A lot of people seem to be looking for help cleaning up hacked or infected web sites lately, so here’s a trick I used in the past to locate and clean up infected PHP files.
Continue reading Find PHP malware in Linux
Last week at work, I noticed some odd events in an event log, and when I investigated them, I found they were part of a failed ransomware attack. This got me thinking about how to prevent ransomware at home.
Ransomware, if you aren’t familiar, is an attack that encrypts your data and demands a ransom, usually around $300, in bitcoins, and you get a short deadline until it destroys your files. More often than not, paying the ransom is the only way to get the files back, so it’s much better to prevent it.
Continue reading Simple tips to prevent ransomware
A software developer asked me today about a website called Download More RAM. I don’t think he heard my other coworkers snicker. He asked if it’s possible to download RAM, then asked if it was a security issue. I said it’s best not to visit it, and spared him the history lesson.
Yes, there’s some history to it.
Continue reading Download more RAM — Safe? Scam? Joke?
There are four posts on the Marx 1249 transformer, but don’t fret if you’ve lost the instructions. Connecting it is easy. But first, you’ll probably want to check it out for safety before plugging it in.
There are two sets of posts on the transformer, but don’t let that confuse you. One set of posts powers the train, and the other set powers any accessories you might have, such as a station. If you don’t have any accessories, you can simply ignore the second set.
Continue reading How the Marx 1249 transformer connects to track
If you have a side business, you need to offer customer service, but it’s also perfectly reasonable to not want your phone to ring at 3 a.m. You can fix that if you set up office hours in Google Voice.
Fortunately it’s easy to set up Google Voice to allow your phone to ring during office hours and go straight to voice mail after hours. And the nice thing is, Google Voice transcribes your messages. This makes it very easy to filter out people who are calling you trying to solicit your services at 25 cents on the dollar. I can’t say for certain that people are more likely to do that at off hours. But it’s certainly more annoying to get awakened at 3 a.m. by someone wanting to lowball you. And yes, I speak from experience.
Here’s how you do it if you don’t want to be disturbed at unreasonable hours.
Continue reading How I set up office hours in Google Voice
If you’re planning to do some shopping at Newegg this week, you can save $10 off $100 or $25 off $200 with the coupon code VCOBF15. It’s good today through 11/29. I just thought I’d pass that along.
I was listening to a podcast when the talk went off on a tangent, to a utility called F.lux. Whoever was talking made it sound like it was just for one platform, so I went looking for an alternative for Windows, given that merely 90.53% of us use it. The answer was F.lux! F.lux is also available for Linux, for what it’s worth. So I downloaded it.
The concept is simple. The lighting on our screens can interfere with our sleep patterns, so F.lux adjusts the screen based on what time it is, so that it interferes less.
Continue reading Use F.lux to help yourself sleep better
I’m playing catch-up with this one, but if you’ve been relying on the quasi-open source Truecrypt encryption solution, you need to migrate to Veracrypt as quickly as possible.
For some reason, it doesn’t seem to be common knowledge that Veracrypt is derived from Truecrypt and is, for all intents and purposes, the successor to Truecrypt.
Continue reading If you use Truecrypt, migrate to Veracrypt
Last week, Symantec discovered a worm that infects routers and takes measures to make them more secure. For lack of anything else to call it, Symantec is calling it malware, and most of the security echo chamber is probably howling over this, but I think I understand why it was created.
Continue reading Vigilante router security