Still use Windows XP? Let’s talk options.

If you still use Windows XP, I wish you’d stop. Seriously, for your safety and the safety of others, I wish you’d stop. The good news is you have some options, and you’ll probably be happier with one of them.

Read more

How safe is my computer from hackers?

On Monday, March 13 at approximately 10:30 AM CST, I will be appearing on KFUO Radio’s Faith and Family program to discuss home computer security with host Andy Bates. One of the questions he’s planning to ask: How can I know how secure my home computer is? Or, to put his question another way, how safe is my computer from hackers?

I’m going to use this space to elaborate ahead of time on some of the things we are going to talk about. We could talk for an hour on any of the questions he’s going to ask, and he gave me three questions and 25 minutes. This is my workaround.

Read more

Optimize Windows 10 for better performance

Optimize Windows 10 for better performance

When I first installed it, I thought it was pretty pointless to try to optimize Windows 10. Of course, I installed it from scratch on a computer with an SSD and 16 gigs of RAM. Then I upgraded a couple of computers from Windows 7 to Windows 10, and I started to see why some people might not like Windows 10 all that much.

Upgraded systems almost always run slow, but I’d forgotten how much slower. And while you didn’t have to do much to Windows 7 to make it fast–that’s one reason people liked it–I find some Windows 10 optimization seems to be necessary.
Read more

Chrome says your file may have been moved or deleted

Chrome says your file may have been moved or deleted

When opening locally stored PDFs in Chrome, sometimes Chrome says the file may have been moved or deleted. More specifically, the error message says “Your file was not found. It may have been moved or deleted. ERR_FILE_NOT_FOUND.” But nobody moved or deleted the file, because I just clicked on it. In fact, I could still see it sitting right there in Windows Explorer.

Oddly enough, I had other files in the very same folder that opened fine. No errors. Here’s how I found the problem, fixed it, and avoided it in the future.

Read more

Using the DD-WRT firewall

Using the DD-WRT firewall

I get a lot of questions about the DD-WRT firewall. There’s a lot of talk out there that goes deep into theory and advanced firewall usage, but what if you just want to know how to set up your firewall to protect your network and open up a few ports?

Here’s how to set that up.

Note: If you have multiple DD-WRT boxes running as access points like I do, only the one directly plugged into the Internet needs to be configured this way. Disable the SPI firewall on your internal access points.

Read more

A scammer called me a fraud

A scammer called me a fraud

Someone I know got a tech support scam popup that said their computer was being hacked. I said to bring the computer over. I wanted to see it.

I found the malicious site in the browser history–I’ll tell you how to do that after I finish my story–and pulled the page back up. The computer played an MP3 file with a scary-sounding message and urged me to call an 888 number. So I called. I got voicemail. I left a message.

Read more

Change your printer’s IP address in Windows

Sometimes you may need to change your printer’s IP address, such as after you rearrange your network. It’s not hard to do, it’s just not always immediately obvious where the settings are.

This method works in Windows 7 and Windows 10. It probably also works in Vista and Windows 8, but I don’t have those versions anymore.

Read more

Linksys EA6200 DD-WRT installation

Linksys EA6200 DD-WRT installation

I picked up a couple of refurbished Linksys EA6200 routers this past weekend. For whatever reason, DD-WRT isn’t officially supported on them, though it does seem to be a popular DD-WRT router. A lot of people make the upgrade far more difficult than they need to. With some simple hacks, Linksys EA6200 DD-WRT installation is pretty straightforward.

I came up with an 18-step process that I simplified just as much as I could. Unlike some methods I’ve seen, I don’t have you editing any binary files or creating custom startup scripts.

Read more

Recommended DD-WRT settings

Recommended DD-WRT settings

I’ve been asked a few times now for my recommended DD-WRT settings, or at least my good-enough settings. I think that’s a great idea, so I’ll walk through how I configure a DD-WRT router. Follow these steps and I can almost guarantee you’ll have the most secure network on your block.

For the purposes of this tutorial, I am going to assume you are configuring DD-WRT as your primary router.

Read more

Whitelist Java to provide better security and a better user experience

One of the best things you can do to improve your security in a corporate environment is to limit the use of Java, or whitelist Java. Undoubtedly there will be one or more legacy web applications your company uses that require Java, and it’s almost inevitable that at least two of them will be certified for one and only one version of the JRE, and it won’t be the same one.

Believe it or not there’s a solution to the problem of conflicting JREs, but it took me years to find it, because I had no idea that Oracle called it “Deployment Rule Set.” The secret’s out now. If you run Java, and you want security, you need Deployment Rule Set.

Read more

WordPress Appliance - Powered by TurnKey Linux