Search This Blog

Tuesday, September 22, 2009

How To Protect Your PC Against Malicous Advertising

We have seen in the past 18 months, a real surge in Spyware, Adware and Viruses. These different infections are all collectively known as Malware. Big business is trying to fight these developers in court, as recently seen by Microsoft. They are trying to hit them where it hurts, their wallet, in hopes of shutting down their operations for good and making them pay for damages for the messes that they create.

But what can you do as an end user?

Monday, September 21, 2009

10 STEPS To Disaster Recovery for Microsoft Small Business Server 2003

I would wager that if you are visiting this page, you have a Microsoft SBS 2003 server that has crashed. Well don't be too frazzled about this because as long as you have access to the old data, I.E. the hard drives are not completely shot, then you should be OK.

Here is our 10 STEP procedure that we recently followed to recover a customer's SBS server completley.

Thursday, September 17, 2009

How To Decrease POP3 Connector Polling Interval For Exchange

Have you ever wanted to decrease the New Mail Polling Interval for the POP3 connector in Exchange to something a bit smaller than 15 minutes?

Friday, September 11, 2009

Introducing The Cisco UC500 Phone System

Roughly 2 years ago, Cisco Systems, INC introduce the UC500 Series of products. The UC stands for Unified Communications.

Q. What are we unifiying you may ask?  
A. Voice & Data over the standard office network.
Q. How does this help me or my company?
A. Well it allows you to converge what used to be 2 separate networks, your phones and your computers, into one very functional voice & data network.

Microsoft CRM 4.0

Sales and your pipeline are critical to the growth of your business. Without a pipeline it is like living pay check to pay check with no hope for the future. So how do you grow your pipeline? Well that is the function of the sales team, however the pipeline needs to be managed and tracked.

Thursday, September 10, 2009

How To Select An IT Support Company


How To Select An IT Support Company
If it ain’t broke, don’t fix it. How about if it ain’t broke, it will be?
Computer and network problems are going to happen; it is a fact of life.  So are you reactive; wait and see, or do you take a more proactive stance?

Back It Up Before It Is Too Late


It’s going to be one of those days today. You decide to come in early to catch up on your emails and other correspondence but when you boot up your computer, you are greeted with a serenade of ominous whining noises from your tower and the screen of your new LCD stares back at you with nothing but complete blackness.  The dreaded computer crash has occurred!
 

It Is Time For A Change In Management?

What if I told you that you could employ an experienced, full-time, IT support manager to oversee and monitor your entire network infrastructure and you would not have to provide benefits, sick days or even vacation days? And what if I went even further and stated that this employee was willing to work for less than minimum wage?  This is the description of one of the most rapidly developing sectors within the IT support industry, Managed IT Services. And you can employ these services at a fraction of the cost of a full-time employee, regardless of your company’s size or level of technology.
 
Only recently has the benefit of remote network monitoring and administration been available and affordable to companies other than the fortune 500. Companies of all sizes are now able to join the big guys in enjoying the nearly 100% network uptime, reduced operating costs and piece of mind attainable through managed services.
 
Advances in broadband connectivity and other technologies now permit IT support companies to keep an eye on everything from copiers and printers status to workstations and server availability, 24 hours a day. Oftentimes you can obtain this level of service for less of a cost of those office supplies that mysteriously vanish from your supply closets every month.
 
And while we want to point out that no system or systems can have an uptime that is guaranteed at 100%, managed services come very close to providing that. So what exactly is managed IT services?
 
In a nutshell, and as succinctly as can be stated, we are defining managed IT services as the real-time monitoring of any or all of the components within your office that have an IP (Internet Protocol) address.  Everything from printers, faxes, copiers, telephone systems, network switches and routers are all candidates for real-time monitoring. Through real-time monitoring, if something is not functioning as it should, even slightly, you can be alerted prior to failure and your support company can schedule corrective action. It is as if you have someone sitting on top of the mountain keeping a watchful eye on the valley below rather than trying to dig out after an avalanche.
 
There are enough monkeys on your back just trying to manage and grow a company so wouldn’t it be great to shake the IT support monkey off your back and into the hands of highly qualified experts? And best of all, it costs less than what is presently spent with the traditional break-fix approach. Still not convinced of the cost savings? It is a fact that less downtime makes employees more production, helps maximize the return on your investment in technology, helps to enhance customer service and generally provides an overall lower TCO – total cost of ownership.
 
Some other key benefit of managed IT services are that the monitoring of network traffic identifies possible systems bottlenecks and or security compromises, operating system patches and software updates can get applied immediately rather than when whomever gets around to it, viruses and spyware is kept off your workstations and servers, potential hardware failures are caught in advance and your scheduled backups are completed and verified with minimal employee intervention. And these are just some of the possibilities. Keep in mind that the potential savings in support and maintenance costs and fiscal management is in direct relationship to the complexity of your systems. In other words, the savings can be huge if your network is huge, but even if your system only consists of a few workstations and maybe one server, there are still savings to be realized.
 
Managed IT Services is not just another fleeting DOT.com fad. In fact the task of developing this service was initiated from the shouting mouths of corporate executives desperately seeking a way to add value to their vital computer network. And we are now in the stage where this service in not just available to companies with enormous IT budgets but to companies of all sizes. Because as computers and computer networks become more and more critical to conducting business, companies strive for more efficient ways to keep these systems stable and more productive. And managed services are just the way to accomplish that task.

Jaydien Network Solution

Call Us: 877.561.6734

35 Beaverson Blvd, Suite 3A
Brick, NJ 08723

Phishing, Pharming, and Identity Theft

No, the spell check isn’t broken and we are not talking about a quiet afternoon drowning worms at the local farm pond.  Phishing and Pharming are methods of identity theft and are accomplished through means of bogus emails or a web site that appears to be a legitimate company.  Victims are typically asked to provide personal information such as passwords, credit card numbers or their social security number in a reply email or at a web site that looks convincingly legitimate.  The verbiage that you will typically see in an email or on a web site trying to obtain your personal information are as follows:
 
“We suspect an unauthorized transaction on your account.
To ensure that your account has not been compromised,
please click here to authenticate your personal profile.”
 
“During our regular verification of accounts, we couldn’t verify your information.
Please click here to update and verify our records.”
 
Never reply or respond to any such request or solicitation. There are no legitimate credit card companies, financial institutions or retailers that will ever make such a request via email or through a website.
 
Above are examples of Pharming and Phishing schemes.  Simply put, they are processes by which scam artists chum the water with millions of emails and / or instant messages, hoping a few fish will take the bait with very good success.
 
Here is how the process of stealing personal information unfolds.  A user simply clicks on a  legitimate looking link located contained within an email or website.  Then the user will be  redirected to a website cleverly disguised to appear legitimate, but in reality is running illegal computer code in the background, unbeknownst to the user. That code is silently searching your computer for personal or financial information that may be stored in a temporary file, a cookie, a word document, etc…
 
Another even more sinister technique exploits the vulnerability of the Internet’s domain name system (DNS).  The DNS system exists to resolve internet names or hosts such as www.google.com to the actual server IP addresses: 64.233.161.104.  A hacker can “poison” a DNS directory by altering it so that a familiar URL or web address becomes associated with a string of numbers pointing to a fraudulent website.  The hacker then channels hundreds of unsuspecting victims into his trap, even though they typed the correct URL into their browser.
 
And worse yet, there are viruses that exist that can accomplish the same goal as DNS poisoning by rewriting your computer’s local host file.  The local host file is a file that exists locally and helps resolve host names or website addresses to their respective IP addresses.  This file is checked first by your web browser when browsing to a particular web site. If no entries are found, your system will then check with the DNS servers in its lists.  If, however, a bogus entry is found, the result is the same. The thief directs you to a bogus website, obtains your bank login or other personal information and you have no idea until it is too late.  When the hook is set, you are in for a long, grueling battle.
 
So how do you protect yourself?  Actually, it’s pretty simple.  Use a quality internet security suite like McAfee, Symantec or Trend Micro and keep it up-to-date.  They all include anti-virus, anti-phishing, firewall, and other protection components.  The key is to be sure that auto-updates are enabled and that the software is kept current.
 
Now add a little common sense:
 
1.   Never reply to an email asking you to confirm your identity.
2.   If you are the least bit suspect of an information request or message, hit the delete key!
3.   Never click on hyperlinks within email messages.  Type the URL into your browser, instead, and bookmark the site for future reference.
4.   If a web site asked for your password and user ID and you do not fully trust the site, try inputting a bogus password.  If it is accepted, you know something is wrong.
5.   Most importantly, keep your web browser, messaging and security software up-to-date.
 
In addition, on the non-internet side of life (Yes there is life beyond www.dot.whatever)
 
1.   Shred all copies of bills, monthly statements, credit card offers, convenience checks, receipts, etc. before putting them in the trash or recycling them.
2.   Opt-out of pre-approved credit offers by calling 1-888-5-OPTOUT.
3.   Periodically review your credit report.  New Jersey residents are entitled to get one free report per year from each of the major credit bureaus.  You can get your free report at www.annualcreditreport.com.
4.   Finally, if you choose to be more proactive, consider using the recently implemented NJ security freeze.  The security freeze, signed into law by Former Governor Codey last year, enables New Jersey residents to prevent anyone from looking at his or her credit files for the purpose of granting credit, unless the resident specifically chooses to allow access to that information. Thieves cannot gain access to your credit report without knowing your PIN and potential creditors won’t extend credit without reviewing it.  Under the New Jersey law, all consumers can place a security freeze on their credit files for free and lift it temporarily for $5 when applying for credit.  New Jersey is now the 12th state to adopt some form of a security freeze law.  Go to http://www.state.nj.us/dobi/creditfreeze.htm to learn more.
 
Already hooked?
 
Depending on what type of identity theft has occurred, there are several different agencies that you must contact in order to restore your identity and help bring the thieves to justice.  Here is a list of some important agencies that will help you in that process.
 
·  Your  local police and file a fraud report.
·  The Postal Inspection Service @ http://www.usps.gov/ncsc/locators/ if you have any indication or suspicion of mail fraud.
·  The Social Security Administration @ 800 269-0271, if you think your SSN is being fraudulently used.
·   Possibly the Internal Revenue Service @ 800 829-0433.
·   The three major credit reporting companies:
Equifax @ 800 525-6285
Experian (formerly TRW) @ 888 397-3742
Trans Union @ 800 680-7289
 
·   Banks, Cable TV, Credit Card, Internet Access, Financial Institutions, Telephone, Utility and other companies where you have established credit to either freeze accounts and or request a change of account numbers, passwords, user IDs, PINs, etc.
 
Want to learn more about identity theft and how you can avoid becoming a victim?  Visit the U.S. Department of Justice web-site at http://www.usdoj.gov/criminal/fraud/idtheft.html .

Jaydien Network Solution

Call Us: 877.561.6734

35 Beaverson Blvd, Suite 3A
Brick, NJ 08723

The VoIP Craze: A Technical Trend or the Next Big Wave?

The VoIP Craze: A Technical Trend or the Next Big Wave?
It is almost impossible by now not to have heard or noticed that new buzz-word being thrown around today on the web and TV. Whether it is was a commercial from Verizon or Comcast or a spam email claiming to lower your phone bills, I’m sure one of the big players have managed to get you wondering what exactly this new service is with the funny name; VoIP.
Well here it is, explained in a nutshell. For starters, let me explain to you what the acronym VoIP actually stands for Voice Over Internet Protocol or Voice-Over-IP for short. VoIP is a revolutionary way to transmit our voices using traditional telephone equipment, or so we think. Let's break down this acronym even more so we can fully understand what is actually going on.
Voice – The voices on either end of a telephone conversation
Over – The act of being transmitted from one place to another
IP (Internet Protocol) – The back end stuff that makes the internet work
 
So in short, VoIP means to make a phone call where the call itself is being transmitted partly or fully over the internet and not over the traditional phone company equipment.
With the proliferation of broadband internet connections all over the globe, we are now able to utilize the extra, unused bandwidth within our internet connections for things other than just surfing the web. One of these new benefits is telephone calls. Phone calling over the internet had not been a service worth trying out in the past because only a few people had the ability to receive broadband internet at their home or office at an affordable rate. And since you need to have a broadband connection to make this work, it never really took off. But in the past few years, Cable and DSL internet have become not only affordable but available just about anywhere. And because the key to making the VoIP service work is a broadband connection, this is now becoming more of a reality. VoIP is no longer just limited to tech savvy or deep pocket customers.
To receive this VoIP service,  you need to simply sign up with a VoIP provider such as Vonage, Optimum Voice, Comcast Voice or even Verizon, and they will send you a neat little box called a phone adapter for you to hook up to your broadband connection. This phone adapter looks like a regular old computer device such as a router or a modem, yet it has a couple of phone ports on the back that you plug your regular old phone into. And don’t worry, hooking it up is easy; it is just like adding another computer to your existing home or office network. Once connected to your home or office network, the VoIP provider will activate this phone adapter on their systems and those phone ports on the back of the device will magically get a dial tone. That’s all you need to do to start making phone calls.
What are your immediate benefits?
 
First, there is a big cost savings. Since the VoIP providers have much less overhead than the tradition phone provider such as Verizon, they are able to offer really low rates. Rates that are similar to cell phone plans that include unlimited minutes and free long distance in the US and Canada.
Second, you are not forced to use the one and only traditional phone provider that has complete control over your area. You now have a handful of providers that you can go with, all of which have good service and good calling plans. The direct result of that type of competition is a better product for the customer.
Third, you can keep your existing number that you have had for all those years and transfer it over to your new VoIP providers, eliminating the need to let everyone in the world know that your phone number changed.
And lastly, and probably the coolest benefit of having a VoIP telephone number, is the ability to take that number with you all over the world. If you remember, that number that you either transferred over or received brand new from your VoIP provider is assigned directly to a particular phone adapter and not just to a house or building. That phone adapter doesn’t care what internet connection it is plugged into, just as long as it has an internet connection to talk to its provider. This means that you can take your phone adapter, that is programmed with your phone number, and take it with you anywhere in the world. Just plug it into a broadband internet connection and voila, you have dial tone for that same number! So if you have a son or daughter that is going away to school overseas and you don’t want to be limited when you can talk to each other based on your expensive Verizon dialing plan, just give your child a phone adapter with a local phone number and talk whenever you want.
So what is the catch? There are only a few catches that I can think of, which are not really deal breakers at all if you ask me.
 
First off, since the phone calls are being routed over the public internet and not the phone company’s equipment, the quality of the call can be at times a little choppy, have some static or even an echo. The calls are basically the equivalent to the quality of a cell phone call.
Second, if your internet goes down or the power goes out, you lose your ability to use your VoIP phone adapter. Once the power or internet is restored, you can start making calls again.
Finally, if you are thinking of getting VoIP service for your business, it might not be the best choice of phone service. Since the phone is so vital to a business, downtime might cost you more money than you will actually save with this service. And the perception that your customers may have of your business when they hear choppy or poor voice quality might also wind up costing you a sale and ultimately, money.
But for your home or home office, this may be the perfect solution for you. The pros might outweigh the cons making it worth the cost savings? I think it is safe to say that most everyone has a cell phone to use as a back if you do have an emergency and the internet or power is not working. The chances of finding a cell phone to temporarily use are pretty good.
So where do you go next? Who can you call to get some ideas of calling plans and prices for a VoIP phone line? Here is a list of some major players in the VoIP industry for you to look at. They all have their plusses and minuses so the best way to approach this is to read each of their websites thoroughly and to call each respective sales department to get all of your questions answered. Once you are able to make an informed decision, choose the best provider to fit your needs.
 
Vonage
 
Packet8
 
SunRocket
https://www.sunrocket.com/
Jaydien Network Solution

Call Us: 877.561.6734

35 Beaverson Blvd, Suite 3A
Brick, NJ 08723

How Much Is That Doggy In The Window?

Ever get frustrated waiting for a price check?  What about making a special trip to take advantage of an advertised special and finding that the item is out of stock?  Or did you ever spend 10 minutes arguing with the check-out clerk about an item that is supposed to be on sale? 
It can be aggravating to say the least and can make your shopping or dining experience less than a pleasant one.
There is a better way to assure your customers a have a more enjoyable shopping experience and that is through a Point of Sale (POS) System. With today’s ever tightening margins and tougher competition, successful restaurateurs and retailers are looking into and installing computerized POS systems help reduce their cost of goods sold.
They aren’t cheap but the payback is normally very quick. Once in place, the rewards are many.
· Increased profits
· Better inventory control
· Reduced transaction times
· Reduced shrinkage and theft
· Customer history files to run special promotions; mailings, etc…
 
And with today’s systems, your POS system can be seamlessly integrated into your back office controlling not only POS and Inventory but also your general ledger, receivables, payables and even payroll.
With (POS) automation in place, you always know exactly what is in stock, what products contribute the most to your profit margin, which contribute the least, etc…
You can also automatically generate replenishment purchase orders, easily adjust the price of slow moving merchandise and improve customer service with loyalty programs, special offerings and faster checkout.
Any business owner knows that long lines at the checkout are undesirable and that typically, long lines result from either price checks or credit card processing. 
If your business has broadband internet access, you can reduce credit card processing from 20 to 30 seconds (via modem) down to around 3 to 5 seconds. 
Age verification can also be easily integrated if you offer liquor, wine or tobacco products.  And with standard barcode or UPC scanning, price checks are almost instant.
Faster credit card processing, faster check outs, instant inventory updates, better customer service all sounds great but isn’t it difficult to set-up?
The answer is NO. Automatic importing of existing inventory spreadsheets or from files within your existing software simplify start-up as do barcode and or UPS scanning of individual products.  Setting up standard, promotional and other pricing has become much easier and straightforward as well as typical price changes.
For the restaurateur … fast and accurate order taking, table seating, split checks, tip tracking, unlimited menu items and modifiers are all impacted positively as well as customer and inventory tracking, menu performance and much much more.
For the retailer … faster transaction times, gift card processing, customer loyalty programs, promotional and multi-item discounting, improved inventory control and more.
Most business consultants agree that to succeed and grow a business, between 1% and 3% of the yearly gross revenues should be reinvested into new or improved technology. 
 
As an example that would mean that a $500,000 operation should plan on spending between $5.000 and $15,000 annually with a resultant net savings of approximately 10% per year as a result of computerization.
Point of Sale automation will save you 3 to 5% or more of your gross on theft and shrinkage alone.  Add in improved inventory controls, happier customers and the marketing opportunities and payback is generally a matter of months and at an investment level well within the above suggested guidelines.
 
To learn more about how Point of Sale automation can benefit your business, contact your local IT consultant or feel free to contact us at any time.
 
We offer and support systems from Cougar Mountain, DELL, PC America and others as well as providing  full service computer and network support.  There is never a charge for initial consultations and we can structure terms of service to match the individual budgetary and operational requirements of your business.
Jaydien Network Solution

Call Us: 877.561.6734

35 Beaverson Blvd, Suite 3A
Brick, NJ 08723

Should I Upgrade To Vista?

There is a lot to like about Microsoft’s successor to Windows XP. The creators of this new operating system hope to awe you with improved security, a new Aero "glass" user interface, integrated desktop search and a plethora of other nice looking features.  So if you are a techie that just has to have the latest and greatest technology or if you just like to try and figure out how to use new stuff,  then get a copy of Vista and tinker to you heart’s content. 
If however you are a small to medium size business owner, then there really is not a compelling reason to upgrade right away. One of the main reasons why businesses will not be scurrying to upgrade their systems is that there really is not anything that you can do with Vista that you can’t presently do with Windows XP Pro. But more importantly, much like all new software that is released, Vista will most likely be full of bugs and querks that will not be ironed out until the first service pack is released. And problems with your computers always translate into lost revenue for a business.
If however you are a tech savvy home user or video gamer that can live with a few bugs or functionality issues, you may be interested in Microsoft’s primary selling points for the new operating system. Some of the key points include upgrades such as improved security, ease of networking, integrated search options, the Windows Defender anti-spyware tool, Internet Explorer 7 and full disk encryption capabilities. 
So what’s really new?  You might have noticed that a lot of those enhancements are currently available today and will run with Windows XP. And you are right. Internet Explorer 7 has been available for XP for months, you probably already have Microsoft’s anti-spyware software, Google and Yahoo Desktop currently offer great desktop searching programs and there are already numerous disk encryption programs available for XP.  And while security and wireless networking may not be all that easy to set-up and administer in Windows XP, once completed properly they are bullet proof.
Sure it is nice to have it all built directly into the operating system, but with a little help and some nurturing, XP can provide all those same features just as Vista can.  Plus XP has been around since 2001 and has gone through two major service pack releases making XP very stable. Current users of XP also have the added benefit of knowing that their operating system will continue to be supported through the year 2011.  As long as you don’t give access to your computer’s administrator logon or give other users administrator privileges, it will be very secure as well. And properly used XP is probably just as secure as Vista will ever be able to be.
So our suggestion to you is simple. If your existing XP system is stable and you and you can live without the pizzazz (Vista really does look great), the most prudent decision would be to just wait awhile.  We say that because like its predecessors, Vista will most likely be a bit fluky early on just as XP was when it made its debut. 
Any software, especially a full operating system upgrade, is going to contain bugs that might be better left for others to deal with as well as compatibility issues with existing software and hardware. Remember the early days of XP?
In retrospect, every previous version of Windows has had to go through a similar maturing process so that does not necessarily make that process a negative one. It is just the way things work in the software world.  And then there are the minimum hardware requirements.  While it is true that Vista will run on all but the most ancient machines, when it comes to showing its true colors, the typical office PC just isn’t going to cut it.  
Without a full gigabyte of RAM (1GB), a video card with a minimum of128mb of VRAM and DirectX 9 graphics capability, the Aero user interface with its 3-D overlays, translucent “glass” effects, animations and all of the other “cool” eye candy won’t work. So if it is the new look that has you considering upgrading, you better hold off until you bring your hardware up to required specifications.
The Vista Capable PC Specification (the minimum) is 512 MB of RAM, an 800MHz processor, 20 GB of hard drive capacity with 15 GB of free space and a graphics processor that is DirectX 9 capable. 
The available versions of Vista and their respective features are as follows:
 
So when should you upgrade?
·     When your computers have reached the end of their useful life (3-5 years for workstations / 3 years for laptops)
·     When you have access to funding that will let you standardize on a new hardware and software platform
·     When you have a demonstrated business need to upgrade such as new custom or office software that requires Vista
In the interim, if you need to purchase a new workstation or two, you still don't have to start using Vista immediately. Windows XP is going to be around for quite awhile and that is mainly due to the fact that it works just fine and there are millions of people that currently use it and do not want to change over yet. It is not as pretty, not as well integrated as Vista may be and it may not even be as secure, but it is good enough for most of us. Or at least until we have the time, budget and a real need to change.
With all that being said, you may still be sitting there thinking that you’re just the right person for this upgrade and you now want to know how should you move ahead as painlessly as possible. Your first step should be to review, or have your IT support people review, your existing equipment and see exactly where you are in terms of matching up with the recommended hardware requirements.
 
The easiest way to accomplish that would be a quick visit to http://www.microsoft.com/windowsvista/getready/default.mspx  which will provide you with the in-depth information and guidance on your upgrade options, clarification on the various available editions of Vista and about half way down on that page a link to Windows Vista Upgrade Adviser.
Running Windows Vista Upgrade Adviser will provide you with a quick analysis of how well your PC meets the requirements for the various Vista editions. It will also help you decide which edition is suitable to your situation and what, if any, upgrades are necessary to experience the full benefits of Vista. You will also receive information on what software applications, utilities and hardware that you presently use that may have compatibility issues.
In conclusion, if you have the proper hardware, a viable need, the budget, and the time and patience to learn or even teach your employees a new operating system then Vista should prove a worthwhile upgrade. 
 
Inevitably there will be some initial issues but once you have verified that your mission-critical applications work properly and have solved any driver and software compatibility issues, Vista will have a lot to offer you and your business.

Jaydien Network Solution

Call Us: 877.561.6734

35 Beaverson Blvd, Suite 3A
Brick, NJ 08723

Why is my computer running so slow?

When you first started using that new computer it booted up quickly; Excel, Word and your email client popped open almost instantly, and you were almost as happy as a gopher in soft dirt...

But lately things have changed. It has slowed to a crawl, taking forever to boot up and web surfing; especially if you are on a dial-up connection is excruciatingly, impossibly slow. Has a demon from the depths of hell possessed your PC? Nothing’s impossible, but it’s highly improbable. So what has happened?

While it could be hardware related, more likely the cause is fairly simple.
  • You have not cleared out your Temporary Internet Files.
  • Your registry is overloaded with redundant entries and invalid keys.
  • Your computer is infested with adware, spyware, malware, foistware, viruses or worms.

Deleting Temporary Internet Files
If you are using Internet Explorer you can delete the Temporary Internet Files by selecting Internet Options and selecting the General tab. In the Temporary Internet files section click the button labeled Delete Files and then OK. This will remove all Temporary Internet files from their folder on your hard drive. Deleting Temporary Internet files does not however remove cookies that are set on your machine.

No we’re not talking chocolate chips here. An internet cookie is a small text file that is saved on your hard drive by a Web server and can save you time by personalizing pages, or remembering information that you enter when you register for products or services. The next time you return, it can guide you toward content of interest to you based on what you have looked at previously. When you register for another product or service, it can automatically fill in questions you've previously answered.

Cookies are generally harmless and we recommend keeping them and turn off the "Always confirm before setting a cookie" feature in your browser. Cookies are very popular these days and some sites will set several cookies on each page. It would be really annoying to confirm each and every cookie you receive. And many internet sites won't work properly without cookies.

If however, you want to clean out all unwanted and unneeded files and want to delete cookies, stop and think about each before deleting it. You should ask yourself, "did I submit information on that site that I do not want to submit over and over again every time I return?" If so, you will want to leave those cookies on your system.

The Registry

Whether your computer is brand new or dates back to the Stone Age, almost every PC contains Registry errors that can cause general slowdowns, system freezes, and phantom errors. Software can easily leave traces behind, so applications you think you have completely removed can still be cluttering up your computer.

Although registry problems are usually caused when you improperly install/uninstall software, minor things like shortcuts to non existent programs, redundant files, invalid application paths can also result in bugs and errors that can cripple your computer.

Registry cleaning is generally best left to your IT support person or support vendor, but if you insist on a D-I-Y approach use a trusted and proven product like CCleaner, McAfee or Norton and follow the directions to the letter. While they will not get everything cleaned up, you should see a definite improvement. But whatever you do, do not attempt to use RegEdit to directly edit your computer’s registry … leave that to a professional as editing the wrong entry can render your PC completely unusable.

The Wares

Adware is software that generates advertisements such as pop-up windows or hotlinks on Web pages that are not part of a page's code and may also add undesired links to your favorites and to your desktop. Adware can also change your home page and your search engine to sites designed to earn income from various advertisers.

Spyware is software that collects and transmits user specific behavior and information, with or without permission. Sometimes, permission to collect and transmit is assumed to have been given simply by the act of installing software or loading a Web page. In reality, few people even notice the “End-User License Agreement” or “Terms of Use/Service/Installation” that are displayed during installation.

Like adware, this data collection process is basically harmless if done with consent or for a reasonable purpose. For example, software that transmits user specific information for the legitimate purpose of confirming eligibility for updates or upgrades should not be classed as spyware. And most people would agree that software developers have a right to ensure that their software is not being pirated, and that the users of pirated software are not receiving the same benefits as legitimate users.

Malware is a completely different thing. Malware is software that damages your system, causes instability and exhibits such antisocial behavior as changing your personal settings or interfering with a computer's registry and security settings. Typical types include trojans, viruses and worms.

Bundled Software (sometimes called Foistware) is software (often adware and/or spyware) that is included with a particular product, and without which the product will not operate, or which is compulsory according to a product's “End-User License Agreement”.

When the wares first began appearing they were very simple and usually involved only a few files which could be easily deleted or disabled. However, as they have matured they have, like HAL in the 2001 Space Odyssey, become smarter. It seems as fast as the clean-up experts develop improved ways to eliminate or minimize them, those behind them fight back with new tricks.

For years now, malware has been polluting and changing our computers' registries, and using random file names that are increasingly harder to identify and remove. And even if victims are able to remove the offending malware, they are sometimes unable to change hijacked home pages or other settings back to what they want because the relevant buttons have been grayed out (made unavailable). Even entire sections sometimes disappear completely from within Internet Options when the bad guys take advantage and compromise your Internet Explorer settings.

Scary, you bet! And it gets scarier … Malware writers can now design their programs so that they reinstall automatically if removed, sometimes using completely different file names. It can now also monitor itself and even the computer registry for detrimental changes. If that’s not enough, other antisocial behavior that has appeared recently includes: using super hidden files, registering the malware processes as a Microsoft Windows Service, and changing a victim's security rights so that they are unable to remove the malware.

Ok, your PC is infected. Now what?

Back up all critical files and start cleaning up the mess. It isn’t easy and it can be time consuming and oftentimes intimidating for the average user when they are faced with the task of removing adware, malware and spyware. And it can be difficult, even for experts, to get rid of some of the worst offenders.

So what’s the answer?
  • Keep informed about current virus trends by educating yourself about new viruses and their symptoms. This way, if you receive an email, for example, that contains a subject line that corresponds with a current virus; you will know not to open it. For example, one recent deception used by virus writers was to disguise an infected email to look like it came from Microsoft and contains an important update to Windows.
  • Get a good Virus Scanner and a Firewall, available from McAfee, Norton (Symantec) or Trend Micro which incorporate virus scanning, personal firewall, PDA, wireless, and instant messaging protection into one easy-to-use application. And keep your virus scanner and firewall software updated, activate all real-time protection options, and scan your computer frequently, especially after receiving updates. There's always a chance of catching a virus between the times an update comes out which enables your virus scanner to recognize it and the time you install the update.
  • Keep Windows Updated as many viruses exploit security vulnerabilities in Windows or its components, especially Internet Explorer, Outlook, Outlook Express, and subroutines and protocols involved in network connectivity. Upgrade to Microsoft XP Professional w/SP2 immediately as it is more secure than previous versions and makes it more difficult for the bad guys to compromise your machine and be certain to enable automatic updates.
  • Avoid downloads from questionable sources or using "free" programs unless you are certain that they do not contain viruses or spyware. In addition, because viruses can spread over a network or via removable media (like floppies, CD's, or ZIP disks), be careful about sharing data or using programs that other people give you. Even if you do know and trust the person who just handed you that CD-R, run it through your virus scanner, anyway.

  • Avoid Internet file sharing as many viruses and worms spread over public file-sharing networks such as KaZaa, Bearshare, or Morpheus. When you join a peer-to-peer network over the Internet, you are opening up your computer to ghosts, goblins and demons. Plus in most cases, you are also breaking the law and virtually guaranteeing that your machine will become filled with malware and spyware.
  • Don't be fooled into downloading or purchasing BetrayWare (programs that claim to automatically fix everything wrong with your PC, optimize it and make the morning coffee) as the vast majority are a complete waste of time and money usually causing more harm than good.

If you have a stubborn virus infection that seems to be beyond the reach of McAfee, Norton or Trend Micro, you may be able to use an online virus scanner, but not necessarily. Like any other program, a virus cannot be removed from your computer while it is running. Usually it is necessary to first stop the running virus processes before a virus can be removed.

And if that’s the case, it is time to call in a “Microsoft Certified” professional.

We’re talking serious for a minute … If you have a PC or network problem that you don’t have the experience or knowledge to deal with always consult a bonded, certified, licensed professional. As with most things in life, you get what you pay for. Your computer infrastructure is the life blood of your company and should never be trusted to anyone without the training and experience only possessed by “Certified” professionals.

Be honest with yourself, and think “what would it cost to not have access to any of your customer, inventory or other files for an extended period”? Always buy “business grade”, never off-the-shelf or cheap white-box PCs, (we recommend the DELL Optiplex series which are highly configurable, reasonably priced and very reliable). Set aside time to maintain them on a regular basis, use a good anti-virus / firewall combination and automated back-up system and properly protect them with a quality UPS.

Nothing less makes any sense as its just too expensive not to!

Jaydien Network Solution
www.jaydien.com

Email Us: info@jaydien.com
Call Us: 877.561.6734

35 Beaverson Blvd, Suite 3A
Brick, NJ 08723

Oops, It's Back Again and the Bad Guys Have It!

Just when you thought that the hard drive was clean, it’s suddenly becomes the case of the mysteriously reappearing data. You wouldn’t leave the keys in your unlocked car, your American Express card on a table in the reception area or payroll and personnel records lying around in public areas, would you? So why would you give away a computer or just send it to surplus or charity without properly cleaning the hard drive?

If you are like most people reading this article, you are well aware of identity theft and what could happen if confidential corporate information got into the wrong hands. But you are probably thinking to yourself, “what do I have to worry about? I cleaned off all of those old emails, passwords, files, etc”. And maybe you even reformatted the hard drive(s) to be absolutely sure. Surprise, some or all of that personal and or company information may still be there, hidden in the dark deep recesses of the digital world. You did see that old classic sci-fi movie TRON didn’t you?

Despite all the hoopla, the fact remains that personal computers were never really designed with security in mind. Potentially any and all information that ever existed was added, edited or materialized on a hard drive, still exists and can be recovered by someone with the proper tools and talent.

The bad guys keep getting more sophisticated and are increasingly looking for surplus and recycled PCs as a source of private and proprietary information. In particular, they are looking for information that can be used to steal an individual’s identity or perhaps confidential corporate information which can be sold to other dubious businesses or people. And one of the worst case scenarios, your information can be used to blackmail a business or individual.

Not nice, but it is a reality. Surplus technology that is donated is often auctioned off to the public and who knows who might get their mitts on that information that you so carefully ensured didn’t exist anymore. Or what about that co-worker, employee or friend that you passed your old equipment down to, they’re 100% trustworthy, aren’t they?

So what to do? Short of taking a blow torch or sledge hammer to your hard drive, which unfortunately is not quite effective but very fun, the only really effective thing you can do is to purchase disk scrubbing software.

Deleting files, reformatting and yes even taking a blow torch to the hard drive does essentially nothing from a security standpoint. The data remains behind even after reformatting. And you’ve surely seen those ads for data recovery from computers exposed to fires and floods.

Reformatting will keep most people out of your old files. But specialized software exists to reclaim files even after reformatting. If you do not know who will get the computer, or you do know and you don't fully trust them, scrubbing is the answer.

What disk scrubbing does is repeatedly write data to the hard drive(s), typically first with a random numeric character, then overwrites that data with a random alphanumeric character often followed by random symbols. This process is repeated until nothing but gibberish remains on the computer. The whole drive can be scrubbed or you can just leave the operating system and selected files on the hard disk, if you choose, as these programs can be set to overwrite only the unoccupied areas. Keep in mind however that this process is irreversible and can be quite slow so you might want to run it overnight.

There are a whole slew of products available to the do-it-yourselfer such as OnTrack's DataEraser, Norton’s Wipe Info, White Canyon’s WipeDrive Pro and others. Or better yet, have an IT professional do it for you – better safe than sorry. Besides you have better things to do don’t you?

Jaydien Network Solution

Call Us: 877.561.6734

35 Beaverson Blvd, Suite 3A
Brick, NJ 08723