The Most Fearless and Ferocious !

December 27, 2009


2009/12/27
The creature in the photo is known by the name of the Black Mamba and is the most feared snake in Africa. The name is referring to it’s ink black mouth. One bite delivers enough poison to kill 20 men; yet to the most fearless and ferocious animal on earth this deadly snake is only dinner!

The African Puff Adder whose venom  contains enough toxin to kill 5 men is no match either for the most fearless and ferocious animal on earth if the Mamba was dinner then the adder was lunch!

The cobra who’s venom will kill a full-grown elephant is no match as well against the most fearless and ferocious animal and in seconds will be a it’s meal.

Even the python with it’s bone crushing coils has it’s body shredded and consumed by the most fearless and ferocious creature.

Have you figured out what who this creature is?

Here is another victim

the young salt water crocodile!

When I say the most fearless and ferocious I am not kidding, our little guy is BAD !

What else does he go after?  Africa’s venomous tarantula !

For an evening snack he will devour scorpions when he finds them.

Nothing can withstand him!

Lions and leopards are the only possible threat to our fearless and ferocious little guy and if they take him it will cost them dearly and usually costs them their lives!

Other creatures on the menu are insect larvae, beetles, lizards, rodents and birds such as vultures and hawks!As well as springhare, polecat and particularly juvenile foxes, jackals, antelope and wild cats.

By the way our most fearless and ferocious little guy eats the honey and larva of the killer bees.  Do they sting him, yes!  But he still eats the hive anyway!

Who is he?   He is known only for eating the hives.  He is the African Honey BADger also known as the African Ratel. 

 

Wait, this Blog is about computers, where is the computer part?

In the computer world there are also very deadly programs that will kill your computer and data.  What bad programs?

Viruses, worms, trojan horses, most rootkits, spyware, dishonest adware and  crimeware.

So what is the most fearless and ferocious program that is able to destroy these malicious programs?

According to Anti-virus Comparatives the #1  protection against these deadly programs this year is

Norton Anti-Virus 2010

If you live in the Kalihari of Africa the two things that make you feel comfortable are:

Seeing a Honey BADger in your yard and Norton Anti-Virus on your computer 🙂

 

 

 

by R. Frank Tulak


The Killer Tomato, Potato and Botnet

December 15, 2009

Here are the last few seconds of this fly’s life before the lighting quick jaws of the venus flytrap leaf snaps shut and the plant begins to digest this fly, pulling the life giving nutrients from the fly to the plant. The venus fly trap (Dionaea muscipula) is labeled a carnivorous plant but not all carnivorous plants capture prey the same way. The standard definition would be “any of several unrelated plants modified to capture and digest animals, especially insects, which supply nitrogen that may otherwise be unavailable in their habitat.”

According to the standard definition; if a plant, because of it’s design, characteristics or attributes, captures and or kills an animal for the purpose of extracting nutrients to be used by the plant, it is carnivorous.

Carnivorous plants don’t digest all their victim only the nutrients it needs. Then when it opens only the structure and shell of the victim is left.

Other carnivorous plants  use nectar mixed with a sap and digestive chemicals to lure and capture the animal like the sundew (Drosera) .

While others are more passive like the  pitcher plant (Nepenthaceae and Sarraceniaceae) who lure insects into an opening that forces them to drown in a pool of water in the center of the plant. Thus extracting the nourishment over time as the animal dissolves in the water.

The problem is there are a whole group of plants that still fit the definition of carnivorous plant but because they do it differently they have never been recognized as been carnivorious.

Ladies and gentleman I introduce the covert carnivorous plants, our well-known tomato and potato plants! All this time we never recognized their carnivorous behavior. For those who grow tomatoes they have always recognised the dead insects on the plant or on the ground around the plant but have generally ignored it.  We never thought about it. I guess we all thought the insects just came to the plant to die. 🙂 The truth, recently accepted without controversy, is the tomato and potato plant lure the insects then the insects are trapped by the sticky hairs on the tomato or potato plant THEN (and here is where we missed it) as the sappy lure dries it finally releases the dead victim to dissolve on the soil to feed the roots of the plant just below the surface.

What does this have to do with Computers?

If you look at a computer program as a kind of life form then you see it needs the nutrients that are available from other computers to grow. So if there is a kind of program that can grow outside its own computer it must lure other computers, capture them then extract or assimilate those computers processor and memory to grow and capture other computers.

Is there such a carnivorous program? If so how big is it?

There are carnivorous programs and they are called  botnets!

How many botnets are there? There are hundreds but there are 16 which are the real monsters and have eaten the lions share of the world’s computers.

Are they dangerous to people? Well that depends on how much of your life is dependent on computers. For illustration purposes let’s use automobiles instead of computers. What if someone could take control away from the driver of a car and completely control it remotely? Could they do any damage? What if they could take control of 100 cars at any moment could they do any damage? Look at the size of  top 5 of these carnivorous programs!

  1. Conficker           35 ,000,000 +   computers controlled
  2. Kraken                     495,000       computers controlled
  3. Srizbi                        450,000      computers controlled
  4. Bobax                       185,000      computers controlled
  5. Rustock                    150,000      computers controlled

HOW DID CONFICKER GROW SO BIG!

After it has infected a target computer (by downloading a Trojan), it tries to prevent it’s removal by disabling anti-virus software and blocking access to security-related web sites, as well as stealing personal information by masquerading as an anti-virus product called Spyware Protect 2009. How ?   The worm informs the user that his computer is infected and takes the user to a fake security Web site, asks them to pay $50 for a spyware program that actually is the Conficker worm, then keeps their credit card information, to boot.

How can you tell if your computer is infected with the conficker worm?

There is a test to see if your computer is infected click here 

Where is the infection mostly located?

 

What should everyone do? Keep their antivirus and antispyware up to date and scan regularly.

Hey I’d rather eat a potato or tomato than be eaten by one! 🙂

 

 by R. Frank Tulak


Are the CIA FBI NSA the same thing?

July 1, 2009

bondslarge2

 

Of course not. They server different purposes and are limited in their authority and influence; but they are very vital in this day and time.

What they have in common is that they collect and act on information related to criminal activity or affects national security.
So they are filled with James Bond types right? No!
A James Bond type would never work well in either group. They may have attributes similar to the Mr. Bond of Ian Fleming’s stories but they must be team players, not lose cannons! Sorry if you are a James Bond fan. 🙂
What their focus is and their boundries are are pretty much given in theirs names.
The Federal Bureau of Investigation (FBI ) and Central Intelligence Agency (CIA) and National Security Agency (NSA).
The FBI is primarily a law enforcement agency, collecting intelligence related to domestic security and performing crime investigation.
The CIA is an international intelligence agency which is not responsible for domestic security
In other words the FBI investigates crimes, and the CIA gathers intelligence.

What does the National Security Agency handle? The NSA handles domestic intelligence in coordination with the FBI. In addition, the CIA often cooperates with international intelligence agencies to exchange information. The CIA may pass information regarding domestic security on to the FBI.

The FBI also handles domestic law enforcement issues. The FBI coordinates national efforts to track down missing persons, complex investigations which local law enforcement cannot handle, processing of criminal evidence, and support for victims of crime. FBI agents frequently assist in the collection of evidence in major criminal cases, especially those involving a substantial amount of money or multiple homicide cases.

The CIA does not handle law enforcement. Agents working within the United States are primarily stationed at CIA headquarters in Washington. Domestically based agents interpret information and create intelligence briefings for the President and White House staff. If directed, these agents may supervise overseas agents in carrying out covert actions on behalf of the United States. (more like Mission Impossible then like James Bond 🙂 )

What does this have to do with computers? EVERYTHING!

You see foriegn unfriendly nations and groups can and do gather information through the use of your computer by way of implanting spyware and malware. This method is almost totally impercievable and very destructive. Not only can they gather intelligence from your computer but use your computer to commit crimes with out you being aware that anyone else is using your computer.
Some recent examples are the Cyber attacks on the World Bank right before the economic world crash. The attack on the White House computers. But ones that can trigger the greatest damage are the botnets.
They are malware that allows someone else to take change of your computer from a distance. As a mild threat they are use to send spam email but as a greatter threat they can be combined to crash any and all networks! Which is about what everything runs on!
Picture if you will traffic any traffic, cars down a highway, water through a pipe, phone calls through a router or just your family coming and going through your house front door. Now instantly jump that incoming traffic to 10.5 million! What would happen to our communications network, our hospital’s network or our defence and police networks? This is the concern of our agancies that guard our nation! What botnet has 10.5 million computers under its control?
The confiker worm! Here is the distributions of control the botnet has.
conficker_world_map
Picture 10.5 million computers awaiting the command of their master!

In the world of your computer it needs protection! You and your computer are part of our nations security!
Your computer needs to have virus protection (like the FBI for our nation) and anti-spyware (like our nations CIA) and it needs to be more strengthed and upadated against attacks with the operating system updates (like our nations NSA).

YOUR MISSION IF YOU DESIDE TO ACCEPT IT IS TO KEEP YOUR COMPUTER’S
ANTIVIRUS UP TO DATE AND CHECK ITS OPERATION EVERY WEEK
UPDATE AND CHECK AND RUN YOUR ANTISPYWARE EVERY WEEK
CHECK AND RUN UP DATES FOR YOUR OPERATING SYSTEM EVERY WEEK.
THIS MESSAGE WILL NOT SELF-DESTRUCT.
GOOD LUCK 🙂


Why Do We Need Passwords?

May 13, 2009

The same question could be phrased “why do we need locks on the doors of our house?” or “Why do we need locks on our cars?”
If some one fails to see the need for locks then have them remove the locks from their home and car.
Quickly the need will be self evident, all though costly.
In this computer age we need security and passwords are that lock to keep the outsiders out side!

Weak or substandard locks are worthless. Would you lock the front door of your house with a luggage lock?

luggagelock
The best they can do to a malicious person is be a nuisance. They will not hinder or stop him.

They are better than nothing right?

Low hanging fruit are always the first fruit taken from a tree. But once they are all gone then more effort is required to get the rest of the fruit. So it is with those with with no passwords at all and those with weak passwords. Those with weak passwords aren’t the first to be taken but they are definitely next!

Your computer has about 256 entry points called ports which are like doors  and it takes less than three seconds to knock on all the doors looking for a response from the computer of  “user name and password”.
Once there is a response then what is used is a dictionary attack where every word in the dictionary is used. This can be done in minutes. Next is the hackers list of most commonly used passwords. Comments on this list can be found at http://tech.yahoo.com/blogs/null/120554 
 

while the list itself can be found at

 

What is a strong password?
It should be at least 8 characters long with a mixture of numbers and letters with one or two special characters.
No, swordfish will not do. 🙂

So how do you remember a password that has number and letters with special characters?

For me special characters mean either at home or at work or at some other location. For instance the special character “$” would be for my computer at work. Then if I am opening a Windows OS then I just use the first four characters of Windows and it would be $Wind. Now interweave the last four digits of your personal phone number at work or your employee ID into it or any other familiar numeric string. Like this $W4i2n4d9. What if you were logging into your Quick books at work? What should the password be? $Q4u2i4c9k. When I am at home the stars are out. Guess what special symbol I use at home? Right, the “*” special character. So logging on to my home computer which has Windows it would be merged with a numeric string at home, perhaps the last four of the home phone *W9i7n5d5. 

This method makes for  stonewall passwords! What is even better they are easy to remember! (well almost 🙂 )

Remember it is not a person that is attacking your computer but a program that is written so that one program can be at thousands of places at one time, knocking on your or other’s computer’s or router’s doors.

Should you share your passwords with anyone? Maybe one; Groucho Marx! 🙂

We are here for you, if you need help give us a call at IBEX 619-464-4249


When a Stone is Not a Stone.

January 23, 2009

pacific_stone_fish

Safety is very important.

Fish hide in the rocks for safety.

In the next few moments of the this picture the little black damsel fish will be literally in the rock on the left and he will not be safe, he will be dead, eaten alive! (click on picture to watch the rock come alive!) Quicktime 7 required download and install here http://www.apple.com/quicktime/

In this world survival and propagation of one’s species is assured if one of two factors are incorporated in your existence, mimicry or crypsis. Mimicry is to mimic the characteristic or appearance of a deadly or dangerous creature even though it is not equipped to or capable of carrying out what it appears to be or have.  This is mostly used by prey.

Predators on the other hand use crypsis or camouflage to appear benign and harmless giving a false sense of protection or safety to their prey. 

In the world of computers more and more programs are resembling life forms.

If the program can not by its own abilities survive it will mimic the abilities of another! Our shelves and drawers are filled with programs that mimic the abilities of other powerful programs but were incapable of performing those abilities.

Then there are the predator programs who appear to be harmless or  benificial to guard and protect you but they are deceiving and will take a big bite out of your productivity, time and finances!

These predator programs trick you into believing a problem exists on your system. Then you are given no alternative but to purchase the bogus applications because your existing antivirus and antispyware cannot resolve the problems because your  antivirus and antispyware are damaged from the predator software, or there is no problem at all. Once they have your credit card info you download more predator software under the camouflaged appearance of protection for your computer. What do you think they will now do with your credit card info?

What if you catch them before you give them your credit card info?

 Even if you catch on that it is a predator it is extremely difficult to remove their fangs and claws out of your computer. Even experienced technicians will have to take 3 to 4 hour to remove it. For those who have paid and downloaded more predators, camouflaged as protection for your computer, it may take 3 to 4 days to remove!  One computer recently came in for repair with 630 predators in their computer!

 Here are the images of the 11 most painful predators in the computer world and 11 creatures whose bite or sting are the most painful  in the world!

 Stone Fish and WinFix

Pain = like boiling oil in ones veins and a sledgehammer to ones joints

Pain = like boiling oil in ones veins and a sledgehammer to ones joints

WinFixer

WinFixer

  

 

 

 

  Gila Monster and UltimateDefender

pain= slowly being burned alive from bite throughout body

pain= slowly being burned alive from bite throughout body

 ultimatedefender

 

.

Black Widow and Spy Sheriff

Unbearable pain just to breath !
Unbearable pain just to breath !

spysheriff

 
Turantula Hawk Wasp and Malwarewipe 
Lightning bolt of screaming agony
Lightning bolt of screaming agony

malwarewipe

Spiting Cobra and DriveCleaner

excruciating acompanied with 5 hours of blindess
excruciating acompanied with 5 hours of blindess

drivecleaner

 Bullet Ant and AVsystemCare

Repeatedly stabbed with red hot nail
Repeatedly stabbed with red hot nail

avsystemcare

Rattle Snake and 1st Anti Virus
being branded continously!
being branded continously!

1stantivirus-main_full

 
 Scorpion and VirusBurst
scorpion_500wvirusburst
 
 Box Jellyfish and SpywareQuake
wraped in burning embers
wrapped in burning embers

spyware-quake

 
Sting Ray and AntiSpyware Soldier
Stabed with a red hot 8 penny nail
Stabbed with a red hot 8 penny nail

ass

 
Brazilian Wandering Spider and System Live Protect
Unimaginable pain with every breath
Unimaginable pain with every breath

liveprotect

 

 

 

 

 

 

Safety  is  very  important.

Getting antivirus and antispyware is being safe!

Unless it gets you! 

Not sure what you are buying?

Call us 619-464-4249

Or email me atrftemail

 

If you are not already receiving it, ask to get our news letter !

We are here for you 🙂

 


…They know when your awake. They know if you’ve been bad or good, so ..

January 7, 2009
They see

They see

 

Privacy  has many  definitions, definitions which are dependant on who you are talking to.

 

Donald Kerr, Principal Deputy Director of National Intelligence  perceives the definition of privacy as anonymity. Therefore from his point of view he believes in this day and time that it  is impossible if there is to be security. In other words, privacy is what you and the government know about you and no others; this is for your safety! 

White Hats, Hackers, Phreeks (a portmanteau for phone and geek no I don’t know why there is an “r” in phreek) define privacy another way; that if you have given that information to anyone then they have a right to it as well. What is left is private.

Then there are those that believe privacy is like going to the beach; if you go to the beach your going to be exposed or why did you go to the beach? What is the beach? The internet. This group of marketers who manufacture the majority of spyware feel they are allot like Santa Claus; “who sees you when your sleeping and knows when your awake and knows when you’ve been bad or good..” and for a price will give any information on any and every type of person who uses the internet ( Ho Ho Ho). One of the oldest is http://www.doubleclick.com/: for a list of most of the American companies that write the spyware programs go to   http://www.spywareguide.com/creator_list_full.php?s=m.

The final group of spyware writers is the smallest but the most infamous they are the Black Hats. These have the skills of all those above but are bad guys “black hats“. They are after your computer to make it commit crimes for them; so that the FBI knocks on your door and arrests you and not them. They work to get your name, social security, birth date and credit card numbers. No, they are not thieves who use your credit cards to go to Europe and eat at fancy restaurants and stay at big hotels then throw your card away. These guys are very intelligent and astute. They collect information and credit card info on hundreds of thousands of people. Then they make a $0.14 to $0.24 transaction of each card at the end of each month.  How much is $0.14 X 100,000 ?  Have you ever complained about a $0.14 charge on your credit card? No one does. Where does the money go? The money trail ends in countries at the fringes of international law; to countries in Eastern Europe and private organizations in Pakistan. What do they do with the money? I don’t think its anything legal!

You are probably asking why I mentioned phreeks (phone geeks) in this article about privacy, right? Because many people say they don’t do credit card transactions over the Internet but only over their cell phones. Do I have a surprise for them. Your cell phone is a computer but what is worse it’s a wireless one.  All broadcasts over the airwaves are monitored and recorded by government agencies except the phone you have that has a wire attached; it is illegal for anyone to monitor that wired phone without a judges order and due cause, but not so for wireless. It is the job of the government to record and monitor wireless transmissions, does the letters FCC mean anything to you?  Well it’s only the government that is listening to my orders over the cell phone, right? Ladies and gentleman may I introduce to you the hottest selling item imported from Europe and Canada the Optoelectronics Scout frequency counter and a AOR-8200

The TOOL

The TOOL

Imagine the thrill of listening to every cell phone conversation within 40 miles !
There are tens of thousands of these  in the US.
Are they illegal to own? No!
Are they are illegal to use? YES! but they can not be detected if they are used.
Honestly it’s far safer to use the computer on the internet then a cell phone to transmit personal information.
With the Internet browser set to 128 bit encryption (and there is no spyware on your system) your computer is linked to the transactional computer and is virtually secure against anyone’s eyes while the information is in transit. How do you know its working?
There will be a little padlock either at the top next to the URL (internet address) or bottom right corner of your Internet browser.
Your transactions are secure!

Your transactions are secure!

 
 
.
Privacy to me is very simple.
If I get private with my wife behind closed doors where I can plainly see  the dimples on her cheeks then I guarantee she can see mine .
Privacy is not one way.
Bare truth from both parties is only right.
If they want my privacy then I have a right to theirs or no deal!
The same for the beach!
You want to check me out in a speedo on the beach then you have to be wearing just as little or no deal !
I don’t care how big your belly is !!!
santa_on_holiday_in_spainHO! HO! HO!  

Why is My Computer Problem called a Virus? Why isn’t it called a Bacteria?

December 31, 2008

v6lbl7Virus are not the same as bacteria.

Just as computer viruses are not the same as malware (spyware). If you can imagine an elephant being bit by a mosquito then you have the comparison in size between the bacteria (elephant) and the virus (mosquito).

The question is what is a virus and why is the problem with the computer called a virus?

Well have you ever wondered what is the determining factors for something to be called alive? What makes a rock not alive and a plant and an animal alive? First it consumes and second it grows and developes and  third it reproduces itself. A bacteria does all these things and does it every twenty minutes! What about a virus? It does NONE of these things! 

Bacteria are micro scale and viruses are nano scale.  A bacteria is very complex single cell organism.

untitledPicture in your mind a peach. If you cut it in half and looked at it, what do you see. (We are going to use the peach as an example of a single cell.) The skin would be the cell membrane, the meat of the peach the cell’s cytoplasm but the seed would be the cells nucleus. The nucleus is not really like a seed but more like a small ball of spaghetti. (you can tell I haven’t had diner yet!)  The awesome thing about the strands of spaghetti is the length of the strand and the protein sequence, that length is the sequence of what the cell is to do its whole life! Including its response to any stimuli (things that happen to it).

Its just like the programing code for a computer operating system!

Didn’t know that the spaghetti like nucleus of a cell (DNA) was modeled after a computer’s operating system, did you?  (smile) Just joking.

What about the virus?  Well it’s just a little snippet of the the spaghetti like strand of code in the nucleus of the cell in a fancy delevery box!

t4bacteriophageThis is a electron microscope image of a virus (bacteriophage) that is harmless to us but deadly to bacteria.

The little appendages lock on to the elephantine bacteria while the shaft penetrates the cell membrane injecting the small package of a piece of spaghetti (protein code, DNA) from it little head into the cell. Once into the cell necleus it attach’s to the spaghetti code and reprograms the cell to literally dismantle itself and make copies of the virus! When the whole cell is transformed internally to nothing but virus clones the cell burst open and releases thousands of the little critters! Guess what they go and do?

Well now back to computers.

So what would you call a little snippet of computer code that takes the computers resources away to replicate itself as many times as it can destroying the computer’s operating system and using that system to infect other systems? Right, a virus!

What would you call a small yet complete program that grows inside your computer’s system taking data and information, processes it and develops and finally replicates itself? Bacteria?

No its called malware or spyware.

Wait if small snippets of code that screws up your computer is called a virus then complete programs that process your personal information to send it to another location and replicates itself should be called Bacteria, right?

Yeah, but if you said your computer had a bacteria instead of malware or spyware people would think that you were weird though you would be logically correct.

I’m hungry, I’m going to get me some spaghetti, want to join me, there is peach for desert 🙂