Zombies and botnets: Help keep your computer under your control

Here a great article from a friend on this important topic.

Online criminals can use a virus to take control of large numbers of computers at a time, and turn them into "zombies" that can work together as a powerful "botnet" to perform malicious tasks.

Botnets, which can include as many as 100,000 individual "zombie" computers, can distribute spam e-mail, spread viruses, attack other computers and servers, and commit other kinds of crime and fraud.

Botnets are highly valued by online criminals, and have become a serious problem on the Internet.

How to tell if your computer has been infected

A virus that makes your computer into a zombie might cause your computer to slow down, display mysterious messages, or work in an unexpected manner.

These viruses usually do not disable your computer, because zombie computers must be plugged in and connected to the Internet in order for the botnet to work.

You can get a free virus scan with the Windows Live OneCare safety scanner. If you want continuous protection, you should use antivirus software such as Windows Live OneCare, which is free for 90 days.

Read other ways to tell if a virus has infected your computer.

What to do if your computer is infected

If your computer shows symptoms of virus infection, first make sure that the software on your computer is up to date. Then run the Microsoft Malicious Software Removal Tool. The Malicious Software Removal Tool checks computers running Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software and helps remove any infection found.

Read detailed information about how to help remove a virus.

5 ways to help keep your computer from becoming a zombie

1.

Never open an attachment in an e-mail, instant , or mobile message unless you know exactly what the attachment is, even if it’s from someone that you know. Attachments can contain e-mail viruses.

2.

Use an Internet firewall.

  Note: Windows XP with Service Pack 2 (SP2) has a firewall already built-in and active.

3.

Stay up to date. Visit Microsoft Update and turn on Automatic Updates.

Note: If you’ve installed the 2007 Microsoft Office System, Microsoft Office 2003 or Microsoft Office XP, Automatic Updates will also update your Office programs. If you have an earlier version of Microsoft Office, use Microsoft Office Update.

4.

Subscribe to industry standard antivirus software and antispyware software, and keep them current. Microsoft offers Windows Live OneCare, which is free for 90 days and Windows Defender. Windows Defender comes with Windows Vista. If you use Windows XP SP2, you can download Windows Defender for no charge.

5.

Use licensed software products. Botnets are often comprised mostly of computers that run illegally copied versions of operating system and productivity software. Unlicensed software can be more susceptible to viruses, and can even come with viruses already installed without your knowledge.

 

to see the orginal posted article go here

 

Well done Rob

Bitlocker to Go – or securing external devices in Windows

 

Windows Vista was the first to introduce BitLocker, full-disk encryption. With server 2008 and Vista Service pack1, we were given the to encrypt other non-boot fixed drives in addition to the boot partition.   In Windows 7 (both the client and Server versions), you now the ability to protect removable storage devices, such as USB-based hard drives, flash devices, and other Microsoft is call this feature "BitLocker To Go".

BitLocker to GO is only available in the Enterprise and Ultimate versions of Windows 7, to create the protected storage. Once this is added to a storage device, that device can be used normally with any version of Windows XP , Vista, and Windows 7. So now you can protect external hard drive and flash drives.

I be speaking at Tech-ed This year about NAP

 

Server 2008 and Vista working better together but until then here is some information for you

 

Implementing Network Access Protection in Windows Server 2008

This Snack describes the benefits of implementing Network Access Protection (NAP) in Windows Server 2008. It describes how to configure network and health policies for various types of clients. It identifies the options for configuring Dynamic Host Configuration Protocol (DHCP) enforcement for NAP and demonstrates the steps for testing a NAP implementation with DHCP enforcement.

Learning snack about Virtualization

 

Microsoft Virtualization

The Microsoft Virtualization solution consists of four virtualization technologies: server, application, presentation, and desktop. Together, these technologies provide you with a complete desktop-to-datacenter virtualization solution that can help you create a dynamic IT infrastructure. This free Learning Snack highlights various features and benefits of the four virtualization technologies. It also takes a closer look at server virtualization and how it is implemented and managed in the Windows Server 2008 operating system

 

Intro to Windows Server 2008 Virtualization

This Snack explains the new virtualization features in Windows Server 2008 and lists the system requirements. It also demonstrates the steps necessary to install Windows Server virtualization.

 

Green IT and Virtualization

Organizations are becoming increasingly aware of the environmental and business benefits of adopting a Green IT environment. This Learning Snack highlights how virtualization facilitates a Green IT environment. It describes the Hyper-V server role and the System Center Virtual Machine Manager (SCVMM) tool, which help create and support a virtualized infrastructure in Windows Server 2008.

Learning Snacks for Vista

Here a a few bite size modules on technology that are easy to watch and learn about.

Windows Vista Essentials

This Snack describes some of the innovative new features in Windows Vista, including a sidebar that provides information at a glance. It showcases the Windows Aero technology and demonstrates the improved file organization techniques. In addition, this Snack walks you through the various ways you can search for information on your computer or on the Internet.

Deploying Windows Vista

Microsoft provides a range of tools and utilities that can help organizations successfully deploy Windows Vista. This Learning Snack describes how to deploy Windows Vista across a network and demonstrates how to create Windows Vista installation images and deploy them on desktops on a network. It also provides guidelines and best practices for deploying Windows Vista in an organization.

Microsoft Desktop Optimization Pack

The Microsoft Desktop Optimization Pack (MDOP) is a suite of products that can help organizations implement the Core Infrastructure Optimization (Core IO) model. This Learning Snack explains how the MDOP facilitates Infrastructure Optimization (IO). It also demonstrates procedures for recovering lost files and managing Group Policy objects (GPOs) by using products in the MDOP suite.

CAREER ASSIST for getting certified by Microsoft

THE FORECAST IS TOUGH. BUT THERE IS A WAY TO WEATHER THE STORM.

In a tough economic climate, how do you get a new job? How do you become indispensible in your current one?

CAREER ASSIST gives you the opportunity to get trained for certification at an unprecedented discount rate.

Here’s how it works: You’ll get a free retake of a failed exam PLUS an entire E-Learning Collection, the online training service created by Microsoft professionals, for just $35. At a value of $270-$350, that’s up to 90% off the regular price.

There’s never been a more critical time than now to show employers you have all the right professional credentials. Get Microsoft Certified now.

MSN Games Launches “Hexic” and “Chess” on Facebook and MySpace

Microsoft Corp.’s MSN Games, one of the leading online casual games portals, today announced the launch of two game applications on social networking sites Facebook and MySpace. MSN Games delivered classic puzzle game “Hexic” to both communities for the first time along with “Chess,” a fresh take on another classic. Both games were developed by Microsoft’s Carbonated Games studio, and the applications were developed by Plexipixel.

“We’re excited to bring two of our most popular games to the Facebook and MySpace communities,” said Megan Hodel, marketing manager for MSN Games at Microsoft. “These networks reach more than 200 million people around the world, and the MSN Games applications will make it easier and more fun for Facebook and MySpace users to play some of their favorite casual games.”

Both of the MSN Games applications reward users via collectible merit badges for playing and achieving skills, and feature leaderboards, news feeds from MSN Games, and the ability to share the applications with friends. The applications feature full Facebook integration, including notifications when badges have been awarded and games completed. MSN Games has also launched a dedicated page on Facebook, where casual game fans can download the game applications to their personal page, view videos, and post pictures and messages.

“Chess” features asynchronous multiplayer functionality, so that users can play their turn whenever they have time to log on and make their move. The application also allows users to track their long-term progress against friends using the ELO rating system.

More information is available at http://msngames.com/apps.

The Imagine Cup

Attention Students! Help Change the World and Win a Trip to Egypt!

Imagine Cup is the worlds Premium Technology Student Competition focused on solving real world issues. Submit your project idea by April 1st for the Imagine Cup Digital Arts Categories.

Why participate?

To beef up your resume and get potential exposure to agencies . To make a difference by actually changing the world . You’ll be the potential winner of up to $8,000 for your team and a trip to Egypt for the WW Finals

http://imaginecup.com/Default.aspx

Vista and Windows 7 trick – TAGS

Creating Tags

do you have problem finding the pictures or videos that you have taken ?

You can use a feature called TAGS – the allows you to organize by adding a descriptive Label (TAG)

Steps are as follows;

1. Double click on a picture and when the files open go to the INFO pane

2. Click on add TAG

3. Add  the new tag (Name, subject, or anything that you search by)

4. Your picture or video now as a tag that you can search on.

Buffer overflow issue in versions 9.0 and earlier of Adobe Reader and Acrobat

There is a major security hole is ALL Versions of Adobe Reader and Acrobat!

 

The fix is being worked on if you are using a 3rd party to read your PDF you ok. If you are using ADOBE products be very careful The patches will not be out till March 11. 2009

Here is the article directly form Adobe

—————–

Buffer overflow issue in versions 9.0 and earlier of Adobe Reader and Acrobat

Release date: February 19, 2009

Vulnerability identifier: APSA09-01

CVE number: CVE-2009-0658

Platform: All platforms

Summary

A critical vulnerability has been identified in Adobe Reader 9 and Acrobat 9 and earlier versions. This vulnerability would cause the application to crash and could potentially allow an attacker to take control of the affected system. There are reports that this issue is being exploited.

Adobe is planning to release updates to Adobe Reader and Acrobat to resolve the relevant security issue. Adobe expects to make available an update for Adobe Reader 9 and Acrobat 9 by March 11th, 2009. Adobe is planning to make updates for Adobe Reader 7 and 8, and Acrobat 7 and 8, available by March 18th. In the meantime, Adobe is in contact with anti-virus and security vendors, including McAfee, Symantec and others, on this issue in order to ensure the security of our mutual customers. More information on protection for this issue from anti-virus and security vendors is now available on the Adobe Product Security Incident Response Team blog.

Reports have been published that disabling JavaScript in Adobe Reader and Acrobat can protect users from this issue. Disabling JavaScript provides protection against currently known attacks. However, the vulnerability is not in the scripting engine and, therefore, disabling JavaScript does not eliminate all risk. Should users choose to disable JavaScript, it can be accomplished following the instructions below:

  1. Launch Acrobat or Adobe Reader.
  2. Select Edit>Preferences
  3. Select the JavaScript Category
  4. Uncheck the ‘Enable Acrobat JavaScript’ option
  5. Click OK

A security bulletin will be published on http://www.adobe.com/support/security as soon as product updates are available.

All documented security vulnerabilities and their solutions are distributed through the Adobe security notification service. You can sign up for the service at the following URL: http://www.adobe.com/cfusion/entitlement/index.cfm?e=szalert

Affected software versions

Adobe Reader 9 and earlier versions
Adobe Acrobat Standard, Pro, and Pro Extended 9 and earlier versions

Severity rating

Adobe categorizes this as a critical issue and recommends that users update their virus definitions and exercise caution when opening files from untrusted sources.

Revisions

February 24, 2008 – Advisory updated
February 19, 2009 – Advisory first created