Categories
Uncategorized

More info on how to protect your PC from the Conficker worm

In addition to my earlier post today on protecting yourself from the Conficker computer worm, here’s a couple of articles that outline steps to inoculating your PC and eradicating the Conficker worm.

First, consider using the Microsoft Malicious Software Removal Tool or the Windows Live OneCare Safety Scanner if you’re concerned that your PC may be infected.

AP Technology Writer Jordan Robertson recommends that "If you can navigate the Internet freely except for sites owned by Microsoft or antivirus vendors such as Symantec Corp., McAfee Inc. or F-Secure Corp., your PC might have Conficker or a similar bug. Robertson also provides a list of Conficker removal programs posted here on the Conficker working group site.

I noticed the following article of interest on the Channel Insider’s Security page, with information on additional tools to stop Conficker.

Gregg Keizer of Computerworld sums it up with an answer to his own question today… 

"I think my PC is safe so far, but what can I do to protect it from future infection?

"The first thing you should do is apply the MS08-067 patch that Microsoft issued last October.

"Second, make sure your antivirus software is running and up to date. Third, apply this Feb. 24 patch from Microsoft, then disable Windows’ Autorun feature, which Conficker.b can abuse in its attempt to spread via USB devices such as flash drives."

Related Links

Also see my post on thinking about computer security and your family PC.

Delicious Bookmark this on Delicious Bookmark and Share

del.icio.us Tags: privacy, tips, howto, Microsoft, security

Technorati Tags: privacy, tips, howto, Microsoft, security

Clubhouse Tags: clubhouse, security, Windows 7, Windows XP, Windows Vista, Security Center
This post is also available via http://tinyurl.com/cell8z
Categories
Uncategorized

Protect yourself from the Conficker computer worm

Of interest today: Learn about the Conficker computer worm on Microsoft.com.

In short, most antivirus software could detect and prevent infection.

Here’s more info from the page Protect yourself from the Conficker computer worm:

The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction.

If you are an IT professional, please visit Conficker Worm: Help Protect Windows from Conficker.

Q&A:

Also see my post on thinking about computer security and your family PC.

Delicious Bookmark this on Delicious Bookmark and Share

del.icio.us Tags: privacy, tips, howto, Microsoft, security

Technorati Tags: privacy, tips, howto, Microsoft, security

This post is also available via http://bit.ly/Ja36

Categories
Uncategorized

Video: Bill Gates on the importance of DreamSpark and the student community, courtesy of Max Zuckerman at Channel 8

Of interest is this video from last week from Max Zuckerman of Channel 8, speaking with Bill Gates on the importance of DreamSpark and the student community…

You can find this video as well as Gates’ keynote on the Government Leaders Forum press site (the conference was last week).

Tags: Bill Gates, Microsoft Corp., Microsoft Windows.

Categories
Uncategorized

Why do I need IPv6? Where can I learn from Microsoft about IPv6 for Windows? (Your questions on IPv6)

This came in today via email (thanks, Brin)… Clip art from Office Online

"Why do I need IPv6? Is there more about IPv6 available from Microsoft? Is there anything I need to do to support IPv6 in Windows Vista or Windows 7?"

Internet Protocol version 6 (IPv6) is (Wikipedia tells us) "the next-generation Internet Layer protocol for packet-switched internetworks and the Internet." It’s the next generation following IPv4, the addressing Internet Protocol used today.

Although not widely used yet, it’s expected that IPv6 (with a 128-bit address) will soon come into its own: some estimate that we will run out of the just over 4 billion 32-bit IPv4 addresses in the next few years.  As the number of Internet-connected devices grows, IPv6 should alleviate the shortage of IP addresses with IPv4.

Just thinking: with all the talk of the US digital television transition and my experience on daylight saving time changes in the US and Canada, should there be an international transition date for IPv6 usage?  My friend, Paul, has been eager to look for a new project to take on… perhaps this is one such customer awareness effort.

Back to the present.

Fortunately, as noted on the IPv6 for Microsoft Windows: Frequently Asked Questions page, both Windows Vista and Windows Server 2008 (which stem from a common architecture) support IPv4 and IPv6 via the Next Generation TCP/IP Stack in Windows Vista and Windows Server 2008. (Please note that’s not ST:TNG.)

Support for IPv6 is also included in Windows 7 and similar to what you’ll find in Window Vista and Windows Server 2008, in addition to the Direct Access feature, which allows you to connect to secure networks (like your office) via the Internet without having to VPN into the network. As noted on the page, "Direct Access is that is uses IPv6 over To keep data safer as it travels public networks, Direct Access uses IPv6-over-IPsec to encrypt communications transmitted across the Internet."

We also provide IPv6 implementations for many older Windows products still in wide use, such as Windows Server 2003, Windows XP Service Pack 1 (SP1) or later, and Windows CE .NET 4.1 or later. Older versions of Windows (Windows 2000, Windows 98) are not supported.

You’ll find a number of technical overviews, articles, deployment and development resources and webcasts available on the aforementioned IPv6 for Microsoft Windows: Frequently Asked Questions page.

 

Tags: Microsoft, your questions, IPv6, Internet, Security, Windows 7, Windows Vista.

Delicious Bookmark this on Delicious Bookmark and Share

This post is also available via http://tinyurl.com/dayg5y

Categories
Uncategorized

Accessing the Internet at a cafe? See these tips for working securely from wireless hotspots

Just received this question as I’m about to head off to a meeting… where I will be accessing the network via our wireless network…

"How do I learn more about what to look out for when using internet cafes?"

I recommend Microsoft’s article on 7 tips for working securely from wireless hotspots

"Wireless hotspots are changing the way people work. These wireless local area networks (LANs) provide high speed Internet access in public locations—as well as at home—and require nothing more than a notebook PC with a wireless card. From coffeeshops to restaurants, airports to hotel lobbies, hotspots are ubiquitous. They are the de facto connection method for travelers and remote workers to access the Internet, their e-mail, and even their corporate networks."

Also see my post on thinking about computer security and your family PC.

 

Delicious Bookmark this on Delicious Bookmark and Share

del.icio.us Tags: privacy, tips, howto, Microsoft, security

Technorati Tags: privacy, tips, howto, Microsoft, security

Also available via http://tinyurl.com/cl4yxg and http://bit.ly/18dR25