For anything larger than 20 inches, you'd be wise to jump to a full 1080p screen.

Tuesday, February 23, 2010

Five Things to Consider When Buying a Computer

#3: Computing Power

Here are some guidelines to follow when assembling your new PC's innards. Your choices in OS and form factor don't make a lick of difference if you don't have the computing power to put them to good use.

CPU
While you can still buy computers powered by Intel's Core 2 family of processors, you'd do better to skip them in favor of the newer Core i3, Core i5, and Core i7. If you'll only be using your computer for Web browsing and the occasional Office document, the i3 should be fine. Users who might do light photo editing, watch HD video, and are serious multi-taskers should opt for the Core i5 series (and preferably 6xx models when shopping for desktops). The most demanding users will want a Core i7. These quad-core processors are built to handle HD video editing and sophisticated games.

AMD has a few viable choices for budget-minded computer shoppers. Its Phenom II X4 processors offer great bang for the buck, but they can't compete with Intel's best offerings. And here at Switched, we're of the opinion that buying a new PC is not the time to start scrimping.

In a netbook, there is really only one logical option: Intel's new Atom N450.

RAM
When it comes to RAM, more is better. As a rule, 4 gigabytes (4GB) is the minimum you should accept in a desktop or laptop. Obviously, 6GB is better, but a jump to 8GB would benefit only gamers and heavy media editors.

Storage
Just like RAM, hard drives are a "bigger is better" affair. Look for 250GB drives in laptops, and 500GB drives in desktops. Of course, if you plan to store lots of videos, photos or music, go bigger -- or, invest in an external USB drive.

Optical DriveDo you have or want to build an extensive collection of Blu-ray discs? (Don't worry, neither do we.) Will this computer be serving as your primary vehicle for consuming entertainment? If you answered in the negative to either of these questions, skip the Blu-ray drive, and stick with the significantly cheaper DVD burner that comes standard in all but the tiniest of PCs.

Graphics CardMost users will welcome integrated graphics by way of Intel's GMA HD series, NVIDIA's 9 series, or one of AMD's myriad options. Those cards will handle Windows 7 eye candy, HD video, and anything the Web can throw at them with aplomb. However, gamers and users who do a lot of video or photo editing, will want to opt for a discrete card from either AMD or NVIDIA. AMD's 4xxx line and NVIDIA's G2xx series will keep all but the most demanding users happy. Serious gamers will want to look at AMD's 5xxx options as well as NVIDIA's top-of-the-line G295 and G285.

If you plan to watch HD video on a netbook or nettop, look for one packing a card from NVIDIA's Ion platform.

Monday, February 22, 2010

Five Things to Consider When Buying a Computer

#2: Form Factor: Desktop vs. Laptop

Deciding between a laptop and desktop is primarily an exercise in identifying how and where you plan to use a computer. Answering these three simple questions should set you on the right path.

Where are you going to use it?
Obviously, you'll need to answer whether or not you plan to travel with your computer. If you need to work on your commute, or take notes in class, a desktop is clearly out of the question. If you'll be using your computer in a cramped dorm room, a small apartment, or a bedroom, though, you may want to opt for an all-in-one desktop -- or, for even more space savings, what's known as a "desktop replacement notebook" (essentially, a large, high-powered laptop). Those in the market for a living room PC should be eying small form factor (SFF) boxes that will better blend with home theater equipment and game consoles. If you're not sure where you're going to be using your machine, as you'll be lugging it from place to place, you'd do well to opt for an ultra-light laptop.

What are you going to use it to do?
If you're going to be doing heavy video editing, photo editing, or gaming, you'll definitely want to consider a desktop PC that can be upgraded and sports a large (20 inch+) screen. Media and gaming addicts who are willing to sacrifice some screen real estate and performance for the sake of mobility should gravitate towards the desktop replacements with 17-inch screens. Those who spend their days buried in sprawling spread sheets might also benefit from a desktop or large-screened notebook. If you only wish to browse the Web, check e-mail, and compose the occasional Word doc, you should check out a notebook with a screen no larger than 15 inches.

Is this a secondary computer?
This should be another obvious one. If you already have a desktop, then opt for a laptop. Do you have a laptop, but want something more portable for light e-mail use? Then check out the netbook scene. And if you're looking for a second machine just to get Hulu or Netflix streaming on your TV, then look for nettops or SFF PCs.

Thursday, February 18, 2010

Five Things to Consider When Buying a Computer

Buying a new computer is always a daunting task. There are tons of variables to consider, including whether or not you're ready to join (or ditch) the cult of Mac. Laptop or desktop? How much RAM? And what processor will you need to power your new computer? As usual, WebAddo is here to help you navigate the labyrinth of options, and lead you on your path to the best PC for your needs. Over the next few days, we will post the top 5 things you should consider when buying a new computer.

#1: Operating System

Windows 7

Windows is the dominant player in the computer world, and with good reason. It has the largest catalog of available apps (including plenty of great free options), is compatible with more hardware than are its competitors, and, like it or not, is the OS of choice for most businesses. While OS X and Linux are catching up in terms of available software and hardware compatibility, they still can't quite match Microsoft's product, especially when it comes to games.

On the downside, Windows is the most vulnerable OS when it comes to viruses and other malware (although that is largely due to its popularity). With its largest competitor, Apple, claiming a mere five-percent of the market, Windows makes the most attractive target for scammers and hackers.

If you opt for a Windows PC, make sure you get a 64-bit version of Windows 7. The Home Premium version will suffice for most users, but geeks and professionals who might need some of the advanced networking features and XP emulation will want Professional.

OS X

Macs are known for their ease of use and sleek design. They've long been the standard choice for creative types and excel at such applications as audio and video editors. Thanks in large part to Apple's popularity with hip, tech-savvy types, more companies have been making sure their software and hardware are compatible with the platform. If you absolutely must have a Mac, but still need to run Windows software, there are options like Boot Camp and Parallels, but they require that you purchase a copy of Windows and have at least some computational acumen.

Thanks in part to its relatively small market share, OS X users are not frequently targeted by cyber-criminals, and the OS, thanks to its Unix underpinnings, is more secure than Windows. With its robust set of included apps, such as iTunes, iMovie, and iPhoto, OS X is an excellent choice for the user who wants to put minimal effort into their computing experience.

Linux

Linux has grown by leaps and bounds over the last five years. Most hardware on the market is compatible with this open-source operating system, and it has become infinitely more user friendly than its "geeks only" reputation would have you believe. While there are plenty of great free apps for Linux, you won't have access to many modern 3-D games or to Microsoft's Office suite. Many Windows apps will run with the help of an emulator called Wine, but it's far from a perfect solution.

Linux shines, though, if you're a heavy user of Web apps, like Google Docs. Its lightweight nature makes it perfect for netbooks, and it's even less susceptible to hacking and malware than OS X. That said, despite having an extremely active and helpful user community, Linux is often more difficult to troubleshoot than either OSX or Windows.

Thursday, January 21, 2010

The Top 5 Myths of Backup

"Back up your files daily!" It's sage advice that we've all heard-and more likely than not—ignored at some point. Many believe it's too time consuming or simply unnecessary. Not so, which is why we're here to debunk these myths and help you find the right answer to protecting your data.

Myth # 5 - Thinking nothing will happen to your files

So you just bought a computer and it's in great condition. Why worry? It isn't going to grow legs and crawl off with your data, is it? Actually, it might (with a little nefarious help). Laptops remain a prime target for theft at airports and college campuses. And if your computer disappears, so does all of your hard work—unless it's backed up elsewhere.

Aside from avoiding this scenario, backing up your files "to cloud" (that is, uploading them online) allows you to store data offsite and download your documents anywhere you have Internet access. Just make sure this storage provides a secure connection—ordinary email doesn't.

Myth # 4 - Believing USB drives are the only answer
USB flash drives can be quite handy. They're small enough to slip into your pocket and carry anywhere. But—and here's strike one—that strength can also be their weakness since these diminutive drives offer limited capacity. If you need to back up several large files, you're out of luck.

USB drives are also very easy to misplace. Many wind up in the laundry via your pants pocket. Will that spreadsheet file you worked on for three days be rinsed clean along with your socks? Maybe, maybe not. But it happens. And speaking of forgetfulness, unless you remember to always manually connect the drive, you won’t have the backup you need later. (That’s strike two.)

Myth # 3 - Depending completely on your hard drive
A hard drive can be unpredictable. Some offer years of dependable service; others die after only a few months. Unless a working crystal ball arrived with your computer, it can be difficult to guess when your drive’s time is nearly up.

And even if your drive is humming perfectly along, an electrical spike to your equipment (or a sudden drop with a laptop) can wipe it clean in seconds, taking all of your digital photos with it. Storing your data securely at an offsite location can avoid this altogether.

Myth # 2 - Relying completely on a manual backup
Whether it's an unexpected meeting pulling us away from our files, or simple late-night forgetfulness, backing up our data is something that slips everyone’s mind at some point. And invariably, this always seems to happen right after completing a huge project, followed by some computer glitch.

No one's memory is infallible. Look for a backup solution that doesn’t require you to initiate it. (It’s easier than finding a working time machine.)

Myth # 1 - Assuming daily backups are too difficult
This is often the biggest myth of all. Backing up your files daily requires no effort at all if you have the right tools. If you don’t want to bother with an external drive, you can install software that will back up everything. This allows you to completely forget about it—until you need that backup. Some great examples are Mozy, IBackup, and Norton Online Backup.

Don't wait for a disaster to start thinking about backups. Call WebAddo today at 770-217-7350 for more information about automated backups for your company.

Monday, January 18, 2010

New website promises free and legal music downloads.

Recently, a new website launched called FreeAllMusic.com that promises free and legal MP3 downloads in exchange for watching ads.

When you go to FreeAllMusic.com you'll be asked to enter a waiting list queue. The wait should, however, be worth it. Users will enjoy gratis downloads with no digital-rights management (DRM) restrictions. That means you're free to copy, share and use the MP3s as you wish.

This is yet another idea that's seeking to end Internet music piracy. So far two of the big four music conglomerates are on board with FreeAllMusic.com, and the service has lined up some big-time advertisers.

Also, do not lock into a long-term satellite radio contract.

An Internet radio from Pandora is coming for your car that will receive commercial radio and Internet broadcasts for free. But at a market intro rate of $1,200 for the receiver, this is still only for the rich early adopters.

Yet it's also a sign that we are this close to being able to listen to whatever we want on the road for absolutely free.

Friday, January 8, 2010

Scam Poses as Facebook Group Against 'Monthly Charge'

It's no secret that playing on people's fears is the best way to manipulate them. So, what's the biggest fear of a social networking addict? Paying for access, of course. And that paranoia is just what a new Facebook scam exploits.

A group called "WE'RE AGAINST THE 4.99 A MONTH CHARGE FOR FACEBOOK FROM JUNE 30TH 2010" isn't an outlet for angry Facebookers. In fact, it's one big malware scam, which could grow even bigger since the group already has 133,000 members. Contrary to the group's claims, you're not going to have to pay to keep tabs on your friends (at least, not that we've heard). The page contains a blank Wall, except for a link that sends you to a site that downloads 25 malicious items to your hard drive.

What's the best way to avoid falling victim to this scam? To start, don't visit the group's page, and certainly don't click the link (or any unknown link, for that matter). Next, let the folks at Facebook know about this scam by clicking on the Settings tab at the top of the site's page. Lastly, tell your friends. Make that status update useful for once, instead of using it to whine or to copy lyrics from a pop song.