What is taking up so much HD space?!
Thursday, July 18th, 2013 | Author:

Ever wonder how your HD gets filled up so much?  Besides your large collection of porn and MP3′s y ou nabbed from The Pirate Bay that is.  There is a nice tool that can help you understand called WinDirStat (KDirStat for us Linux guys).

windirstat

 

Depending on how large your drive is, it wil take quite a few minutes for the program to read everything but when it’s done, this is the picture you will see.  Each colour represents some type of file and it’s relative size.  If you click on any one of those coloured squares, the file will be highlighted in the directory navigation section.  This way you can either delete it or at least know where you put it.

If you find that your drive is simply dominated by MP3 files, then perhaps an external drive would be a good idea to store them on and free up the main drive for regular use?  In either case, this is a great little tool for managing all the data we gather these days.

If you own a Mac, this is for you!

http://www.intego.com/mac-security-blog/how-to-securely-set-up-your-new-mac/

Website error codes explained graphically.
Monday, November 12th, 2012 | Author:

For those of you who see these messages when trying to access a website, this will help.

Word to the unaware, do you know what your system does without your consent? http://securityaffairs.co/wordpress/10183/security/new-technologies-raise-serious-doubts-on-privacy-security.html

More security weaknesses found and another reason why windows firewall is not enough. It doesn’t protect outgoing connection, nor does it inform you.

It appears that information theft has taken a new form: we’ve found a malware that steals image files from all drives of an affected system and then sends them to a remote FTP server.

https://blog.trendmicro.com/trendlabs-security-intelligence/malware-steals-image-files-from-systems/

Category: Tech News  | Tags: ,  | Leave a Comment
Twitter ‘User For The Month’ Scam « AllTwitter
Sunday, November 04th, 2012 | Author:

Twitter scam. Not surprising.

You’ve seen all the Twitter spam messages by now, we imagine, and you know to ignore them. You won’t get rich quick, lose tons of weight or win a free iPad when you click that link. And you know that claims of a negative post or picture of you are false.

http://www.mediabistro.com/alltwitter/twitter-user-for-the-month-scam_b30751

Category: Tech News  | Tags: , ,  | Leave a Comment

Late in August McAfee Labs discovered a Fake Antivirus program that claims to detect infections, and displays alerts to scare users into purchasing protection.

On the contrary, this program is not genuine software and has nothing to do with reliable and effective AV tools. The truth is that this is another scam application developed to enter your PC through vulnerabilities in outdated programs.Trend Micro, which detects the threat as TROJ_FAKEAV.EHM said, ”After infecting a user’s system, this malware scares its victim into buying the “product” by displaying fake security messages, stating that the computer is infected with spyware or other malware and only this product can remove it after you download the trial version. As soon as the victim downloads Win 8 Security System, it pretends to scan your computer and shows a grossly exaggerated amount of nonexistent threats”.

This sort of malware is commonplace, with examples existing for Windows XP, Windows Vista, Windows 7 and even Mac OS X. What’s amazing is not that the hackers have decided to use the Windows 8 name, but the fact that they chose to do this before Windows 8 is even out.Trend Micro’s conclusion about this threat is that, It is typical for cybercriminals to piggyback on the highly-anticipated release of any latest technology to take their malware, spam, malicious app to new heights.

To stay safe, users must keep their cool and think twice before clicking links or visiting web pages  especially those that promise the latest items or programs for free. If it’s too good to be true it probably is.

http://thehackernews.com/2012/11/beware-of-fake-antivirus-win-8-security.html?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Daily+Cyber+News+Updates%29

Spammers Using Shortened .gov URLs
Monday, October 22nd, 2012 | Author:

From the “What will they think of next?” files…. Slashdot (@slashdot) tweeted at 7:42 PM on Sun, Oct 21, 2012: Spammers Using Shortened .gov URLs http://t.co/1q5QPlQx (https://twitter.com/slashdot/status/259967853212618752) Get the official Twitter app at https://twitter.com/download

Category: Tech News  | Tags:  | Leave a Comment

Some pretty practical advice here!

http://www.howtogeek.com/126911/what-to-do-if-you-get-a-virus-on-your-computer/?utm_source=newsletter&utm_medium=email&utm_campaign=181012

Category: System Protection  | Tags:  | Leave a Comment

HTTPS Everywhere, the browser extension we produce in collaboration with the Tor Project and an awesome community of volunteers, is now used by more than 2.5 million people around the world.1Today we released version 3.0 of HTTPS Everywhere, which adds encryption protection to 1,500 more websites, twice as many as previous stable releases. Our current estimate is that HTTPS Everywhere 3 should encrypt at least a hundred billion page views in the next year, and trillions of individual HTTP requests

https://www.eff.org/deeplinks/2012/10/https-everywhere-3-and-a-trillion-web-requests

Basically this helps protect you from spyware and other malicious software that may be trying to see what you are doing/your password. Install it and forget it. Works great.

Category: System Protection  | Tags: , ,  | Leave a Comment