Entry-level troubleshooting

Ars Technica offers a very good, brief guide to troubleshooting computer hardware. Being two pages long, it doesn’t tell you everything, but includes some good tricks, including one I don’t always remember to tell people. To fully discharge a device, unplug it from the wall, remove the battery if it has one, then press and hold down the power button for 10-15 seconds. This discharges any power that could be lingering in the capacitors inside. Read more

Short takes, 5 Jun 2012

I’m positively uninspired this morning, trying to recover from a weekend of the most boring writing I’ve ever done in my life–something that, mercifully, only a small handful of tortured souls will ever have to see and read–so I’ll do some short takes.

Read more

I can save you $99

Microsoft is willing to install a clean copy of Windows in its retail stores on any PC for a flat fee of $99. (Windows license not included, of course.) They’ll also optionally include Microsoft’s Windows Live Essentials programs, the ad-supported starter editions of Word and Excel, Microsoft Security Essentials antivirus, and Zune media player software.
Read more

Things I wish everyone knew about home Mac security

On Wednesday evening, I wrote about basic computer security from a Windows-centric perspective. I knew some people who needed help in a hurry, and given there was a 90% or so chance they were running Windows, I took that route.

Some of my buddies who use Macs passed it along. And much of what I said then does apply, but I’d like to clarify a few of those points.
Read more

Things I wish everyone knew about home computer security

I’m a security professional by trade, with two certifications. I’m not responsible for defending your computer networks, but I want your networks to be secure. There’s a really simple reason for that. If your computer and your network is secure, then it isn’t attacking mine. Or anyone else’s.

Several fellow subscribers to a train-related interest group that I like got hacked recently, and have been sending out spam messages. They’ve received a lot of advice in the hours since. Some of it has been good, and some not as good. So I tried to think of some things that people could do in about 30 minutes to keep the crooks at bay.

Incidentally, the computer crooks won’t be going away. Computer crime happens because the criminals can make more money doing that than doing something legal. The only way to make it stop is to make it too hard, so that getting a real job becomes more profitable. You won’t solve that problem in 30 minutes, but if we all take that single step down that road, we’ll make the world that much safer. So, with that, let’s roll up our sleeves. Read more

One in five Macs has malware–but read the fine print

Sophos claimed today that 20% of the people who’ve installed their free Mac antivirus has malware.  That’s not altogether surprising, but it’s also not nearly as big of a problem as it sounds.

One in 36 systems has Mac malware, which means the Mac has an infection that could actually be harming the system itself. That number is low but believable. In my experience, the people who seek out antivirus software are usually the ones who need it the least.
Read more

What’s going on with Macintosh security?

The latest figures I’ve read say there are perhaps a half-million infected Macintoshes still floating around out there, an improvement from the high of 600,000 that I was seeing a few weeks ago, but probably not what Apple had hoped after releasing its most recent fix.

I argued three weeks ago that the end of the innocence was either here or very near. I’ll argue now that it’s gone: There are now 250 known Macintosh OS X viruses in existence. In 2003 there were none. Read more

Acer Aspire One 722 review

I set up an Acer Aspire One 722 netbook this week. This is my Acer Aspire One 722 review. I imagine the return rates on these things is horrendous, because the out-of-box experience is pathetic.

This one won’t be going back though. Tune it up, and it’s an adequate performer. It’s still a netbook–all that talk of the AMD C-50 and C-60 chips delivering Celeron-like performance was just rumor–but it can match an Atom’s CPU performance and delivers better graphics performance than Intel. Read more

Don’t call the war on hackers unwinnable

John C Dvorak asks what war we’re waging on hackers. While war may not be the best choice of words, because it’s not exactly a conventional war, there’s no question there’s something going on, and we’re not winning it right now.

The latest salvo is that someone in China is building a botnet using Macintoshes. Read more

End of the innocence for Mac security

Antivirus vendor Kapersky has identified a new trojan horse targetting Macintoshes.  It spreads a botnet based somewhere in China via an infected Microsoft Word document, typically sent as an e-mail attachment.

The spin is that if you don’t use Word on your Mac, you’re safe. That’s true–this week. But going forward, it’s going to take more than that. Read more