Other WelchWrite Blogs: A Gardener's NotebookCareer OpportunitiesMy WordCareers in New Media

Home -- Contact Me -- Search Welchwrite.com -- Subscribe to TechIQ
Douglas' Events, Appearances and Seminar Calendar


Thursday, December 24, 2009

Installing Microsoft Security Essentials on client's computers

I recently noticed the article below in my reading and it reinforced my recent change in what software I install on my friend's, family and client's Windows PCs.

I was installing a combination of ClamAV and Windows Defender, but upon the release of this new software, Microsoft Security Essentials, I saw an opportunity to stream line things and give the users less to concern themselves with as far as updates and new versions.

Twitter friend and follower @MadMarv saw my original Twitter post when I shared the item below and repied "yeah, I'm starying to roll out MS. Sec. Essentials around the office. Seems less obtrusive than any other AV right now."

Every Windows PC needs an antivirus and anti-malware program to protect it and Microsoft Security Essentials combines both into one, easy-to-install package. If you don't currently have protection installed, or it is out of date, head over to Microsoft's Web Site and download and install Microsoft Security Essentials as a base line of protection.

While it has been true for years that you needn't spend a lot of money (or any money) on you PC protection products, Microsoft Security Essentials simply reinforces that fact.

Microsoft Security Essentials Ranks as Best-Performing Free Antivirus [Antivirus]
from Lifehacker by The How-To Geek

Anti-malware testing group AV-Comparatives.org not only gave Microsoft Security Essentials a top rating for malware removal, but now they've given it their best ranking in their performance test as well.

AV-Comparatives.org ran a series of real-world tests running through common scenarios like downloading, extracting, copying, and encoding files, installing and launching applications, and they also ran through an automated testing suite as well. Once the dust had settled, it became clear that not only is MSE one of only three products that both blocks and removes malware well, but it's also very light on system resources.

Read the entire article


Labels: , , , , ,

Friday, February 16, 2007

Elsewhere Online: Default Router Passwords Could Compromise Home Networks

This Slashdot story points up a vulnerability that some people might have left exposed on their home routers from companies like Linksys, D-Link and NetGear.

Whenever I set up a router, I make sure to reset the default password for that router. This is the password that allows you to setup and change settings within the router, not the password you might use to connect to your wireless network. That said, some of you might still be using the default password.

An exploit has been discovered that allows a malicious web page to access your router setup information, if it still uses the default password, and change settings within the router. Not a good thing.

If you are wondering if your router still has its factory default password, drop me an email at techiq@welchwrite.com and I can give you some instructions that will allow you to test for it.

Drive-By Pharming Attack Could Hit Home Networks

Rob wrote in with a link to a CBR Online article discussing drive-by pharming, a new exploitation technique developed by Indiana University and Symantec Corporation. While it's not known if the technique is in use 'in the wild', the exploit could easily co-opt the web-browsing habits of a user that had not properly configured their router. "The attack works because most of the popular home routers ship with default passwords, default internal IP address ranges, and web-based configuration interfaces. The exploit is a single line of JavaScript loaded with a default router IP address, a default password, and an HTTP query designed to reconfigure the router to use the attacker's DNS servers." The article goes on to discuss several related and more advanced techniques related to this one, which security companies will have to keep in mind to guard against future attacks.

(Via Slashdot.)
Technorati Tags: , , , , , , , , , , ,

Labels: , , , , , , , , , , ,

Wednesday, January 17, 2007

Reminder: Install all Windows Updates

Just another reminder of how important it is to install all Windows Updates )and Software Updates on Macs, too) when they are released. Don't leave yourself open to attacks that can be prevented.

If you need any assistance in installing these updates, email or call douglas@welchwrite.com/818-601-0051

Attack code out for 'critical' Windows flaw Code that exploits a recently found flaw in the way Windows handles Vector Markup Language documents has been published.

(Via CNET News.com.)

Technorati Tags: , , , , , ,

Labels: , , , , , ,