Sunday, April 14, 2013

Remember When Your PC Was LIGHTNING FAST?

You buy that brand new desktop/laptop/mac and you pull it out of the box, you start it up and it's SO FAST!! ZOMG! Within a months time you're saying,"Why is this crazy thing running so slowly? It seems like it takes FOREVER to start and even longer to load anything I want." Believe it or not you can make it run like new again.

There are several reasons why your PC (I'm just going to refer to PC for simplicity and I don't feel like typing desktop/laptop/mac every time) can begin to slow down. Of course there could be hardware issues such as your hard drive. Of course the usual life expectancy on hard drives are around 3-5 years for desktops and even shorter for laptops but, you could be the unlucky winner of a bad hard driver that could go bad in just a few days. Things happen. If this happens you should send your PC in for repairs. 

You could also have viruses or other malware that have gotten into your system. This could be mitigated by simply having virus protection. Some still can make it through and you can do other processes to rid of them but, I will write about that another time. Some of the more common reasons are insufficient RAM (Random Access Memory), leaving another user logged on, and too many programs running on start-up. These three can have very simple and effective fixes.

RAM is hardware that is basically used to increase the amount of multitasking the PC can do at once and still run effectively. Think of it as your own brain. The amount of information that you can simultaneously process without "burning out" and slowing down significantly isn't much. If you do a single activity you can think straight and you're not stressed out or making mistakes. If you try to do 15 things at once naturally you're going to probably have a meltdown. You can increase the amount of RAM in desktops and laptops at a relatively low cost with a single 2GB RAM stick or more according to what your needs are. The installation is fairly easy but, if you spook easily I would seek some assistance. I can also write a tutorial on RAM installation later.

If you have only 1 User Account on your PC you can skip this section completely. Something as simple as leaving another user logged on can hinder your PC speed significantly and can be fixed very easily. When you switch Users from one to another without logging out it continues to keep ALL of the processes and programs running for the previous user. As you open more programs on the current user your system is significantly slowed down more. You can eliminate this issue by simply logging out of the previous user. When you do so, it will shut down those programs and processes that they had running and give you more RAM to work with.

There are many of us who are guilty of downloading a program and for ease of access allow it to launch on Startup. This is a terrible idea, with the exception being anti-virus software. However, some software automatically adds it's own processes to start-up unknowingly which will cause your system to become slower. Think of it as driving your car with ONLY yourself in it. You accelerate faster, right? With 4 people in that car it will accelerate slower, as it will with the more passengers you add.

A way to view every process/program that launches at start-up is to use MSConfig. You can access this by pressing the Windows key + R to open the Run command, or simply clicking Start > Searching for "run" > Clicking on "Run", then typing "msconfig" in the text box and clicking OK. This will bring up a menu labeled System Configuration, with tabs named General, Services, Boot, Startup, and Tools. Click on the Startup tab to access the items that are currently booting on Startup. Each PC's Startup Item list is going to be based on your individual PC and what you have installed on that machine. Everything with a Check Mark is booting on Startup. If you have things such as Skype, iTunes, or Adobe, you can UNcheck those boxes. You don't need those running unless you have it open and are actively using those programs. However, things such as Java, (for my particular PC) Intel Common User Interface, and Microsoft Security Client, ALL need to boot on Startup. Clean up the things that don't need to be running and then click OK. You will be prompted to restart your PC to apply these changes NOW, or you can wait until the next time you restart for these changes to take effect.

These are only a few simple ways to make that tortoise PC of yours get closer to running as fast as the hare again, and NO in the PC world slow and steady does not win the race. If any of you have questions about the processes you find in MSConfig feel free to ask. If you do not feel comfortable doing this fix yourself feel free to contact me in regards to this and I may be able to assist you further. 

Thank you all for stopping in again. I truly hope this helped someone out. This information may not be new to all of you but, sometimes it's easy to overlook the simple things. I would benefit greatly with more feedback on what sort of issues you're all encountering or general problems that you would like to learn about. Submit some ideas in the comment section and let's get this show on the road.

Jeremy DeWitt
Security+, A+

Friday, April 12, 2013

Ever Think of Using A Different Internet Browser?

Many computer users never think about what browser they use when accessing the internet and that is usually due to lack of knowledge that there ARE other browsers available. For most of us PC users, Internet Explorer (referred to as IE from this point forward) is the default web browser that comes pre-installed onto our desktops and laptops. I have one single use for IE... Can you guess what that is? Exactly, to download a better web browser!

While IE can get the job done for most things the average user wants to accomplish, it can never hurt to find something that works better. Personally I use Google Chrome. The features compliment the massive amount of web browsing that I do. For all of you secretive people out there, it also included what is called an "Incognito Window". If you choose to open and Incognito Window, there will be no search history, cookies, or any other traces left behind of any activity conducted under the Incognito Window. However, if you bookmark or download something those two activities will still be traceable, so keep that in mind. The ability to drag and drop tabs in and out of the Tab Bar is an amazing feature that is offered as well. It also has great security options built-in! These are some of the reasons I particularly choose Google Chrome.

There are other browsers that work great and include their own features and innovations such as Mozilla Firefox, Safari, and Opera. Each have their own Pros and Cons. Don't be afraid to get out there and try out the options you have available to you, find the one you like and let us know why you prefer it over the others. Everyone is entitled to their opinions and reasoning behind them.

I will include the direct links to each of these browsers for those of you who would like to try any of them out.

Google Chrome
Mozilla Firefox
Safari for Windows
Opera (has Windows, Mac, & Linux Options)

Thank you all for taking the time from your days to learn these little bits of information. If you know anyone that can benefit from this information then send it to them to show how much you love them! :) More entry's are coming soon, so stay tuned and maybe you will find more that is relevant to you.

Jeremy DeWitt
Security+, A+

Keep "Piggybackers" Off of Your Wireless Network!

I have tried many times to make people understand the importance of securing their wireless networks. Some of you may think,"I know how to plug in my hardware and make it work the way I need it." This may be true but, have you ever thought about someone else simply using YOUR internet that YOU pay for, for free?

With the going rates of high-speed internet  ranging from $20-100/Mo. I would not want someone I didn't know on my connection without paying their part. I can later write a tutorial on how to do each of these individual methods but, for now we are just going to look at WHAT you can do to mitigate this problem. Some will say,"I don't care if someone else uses it, I don't really have time for it." Granted the way you want to handle this is at your own discretion but, personally I don't want unexpected traffic on MY connection without permission. 

There are several things you can do in order to make your network secure. Setting a pass-phrase, CHANGING the SSID name and pass/phrase, and disabling SSID broadcasting. There are also other options such as MAC filtering and creating DMZ's but, that isn't something the average user really wants to bother with.

Set a pass-phrase on your router in order to connect and make sure you use a strong encryption key (WPA2 is one of the strongest to date). That being said, many people leave the Default pass-phrase and think they are secure. Wrong. Make something that only you could possibly know. I can go to Google and search for default pass-phrases for ANY existing router in the world and get access to those networks that didn't bother to change it. Do NOT use your telephone number for your pass-phrase, I have seen this numerous times. The same goes for your name, your address, or family member names. As I stated in my "Keep your Social Media safe from intruders" blog, you need to make it anything that is NOT common knowledge.

The SSID is basically the name for your router. It has a default SSID given by the manufacturer and is usually physically located on the bottom of the router along with the default pass-phrase. These SSID's differ from company to company and individually from router to router as well. You may ask,"Why do I need to change the name? How will that benefit me?" It is theoretically the same as changing your password. A different name can act as a "2nd pass-phrase" as long as you take the steps to disable SSID broadcasting (Which will be discussed next).  If you change your SSID and continue to broadcast it, you are basically doing nothing except personalizing the name. Some of us will continue to broadcast SSID for sheer availability and convenience, in that case I suggest using a name along the lines of "FBI Security Van" (Thanks Andy Carowan). That could either get a laugh or make someone run for their lives.

Some of us will still choose to broadcast the SSID, there is really nothing wrong with it as long as you have a pass-phrase in place but, it never hurts to have more security. By disabling SSID broadcasting, you can ensure that when someone is "searching" for a wireless network yours will NOT pop up in the Available Networks tab. In order for anyone to connect to a network with disabled SSID broadcast, they must then have the correct SSID and pass-phrase now, which can be seen as a hassle for most intruders. 

Again, someone will then ask,"What if I just disable SSID when I set up my router and leave everything the same?" Potentially this could work but, you are still giving access to the wrong people who take the time to check. They can enter default SSID names and pass-phrases until they get it correct but, most of the time it would be a program doing this. So if you take the time to change both then you are going to be the least susceptible target. 

When you leave your network unsecured you are susceptible to having your information stolen. With a little bit of research an average user can gain access to information on YOUR PC without your knowledge. Let's be honest, there are some out there who store EVERYTHING on their PC, not knowing the dangers. I've seen people with their entire Bank Account information saved to their Desktop, Social Security numbers, these things are a thief's dream. It is in your best interest not to save this kind of information on your PC's (or MAC's, for those users) at all. Inevitably someone is still going to do it, so if you do take the time to encrypt the files at the LEAST.

There has been several things covered in this topic today. If you would like an in-depth explanation on how to do these things to keep yourself safe, feel free to ask and I will then write a tutorial with screenshots in order to assist you further. 

Thank you all for taking the time to educate yourselves on this topic. Again, feel free to ask any questions you have or to suggest another topic you would like to become more educated on. I will be adding to the list of entry's as I come across topics of concern to you all.

Jeremy DeWitt
Security+, A+

Thursday, April 11, 2013

Keep your Social Media safe from intruders!

I am a Facebook (possibly MySpace, Twitter, etc.) user like much of the world today and I'm sure many of you are as well. I constantly see the "Sorry for all of the random posts, my account got hacked" posts and today is no different. That being said, most of the time GENERALLY speaking you have not been hacked. Most of the people experiencing what you're calling "hacking" is known as social engineering.

At any given moment I could probably get access to 1/2 of the friends on my Facebook account by knowing a few simple things about them, i.e. their birth date, their siblings names, their mother's maiden name, or something similar. Most of us while creating these online profiles feel that it is a hassle to make sure our information is secure, so we speed through the creation process and make it very easy for anyone using social engineering to gain access to our accounts. I can never stress enough the importance of making your security questions difficult. It needs to be information that can't easily be obtained by simply checking your profile and it's contents. So be careful when choosing and answering those questions. Another form of social engineering is called "phishing". Yes, just like girls fish for compliments. Your account information can be given away by someone simply phishing for information. For obvious reasons you shouldn't give out personal information to strangers but, even people you are friends with could want access to your account for malicious purposes. Stray away from talking about things that may be related to your security questions. If you are chatting with a friend on Facebook and they are asking you things that don't seem normal, you should not answer them. If one of your security questions was "What is your mother's maiden name?" and you give that information to someone you could potentially have given them the keys to your personal account. Be very weary of people trying to steer your conversation in a weird direction to obtain information because anyone that is smart enough will not just blatantly ask they will make a way for you to tell them the information without directly asking for it.

This does not ONLY entail to Social Media. This is also very important for email addresses, especially if your primary email is the one linked to your Social Media. If I were to gain access to your email first, then I have no problem getting into your Social Media accounts. All that needs to be done at that point is to access the Social Media website and use the Forgot My Password link, have an email sent and they are in and you are out. They are also known to change passwords in order to keep you locked out. There are ways to mitigate being locked out with such mail servers as Yahoo!, they offer a service that will text your phone if your password is changed and allow you to confirm that it was you by sending a confirmation number that you will need to enter.

There are obviously other methods that can be used to gain access to your accounts also. Brute-force password cracking will eventually come up with a solution to almost any password once it has gathered enough data and has the correct encryption. Simply adding a single number to your passwords will greatly reduce your risk of getting your password cracked. There are average time frames that it takes for Brute-force to be successful and I can tell you that if you have a password that is at least 9 characters long and includes a combination of upper-case letters, lower-case letters, numbers and symbols such as !%&^$ you will make your account secure enough that most people would simply skip over it and not bother. Some attackers would still go for it just for a show of force but, that is very rare. The normal attacker is going to just skip the accounts that are secured correctly and prey on the weak unsecured ones. I have a password that would take 2+ Millenia to crack. Of course, there is an extremely small chance that it can be cracked before that but, the likelihood is exponentially outweighed. That time frame could be lowered by having several computers involved but, that is a different subject at a different time. :)

I hope that some of these methods have helped you to keep your personal information more secure and quite possibly may have informed those of you that didn't realize the different ways that you can be attacked online. I am simply trying to raise awareness for the importance of security for the average user.

I will continue to post things that will be relevant to the average computer user and try to add a few more technical things in as we continue onward. If any need more elaboration on any of these methods feel free to comment and ask. I will then elaborate with a new post and bring more depth to those things that you all may want to know more about.

Thank you all for taking the time to read and hopefully it will save you from getting "hacked" one day. :)

Jeremy DeWitt
Security+, A+



New to Computers? Or Need to Learn Newer and More Relevant Information?

Whether you're new to computers or an ancient computer wizard with skills useful for only King Arthur's Round Table, learning new things isn't as hard as it may seem. I have grown up with computers in my life since I was a very young child but, not everyone has had that particular privilege.

Here in this blog we will all take a journey together learning new topics and how to make them useful for ourselves at home and at work. I will be explaining several different things about common issues people have and how to fix them or how to reduce the risk of those issues. You will learn about security and troubleshooting, and with any luck I may include some hardware modification for those of you who are brave enough to delve into those dark secrets.

You are welcome to suggest topics and ask questions. I will do my best to answer everything I can for you and if I don't have the answer we will learn it together step-by-step. I will cover things from PC all the way to Gaming Consoles. Feel free to step in and ask about any concerns you have about any problems.

I am not some industry expert with 40 years of experience but, I know where to find information and how to apply it to make it useful. The best way to learn is to make mistakes, that way when you finally get it right you will never forget.

I will be compiling a list of subjects I am commonly asked and post individually about them. Again, anyone is welcome to contribute questions. The first list I will be compiling is common things my Dad asks me about which are generally things that others ask about.

I hope to help anyone who is in need and hopefully we can all continue to learn and increase our knowledge together.

Get ready to learn!

Jeremy DeWitt
Security+, A+