eMail Accounts

Free email accounts like Yahoo, MSN, and Gmail typically employ a web based client(how you send and receive email). You access your email through a web site. The provider sells advertising on the web site to re-coup expenses and generate a profit. A web host provider may offer email services for your domain. Most provide a web interface or webmail. Another way to access your email accounts is through a local email client, Continue reading

LIMITED OPPORTUNITY!-BUY NOW!!!

I recently found this advertisement from around 1978 while sorting through the contents of my filing cabinet.  It may have been the first PC related scam. This flyer was sent to every PC retailer in the country.  Not one diskette drive was ever shipped.  If you could find one, a single sided TRS-80 drive was more than double this price, required the purchase of the expansion interface, and was somewhat unreliable.  The data capacity of a double sided 5.25 in diskette was 256,000 characters.

“Never trust a company with the word ‘World’ in it’s name” is one of the Rules For Life I developed from that long ago episode in my past.

I have no idea how I managed to hold on to this scrap of paper for so long!

Protect Yourself From WannaCry!

The latest ransomware attack, referred to as WannaCry was accidentally stopped in its tracks some days ago by an amateur researcher that tripped a kill switch by registering a domain name hard-coded in the hacker’s routines that was essentially a GUID.  The safeties have now been taken off and the latest and greatest instantiation of this malware has already gobsmacked the Ukraine. Here’s the D&D:
The bad guy(s) search the Internet for machines with the TCP port 445 open.  Server Message Blocks (SMB), a file sharing protocol used by printers, routers, scanners, and such use this port.  SMBv1.0 is the original protocol in Windows,  that has used the port, at least since the W2K days, has been deprecated since W7, but the code is still in all the OS’s, as well as v2.0 and v3.0.  The v1.0 code contains THE buffer overflow vulnerability, whereas a specifically formed packet rammed up port 445 trips the onerr routine, crashes the system stack, and gives the perp the ability to remotely execute code outside of the UAC(User Account Control); you know– that system modal box that asks if its OK for Windows to make changes to the system YES? or NO?.  The code then seeks out any workstations on the LAN and infects them as it encrypts all data files it can find.   BTW this general vulnerability has been around since before forever and if anyone is stupid enough to believe that Windows has been completely re-written since NT…well here’s exhibit Z.  I have lost count of the number of exploits known to  use the onerr goto system stack crash vulnerability.
So stop what you are doing–  Go to Control Panel -> Programs -> Windows Features —
uncheck the bloody SMB 1.0/CIFS File Sharing Support checkbox

Click OK
re-boot
bow your head
wait for the ricochet
think about LINUX
cause it ain’t gonna end here
My W7 machines didn’t have this feature but my W10s did.
It’s the W7 machines that caught most of the hell.
Most XP machines just crashed.
Special thanks to the NSA for not telling anyone about this.
M$ found out about it from a stolen NSA data dump to WikiLeaks
and issued a security patch in March.  Europe is getting hit hard
probably because no-one’s got good validation codes.  bad code – no update.
M$ has even issued a WannaCry security update for XP and W2003 servers.

It’s Time To Kill Freeware

gallows     Allow me to walk you down the garden path to the briar patch called Freeware; a segment of the software industry that just needs to go away. Now I am not referring to such organizations like Open Source Foundation, Open Office, Open Libre, The Apache Foundation, or the authors of Squirrel, Firefox, MySQL, Notepad++, Filezilla and many others. Continue reading

The Canon MG3520 A Next Gen Inkjet Printer

MG3520I am always on the lookout for new tech items with low user ratings.  No doubt- the device  is quickly discounted to get it out of the retail stream while the manufacturer corrects the issue.  These devices will also show up in the re-manufactured market at a significant discount owing to the many user returns. Often, the bad reviews have nothing to do with quality, capability, fit or finish. Continue reading