13.11.2017 Views

ce magazine november issue

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Michigan City Indiana

Vol. 3

Hackers compromised

free CCleaner

How to set up and

use ES File Explore

on your cell phone

1


Thanks to all who contributed to CE

Magazine. Have an article you would like

contribute? You can mail it to:

CE, P.O. Box 8619

Michigan City In 46360

Or E-Mail it to

computerease@juno.com

CE Magazine is part of OtherSide Ministries © all rights

reserved

Founder & Chief Editor

Peter Nadal

Editor

Pamela Kennoy

Art & Design

Peter Nadal

In our November Issue Vol. 3

5 Hey Pete! On this issue “How to set up

and use ES File Explore on your cell

phone.”

12 Scam Alert by Rodrigo Esperanza

15 Biz Cards board!! Hey its free

16 Secret Scroll Tip

17 Protecting Seniors online from scams,

Hacks and tax fraud by NewsUSA

19 Cheap vs. Frugal by Nomar Shaw

24 Hackers compromised free CCleaner

article by Joseph Menn

28 Come a Long Way Baby!

Our Writers

Rodrigo Esperanza

Nomar Shaw

Diane G

Outside Sources On This Month issue

NewsUSA

Cyber Risk

Front Cover

River bridge autumn reflection park

Additional artwork and fonts by

Peter Nadal

Original Computer-Ease logo ©

2


We had a lot of fun with the Halloween Special Edition and it was a great hit with you folks

and I thank you. The November issue front cover sets the tone and mood of this issue and if you

want to know where we got it, go to Google and search for “River Bridge Autumn Reflection

Park” then click on images. VuNature.com is the site that has it and some more you may like

and if you noticed we flipped the picture around your right, we did it for better effect on the

front cover.

As a vet I do give thanks for their service, I do it especially when I go to the VA Clinic. If you

know a vet in your neighborhood, invite him or her over for Thanksgiving and let‟s celebrate

Thanksgiving the American Way by watching and caring for those who served and keeps

freedom ringing and don‟t forget our boys and girls in blue!

Now for those who have loved ones in the service and want to share Thanksgiving with them,

here is a novel approach: Pack a box with all the trimmings and send it out including a letter

with some instructions; “When you get this Thanksgiving in a box call me via video phone

when you are ready and will have Thanksgiving together!” for iPhone use Facetime.

From my home and staff to your family, have great

Thanksgiving and May Peace duel in your home.

From:

Peter Nadal, Pam Kennoy, Rodrigo Esperanza, Nomar Shaw

and Diane G

3


Simper Fi!

To all veterans we thank you for your service

4


How do you do that!

If you are always on the move and going from your home computer to office

computer and have no time to carry cables to plug in to transfer documents, picture

etc, then I got a great hint for you. Whether its iPhone or Android phone there is a

app called ES File Explore and not only does it allow you to go into your files on

your phone, but, it also lets you hook up to your computer to swap files without

cables. Now you can get this lil jewel on Play Store for android or APP Store for

iPhone and here is the app logo;

It will work from Windows xp pro to Windows 10, now, this „how do‟ is about

Windows 10 and how to set it up to work and share with ES File Explore as

Windows 10 is to say the least is stubborn.

Step One

Go to the bottom left side and press windows logo and when to menu pops up

press the settings gear wheel (red circle). The windows stetting

window will open up, from there you will select ACCOUNTS

(red circle) see picture 2 on next page, go ahead and select it.

5


Picture 2

Step two

If you see this then exit out this window as your good and you can go to step three.

Picture 3

6


But, if you see this;

Then sign into your local account instead of being logged into Microsoft

account. Windows 10 will guide you if you don‟t have a password to sign in to

create one then Windows will log off. Re log in and now Microsoft won‟t have their

grubby fingers in your computer, you have control now.

Step three

Go to the bottom right side of the screen and you will see your wifi bars or a lil

screen for network cable.

Left click on it then a small menu appears like the picture above, click on „Open

Network and Sharing Center‟ as seen in picture 5.

7


Picture 5

Now, go up to the left side and select „Change advanced sharing settings‟ (red

circle).

Picture 6

Click on „Guest or Public (current profile)‟ (red arrow) button and if it matches

picture 6 then move on to „All Network‟ see picture 7

8


Picture 7

In All Networks (red arrow) do the same thing, match your settings as seen in

picture 7, if no changes were done then close the window by clicking the x at the

top right hand side, but, if have done changes the „Save changes‟ will be lit, so, go

ahead and click on it and now Windows 10 is ready to share with ES File Explorer,

go to step four.

Step Four

Now the last few settings we need to do on ES File Explore, tap in the ES app on

your cell to bring up Es File Explore. In ES File Explorer tap the 3 lines icon in the

upper-left hand corner, see picture 8

9


Picture 8

Picture 9

Then navigate to network and

tap on it then tap on Network.

Then tap on search to find

your computer on your

network as seen on the right

picture. When you see your

computer you can cancel the

search or let it finish the

search.

Picture 10

10


Step Five

Once the search is done go ahead and tap on your

computer. As seen in the picture on the left log in

and check „Remember password‟ click ok. Now

you have access to your computer files, your

main file will say „Users” tap on it and you will

see your personal file along with Public,

Administrator, Default, Default User and All

Users.

Now, I know what you‟re going to say, “I got

cables!” yes you do, however, this beats carrying

cables around all the time. You can now tap in to

your office computer, kids‟ computers, or your

laptop as long they are connected to a router.

11


By Rodrigo Esperanza

In today's world when it comes to Computers & Smartphone‟s one has to be very

careful. "Why?" You ask! There is a scammer in every turn of the corner. You

might get the following in your E-Mail which I did!

"Dear Sir/Madam,

I am Joseph, Business Development Manager.

We are an India based Website designing/application development company with our primary

focus on making websites that are easy to update and manage, such as Shopping carts and

Content Management Systems.

We have our competency in CMS (Joomla, Modx, Mambo and other quality Content

Management System) and e-commerce website.

We offer dedicated developers for as low cost. The developers would assist you to get desired

web solutions with impeccable standards of work. You can hire developer from us Web

Development, AJAX Development, XML Development, Wordpress Development, Joomla

Development, CMS Development, eCommerce Development, Magento Development, X-Cart

Development and Mambo Development, PSD To HTML/XHTML/HTML5 Designing, Template

Design, Landing Page, Jquery, Emailer Design and Flash Logo Design.

As many as 90% websites do not bring business to their potential because they do not appeal to

the target audience. And the reason most visitors leave a website is because of a complex

design and navigation

12


With an experience of developing more than 2500 websites successfully, we can help you earn

more business from your website if you are ready to redesign your website. Most of our clients

have benefited from our expertise. Most firms from UK, USA, Canada and Australia overseas

have achieved a significant amount of savings by outsourcing either complete or part of their

work to us in India.

With more than 50 developers working for us, we offer:

- Reduced cost

- Flexibility

- Freedom

- Assured deliverability

- Ease of communication

- Greater control over time management.

We wish you the best of luck and looking forward to a long and healthy business relationship

with you.

Contact us today to know more about our Web design, re-design, development and CMS

Services and about our past work details, Client Testimonials, Packages?

Getting started is easy. Just mail us at Joseph@creative-webmarketing.info and we will

definitely help you to achieve your business goals and objectives.

Please share your Skype id and contact number to make the communication easily assessable.

I look forward to your reply.

Best regards

Joseph

Designing & Development Department

Email: Joseph@creative-webmarketing.info"

If you do get something like this, then look for the disclaimer below the email.

If you see one most likely then it is a scam, even thou it may look legit. These

email disclaimers are tagged on by your email provider like the example 1.

13


Example 1;

Disclaimer:

The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and

Marketing Act) establishes requirements for those, who send commercial email, spells out

penalties for spammers, and companies whose products are advertised in spam if they violate

the guidelines, and gives consumers the right to ask emailers to control it. The above mail

Joseph@creative-webmarketing.info and we ensure you will not receive any such mails.

In an average month I get around 15 every two or three days, I try to educate a lot

of my friends about these email scams and also phone scams. If you need a web

site, blog site or some sort of computer repair then 'PLEASE' contact your local

computer tech.

For any questions; email us at computerease@juno.com

14


end your biz card in pdf to computerease@juno.com or mail to Computer-Ease, Po BOX 8619

Michigan City In 46360

15


Secret Tip Scroll

This time of the year hacking computers or cell

phones, scams, frauds, and any other despicable acts

are high, so here are some tips to keep you safe.

1. When you go Christmas shopping turn off your

Wifi and your Bluetooth. This is done through the

settings app of your cell phone.

2. If you go to Chicago the potential of being

hacked on your cell phone on a scale of 1-10 it’s

going to be 100 that you will get hacked. The

best solutions turn your phone off.

3. Keep your cell phone, not in your purse but invest

in a pocket for a bra, if you’re a man take it off

the clip and keep it in your front pocket.

Be Safe, do not shop alone especially at night time.

Don’t believe every notification about your

computer, Call your computer tech

16


Protecting Seniors Online from

Scams, Hacks and Tax Fraud

Share |

NewsUSA - The vast majority of seniors today are using the

Internet at least once a week to check email, pay bills online and

keep in touch via social media. But all that time online puts

them at risk for scams and hacks, such as tax fraud.

In fact, a new survey by Home Instead, Inc., franchisor of the

Home Instead Senior Care network, found that 67 percent of

surveyed older adults have been the victim of an online scam or

hack.

Encouraging seniors to practice cyber security can go a long way toward protecting

their identity and sensitive financial information. Home Instead collaborated with

the National Cyber Security Alliance to create Protect Seniors Online, available at

www.ProtectSeniorsOnline.com, a free resource that educates older adults about

cybersecurity. Here, seniors can test their cybersecurity skills with the "Can You

Spot an Online Scam?" quiz.

Older adults can take the following steps now to protect themselves online:

*Password protect and secure devices, accounts. Lock all devices (including

computers, tablets and smartphones) with secure passwords in case devices are lost

or stolen.

*Think before clicking. When faced with an urgent request -- like emails asking for

money -- think before clicking or get a second opinion. Clicking on links is often

how scammers get personal information. When in doubt, trash an unusual message.

*Share with care. More than half (51 percent) of seniors surveyed by Home Instead

use social media to stay connected. Use care when sharing personal information,

17


adjust privacy settings to limit who can see your information, and turn off location

sharing.

*Use security software: Install anti-virus and anti-spyware software and program it

to run regularly. And be wary of pop-up ads or emails, many of which contain

malware that can infect computers.

*Log out: Log out of all apps and websites when you are finished. Leaving apps

and websites open on computer screens could make you vulnerable to security and

privacy risks.

*Recommend support: Older adults who live alone may need help from a trusted

source -- such as a family member, tech-savvy friend or professional caregiver --to

serve as a second set of eyes.

To explore additional Protect Seniors Online resources, including the interactive

quiz, visit www.ProtectSeniorsOnline.com

A Home Instead office near you can be found by visiting

www.homeinstead.com/state.

18


The Frugal Way Part 1!

Acer Aspire R1600 & Windows 8.1, Marriage Made In Heaven?

By Nomar Shaw, contributing writer/CE Magazine

This article “Acer Aspire R1600 & Windows 8.1, Marriage Made In Heaven?”

originally was written by my boss, Peter Nadal. Having an Acer Aspire R1600 I

fallowed his upgrade and I could not been happier. Mounting an Acer R1600 to a

Monitor The Frugal Way Part 2! Is my contribution to this upgrade hack, so, if you

have one collecting dust this article is for you!

Part 1 is for an average knows how.

As you can see below Acer Aspire R1600 (1st generation) on its mount, figure 1 is

what it looks in side. The Aspire R1600 intended for office environment, but, it

grew in popularity with all us computer nuts. It came with;

1: Intel Atom 230 processor (1.6

GHz)

2: 1 GB of RAM

3: NVIDIA ION graphics

motherboard

4: 802.11 Wifi (this was optional)

5: 160 Gig Hard Drive

6: Windows XP Pro

19


Mine as you can see in Figure 1 has 4 gig of ram and Wifi card added, by the way, it

uses the same Wifi cards that most laptops have which makes it real easy to find.

My R1600 came from a very good friend/customer whom I upgrade to a new

Figure 1

Laptop. The 1st thing that I did was to max out the memory and plug in a Wifi card

(Wifi card is above the hard drive) from one of my parts laptop. Make sure you

tape the antenna wires to the front lid and away from the fan intake as seen in

figure 2 (note: I rewired the antenna in different way since that picture).

Figure 2

20


Now as you can see there is no DVD Rom, but, no problem for me as all my

Windows (except XP & Windows 8 & 8.1) install disks are mounted on thumb

drives. Windows 7 home premium got installed without a hitch and I used XP

drivers on the ones the Win 7 could not find. It worked great especially Djing and

Karaoking for private parties and at the house, BUT, on the slow side and an

overheating problem. I ran it for a year till 8.1 showed up, so, by this time I had to

migrate all music and karaoke files along the dj software to a medium size desktop

that I build specifically for djing. So, the R1600 became the bar computer and what

better time to find out how good is windows 8.1, will the old girl run smooth? Will

it over heat?

VERDICT!

I have to eat my cynical words about 8.1, its way better then 8, Aspire R1600 and

Win 8.1 is most definitely a marriage made in heaven. Win 8.1 has a small foot

print compared to win 7 and because of the small foot print, small computers like

the Aspire R1600 run smoothly with it. But, some tweaking to win 8.1 has to be

done to get her to run nice. The driver’s for the NVIDIA ION graphic card is hard to

find. Win 7 took the XP Driver without a fuss and this is because win 7 has most of

XP coding, win 8.1 does not. A visit to Nvidia web site produced the 32 bit driver, a

word of warning, though the Aspire r1600 can run 64 bit with no problem, finding

a 64 bit nvidia graphic driver for win 8.1 is a dead issue, stick to the 32 bit version

of any windows you install.

UPDATE! Since this article from a few yrs ago Peter re-did the Acer to Windows 10

and his opinion is two thumbs up. As you can see wifi works great, picture below,

21


Mounting an Acer R1600 to a Monitor

The Frugal Way Part 2!

I have been told I'm cheap! Raised by a Jewish step Mom the proper word is FRUGAL!

I have this Acer R1600 that I up graded to windows 7 (I decided to not to go Windows

10, but, to stay Win 7 home), bump up the memory to 4 gb and installed a laptop

wireless card with a interior antenna. And wanted to mount it behind a LCD Monitor,

but, the mounts made for Acer R1600 series range from $19 to $45 (plus shipping) and

frankly money is tight, so..... I went to the bench and let the mind juices work.

After a few "prototypes" came up with the easiest way to mount it...

Blank PC Case Brackets!

22


As you see by the pictures its straight forward, just place the bend of the bracket in the

faceplate grove and mark it. Bend it(see note), drill a hole (as seen in the picture 1 & 2)

and screw it in. Angle it as seen in picture one & two then slide the Acer in. As for the

cables I round them then tied them up with twisty ties

Note: Take the two brackets the part that is already bent and slide it in the front grove then mark

where you need to bend it to create the pocket

23


A CE MAGAZINE HEADS UP!!!

THIS IS A MUST READ, IF YOU’RE NOT SURE HOW TO FIND OUT IF

YOU GOT HACKED VIA CCLEANER THEN GET HOLD OF YOUR

COMPUTER TECH!

#Cyber Risk

September 18, 2017 / 3:39 AM / 2 months ago

Hackers compromised free CCleaner software,

Avast's Piriform says

Joseph Menn

4 Min Read

SAN FRANCISCO (Reuters) - Hackers broke into British company Piriform Ltd’s free

software that optimizes computer performance last month, potentially allowing

them to control the devices of millions of users, the company and independent

researchers said on Monday.

FILE PHOTO: A man holds a laptop computer as cyber code is projected on him in

this illustration picture taken on May 13, 2017. REUTERS/Kacper

Pempel/Illustration/File Photo

24


More than 2 million people downloaded tainted versions of Piriform’s program,

which then directed the computers to get instructions from servers under the

hacker’s control, Piriform said.

Piriform said it worked with law enforcement and cut off communication to the

servers before any malicious commands were detected. This came after security

researchers at Cisco Systems Inc (CSCO.O) and Morphisec Ltd alerted Piriform’s

parent Avast Software of the hack last week.

The malicious program was slipped into legitimate software called CCleaner, which

cleans up junk programs and advertising cookies to speed up devices.

CCleaner is the main product made by London’s Piriform, which was bought in July

by Prague-based Avast, one of the world’s largest computer security vendors. At

the time of the acquisition, the company said 130 million people used CCleaner.

A version of CCleaner downloaded in August and September included remote

administration tools that tried to connect to several unregistered web pages,

presumably to download additional unauthorized programs, security researchers

at Cisco’s Talos unit said.

Talos researcher Craig Williams said it was a sophisticated attack because it

penetrated an established and trusted supplier in a manner similar to June’s

“NotPetya” attack on companies that downloaded infected Ukrainian accounting

software.

“There is nothing a user could have noticed,” Williams said, noting that the

optimization software had a proper digital certificate, which means that other

computers automatically trust the program.

In a blog post, Piriform confirmed that two programs released in August were

compromised. It advised users of CCleaner v5.33.6162 and CCleaner Cloud

v1.07.3191 to download new versions. A spokeswoman said that 2.27 million users

had downloaded the August version of CCleaner while only 5,000 users had

installed the compromised version of CCleaner Cloud.

25


Piriform said that Avast, its new parent company, had uncovered the attacks on

Sept. 12. A new, uncompromised version of CCleaner was released the same day

and a clean version of CCleaner Cloud was released on Sept. 15, it said.

Only the cloud version could be updated automatically to remove the bad code.

The nature of the attack code suggests that the hacker won access to a machine

used to create CCleaner, Williams said.

CCleaner does not update automatically, so those who installed the problematic

version will need to delete it and install a fresh version, he said.

He also recommended running an antivirus scan.

Williams said that Talos detected the issue at an early stage, when the hackers

appeared to be collecting information from infected machines, rather than forcing

them to install new programs.

Piriform said in a news release that it had worked with U.S. law enforcement to

shut down a server located in the United States to which traffic was set to be

directed.

It said the server was closed down on Sept. 15 “before any known harm was

done.”

Avast said little about the breach, posting nothing on its Twitter account in the 12

hours after the announcement and displaying nothing on its main web page.

Piriform’s news release and technical blog post did not mention Cisco or its

partner Morphisec, instead crediting Avast with discovering the still-unexplained

compromise.

After the controlling web addresses were seized, Cisco saw 200,000 attempts to

connect to them

26


Computer Magazine From The Past!

27


Come a Long Way Baby!

Via Old Picture Of The Day, here's the Osborne 1, which was released in 1981.

It weighed ~25 pounds, had a 5-inch screen, and cost $1,800.

From this!

Here's some history from Wikipedia:

As the personal computer became feasible in the early 1970s, the idea of a

portable personal computer followed. A "personal, portable information

manipulator" was imagined by Alan Kay at Xerox PARC in 1968, [6] and described in

his 1972 paper as the "Dynabook". [7]

The IBM SCAMP project (Special Computer APL Machine Portable), was

demonstrated in 1973. This prototype was based on the PALM processor (Put All

Logic In Microcode).

28


The IBM 5100, the first commercially available portable computer, appeared in

September 1975, and was based on the SCAMP prototype. [8]

As 8-bit CPU machines became widely accepted, the number of portables

increased rapidly. The Osborne 1, released in 1981, used the Zilog Z80 and

weighed 23.6 pounds (10.7 kg). It had no battery, a 5 in (13 cm) CRT screen, and

dual 5.25 in (13.3 cm) single-density floppy drives.

To This!

29


The TRS-80 Model 100 is a portable computer introduced in 1983. It is one of the

first notebook-style computers, featuring a keyboard and liquid crystal display, in a

battery-powered package roughly the size and shape of a notepad or large book.

Display: 8 lines, 40 characters LCD

Graphics: 240 by 64 pixel addressable graphics

Units sold: 6,000,000

Power: Four penlight (AA) cells, or external power adapter 6V (>180 mA)

Memory: 8 KB - 32 KB (supported)

Operating system: Custom dedicated runtime in firmware

CPU: 2.4-MHz Intel 80C85

Yep the boss has one of these too, minus the big floppy drive.

Thank for reading CE Magazine

Chow For Now

Nanomites!

30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!