Wednesday, April 21, 2010

Keep it Up-to-Date

Yeah, yeah, keeping up a two-week schedule. Right. Well, I've been really busy with life changing... ah, who am I kidding. I'm lazy. Well, this series will be finished up by the end of the month, and we'll get back into the swing of things. Deal?

Great, so our computer is clean, organized and safe (relatively speaking- we aren't out of the woods yet!). Now what?

We're going to be looking at updates: what they do, what they're for, and why we need them. Updates are a crucial component of computer maintenance. Programmers and developers release updates for their programs on a regular basis. These patches contain updates to program functions that increase security and stability, offer new features, and improve the overall performance of the program they serve.

Updates vary widely in several areas: how they are delivered, when they are delivered and how greatly they alter the performance of a particular function. Looking specifically at every single program that we recommend would take much longer than you care to read (or I care to write), so we're going to break down three key updating pieces of software and examine how, when and why they're updated.

Our first stop is our anti-virus program. Whether is AVG or Avast, Kapersky or McAfee, anti-virus programs constantly have updates coded, written and released for them. Without getting into a long discussion of how anti-virus programs work (though, that sounds like a good topic for another post…), near-constant anti-virus updates are crucial. This is because anti-virus applications work on the basis of a signature database; the anti-virus program uses a database of signatures written by programmers to identify viruses and malicious code. Lab technicians at any anti-virus company work around the clock to analyze the dozens of new virus infections and symptoms that appear in the wild every day. Without these updates, your anti-virus software will quickly become out-of-date (translation: useless). Trying to scan a computer with an outdated databse would be like trying to proofread an English essay with a dictionary from the 1800's- you're going to miss a _lot_ of information, and that could be potentially hazardous.

Because of the necessity of relevant information, anti-virus companies offer updates to their users daily, if not several times a day. Often, these are delivered directly though the anti-virus program- 'Check for updates' is a button you should be clicking often if you don't have automatic updating set on your anti-virus program! Updating your anti-virus program is absolutely necessary if you want to maintain your system's security.

The next piece of software we'll look at is our operating system: Windows. Microsoft release updates for their operating systems on a regular basis. These updates range from critical security fixes to optional features and programs. The most crucial of these patches fix security flaws and gaps that, if left unchecked, will provide an open avenue that could potentially allow an attacker to maliciously interact with your system. Other security fixes are offered for Microsoft's supported programs, such as the native internet browser Internet Explorer or Microsoft Office. Small bugs, less-crucial components and third-party hardware controls (such as your video and sound drivers) can also be fixed through Windows' updates.

Typically, Microsoft releases updates several times of month. Often, these are released in packs of several updates in one release. The packs contain a mix of the security flaw fixes, component updates and optional features that we just mentioned. Usually, it's important to install the updates that Microsoft offers ASAP- there's no reason to ignore a security flaw or faulty component that can easily be fixed. Windows Update, the feature that handles Microsoft's updates, can be found in the Control Panel, and gives users the choice of when to check (and when to download and install) the updates that Microsoft recommends. I highly recommend that typical users leave the default update settings intact.

Our final program is a cleaning program I recommended to almost everyone I meet. CCleaner is a powerful cleaning tool that allows users to empty TEMP folders, clean broken registry keys, clear browser caches and more. Piriform, the company that produces CCleaner, periodically releases new versions of their software. These version updates come with new features and upgrades that weren't present in old versions of the software.

This type of updating and upgrading is very different from the other options that are available. For example, Version 1 of a program would be the initial piece of software that a company introduces; Version 2 might introduce a new feature in the program; and Version 2.1 would fix a bug in the new feature. Make sense?

Updates like this often won't be automatically downloaded and installed; instead (as in the case of CCleaner), the production company and programmers will make the new version of the program available, and users will have to manually install the new version of the program.

Programs that are updated like this often don't need to be "updated"; if updates aren't offered natively within the software, chances are you won't need to update the program for it to run properly. Need is the operative word here; running the latest version of a program to ensure the highest level of compatibility and security within you operating system.

So what now? Well… update! Your best option (if you haven't maintained your programs) is to go through each piece of software and make sure that it is updated. Company websites will often announce when a new version, patch or update is available for their program; that's usually the best place to go to make sure you're up-to-date. I've also included a few common programs whose older and unpatched versions are commonly exploited by hackers and malicious software:

Update Windows- Keeping your operating system updated with the latest patches and releases is a key factor in maintaing a secure system. You can update Windows by going to Control Panel > Windows Update or visiting the Windows update website.

Update Java- In addition to Windows updates, you also need to ensure that your version of Java is the most up-to-date. The current version of the Java Runtime Environment is JRE 6 Update 19. Make sure you uninstall any other versions of Java you have before you install the most up-to-date version.

Update Adobe Products- Adobe Reader is used to view PDF files. Flash is used to run various parts of webpages (for example, games or animated cartoons). Older versions of Adobe products are more suceptable to infection. You can download the latest version of Adobe's Reader here and Adobe Flash here.

'Keep it Up-to-Date' is part five in a seven-part series discussing computer performance and maintenance.

Sunday, April 4, 2010

Keep It Safe

Five weeks later and I finally get time to sit down and write. Oy. Well between CBU and my classes at Geek University, I've barely had time to breathe. Hopefully, this series will be done my next week. Hopefully.

WARNING! A VIRUS HAS BEEN DETECTED! Do you know why a virus has been detected, dear reader? It's because you're an idiot. Well, you aren't, but whoever got that virus probably is.

One of the biggest arguments against PCs in the Windows v. Mac debate is the ungodly amount of viruses that Windows can pick up. Mac users just don't seem to have that problem (actually, they do, but we will save that for another time). Over one million computer viruses currently exist; thankfully, only a small percentage of that total is in any manner of wide circulation.

Computers get infected with viruses when they are introduced to an infectious environment. In layman's terms, this means a computer will only get infected if it is the position to get infected (e.g. a computer will not randomly infect itself through some freak code mutation- and if it did I would promptly lose all faith in humanity). The most common methods of infection are through malicious e-mail attachments (infected files run on your computer when you open the attachment), poisoned webpages (your browser can become hijacked) and spiked peripherals (a USB flash drive with an infectious file, for example).

The reason that people who get viruses are idiots are because of the methods of infection I just listed. 99 percent of the time, a computer must have input manually fed to it in order to become infected (or do just about anything else, for that matter). A computer puts out what is put into it. That fake message from Aunt Tille that actually holds the Vundo trojan? Your fault for clicking on it. The poisoned porn webpage you visted last week? Your fault for going there. The infectious flash drive you put in your USB port? Well, somone had to put it there, didn't they?

Granted, there are exceptions for every rule, but for the most part, it is the users fault that the system has become infected. Now, I'm not trying to be rude. Few sane people intentionally infect themselves, so don't take the last 100 words as a slam. Hackers and virus writers are a slippery folk, and they're very good at preying on the weakness of uninitiated computer users. Having said that, this blog is all about removing the 'un-' suffix from that qualifier, so let's un-unitiate you, yes?

Computer threats used to consist of viruses (and the occasional cup of coffee). Today, in addition to viruses, the computing world is filled with worms, trojans, bots, rootkits, malware programs... the list never ends. For the most part, these threats tend to be very specific in the damage they can do to your system. The two general categories that most security professionals use to classify computer threats are 'viruses' and 'malware programs'.

The difference is relatively simple. Viruses are simply bits of executable code ('executable code' being information your computer reads and responds to. Ish) that are designed to run and perform actions outside of normal operating parameters. Malware is an entirely different beast. A mash of 'malicious software', malware is any computer program that is designed to operate in a malicious manner (real creative nomenclature, I know. Computer geeks aren't poets). Words like 'adware' and 'spyware' are tossed around in a threatening manner to scare naïve computer users, kinda like how Glen Beck and Bill O'Reilly open their mouths for the sole purpose of frightening East Coast mothers and impressionable college students. Those are example of malware. A lot of malware programs are designed display unwanted pop-up advertisements on infected computer screens, or track a users spending and surfing habits; other malware programs are built to trick web surfers into thinking their computer is infected and to buy a fake cleaning product. These are known as rogue anti-malware programs. A large list of these fake products can be found here.

Surfing safely really boils down to a few basic rules: Stay protected and know where you're going. Running a strong set of protection programs is essentially; I've included a list of my personal preferences that I suggest to users asking for help at my forum. Any links or attachments that look suspicious, or emails from unrecognized senders, should just be avoided. Satisfying your curiosity isn't worth an infection.

I've included a list of sites that will give you a good knowledge base regarding safe computing practices. Of course, if you ever have any questions about anything: ask. The internet is full of wonderful communities run by people (like myself) that volunteer time and effort to help those who have questions. Having said that, on with the linkage!

  • Anti-Virus- Having an up-to-date anti-virus program is crucial. Make sure you update it often and run regular scans (at least once a week). A good anti-virus program will also actively scan for malicious files on your system. Here are a few free anti-virus programs I recommend:
    • AVG Free- I personally use AVG Free, and it has given me no problems. It consumes little system resources and offers automatic updating. It also works with your web browser to display a safety ranking on your Google searches, helping you to avoid blindly walking into an unknown domain.
    • Avast! Antivirus- Avast! is a consistenly-chosen free anti-virus program. It runs almost silently in the background without causing any disruptions, and is the only free anti-virus program that offers boot scan options.
    • NOTE: Please do not install more than one anti-virus product. Doing so can slow down your system, cause program conflicts and actually leave your computer more vulnerable to infection.

  • Anti-Malware- Anti-malware programs come in all shapes and sizes, from passive, on-demand programs to real-time scanners that function in a manner similar to your anti-virus program. Here are a few anti-malware programs I recommend:
    • Malwarebytes Anti-Malware (MBAM)- MBAM is a free program that offers excellent detection and removal rates for free. The paid version offers real-time scanning and protection.
    • SUPERAntiSpyware- Another excellent free program that, despite the rogue-sounding name, offers impressive results.
    • SpywareGuard & SpywareBlaster- Two anti-malware products built by Javacool. Designed to run side-by-side, these programs offer excellent scanning and detection abilities that will prevent the installation of most malware programs.

  • Firewall- A firewall prevent malicous attacks and hackers from invading your system; not having an active firewall program running on your system leaves you open to a possible invasive threat. Here are a few free firewall programs I recommend:
    • Comodo Firewall- Comodo is recommended by most security professionals as the most effective free firewall program available. It boasts impressive performance and an easy-to-use interface. Be aware that when downloading Comodo you are downloading the entire Comodo Internet Security Suite, which includes a firewall and an anti-virus program. If you want to use the Comodo AV, make sure you disable and uninstall any other anti-virus programs on your computer.
    • Sunbelt-Kerio- Offers good inbound and outbound firewall protection.
    • NOTE: Please do not install more than one firewall product. Doing so can slow down your system, cause program conflicts and actually leave your computer more vulnerable to infection.

  • Browser- Internet Explorer, the deault internet browser that comes pre-installed with Windows, is very vulnerable to hackers and attackers, even with extra security settings. I recommend switching to an alternative browser such as one of these:
    • Firefox- Firefox is the most common alternative web browser. It boasts advanced security features, a host of additional add-ons and downloads, and a wide variety of customization options.
    • Google Chrome- Chrome is a lightweight browser built by the makers of the most powerful search engine in the world. While it doesn't have all the neat add-ons and extensions that Firefix boats, it's quick, speedy and powerful. Unfortunately, the engine it uses isn't always compatible with older webpages, meaning Chrome might display some pages improperly.
    • Opera- Another alternative browser, Opera is popular among power users for its abilities to, among other things, host private file-sharing sites (imagine being able to access your hard drive from anywhere in the world with an internet connection- for free).

  • MVPS Hosts File- This download replaces your current HOSTS file with one containing well-known ad sites and other bad pages. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1, which is your local computer, which makes it more difficult to infect yourself in the future.
  • Tony Klein's 'How Did I Get Infected'- This Geeks to Go article gives a brief overview of how to prevent virus and malware infections. It's a must-read for anyone surfing the internet. This article also provides some great information for web-surfing novices.
'Keep it Safe is part four in a seven-part series discussing computer performance and maintenance.

Tuesday, March 2, 2010

Keep it Small

We are rolling! Half of the 'Keep it Clean' series has been written, and I'm starting to generate more ideas for future posts. In addition, I spent the day in San Clemente working for an independent client. Hooray for job ventures! Let's hope business keeps looking up!

As I mentioned a few weeks ago, bloating your hard drive with unnecessary files is wasteful and inefficient. In addition to temp files and system logs, old program files and registry entries can quickly fill up your hard drive. I can't tell you how frustrating to hear the words, "Well, I don't know what that is. Someone installed it years ago and I never use it."

Here's a painfully simple tip: If you don't use it, get rid of it (and I'm pretty sure that this applies to more than just computers). Old programs, games, and personal files can take up gigabytes of space that could be used for something else- or just eliminated in order to maintain a smaller drive footprint. Windows itself (depending on which build you have installed) will only use about ten GBs of hard drive space.

Other programs, especially "crapware" (all that extra software that your computer brand puts on to the system post build, like games, photo editing tools and the ever-irritating HP Help Center), will do little more than take up space and be obnoxious. Crapware certainly earns its moniker- it's crap! 90 percent of crapware is brand-specific software that is already included in Windows in some fashion; most machines come with brand-specific system restore software, and laptops also come with battery management software; Windows is perfectly capable of handling these tasks. In addition, many digital accessories that make use of your desktop also come with unnecessary features; the Nikon digital camera software suite comes bundled with a wonderful program called “Nikon Transfer”, which is nothing more than a 200 MB copy-and-paste waste of space. Granted, some pre-included programs, like Acer's security features, aren't found in Windows and can be somewhat useful. As a rule, though, crapware can be uninstalled with no adverse effects to your operating system; they are not necessary to run Windows, meaning your computer won't fry if you get rid of them.

Like keeping your drive defragmented, keeping the footprint small is important in maintaing efficiency and longevity for your drive; the more information your computer has to sift through to find what it is looking for, the less optimally your system will run. Eliminating unnecessary programs and data is vital; conveniently, CCleaner has a nifty tool that will uninstall unwanted programs and disable unwanted startup entries that bog down your computer's boot times. Hooray for software plugs!

It's not a bad idea to go through and 'audit' your system every once in a while. Take some time and go through everything on your drive- and I mean everything. Open windows explorer and sift through your files, your music, your games and programs. If you use it regularly, keep it. If not, delete it. Be careful about what you delete, though- if you don't know what something is or what it does, it's probably best not to delete it. And of course- NEVER delete files in the C:\Windows folder- EVER! These files are essential; they are what Windows uses as an OS to run. Deleting these can and will detrimentally affect your system’s operation. Thankfully, later builds of Windows prevent you from causing any significant changes to the system folder, so there isn’t much to worry about. Still, unless you know exactly what you are doing, or are under the supervision of a trained professional (such as yours truly), it’s best that you avoid that area of your system.

Old games and programs that you don't use anymore can and should be safely deleted. The same goes for that old Stryper album that's collecting electromagnetic dust. Obviously, things like photographs and documents you are storing for historical or personal reasons should not be deleted. If you have data that's taking up space and you want/need it, good. That's what storage space is there for.

Getting rid of old, unused files will free up space on your drive and optimize your system's performance. Any user with a decent amount of common sense will know what to delete and what to leave alone. The best system audit is the one that doesn't happen- if you know exactly what is on your drive, and you know that every byte of data is essential, you're good to go.

'Keep it Small' is part three in a seven-part series discussing computer performance and maintenance.