If you’ve reached this blog post from a Google search for the phone number 4169153536, please be advised that the call you’ve received is a scam. Read on for details.
I touched on rogue security software in my last post (Digitally Transmitted Diseases 101), but a recent experience made me want to revisit the topic.
A member of my family recently fell prey to one of these programs. Setting aside how the program made its way onto his computer, it happened, and it told him that his computer had fallen victim to over “800 hacks.” Not being very technologically savvy, this scared him, as it’s designed to do. He called a number that was given to him (416 915 3536, which has a Toronto area code), and spoke to someone named Steve Dawson.
Unfortunately, my grandfather was convinced to hand over his credit card information, and grant them remote access to his computer. When he started to realize he may have made a mistake, he told Steve that he would ask his grandson to help him. Steve, in an effort to sound legitimate, encouraged him to have me call them. Here’s how that phone call went:
“Hello, thank you for calling Windows technical support!”
Right away, I can tell that this is not a local call, by how it’s ringing. This is a call that’s being routed to another country altogether.
A lady claiming to be named Lucy picks up the call. She has a thick accent. “Hello, thank you for calling Windows technical support. How may I help you?” There’s a tonne of noise and yelling in the background.
“Good evening. Steve Dawson, please,” I say.
She replies, “Oh, Steve Dawson. Yes.” And then, instead of putting me on hold, she just yells, “STEEEEEEEEEEEEEEVE!”
Very professional. Another guy with a thick accent comes on the line. He says he’s Steve Dawson. I ask him what country he’s in. He says New Jersey, United States. Bullshit.
Two minutes into the conversation, he gives up on the lie that he represents Microsoft technical support. When he realizes that he’s actually speaking to an IT professional, he gives up on the lie that he’s a Microsoft-certified engineer. When my grandfather told him he would ask his grandson to help him, he told him to have his grandson call him. I ask what he thought was going to happen when I did call him. He has no answer.
He starts rambling, and I tell him to stop talking. I spend the next five minutes ripping into him over the phone until he gives up and hangs up, but not before he turns it around and starts calling me a scammer.
Did I expect to get anything out of the conversation? Of course not. But sometimes it’s nice to have someone to yell at – someone who deserves it. And for messing with a kindly elderly man, he deserves it.
That takes care of all my pent up aggression this week. I don’t have an asshole landlady to argue with anymore, so who else am I going to unload on?
What do you do if this happens to you?
If you’ve let it get this far already (as in, they have your credit card number and/or remote access to your computer), the first thing you need to do is cut off their access. It may not be easy for you to shut down your computer properly, so hold the power button for a few seconds to cut power if you need to. The important thing is that their access over the internet be cut immediately.
Call your credit card company and report the fraud. Explain what just happened, and have them reverse any charges made. They’ll cancel your current card, and issue you a new one. If necessary, involve the police, as they can file a police report that forces your credit card company to cancel the fraudulent charge.
If you’ve given them your computer’s password, change it immediately. Think about any other online accounts you may use the same password for, and change those immediately, too. This is especially important if you use that password for your email or any online banking.
Call your nearest IT guy and ask them to help you remove the malicious software from your computer, as well as any remote access software left behind. A scan with your antivirus software is recommended, but you may need a professional to look at it anyway, especially if your antivirus software has been disabled.
The Moral of the Story
Don’t trust software you’ve never seen before if it tells you that your computer is infected. Don’t trust someone who calls you and tells you the same.
And the most important point, something I tell my clients all the time: If you have even the slightest doubt or question about something, call your IT guy. Don’t worry about putting them out. Just remember, a five-minute phone call can save you hours of frustration and embarrassment.
Steve Dawson, whatever your real name is, know this: If I ever meet you in person, your testicles will be introduced to my shoe, post-haste.What do you think? Leave a comment!
These days, more and more people seem to be asking me, “Tristan, I want to become a shark-fighting, syrup-chugging, moose-herding, tree-felling Canadian, too. But first, I’m confused – Can you explain the difference between a virus, a trojan, and spyware?”
You may have read a post I wrote on the digital clap a couple of years ago, Discount Pharmaceuticals – Get ‘em While They’re Hot! Consider this a sequel, if you will. Previously, I offered some helpful tips on protecting yourself online. Now, I’m going to help you understand what you’re protecting yourself against.
Turns out, the digital clap isn’t the only digitally transmitted disease out there. Here’s a brief explanation of the most common types, better known as “malware” (malicious software, get it?).
The Infamous Computer Virus
The virus is so widely known, that people often group all other forms of malware into this one category. However, it’s important to understand that a virus is just one form of malicious software that wants to settle in on your computer.
It’s easy to see why the virus is so widely known, since it’s been around the longest. Before internet use was widespread, viruses were often spread on floppy disks, and other portable media. Today, they most often spread over networks.
They make changes to systems whose results range from simple annoyance to outright destruction of data, and they’re also injected into other files, including Microsoft Word and Excel files.
Since the virus was, essentially, the first form of malware, how do the other forms differ?
The Trojan Horse of Greek mythology seemed, to the inhabitants of the city of Troy, to be a gift. However, concealed inside were enemy soldiers that used it as a ruse to gain entry to the city and destroy it.
Think of a trojan as the software version of that horse – A piece of software designed to seem harmless on the outside, in an attempt to get you to run or install it. Once you do, you’re opening yourself up to attack. Trojans are often used to steal information, or even enable an outside party to gain remote access to your computer. You want that about as much as you want the real clap.
Worms are viruses that spread by any means necessary – Usually, over a network directly, or by harvesting your address book and sending itself to your friends. Trust me, they’ll love you for that.
Spyware and Adware
While not usually as destructive as other forms of malware, spyware isn’t any less dangerous. It’ll sit on your computer, collecting information about your habits on the internet, such as what sites you visit, and send that data elsewhere.
Why is this a problem? It’s a privacy violation. How many other people do you really want aware of that embarrassing Google search you did last week about that rash on your buttocks? And for advertising data, no less?
Adware is designed simply to display advertisements on your computer. And where do you think they get the data to target the ads towards you, personally? Bingo. The most annoying fact about spyware and adware is that it’s often installed with software such as browser toolbars, which many people elect to install themselves. The MyWebSearch toolbar is a perfect example of this.
The Rogue Antivirus Application
Rogue antivirus software likes to get all dressed up for a night on the town. In this case, the “town” is your computer. These tricky bastards are designed to look like legitimate antivirus applications, such as Vipre or (heaven forbid) Norton Antivirus.
What’s funny about these ones is that they actually tell you that you’re infected, in an attempt to get you buy bogus software. Tricky, indeed.
Of course, if they were legitimate, they’d make it easy for you to remove them. Too bad it just isn’t that easy. They often block key programs that would otherwise make stopping or removing them a simple task.
I don’t have to explain this one, do I? It should go without saying that you do not want to enter a password to your bank account on a computer that’s secretly recording every keystroke on your keyboard, and sending that data to someone on the internet.
Last but not least: The Rootkit!
Always save the best for last, right? Just kidding. Seriously.
A rootkit camouflages itself among your computer’s core systems. It integrates itself into a part of your operating system, and hides itself so well that it is often incredibly difficult to detect, much less remove. Of all the forms of malware out there, the rootkit is most often the one that will make your IT guy throw his hands up in defeat, and just wipe a computer entirely.
It’s not that you can’t remove a rootkit, it’s just that in the time it usually takes to make progress against one, you can often just wipe a computer and reinstall its operating system and applications anyway. Removing rootkits usually ends up being a frustrating exercise that can even lead to significant damage to an operating system, anyway.
The More You Know
This topic is one that confuses a lot of people outside the IT industry, but that’s ok. It isn’t your area of expertise, but you want to better understand what threatens your computer, and even your business.1 person has commented. What do you think?
I’ve been to the future. What I saw wasn’t pretty. All these years, I was sure Skynet was going to bring about the death of the human race. But who knew it’d be civil war caused by an age-old conflict: Mac vs. PC?
Citizens of the Internet, you see it every day – Mac and PC users blindly firing shots at each other, back and forth, without end. What’s sad is that many of these people (on both sides – don’t kid yourself) do so without any idea as to the facts behind their own statements. They operate on hearsay, rather than formulating opinions for themselves.
I like to think I have a well-rounded perspective on the issue. As an IT guy who supports and uses both platforms, I know that both have their pros and cons. And my personal preference for Microsoft Windows doesn’t mean I’m going to criticize someone for choosing a Mac. That said, for the sake of educating the naive on both sides, here are my thoughts on Mac vs. PC:
“Macs are so over-priced.”
Yes, I’m starting this off by defending Apple. Ignorant PC users often complain that Macs are over-priced. Really? It’s true that you’ll probably shell out more for a Mac at your local Best Buy than you will for a PC. But have you looked at the hardware you get for that price?
Apple designs their hardware to be beautiful. It appeals to the senses. Smooth curves, aluminium unibody construction, sleek form factors… My sister’s iMac looks and feels awesome as part of the decor in her living room. I pick up a Macbook Pro, and it’s clear to me that it’s built well. I have an iPad, and I can tell you that it is solid. I toss it around all the time without ever worrying about it snapping or cracking. That’s more than what I can say about my notebook.
If these are things you place value on, then you aren’t wasting your money. Most PC manufacturers don’t pay that much attention to those details, and that’s why you pay them less. An exception: You’ll usually pay more for a Sony Vaio; But, well, look at them. They’re beautiful, and they’re built with high-quality materials. You get what you pay for.
“Macs never get viruses.”
People who insist that Macs simply do not get viruses – These are the people who make me laugh. Your Mac not getting a virus is not the result of good security. Here’s the truth of the matter:
For years, PCs have held the vast majority of market share in the computing world. If you’re writing malicious software, and you want to hit as many computers as possible, are you going to write it for a platform that only 1% of computers run on? Of course not.
Here’s a scary thought: With Mac popularity (and with it, market share) skyrocketing, virus programmers are seeing a much tastier target in Apple products. And because, up to now, OS X was left relatively untouched, Apple is facing the enormous task of plugging security holes that were largely ignored for years.
The fact is that Macs can and do fall victim to malware, with more and more viruses being written for them.
I use a PC, yet I never get hit by malware. Your best defense on the internet is, as always, common sense. (See: Discount Pharmaceuticals – Get ‘em While They’re Hot!)
“Everything on my Mac just works.”
Come on, people. Your Macs crash all the time. I see it happen all the time. Some of the most unstable computers I’ve worked with were made by Apple. But you know what? PC users don’t have it any better.
Software is written by imperfect developers who miss things and make mistakes. Windows and OS X are both full of bugs, but they’re getting better. Mac OS X is, for the most part, very stable. Guess what? So is Windows 7.
Some Mac users claim that PC users constantly have to deal with installing drivers. I’ve used Windows 7 since it was released, and I can’t remember the last time a peripheral didn’t just work on its own. Granted, you do run into problems with some devices on Windows, but there are simply so many more available. Mac peripherals are fewer in number, so quality control is easier.
Both platforms have some truly amazing and innovative products. Case in point: Time Machine is a superb backup product. Well done, Apple.
“PCs are real computers. You can’t do real work on a Mac.”
Someone said those words to me last week, verbatim. It’s funny, if you consider that the PC is definitely the dominant platform in the gaming community.
You can be just as productive on a Mac as you can be on a PC. You may do it with different software at times, but there isn’t much you can do on Windows that you can’t on OS X, anymore.
There are things I like about Macs and PCs alike. There are also aspects of both that frustrate me immensely.
To PC users: The next time you’re about to blindly criticize someone for using a Macbook instead of a Dell, think first. Consider that calling them a “fanboy” actually makes you seem strangely obsessive, yourself. So just be cool. To each his/her own.
To Mac users: I understand the appeal of the platform you choose to use. Just remember that your computer is not immune to the viruses you tease PC users about, and no computer is 100% stable, all the time. Still, I have to say that Macbook Pros are sexy. I’d love to buy one and put Windows on it
Kudos to Apple for those funny commercials, but unless you work for their marketing department, this isn’t a war. So if Skynet wants us dead, let’s not make it any easier for it by killing each other over our choice of computers.
This crunchy poast was inspired by a series of tweets by Jeff Broderick. I don’t know him, but he seems like an interesting dude. And he definitely isn’t ignorant or naive. Thanks for the inspiration to write, Mr. Broderick.1 person has commented. What do you think?
If there’s one thing I love doing, it’s playing around with smartphones. I have an HTC HD2, and I fear I’m addicted to upgrading its software and running bleeding edge operating systems on it. So when I bricked it (messed it up so badly that it effectively turned into little more than a brick) the other day for the 62,498th time, I decided it was time to abandon Windows Mobile 6.5 and install Google Android 2.3.
If you’ve ever used an unlocked phone on a network that doesn’t support it (like an HD2 on the Rogers network in Canada), you may be familiar with issues such as your data connection failing to work, or MMS (picture) messages failing to send. This is because your phone needs to know where on the internet to look to get a connection. Phones sold directly by service providers come with these settings already configured, unlike unlocked phones that they don’t support.
If you’ve ever dealt with Rogers’ tech support department, you know that getting help with such issues can be as fun as trying to pry a banana from the thick, leathery hands of an angry gorilla that doesn’t like to share.
This post is for anyone on the Rogers network in Canada who happens to be seeking this information for a quick fix to their MMS woes. I found that the settings in my new Android Cyanogen ROM were entered incorrectly, and these are the settings I used to regain the ability to send pictures of my ugly mug to anyone I want to scare the crap out of an a given day.
Configuring Your Smartphone to Use MMS on the Rogers Network
Find your phone’s network connection settings. On Android, they’re located under Settings > Wireless & Networks > Mobile networks > Access Point Names. You should find an entry dedicated to Rogers MMS. Open it, and fill in the following settings:
- Name: Rogers MMS
- APN: media.com
- Username: media
- Password: mda01
- Server: 172.25.0.107
- MMSC: http://mms.gprs.rogers.com (make sure “gprs” is spelled correctly; on mine, it was misspelled as “grps”)
- MMS Proxy: 10.128.1.69
- MMS Port: 80
- MCC: 302
- MNC: 720
- APN Type: mms
Check the entry for your normal data connection, and under APN Type, ensure that “mms” is NOT in the list. This will ensure your phone looks to the Rogers MMS profile when you’re sending and receiving pictures messages, and not the normal data connection.
If your normal data connection isn’t working either…
If your normal data connection isn’t working either, check the settings in the other connection profile against the following:
- Name: Rogers
- APN: internet.com
- Username: wapuser1
- Password: wap
- MCC: 302
- MNC: 720
You should be able to leave all other fields blank, as long as you have the above details entered.
A simple fix that I’m sure will only be useful to a handful of people looking for very specific information, but I thought I’d share. Questions? Feel free to leave them in a comment or email me. Don’t thank me; Just give me that banana the next time we run into each other.9 people have commented. What do you think?
You just don’t understand how terrible a web browser Internet Explorer 8 is (sorry, Microsoft) until you get around to trying one of the other popular browsers out there right now.
I faithfully stuck to Internet Explorer for years (from version two; no joke). I dismissed other browsers, such as Netscape (didn’t like the annoying bevel on its toolbar buttons, so sue me), Firefox (felt like the hipster of web browsers), Opera (it was just terrible up to version 9.5) and Safari (far too unstable in my tests). But when it took me twelve seconds to open a new tab in Internet Explorer and I felt like stabbing myself in the eye with an unripe banana, I knew it was time for a change.
I installed Google Chrome, tried it out for half an hour, and then never looked back. I could go on about how stable, fast and awesome it is, but this isn’t a browser review. Instead, I’d like to tell you about some extensions (add-ons, if you will) for Chrome that make browsing the web a faster, more efficient and enjoyable experience for me. So, without further ado… My top ten Google Chrome extensions that let me surf like a ninja, in no particular order.
1. Facebook for Google Chrome (download)
This extension installs a little Facebook icon next to your address bar that shows a number when you have unread notifications. You can then click the icon to post a status update, or get quick access to your news feed, wall, notifications and inbox. If you’re an avid Facebook user and you use Chrome, then you need this extension.
2. Google Mail Checker (download)
This extension is similar to the Facebook extension, except that it tells you how many unread messages you have in your Gmail inbox. Clicking its icon next to your address bar will open your Gmail account. Like a boss (don’t ask; I just wanted to put that phrase somewhere in this blog post).
3. Google Translator (download)
I have multi-lingual friends who sometimes post status updates in other languages. After weeks of tabbing between Facebook and Google Translate, I discovered this extension. Click the button beside your address bar, and use Google Translate inside a convenient popup without having to open the web site. Holy useful, Batman.
4. SearchPreview for Google (download)
This extension adds a preview thumbnail beside each result when you do a Google search. Even if you don’t consider this particularly useful, it does make your search results look rad. And after using this extension for a while, seeing a Google search results page in someone else’s browser without the thumbnails looks extremely weird.
5. Google Quick Scroll (download)
Have you ever clicked a Google search result, only to have to scroll through pages of text looking for the information relevant to your search terms? You need this extension. When you do a Google search and open one of the pages from the results, a small popup spawns in the lower-right corner of your browser with direct links to the content on the page that has to do with what you searched for. This saves me precious minutes every single day.
6. Wikipedia Companion – Mini Wiki Browser (download)
I love this extension. It makes my inner Wikipedia whore very, very happy. I read an average of 4,238 Wiki articles per day, and most of the time it’s for quick information on something I’ve just heard or read about. With this extension, I don’t even have to open the Wikipedia web site or do a Google search. I just open the popup from my address bar, type my search terms, and read the Wiki. It even collapses the subheadings to reduce initial clutter, making it easy to find specific information (like artist discographies!).
7. Fast Youtube Search (download)
This is a very simple extension that places a Youtube button next to your address bar. Click the button, type your search terms, and it opens your Youtube search results in a new tab. Another useful function to have if you constantly find yourself looking for specific videos on Youtube throughout the day.
8. Dionysus (download)
If you’ve ever visited a web site that had embedded music that you really wanted to download, and aren’t comfortable looking in your browser’s cache for it, this extension may help. When it detects MP3 or OGG music embedded in a page, it displays a little icon inside your address bar that lists all such files, and gives you links to download them.
If you ever download files from file sharing services such as RapidShare, MegaUpload or DepositFiles, you’ve no doubt shared my pain when you clicked on a download link, only to find that it was broken, or had been removed by the service. Chrome Link Checker will automatically highlight any such download links on a page, making them easy to pick out. It’ll highlight broken links in red, and good links in green, so that you know which ones not to bother with. Brilliant.
RapidShare Link Validator goes a step further and gives you an icon inside your address bar whenever a page contains RapidShare links. The icon will be red if none of the links work, yellow if some of them work, and green if all of them are valid. This extension works only for RapidShare links, but is still quite useful, especially when paired with Chrome Link Checker.
10. Mini Google Maps (download)
The Mini Google Maps extension isn’t as functional as opening Google Maps in a full browser tab, but having a map in a little popup window that loads instantly is cool, nonetheless. And it does serve a purpose if you need to check a map really quickly without the need for fancy stuff like driving directions. Either way, it makes my list.
Questions? Comments? I’m always glad to find new useful extensions, so if you have any that you enjoy using, I’ll trade pink coconuts for them.5 people have commented. What do you think?