Showing posts with label internet virus. Show all posts
Showing posts with label internet virus. Show all posts

Friday, January 28, 2011

Caveat Emptor: May the Buyer Beware--7. Internet Hackers & 'Cloud Computing'


An unusual
cloud formation over
Washington, DC, 2002.

"Jousting in the Clouds",
An Original Photographic
by mkrause, 2002, 2011,
mkrause54@yahoo.com or mkrause381@gmail.com.



Can Internet Hackers Be Blocked From PC Files?

Julian Assange and wikileaks have been in the news recently for US defense leaks. If the US government cannot protect its classified files from access by Internet hackers, can the average PC user?

A monthlynotesstaff source complains that wifi usage places PC files at risk.
PC scans done at Internet Cafes, Verizon at the Borders coffee shops, possibly AT&T at Starbucks or Fedex Kinko's, motel stay wifi connections may expose you and your computer to hackers.

This source reports the significant rearrangement and loss of easy access to numerous internal (hard drive) files of original photographs and graphics. At first the files appeared to have been taken and replaced by network news file photos. The files were later found in other computer files. The network news files appeared on the 'Recently Changed' file. The news photos cannot be deleted easily or possibly at all, or moved to the "Recycle Bin".

This may be evidence of a serious problem with the concept of the 'stream of data' known as 'cloud computing'. Individual PCs through some type of internet virus are being hijacked for use as servers for Internet Service Provider (ISP) networks like Yahoo and its affiliates, possibly Google, or even cable networks scanning electrical outlets in businesses.

Even good, well-known security programs cannot maintain a 'firewall' preventing data leaks from the individual PC. Part of the problem is the software design. New programs require not only the CD bought in the store, but also Internet access to install and run the software program purchased.

There is a need for immediate research into this problem. New types of software may have to be developed to maintain a computer industry and products users want to purchase. Perhaps software contained on your PC only, networks of PCs, partially or fully open or closed Internet circuits, and other options may make the computer industry too unwieldy for the average computer user to navigate.

These phenomena may create new challenges for newspaper and book publishers, and other print media companies now moving into electronic formats.


(Read more on this and other topics on "Caveat Emptor: May the Buyer Beware" on http://monthlynotesthirteen.blogspot.com on www.google.com.)

Graphic: "Jousting in the Clouds", An Original Photographic by mkrause, 2002, 2011, mkrause54@yahoo.com or mkrause381@gmail.com. An unusual cloud formation over Washington, DC, 2002.

Email mkrause54@yahoo.com or mkrause381@gmail.com to comment or request copies of this or other blogs posted by mary for the monthlyntoesstaff on http://monthlynotesthirteen.blogspot.com (http://monthlynotes.blogspot.com through http://monthlynotesfifteen.blogspot.com) on www.google.com.

Wednesday, January 26, 2011

Caveat Emptor: May the Buyer Beware--6. Internet "Viruses"


Is it an avian internet virus
on the Information Superhighway?
Even in the age of cyberspace,
the paradox of
life in juxtaposition
persists.
An Original Photographic,
copyright by mkrause,
2002, 2011,
Hot Springs, Arkansas, 2002.


Viruses and Viruses

Life presented 2 simultaneous challenges in April, 2010. Struggling with the discomfort of human influenza virus symptoms is difficult. But suddenly while trying to connect to wifi Internet over coffee and a breakfast roll at an 'Internet cafe', the computer too fell ill with an Internet virus.

Paralytic but repetitive, the virus froze the PC screen between the Internet and any and every file requested. The Internet Service Provider name or symbol, Yahoo or Y!, flashed across the screen. Then there were 4 repeated screens of possible 'look-alike' manufacturer (hp) and 'Microsoft' security tool ALERT. The screen informed the PC user that the PC was "seriously infected, being hijacked, damaged, perhaps irrevocably", with the threatened "loss of private data". The virus blocked attempts to contact Yahoo Help.

At first the virus appeared to be a very aggressive security update sales screen series. But it was not possible to advance to the next screen to buy the security update. Over the next day or so, wonderng how the virus had moved or deleted the security products already installed on the PC, it was difficult to decide on a new anti-virus security product. The virus also blocked download of a Microsoft security update at a computer learning center.

An associate at the center was able to "google" the security tool ALERT named on the screen. Other websites described a similar virus which had been noted more frequently by PC users since December, 2009. The virus was freezing more and more computers more frequently in March and April, 2010.

Some users successfully had removed the virus with a number of techniques, including "re-booting" without the purchase of additional security software. Others found the virus resistant to removal or noted that the virus recurred days or weeks later.

One screen revealed the virus as a 'hybrid trojan-BNK.win32.keylogger.gen' virus which had contaminated Internet Explorer, version 7. The viral attack did occur days after problematic attempt to update to Internet Explorer 8 on google and a review of IE update on Yahoo.

Customer Service at the new security software described the virus as an 'extremely experienced' Internet virus. This company suggested the PC be taken to a computer technician to be 'wiped clean', followed by software re-installation.

Luckily, the virus seemed to weaken its hold on the PC and allowed some contact with the Internet over the next few days. The PC seemed to clear the virus with the addition of an inexpensive 'Defender" security software CD program, which the PC may have confused with "Microsoft Defender", installed before the viral attack.

Previously convenient 'Internet Shortcuts' to Aol and Yahoo had been damaged leading the PC user to wonder if the cable internet service provided objected to wifi Internet users.

Subsequently, a new Norton 360 CD software program was installed, with some difficulty and delay over the next 2-3 days. Later, the new security program worked relatively well and the virus seemed to have cleared.

It is sometimes hard to tell if the PC is being disrupted by a 'hard sell' by software, cable, computer repair techs, or even the Internet cafe staff where you may spend too much time hunched over your coffee and computer. But that's life in cyberspace.

(Read more on these and other topics in 'Caveat Emptor: May the Buyer Beware' on http://monthlynotesthirteen.blogspot.com (http://monthlynotes.blogspot.com) on www.google.com).

Graphic: An Original Photographic, copyright by mkrause, 2002, 2011, 'The Paradox of Life in Juxtaposition', Hot Springs, Arkansas, 2002.

Email mkrause54@yahoo.com or mkrause381@google.com to comment or request copies of this or other blogs on http://monthlynotesthirteen.blogspot.com (http://monthlynotes.blogspot.com through http://monthlynotesfifteen.blogspot.com) on www.google.com.