• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

5 Simple Ways To Avoid Getting An Avalanche Of Spam

July 26, 2007

As you probably already know from firsthand experience, once you’re on a spammer’s list, it’s next to impossible to get off. And changing your e-mail address can be a major inconvenience especially if you rely on it to stay in touch with important business and personal contacts.

To reduce the chances of your e-mail address getting spammed, here are 5 simple preventive measures you can take that will go a long way in keeping not-so-delicious spam out of your in-box.

Use a disposable e-mail address
If you buy products online or occasionally subscribe to websites that interest you, chances are you’re going to get spammed.

To avoid your main e-mail address from ending up on their broadcast list, set up a free Internet e-mail address with Hotmail or Juno and use it when buying or opting in to online newsletters. You can also use a throwaway e-mail address when making purchases or subscribing to newsletters.

Pay attention to check boxes that automatically opt you in
Whenever you subscribe to a website or make a purchase online, be very watchful of small, pre-checked boxes that say, “Yes! I want to receive offers from third party companies.”

If you do not un-check the box to opt-out, your e-mail address can (and will) be sold to every online advertiser.  To avoid this from happening, simply take a closer look at every online form you fill out.

Don’t use your main e-mail address on your website or forums
Spammers have special programs that can glean e-mail addresses from websites without your permission. If you are posting to a web forum or newsgroup, use your disposable e-mail address instead of your main e-mail address.

If you want to post an e-mail address on your home page, use “info@” and have all replies forwarded to a folder in your in-box that won’t interfere with your main address.

Create throwaway e-mail accounts
If you own a web domain, all mail going to an address at your domain is probably set up to come directly to you by default.  For example, an e-mail addressed to anything@yourdomain will be delivered to your in-box.

This is a great way to fight spam without missing out on important e-mails you want to get. The next time you sign up for a newsletter, use the title of the website in your e-mail address. For example, if the website is titled “successsecrets.com,” enter “successsecrets@yourdomain.com” as your e-mail address. If you get spammed, look at what address the spam was sent to.

If successsecrets shows up as the original recipient, you know the source since that e-mail address was unique to that web site. Now you can easily stop the spam by making any e-mail sent to that address bounce back to the sender.

Don’t open, reply to or try to opt-out of obvious spam e-mails
Opening, replying to, or even clicking a bogus opt-out link in an obvious spam e-mail signals that your e-mail address is active, and more spam will follow.

The only time it is safe to click on the opt-out link or reply to the e-mail is when the message was sent from a company you know or do business with (for example, a company that you purchase from or a newsletter you subscribed to).

Malicious Software Is Spreading Through Multiple Operating Systems

July 26, 2007

“A new worm is being distributed within malicious OpenOffice documents. The worm can infect Windows, Linux and Mac OS X systems,” according to a Symantec Security Response advisory. “Be cautious when handling OpenOffice files from unknown sources.”

Apple’s Mac OS is not a virus-free platform, said Jan Hruska, who co-founded antivirus firm Sophos.

“Viruses on the Mac are here and now. They are available, and they are moving around. It is not as though the Mac is in some miraculous way a virus-free environment,” Hruska said. “The number of viruses coming out for non-Mac platforms is higher. It gives a false impression that somehow, Apple Macs are all virus-free.”

Once opened, the OpenOffice file, called badbunny.odg, launches a macro that behaves in several different ways, depending on the user’s operating system.

On Windows systems, it drops a file called drop.bad, which is moved to the system.ini file in the user’s mIRC folder. It also executes the JavaScript virus badbunny.js, which replicates to other files in the folder. On Apple Mac systems, the worm drops one of two Ruby script viruses in files respectively called badbunny.rb and badbunnya.rb.

Net Security Purr-Fected: Pictures Of Kittens Are The Unlikely New Weapon Against Online Fraud And Spam

July 26, 2007

There’s a new way to combat internet fraud, prevent spam and keep online shopping secure. But your first impressions may be that it’s not exactly high tech. It takes the form of a simple question: From a gallery of fluffy-animal snaps, can you tell which are cats and which are dogs?

Your answer is enough to find out whether you are human or an automated spam program, designed to send unwanted email.

The dog/cat question is the latest example of a security device called a Captcha, a simple puzzle that usually takes the form of a string of distorted letters and numbers.

Captcha stands for Completely Automated Public Turing Test to Tell Computers and Humans Apart.

The idea behind a Captcha is that users have to perform a task that is simple for a human but incredibly difficult for a computer. Distorting random letters and numbers makes them confusing to a computer but readable to the human eye.

Regular web users will be familiar with Captchas, as they are ubiquitous on shopping, email and networking sites; during initial registration and sometimes log-in, Captchas are used as an additional gateway to passwords.

Although a number of computer researchers have claimed that they invented the Captcha, it’s generally acknowledged that Carnegie Mellon University led the charge after being asked by Yahoo in 2000 to create a security tool to stop spammers using computer programs to set email accounts and then use these accounts to send millions of spam messages.

According to Luis von Ahn, a member of the original Carnegie Mellon team, “Captchas are still the best defence against many types of automated attacks, and I believe they will be used for the foreseeable future. The only ones that can be broken are the extremely primitive ones that use a constant font, and apply no distortion to the characters other than thin lines that are easy to remove automatically.”

But as programs are written that can read heavily distorted codes, the distortions become even more extreme. And as they do so, some of the Captchas are becoming too tricky for many humans to decipher at first attempt. More and more users are finding that they need two or three attempts before they can confirm their shopping orders or set up their new email account. So, creators of Captchas are exploring new avenues.

Von Ahn is the executive producer of a new project, Recaptcha.net, which uses old tomes to create new Captchas. While digitally scanning books to make them available online, character recognition software often fails to recognise a word, because of smudges or damaged paper. If von Ahn’s software can’t read it, he’s assuming that other computers will also struggle. “The words in my Captchas come directly from old books that were recently scanned, and we are using people’s answers to decipher what the words are.”

Picture recognition is an increasingly popular alternative. People are asked to look at a grid of images and pick the ones that have something in common – straightforward for humans but impossible for computers, as it’s difficult for computers to accurately classify images.

Pix Captcha (www.captcha.net), a Carnegie Mellon project, displays pictures of certain things – worms, babies and so on – and then asks people to select the corresponding noun from a drop-down menu.

Most altruistic is a Microsoft research project called Asirra (research.microsoft.com/asirra) – Animal Species Recognition for Restricting Access – that uses pictures of rescue-home dogs and cats from Petfinder.com. It asks you to click on the cats, rather than the shots of aardvarks, bears and dogs thrown in to baffle the computers.

It also helps find homes for domestic animals – each image has a tag reading “adopt me” on it.

Although still in the “beta” testing stage, Asirra has a database of over two million images with which it can create Captchas. It has the potential to change the way we stay secure online – and give animal lovers everywhere a dose of cuteness.

Adapted from The London Independent.

Tech Experts Keeps Complete Packaging’s Network Running Problem-Free

June 26, 2007

No one knows better than Sue Brey, Complete Packaging Inc.’s controller, how important it is to have a problem-free computer network. Complete Packaging specializes in just in time inventory and production of specialized, “total-solution” packaging products, primarily for the automotive industry.

Complete Packaging is an ISO-9001 and Q9001-2000 certified supplier. “We manufacture wood pallets, crates, boxes, and coil cradles,” said Sue, “and we are a distributor for corrugated shipping containers and set up boxes. Our customers rely on Complete Packaging to provide the right product, at the right price, on time.”

To handle their orders and customer service, Complete relies on a Windows Server 2003 network installed by Technology Experts, using an IBM server, and various IBM workstation computers.

The company has a high-speed T1 Internet connection, facilitating online order entry and email service for the company’s employees. A nearby warehouse facility is connected by a private, secure wireless network to the main office building, allowing computers at both locations access to the Internet service and data stored on the file server.

“We rely on our computers for accounting and manufacturing planning,” continued Sue. “Tech Experts also developed a specialized program we use to prepare the shipping paperwork we use to deliver our products to our customers.”

Complete uses Quickbooks for accounting, payroll and payables. “One of the recent projects Tech Experts did for us was upgrading our Quickbooks,” said Sue. “I was really happy the upgrade process went smoothly.”

Network downtime is costly for any business, but even more so for a company like Complete Packaging that relies so heavily on its computer systems.

That’s why Sue and Complete have invested in a support agreement with Tech Experts.

“One of the most strategic advantages we’ve found working with Tech Experts is that they’re a local company. The support agreement we have gives me peace of mind, knowing they’ll be here right away when I need them,” said Sue.

Sue summed it up best: “Wow! That is all I can say about the team at Tech Experts. It’s so nice  to know that my entire network is handled so I can focus on running the business. I’ve worked with other computer consultants in the past and no one can touch their level of service or expertise.”

Take Advantage Of These Microsoft Incentives

June 26, 2007

As your local Gold Certified Microsoft Partner, and a Microsoft Small Business Specialist, Tech Experts has access to special promotion and incentives direct from Microsoft.

Microsoft Financing 6/50 Promotion, Ends: July 31, 2007

Use Microsoft Financing for any IT solution including Microsoft software and we will finance not only the hardware portion, but also the software and your services as part of the total solution.

You pay only $50 per month for six months, followed by 36 regular monthly payments. When you use Microsoft Financing, you conserve your capital, preserve your corporate credit lines, and own the hardware you purchase outright. Plus, you can add IT solutions to your contract at any time during the term of the loan.

Windows Server Partner Subsidy Program, Ends: June 29, 2007

Your business is growing, and Windows Server® 2003 R2 provides a winning platform for small and medium businesses. Now until June 29, 2007, Microsoft is offering partner subsidy dollars worth up to $10,000 to customers purchasing between three and twenty-five Windows Server® 2003 R2 Open licenses that include Software Assurance. That adds up to great growth investment!

Participate In Microsoft’s Business and Technology Assessment Program (Ongoing Promotion)

Spend 30 to 45 minutes working with a Tech Experts professional completing your small business technology assessment, and be entered in a monthly drawing for a $100 cash prize.

The assessment program consists of a series of questions designed to get an overall picture of how you use IT in your day to day business operations.

 

Finally! A Way To Stop Spam, Spyware And Pop-Ups From Taking Over Your Computer

June 26, 2007

If you are absolutely fed up with the number of spam e-mails you get every day, the annoying pop-ups being shoved in your face when you surf the net, and advertisers installing spyware on your computer to monitor your every move and serve up unwanted ads, then please read on.

We’re Waging War Against Spam, Spyware, and Pop-Ups!
Just recently we polled our clients to find out what their biggest frustration currently is with their computer networks.

Not too surprisingly, an overwhelming number of you said “SPAM” with pop-ups running a close second on the list of things that make you crazy.

That’s why we’ve decided to launch a war against spammers and unethical online advertisers for our clients by offering a FREE “Stop The Ads” audit.

We’ll Show You How To Stop Spammers And Unethical Advertisers In Their Tracks
During this free audit, one of our senior technicians will come onsite to review your network and uncover loopholes that allow spammers and advertisers to penetrate your network and install unwanted spyware on your computer.

Note: Spyware is a small program that online advertisers download to your computer without your permission or knowledge so they can monitor your web surfing and steal your confidential information. Sometimes they can even read your credit card information!

During this FREE “Stop The Ads” audit we’ll show you how to:

  •  Eliminate pop-ups finally and forever.
  •  Quarantine virus-riddled spam before it ever gets to your in-box.
  •  Filter spam without blocking important e-mails from clients and associates.
  •  Clean out any spyware installed on your individual PCs or network.
  •  Bulletproof your network from viruses and other cyber criminals.

And If You Are Not Currently Hosting Your Own E-mail In House, We’ll Also Show You How To:

  • Save hundreds or even thousands of dollars on costly bandwidth and ISP fees by bringing your e-mail in house.
  • Prevent your ISP’s spam filter from blocking important, non-spam e-mails you need to receive.
  • Make it easier to set up new e-mail accounts.
  • Stop employees from accidentally (or intentionally!) sending illegal, inappropriate, or confidential information via e-mail.
  • Set up a safe and secure filing system to store all of your important e-mail.
  • Eliminate the file size limitations on your in-box.

Here’s How It Works:
To request your free “Stop The Ads” Audit, simply call our offices or fill in and fax back the enclosed form.

If you have three or more computers in your office, we will send one of our senior, professional technicians to your office. If you have less than three computers, we’ll make arrangements for you to bring your machine into our professional repair shop.

Our technician will be on time, guaranteed. He will evaluate your network for FREE and give you a straightforward situation analysis, and explain the options you have available for eliminating spam, spyware, and pop-ups.

We will also give you a guaranteed price in writing – not an estimate – for the options you want to try. If you agree to allow us to do the work (you are under no obligation), we can usually start right away!

EVERY job is backed by our exclusive Peace of Mind Guarantee: if you are not happy with the work or the technician doing the job, simply say to the technician “this is not what I had in mind.”

That will be his cue to stop the work, restore your network, and leave your office – AND YOU WON’T PAY ONE PENNY!  No questions, No argument, No guilt, No payment. You can consider the job cancelled and the work ON US.

As you can see, we don’t think you should take a chance on hiring ANY computer support company – even us. We strongly feel that the client is number one and to prove our commitment to you, we are willing to put ourselves on the line.

It’s that simple and you have nothing to lose!

Give us a call at (734) 457-5000. You’ll be glad you did!

Michigan Man Fined For Using Free Wi-Fi

June 26, 2007

A Michigan man has been fined $400 and must work 40 hours of community service for using a local café’s Wi-Fi connection from his parked car to check his e-mail and surf the Web.

He got off easy, according to the local TV station that reported the case: under Michigan computer access law, using a Wi-Fi connection without authorization is a felony, punishable by as much a $10,000 fine and five years in prison.

But the story raises more questions than it answers, including whether the café’s Wi-Fi connection was a fee-based service, which would imply authorization was required, or a free service that, without any security restrictions, could be accessed by anyone within range, including someone outside the restaurant.

The story also doesn’t say whether the defendant, Sam Peterson II, of Sparta, Michigan was convicted of the crime or pled to the charge.

Peterson routinely drove to Sparta’s Re-Union Street Caf, to check his e-mail but never went into the coffee shop.

His regular routine drew the attention of Sparta Police Chief Andrew Milanowski, who asked Peterson what he was doing. Peterson told him.

After checking the Michigan statutes, the chief swore out a complaint of fraudulent computer access, and Peterson was charged.

Researcher: Don’t Trust Google Toolbar

June 26, 2007

Makers of some of the most popular extension software used by the Firefox browser are not doing enough to secure their software, a security researcher said Wednesday. The problem is that many widely used Firefox extensions, including toolbars from Google, Yahoo, and AOL, do not use secure connections to update themselves, according to Christopher Soghoian, a security researcher.

The Indiana University doctoral student discovered the Firefox issue last month while examining network traffic on his computer. He noticed that many of the most popular Firefox extensions are not hosted on servers that use the very secure SSL Web protocol.

Although the corporation behind Firefox, Mozilla, hosts the majority of Firefox extensions on its own SSL-enabled Web site, it is common for commercial extension-makers such as Google to host their software on an unsecured site, Soghoian said in an interview.

This leaves users vulnerable to a “man-in-the middle” attack, where Firefox could be tricked into downloading malicious software from a site it mistakenly thought was hosting an extension.

It wouldn’t be easy for an attacker to pull this off, however. In one scenario, the hacker would set up a malicious wireless access point in a public area where people are using wireless connections. He could then redirect extension update traffic to a malicious computer. “An attacker who sets up a wireless access point can then infect anyone who connects to it,” Soghoian said.

Why You Need A File Server Right Now

May 26, 2007

If you’re the owner or manager of a small- or medium-sized business that still uses peer-to-peer networking, it’s time to consider upgrading your network by installing a dedicated business server.

Due to recent technology advances, particularly the availability of Microsoft Small Business Server and Windows Sharepoint Portal Services, the pros definitely outweigh the cons. In fact, the upgrade may result in some benefits you hadn’t counted on.

How do you know when it’s time to upgrade to a server-based network? Here’s a simple checklist you can use to assess your needs, followed by a more detailed discussion.

It might be time to upgrade if:

  • Your staff is moving to laptop PCs.
  • Your staff is specializing and you need to start to segregate data.
  • You want critical data backed up securely and automatically.
  • Your office needs to use collaboration software, such as shared calendars.
  • Your staff requires remote access to shared data
  • Moving to Laptops

One characteristic of a peer-to-peer network is that individual member PCs share resources, such as files, printers, and fax modems, with each other.

Unfortunately, several recent technology trends are making peer-to-peer networks difficult to use and manage.

For example, many of today’s knowledge workers are switching to highly mobile laptop computers which may or may not be in the office at any given time.

When a PC is disconnected from the network, its resources aren’t available other users in the office.

Data Segregation
One of the most compelling reasons to upgrade your basic network to a server-based configuration is data security.

Even small companies have a legal responsibility to protect payroll, human resources, and other sensitive information from misuse, but the file sharing schemes used in peer-to-peer networks don’t provide the high level of control offered by server operating systems.

Automatic, Secure Backups
Along with access, backup is also an important part of any data security scheme. Regular and dependable backups are difficult to manage when data is stored on multiple desktop PCs because even the most sophisticated backup software can’t back up a PC that’s been turned off.

Once you move your critical data to a file server, regular automated backups can be scheduled to take place during off hours. Since the office staff doesn’t typically have access to the server’s operating system, it’s unlikely that anything will “interfere” with backup, and even if the network is down, a file server can faithfully back itself up to tape as long as it has power.

Collaboration
Although shared calendars and other collaboration tools are available from a number of Internet-based sources (Yahoo, Google, and others), your data is much more secure when it’s stored on your own file server.

You’ll also find that the selection of privately hosted collaboration software is broader and the applications are more customizable than those apps available online.

Remote Access
The increased use of laptop computers mentioned above eventually results in the need for remote access to company data. While this can be accomplished with products such as Symantec’s pcAnywhere, Citrix’s GoToMyPC, and even Windows XP’s built-in Remote Desktop Connection, secure remote access is built into most file server operating systems and remote users are subject to the same access restrictions and privileges as locally connected users.

In the past, one of the main deterrents to server-based networking has been the complexity of server operating systems, but this is rapidly changing. Once installed and properly configured, Windows Small Business Server (SBS) 2003 requires about the same day-to-day technical expertise as Windows XP or Windows Vista.

And later this year Microsoft will release a “server appliance” product called Windows Home Server (WHS) that will provide many file server features with almost no human interaction. In fact, the device won’t even require a keyboard, mouse, or monitor — just plug it in and you’ll have an instant file server!

Another traditional objection has been the cost of dedicated file servers, which often out-weighed the budget – and the benefits for many small offices. Fortunately, technology advances are making low-cost, easy-to-operate servers available to offices that wouldn’t have considered them just a few months ago. Server equipment from IBM and HP, combined with Microsoft’s Small Business Server software, is now more affordable than ever for small companies.

In summary, if you’re still using a basic peer to peer network, you’ve probably outgrown it! Consider adding a dedicated file server to your suite of office tools to improve data access, security, and usability.

Detect Hard Disk Failure Before It Happens

May 26, 2007

Roughly 60% of all disk drive failures are mechanical in nature – from spindle-bearing wear to read/write heads banging into delicate disk platters – and now technology built into the drives can report anticipated and specific failures to give you a chance to rectify the situation, hopefully before it is too late to retrieve your data.

In addition to monitoring a variety of parameters related to mechanical events (disk platter RPM, time to spin up, motor current, head seek failures, and sudden shock to the drive chassis), S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) can report read and write retry attempts necessary due to defective areas on the disk or head failure or drive temperature.

Many S.M.A.R.T.-enabled drives can also report how many times they have been turned on and off and the number of hours the drive has been on.

If S.M.A.R.T. is enabled in your system BIOS, the BIOS will check and report any early or permanent signs of disk failure. You can also monitor your drive’s condition with a S.M.A.R.T.-aware disk monitoring program.

To view all available S.M.A.R.T. information about your drive, try the free DiskCheck utility from http://www.passmark.com/products/diskcheckup.htm.

DiskCheck is a nonresident utility that will show you exact drive information and all of the supported S.M.A.R.T. statuses from your drive.

There’s also Ariolic Software’s ActiveSMART (http://www.ariolic.com/activesmart/) resident monitoring tool, which provides a wealth of detail on drive status and notification of potential failures.

If you get a S.M.A.R.T. warning about a drive failing, back up your data immediately and replace the drive.

A failing disk drive is no fun. A failed disk drive is even less so. In working with our clients, we’ve encountered a lot of grieving “Have I lost all of my data?” looks from end users.

It is indeed a sad time. Many times, clients don’t “get religion” about data backup until something catastrophic like this occurs.

A plethora of disk drive repair and data recovery tools are available to help recover your data. But, the single most effective way to ensure you won’t lose your data in the event of a hardware problem is to make regular backups!

We’ve long since given up on the pedestrian Norton Utilities like Norton Disk Doctor because it does not do enough to spend the time running it, especially for those really cranky lost partitions, erratic mechanical problems inside the drive, and when S.M.A.R.T. says the drive is bad or going to be bad soon.

When it’s time to recover partitions and data we unlock our arsenal of serious disk recovery tools, which are:

  • Steve Gibson’s SpinRite 6.0 (www.spinrite.com) for finding and fixing or moving bad data blocks on FAT, NTFS, Linux, Novell, Macintosh, and even TiVo volumes.
  • Ontrack’s Easy Data Recovery (www.ontrack.com) for digging deep inside a drive and extracting recovered data to other media.
  • Symantec’s GHOST (www.symantec.com) to “peel” data off a bad drive to a disk image for replacement onto another drive, or to extract individual datafiles with Ghost Explorer.

And, if our internal data recovery efforts fail, we always have the option  of sending a drive out to a special data recovery service, such as Ontrack (www.ontrack.com) or Action Front (www.actionfront.com).

These services are typically very expensive – sometimes $1000 or more – but if it is the only option to recover your data, other than re-keying everything, it may well be worth the cost.

Just remember – regular, monitored backups are your best defense against hardware failure and data loss.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

How To Use A Password Manager And Virtual Cards For No-Risk Holiday Shopping

December 19, 2025

Help Your Team Bridge The AI Gap

December 19, 2025

Is It Time to Rethink Your Phishing Training?

December 19, 2025

Your Best Defense Against A Cyberattack

November 17, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Spyware Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.