Category: Operating system issues

Could an upgrade to Windows 8 yield a performance boost to your computer

Article

Installing Windows 8 on your old PC could turn it into Greased Lightning | ZDNet

My Comments

Some of us might think about upgrading an existing computer system to Windows 8 when this operating system is released rather than staying with Windows 7. Most commonly, there would be a lot of doubt about this process but, in some cases, it could improve the computer’s performance.

A Windows computer that was built up in the last four years i.e. since Windows Vista was launched could easily benefit from an upgrade to Windows 8. This is due to the reworked code that is written to work best with the recent generation of hardware.

The speed increase also comes due to natively-integrated desktop security software as well as Internet Explorer 10 and integrated cloud-computing support.

But I would recommend that the system which is being upgraded has current expectations for RAM and secondary-storage capacity. This would be 4Gb RAM and 128Gb of secondary storage as a bare minimum. If the machine uses a hard disk rather than solid-state storage, I would expect it to have at least 320Gb. As I subsequently mention, the operating system is at a price point that may allow you to budget in a hardware upgrade to these expectations.

Users can upgrade their Windows computers to the new operating system at a cost-effective price due mainly to the “electronic hard-copy” distribution that Microsoft is using i.e. to buy and download the operating system online rather than having to buy a packaged copy with an optical disk. This is in a similar way to how Apple are distributing the MacOS X Lion and Mountain Lion operating-system upgrades. It also comes with some attractive licensing terms including the ability for those of us who are building our own systems to legitimately purchase a “system builder” package.

It would be OK to go ahead with the upgrade if you can handle the changes to how the operating environment works, such as the new touch-focused Start “dashboard” and having to “descend further” to get to the standard operating interface. But I would recommend that those of us who aren’t computer-competent should stay with Windows 7 unless they are buying a new computer that comes with Windows 8.

Your new MacBook Air or MacBook Pro being thirsty on the battery? Check for software updates

Article

Apple releases fix for increased power consumption in new MBP and MBA | ZDNet

From the horse’s mouth

Apple – Software Download (direct)

My Comments

You may have just bought the Retina-based MacBook Pro or a Macintosh laptop over the past year but have noticed that you always have to run it on AC power rather than on battery. In some cases, you may have noticed that the fan in the computer is running more than it should.

This has been discovered by Apple as a firmware bug and they have prepared a software update to rectify this problem. This bug is allowing the CPU in the MacBook to run harder than it really needs to, thus allowing it to draw on more power and yield more heat. The software update also improves operating-system compatibility with certain USB devices which may also help with the stability of the system.

This software update is available at Apple’s Website or through the Software Updates panel in MacOS X Lion. Infact, if you have just bought a Mac laptop, I would recommend that you visit the Software Updates option and deploy this and other important updates to your Mac.

Now you can have your Leopard-based Apple Macintosh secure from the current threats

Article

Apple issues Leopard update with Flashback removal tool – Engadget

Downloads

Apple

Java security update (targets Flashback Trojan)

Adobe Flash security update

Adobe

Latest Flash Player update

My Comments

Owning an older Macintosh computer that is running MacOS X Leopard but isn’t powerful enough to be upgraded to Snow Leopard or Lion? Or you haven’t upgraded your Mac to Snow Leopard or Lion due to keeping a LocalTalk peripheral in service using that link.

You may fear that this situation may make you vulnerable to the recent security scares involving Trojan-Horse programs written in cross-platform code that is targeting the Macintosh platform. Now Apple has remedied that problem by releasing two patches targeting this version of MacOS X.

The Java security update checks for and removes the Flashback Trojan from your Mac, but also disables Safari’s Java plug-in. If you need to use Java in Safari, you would need to visit the Preferences menu by going to Safari>Preferences or pressing [Command] and [,], then clicking the “Enable Java” option.

The Adobe Flash update will disable the out-of-date version of Adobe Flash Player end encourage you to visit Adobe’s Website in order to download the latest version of the software. Here, you make sure that you are downloading for MacOS X 10.4 – 10.5 to get the latest version for your MacOS X Leopard computer.

Apple has now released a software fix for the Flashback trojan

Articles

A look at Apple’s Flashback removal tool | MacFixIt – CNET Reviews

Apple releases fix for Flashback malware | Engadget

Downloads – Apple’s support Website

Java Update for MacOS 10.6

Java for MacOS Lion

My Comments

Apple has reacted to the groundswell of concern about the recent Flashback malware and have issued updates to its Java runtime environment for both MacOS Snow Leopard and Lion.

Here, they have implemented a check-and-remove routine for this Trojan as part of the installation routine for the new Java runtime environment. For most Macintosh users, this will simplify the process of removing any existence of this malware as well as keeping this runtime environment up-to-date.

The CNET article also gave a detailed review of what goes on as well as how to fix situations if the installation takes too long and the procedure hangs. As I have posted previously, Apple could improve on the issue of providing system maintenance and desktop security software so that Mac users can keep these systems in good order.

The Apple Macintosh platform–now the target for malware

Introduction

In the late 1980s when the scourge of computer viruses hitting popular home and small-business computing platforms was real, this issue was exposed across all of the platforms that were in use during that year. This encompassed Apple’s two desktop platforms i.e. the Apple II and the Macintosh; along with the Commodore Amiga, the Atari ST and, of course the MS-DOS-driven “IBM” platform. Of course, the computer magazines ran articles about this threat and how to protect against it and disinfect your computing environment from these software pests.

But through the 1990s, the Windows / DOS systems were the main malware target, especially the Windows 98 and XP systems that ran Internet Explorer due to their popularity. The other platforms weren’t targeted that much due to their lesser popularity in the field and the computer press didn’t touch on that issue much. It was also because some of these platforms like the Amiga and Atari ST weren’t being supported any more by their manufacturers.

But lately there has become a trend for people to hop from the Windows platform to the Macintosh platform due to reduced targeting by malware authors and the perceived hardening that Apple has done to this platform. This has been recently augmented by the popularity of the iOS mobile-computing devices i.e. the iPhone, iPod Touch and iPad as well as elegant computing devices available to this platform. All of these factors has led to an increased popularity of Apple Macintosh computers in the feild and they have become a target for malware authors.

But most Macintosh users run their computers with the Apple-authored Safari Web browser and are likely to implement Apple iWork or Microsoft Office productivity software. They also run these computers without any desktop-security or system-maintenance tools because they perceive that Apple has made the task of keeping these computers in ideal condition easier than with the Windows platform.

What can Macintosh users do

Macintosh users can harden their computers against malware by installing and keeping up-to-date a desktop security suite. A free example of this is the Avast program that has been recently ported to the Macintosh platform and another paid-for premium example is the Kaspersky desktop-security suite. These programs are, along with a system-maintenance suite like Norton Utilities, a must-have so you can keep these computers working in an ideal condition.

Another practice that I always encourage is to keep all the software on your Macintosh computer lock-step with the latest updates. This can also help with dealing with any bugs or stability issues that may affect how the software runs on your computer. Here, you may want to enable a fully-automatic update routine for security and other important updates or a semi-automatic routine where the Macintosh checks for these updates and draws your attention to any newly-available updates, that you then deploy.

It is also worth disabling Adobe Flash Player, Java and similar “all-platform runtime” environments if you don’t need to run them. There are many articles on the Web about this in response to the Flashback Trojan Horse. Otherwise make sure that the runtime environments are kept updated. Similarly, you may want to change your default Web browser to a purely-open-source browsers like Firefox or Chrome, which is more likely to be kept up-to-date against known bugs and weaknesses. This was also made easier with new-build installations of MacOS X Lion i.e. when you had a new Macintosh with this operating system “out of the box”. Prior operating systems had the Java runtime installed by default and this survived any operating-system upgrade.

What Apple needs to do

Apple needs to come down from its silver cloud and see the realities of what is involved with keeping a computer in good order. For example, they need to provide desktop-security and system-tuning tools so that users can keep their Macintosh computers in tip-top condition and free from malware. They also need to transparently and immediately implement all updates and upgrades that Oracle releases for the Java environment in to their distribution or allow Oracle to distribute the Java environment  for the Macintosh platform.

As well, they need to take a leaf out of Microsoft’s book by implenenting a “default-standard-user” setup that has the user operating as a “desktop-user” privilege level by default. Then the user is asked if they want to go to an “administrator” privilege-level when they perform a task that requires this level and only for the duration of that task. This is important with home and small-business computer setups where there is typically only one fully-privileged user created for that system.

Conclusion

What the recent “Flashback” Trojan Horse has done is to bring the Apple Macintosh platform to a real level where issues concerning desktop security and system maintenance are as important for it as they are for other platforms.

Making sure your small business is ready for IPv6

Article

HP Blogs – 6 steps for SMBs to become IPv6-ready – The HP Blog Hub

My Comments

There is all the talk of us running out of IPv4 public IP addresses for the Internet, and an increased awareness of IPv6 Internet technology. One major driver for the IPv6 technology is the rolling out of next-generation broadband services; where this feature will be seen as being part of the “next generation” mould.

In the near time, the typical IPv6 network will operate as a “dual-stack” setup where there is an IPv6 network and an IPv4 network operating over the same network space. A device such as an IPv6-ready router will typically bridge the gap between the dual-stack devices and the IPv4-only devices by assisting in the discovery of the devices and transferring data between the two different network stacks.

Outside IT contractors

If you do regularly engage outside contractors for your IT needs such as your POS / property-management technology, it would pay to ask whether the technical staff know about IPv6 and how to deploy it. Most of these contractors may think that small business doesn’t need IPv6 but as the Internet moves to this technology, it pays to be future-proof.

ISPs and Webhosts

It is worth making sure that your business’s ISP and Internet hosted services such as your Webhost are ready for IPv6 or have intentions to roll out a customer-facing IPv6 service.

Most ISPs and Webhosts are likely to have the backend of their services working on IPv6 technology but their customer-facing services like the Web services or Internet service may not be ready. This may be due to the presumption that most customer setups will fail when confronted with IPv6. The exception may be the ISPs that serve a “switched-on” audience that knows their way around the Internet technology; or ISPs and Webhosts that offer customer-facing IPv6 service as a limited-user beta test and they may offer a “dual-stack” setup.

It also pays to check that your domain host supports domain records that are compatible with IPv6 setups. This includes having AAAAA-form DNS records that can resolve your domain name to IPv6 addresses.

Hardware

Computers that run Windows Vista or 7, MacOS X Lion or recent Linux distributions will be ready for IPv6; with Windows XP having support through a downloadable module from Microsoft’s Web site. Relatively-recent computer equipment can be upgraded from prior operating systems to the newer IPv6-compliant operating systems. For the mobile platforms, the IOS (iPhone / iPad / iPod Touch), Android, Symbian and Windows Phone 7 platforms do support IPv6. They will typically operate on a “dual-stack” arrangement by being able to service an IPv4 network and an IPv6 network at the same time through the same network interface,

Similarly, most network printers pitched at the business end of the market that were released over the last few years would have support for IPv6 in a dual-stack setup.

As for routers, managed switches, access points and other network hardware, I would suggest that you check for firmware that supports IPv6 for your existing equipment. Keep an eye on the manufacturer’s Website for newer firmware updates that support IPv6.  If you are purchasing or specifying newer network equipment, make sure that it does support IPv6 or has future support for this in a planned firmware update. Most unmanaged switches, HomePlug-Ethernet bridges and devices that don’t use a Web or SMNP user interface would not need to be compliant with IPv6. This is because these devices work at levels below the IP stacks.

In the case of routers, the device should work as a “dual-stack” unit with support for routing between the two different IP network types. It should also be able to cope with working with a dual-stack Internet service especially as the business Internet services that provide IPv6 will do so in a dual-stack manner.

When I review any network hardware including printers, I will identify those pieces of equipment that are IPv6-ready so as to help you know whether the equipment will be future-proof.

Software

As for software on these computers, any desktop firewall software or other network-utility software that you run would need to support IPv6 operation. This is something that recent versions of this software would cater for, but you should make sure of this when you specify new software. It also holds true for any other network-management programs that need to work on an IP level.

The application software that serves office functionality or line-of-business needs wouldn’t be of concern in relation to IPv6 because the operating system would be handling the network-resource requests for these programs.

Conclusion

The key issue with assuring IPv6 compatibility for your small business network is to make sure that your computer equipment works on dual-stack IPv4/IPv6 software and / or there is a router that works as n IPv4/IPv6 bridge on both sides of the network-Internet “edge”. As well, the IT contractors and services that you engage would need to be knowledgeable about IPv6 and the impending rollout for your business.

You can create a removable recovery disk for MacOS X Lion

Article

Apple releases Lion Recovery Disk Assistant, asserts its dominance over Snow Leopard | Engadget

Resource Links – Apple Support

Apple Lion Recovery Disk Assistant

Further Details

My Comments

Now that Apple are distributing the “Lion” version of the MacOS X operating system in an online manner, you may think of how you may be able to do a bare-metal recovery of your Macintosh computer. This is where the computer has a hard disk on board but it doesn’t have the operating system to work from. This is because there is no physical disk that came with the upgrade which you can install from when you need to reinstall the operating system.

Now Apple have provided a recovery disk program that allows you to create the recovery image on to an external disk like a USB memory key or a USB external hard disk. It avoids the need to reuse Snow Leopard (which may be on an install DVD) in order to download Lion again as part of the recovery process.

Normally, an upgrade to MacOS X Lion would create a recovery partition on the Mac’s system disk. This wouldn’t be good enough if that hard disk crashed. When you run this utility, you create a copy of the same recovery partition on an external disk which you can then boot from during a bare-metal install or system rebuild.

Like the internal copy, this would allow you to do a “ground-zero” OS install, reinstall from a Time Machine backup, use MacOS Disk Utility to check and repair the hard disk as well as use Safari to visit Web-based resources.

When you prepare the Recovery Disk, you would have to create a separate partition (logical disk) on the same USB physical disk which should be greater than 1Gb. As well, the Mac should have a Recovery HD partition created on it during the Lion OS install or upgrade. This is because the Recovery Disk Assistant formats the drive to create the partition. As well, the partition will be hidden from view when you use the file-system utilities like Finder or Disk Utility.

It will come in to play when you have the external disk connected to the Mac and you reboot it while holding down the Option key. Here, the new Recovery partition will be listed as an option in the Mac’s “Startup Manager” boot menu.

Criminal legal action now being taken concerning “scareware”

 Articles

Scareware Indictments Put Cybercriminals on Notice – Microsoft On The Issues

Swede charged in US over ‘scareware’ scheme | The Local (Sweden’s News in English) – Sweden

US-Behörden klagen Scareware-Betrüger an | Der Standard (Austria – German language)

From the horse’s mouth

FBI Press release

My comments

What is scareware

Scareware is a form of malware that presents itself as desktop security software. Typically this software uses a lot of emphasis on “flashing-up” of user-interface dialogs that mimic known desktop security programs, whether as add-on programs or functions that are integral to the operating system. They also put up dialogs requiring you to “register” or “activate” the software in a similar manner to most respected programs. This usually leads you to Web sites that require you to enter your credit-card number to pay for the program.

In reality, they are simply another form of Trojan Horse that is in a similar manner to the easy-to-write “fake login screen” Trojans that computer hackers have created in order to capture an administrator’s high-privilege login credentials. Some of the scareware is even written to take over the computer user’s interactive session, usually with processes that start when the computer starts, so as to “ring-fence” the user from vital system-control utilities like Task Manager, Control Panel or command-line options. In some cases, they also stop any executable files from running unless it is one of a narrow list of approved executable files. They are also known to nobble regular desktop anti-malware programs so that they don’t interfere with their nefarious activities. This behaviour outlined here is from observations that I had made over the last few weeks when I was trying to get a teenager’s computer that was infested with “scareware” back to normal operation.

Who ends up with this scareware on their computer

Typically the kind of user who will end up with such software on their computer would be consumers and small-business operators who are computer-naive or computer-illiterate and are most likely to respond to banner ads hawking “free anti-virus software”. They may not know which free consumer-grade anti-virus programs exist for their computing environment. In a similar context, they may have found their computer is operating below par and they have often heard advice that their computer is infested with viruses.

What you should do to avoid scareware and how should you handle an infestation

The proper steps to take to avoid your computer being infested with scareware is to make sure you are using reputable desktop security software on your computer. If you are strapped for cash, you should consider using AVG, Avast, Avira or Microsoft Security Essentials which have the links in the links column on the right of your screen when reading this article on the site.

If you have a computer that is already infected with this menace, it is a good idea to use another computer, whether on your home network or at your workplace, to download a “process-kill” utility like rkill.com to a USB memory key or CD-R and run this on the infected computer immediately after you log in. It may alos be worth visiting the “Bleeping Computer” resource site for further information regarding removing that particular scareware threat that is affecting your computer. This is because I have had very good experience with this site as a resource when I handled a computer that was infested with scareware.

If you are at a large workplace with a system administrator, ask them to prepare a “rescue CD” with the utilities from the “bleeping-computer” Web site or provide a link or “safe-site” option on your work-home laptop to this site so you can use this computer as a “reference” unit for finding out how to remove scareware from a computer on your home network.

How the criminal law fits in to this equation

The criminal law is now being used to target the “scareware” epidemic through the use of charges centred around fraud or deception. Like other criminal cases involving the online world, the situation will touch on legal situations where the offenders are resident in one or more differing countries and the victims are in the same or different other countries at the time of the offence.

This case could raise questions concerning different standards of proof concerning trans-national criminal offences as well as the point of trial for any such offences. 

Conclusion

Once you know what the “scareware” menace is, you are able to know that criminal-law measures are being used to tackle it and that you can recognise these threats and handle an infestation.

Disclaimer regarding ongoing criminal cases

This article pertains to an ongoing criminal-law action that is likely to go to trial. Nothing in this article is written to infer guilt on the accused parties who are innocent until proven guilty beyond reasonable doubt in a court of law. All comments are based either on previously-published material or my personal observations relevant to the facts commonly known.

Microsoft Internet Explorer antitrust case resolved by European Union

 EU resolves Microsoft IE antitrust case | Microsoft – CNET News

From the horse’s mouth

European Union

Microsoft’s press release

My comments on this issue

Previously, there was talk of Microsoft having to supply European customers with “browser-delete” options for copies of Windows 7 operating system where they would have to explicitly download their browser of choice and wouldn’t be able to “get going” with Internet Explorer. Now, there is the requirement to provide a “browser-select” screen when you can install any of 12 alternative browsers and nominate one of the other browsers as the default browser. This will have the browsers organised in a random order so as not to favour Internet Explorer or a “browser-skin” with hooks to the Internet Explorer code.

One main improvement that I had liked about this is that you can deploy more than one browser from the “browser-select” screen, which will please Web-site developers who want to test their site in other browser environments. Similarly this will please users who are testing browsers for a proposed usage environment or replicating problems encountered with a particular browser.

It will be feasible for a computer supplier to “run with” a different default browser yet consumers can choose whichever browser suits them better. This would be more so with operations like Dell or the small independently-run High Street computer shops who build computers “to order” for individuals, rather than suppliers like HP/Compaq or Toshiba who build systems to particular packages to be sold through electronics chain stores.

The only issue is whether an individual or organisation can determine a particular browser as part of a Windows-based “standard operating environment” when they specify their computer equipment and not have to pass through the “browser-select” screen. Also, what will be the expectation for any proposed computer fleets and “standard operating environments”? Will the company who buys the computer equipment be able to determine which is the default browser for their environment or will they be required to allow individual staff members / end-users to choose which browser they are to work with? The reason I am raising this issue is because in some countries within the EEA like France, there is an organised-labour culture where the trade unions can exercise a lot of influence over what goes on in a workplace.

Another issue that may need to be raised is whether the European-specific “browser-choice” arrangements will be available outside of the European Economic Area. This may be of concern to independent system builders who may want to assure customers of browser choice as a differentiating factor or local, state or federal government departments who may want to be assured of this for computers supplied as part of their IT programs operating in their area or as part of a legislative requirement for their area. It may also be of benefit to PC users who want to load their computers with many browsers so as to, for example, test a Web site under many operating environments.

Application-distribution platforms for smartphones and other devices

At the moment, there are an increasing number of PDAs, smartphones and mobile Internet devices that can be given extra functionality by the user after they buy the device. This is typically achieved through the user loading on to their device applications that are developed by a large community of programmers. This practice will end up being extended to other consumer-electronics devices like printers, TVs, set-top boxes, and electronic picture frames as manufacturers use standard embedded-device platforms like Android, Symbian or Windows CE and common “embedded-application” processors for these devices. It will be extended further to “durable” products like cars, business appliances and building control and security equipment as these devices end up on these common platforms and manufacturers see this as a way of adding value “in the field” for this class of device.

From this, I have been observing the smartphone marketplace and am noticing a disturbing trend where platform vendors are setting up their own application-distribution platforms that usually manifest as “app stores” that run on either the PC-device synchronisation program or on the device’s own user-interface screen. These platforms typically require the software to be pre-approved by the platform vendor before it is made available and, in some cases like the Apple iPhone, you cannot obtain the software from any other source like the developer’s Web site, competing app store or physical medium. You may not even be able to search for applications using a Web page on your regular computer, rather you have to use a special application like iTunes or use the phone’s user-interface.

People who used phones based on the Windows Mobile or Symbian S60 / UIQ platform were able to install applications from either the developer’s Website or a third-party app store like Handango. They may have received the applications on a CD-ROM or similar media as the mobile extension for the software they are buying or as simply a mobile-software collection disc. Then they could download the installation package from these sites and upload it to their phone using the platform’s synchronisation application. In some cases, they could obtain the application through the carrier’s mobile portal and, perhaps, have the cost of the application (if applicable) charged against their mobile phone account. They can even visit the application Website from the phone’s user interface and download the application over the 3G or WiFi connection, installing it straight away on the phone.

The main issue that I have with application-distribution platforms controlled by the device platform vendor is that if you don’t have a competing software outlet, including the developer’s Web site, a hostile monopolistic situation can exist. As I have observed with the iPhone, there are situations where the platform vendor can arbitrarily deny approval for software applications or can make harsh conditions for the development and sale of these applications. In some cases, this could lead to limitations concerning application types like VoIP applications being denied access to the platform because they threaten the carrier partner’s revenue stream for example. In other cases, the developer may effectively receive “pennies” for the application rather than “pounds”.

What needs to happen with application-distribution platforms for smartphones and similar devices is to provide a competitive environment. This should be in the form of developers being able to host and sell their software from their Website rather than provide a link to the platform app store. As well, the platform should allow one or more competing app stores to exist on the scene. It also includes the carriers or service providers being able to run their own app stores, using their ability to extend their business relationships with their customers like charging for software against their customers’ operating accounts. For “on-phone” access, it can be facilitated in the form of uploadable “manifest files” that point to the app store’s catalogue Website.

As well, the only tests that an application should have to face are for device security, operational stability and user-privacy protection. The same tests should also include acceptance of industry-standard interfaces, file types and protocols rather than vendor-proprietary standards. If an application is about mature-age content, the purchasing regime should include industry-accepted age tests like purchase through credit card only for example.

Once this is achieved for application-distribution platforms, then you can achieve a “win-win” situation for extending smartphones, MIDs and similar devices