32 iPad Tips and Tricks

Master your new iPad with these quick tips and handy iOS shortcuts.

You know that your new iPad will let you easily watch movies, browse the Internet, or play games on the go, but there are many advanced features hidden beneath the surface of iOS that can improve your tablet computing experience even further. To help you become an iPad master, we’ve compiled a handy list of tips and tricks for new iPad users. Read on if you want to learn how to multitask, take screenshots, encrypt your backups and more.

Set the iPad to self-destruct in 10 seconds: Okay, not really–but you can set the iPad to erase all data after ten failed passcode entry attempts by checking the Erase Data option under Settings, General, Passcode Lock.

Don’t let AutoCorrect mess you up: If you don’t like the option AutoCorrect gives you, reject it by finishing the word as you prefer, and then tapping the suggestion. If you want to use AutoCorrect’s choice, just type a space or punctuation mark, or tap Return, the moment it pops up.

Create custom shortcuts for common phrases: Make AutoCorrect work for you by teaching iOS to transform shorthand (such as “omw”) into common phrases (like “on my way”) using iOS 5 shortcuts. Simply navigate to Settings, General, Keyboard, and select Add New Shortcut. Type the phrase you want to shorten in the Phrase field, and then type the shortened version you want to use in the Shortcut field.

Download the free iPad User’s Guide: You may have noticed that your iPad didn’t come with a big printed manual–that’s not Apple’s style. However, you can download the PDF version of the iPad User’s Guide from Apple’s website, or you can read it in iBooks if you have that installed (iBooks is available as a free download in the App Store). Make sure to download the manual for the version of iOS you’re currently using!

Use the Side Switch: You can use the switch on the side either to enable and disable audio alerts (this doesn’t affect video/audio playback) or to lock the screen’s orientation in portrait or landscape mode. You can toggle which function is assigned to the switch by opening Settings from the home screen, selecting General, and choosing the function you want under the ‘Use Side Switch to’ heading.

Take a free guided tour: Apple provides video tutorials on setting up iTunes, as well as a complete rundown of all your preinstalled apps so that you can get a good look at how to use them.

Speed up your sentences: Double-tapping the spacebar while typing a message will type a period and a space.

iPad Tips and TricksMultitask in iOS: You probably already know that you can press the Home button twice to bring up a list of currently running or suspended apps. However, you can also swipe the multitasking bar left to right to quickly access audio/video playback controls, a shortcut to the iTunes app itself, an AirPlay button that lets you wirelessly mirror the iPad display on an Apple TV, and volume controls. Also, when you choose whether the Side Switch should mute alert sounds or lock the screen orientation (see the tip above), the function you didn’t choose will appear in this shortcut bar.

Secure your backups: You can encrypt your iPad’s backup data in iTunes. Just open the iPad in iTunes, click the Summary tab, and check Encrypt iPad backup under the Options heading.

Swap the search engine: Too cool for Google? You can change Safari’s default search engine by going to Settings, Safari, Search Engine. Alas, you can choose only from Google, Bing, or Yahoo–no vintage Metacrawler for you.

Take a screenshot of whatever is on the screen: Press the Home button and the sleep/wake button simultaneously. The screenshot will automatically appear among your photos.

Selectively prevent automatic sync: Sometimes you don’t want to sync your iPad when you connect it to your computer. In that case, hold down Shift-Ctrl (or Command-Option, on a Mac) in iTunes while plugging your iPad in, and iTunes will skip the automatic sync just this once. Alternatively, you can safely interrupt a sync by dragging the unlock slider on your device while the iPad is midsync.

Toggle 3G/LTE data roaming: If you’re using a 3G iPad, you can turn data roaming on in theSettings, Cellular Data menu in case you want to try receiving cellular Internet through a different provider (fees may apply). You can also disable LTE service if you’re trying to conserve bandwidth, and you can check your data usage by going to SettingsGeneral, Usage.

Restrict mature content: Go to Settings, General, Restrictions and tap Enable Restrictions to selectively apply controls on your apps, content, Game Center, and more. You can use this setting to limit mature content on your new iPad by disabling explicit-language recognition, blocking podcasts that have the “Explicit” tag, or blocking movies, TV shows, and apps that are rated for mature audiences.

iPad Tips and TricksMake your passcode more complicated: iOS defaults to a four-number passcode, but you can turn it off by going to Settings, General, Passcode Lock, Simple Passcode. Now you can use any full keyboard password to lock the iPad. The password also helps to encrypt your mail and attachments on the iPad, so you probably want to make it safer than a four-digit number.

Tweak AutoFill: You can choose to enable Safari’s AutoFill feature under Settings, Safari, AutoFill. From there you can tell Safari to fill out forms automatically, either by using your specified contact information or by remembering the names and passwords from previous website login sessions.

Sync your bookmarks: You can use iTunes to sync your iPad’s Safari bookmarks with your PC’s Web browser. Open the iPad tab in iTunes, click the Info tab, scroll down to the Other heading, check Sync bookmarks with, and choose your preferred browser.

Email photos: The easiest way to email photos from an iPad is to open the Photos app, select a photo, press the button in the upper-right corner (the rectangle with the right-facing arrow, not the AirPlay or trash can button), and choose Email photo… to send.

iPad Tips and TricksTest your Web links: You can check a linked word’s actual destination URL by touching and holding down on the link–it’s a perfect way to sniff out phishy links.

Choose an app for email attachments: You can open a file attached to an email message by tapping the attachment in Mail, but if the default app isn’t the one you want to use, simply press and hold and wait for a menu that lets you select an app.

Use your iPad as a picture frame: Not for physical photographs of course, but you can press the Picture icon in the lower-right corner of the lock screen to have the iPad display your photo stream as a slideshow.

iPad Tips & TricksShow traffic conditions: Open Maps, press the dog-eared page icon in the lower right, and then turn the Traffic overlay on. If your iPad has an Internet connection, Maps will show real-time traffic conditions in the displayed area. Green means traffic is going at the posted speed limit, yellow means traffic is slower than the posted speed limit, and red means traffic is stop-and-go.

Share podcasts with friends: Listening to a podcast that you think a friend would like? You can share the link while you’re listening to it by pressing the Email button while it’s open.

Don’t forget your downloads: You can immediately see if your iTunes account is due for incoming downloads by opening iTunes on your PC, clicking the Storemenu, and selecting Check for available downloads. This trick can come in handy if your download process is interrupted, or if you missed some bonus iTunes content that came with an album you purchased.

Turn on Universal Access: You can enable options such as closed-captioned movies, VoiceOver screen reading, zoom magnification, and inverted white-on-black text by selecting the iPad in iTunes, opening the Summary tab, and clicking Configure Universal Access under the Options heading.

Forget Wi-Fi networks: So you accidentally connected to a network once, and your iPad remembers it for life–whether you like it or not. On your iPad, go to Settings, Wi-Fi, and find the network under the ‘Choose a Network’ heading. Tap the blue arrow next to the network you want to remove, and tap the button on the top that says Forget this Network.

Customize your Spotlight searches: The iPad uses Spotlight for its built-in search functions, and you can tweak it to your needs under Settings, General, Spotlight Search. If you have a lot of data on your iPad, for example, you can selectively disable search in different categories (Contacts, Applications, Audiobooks, Notes, Events, Mail, and so on) that you don’t use so that your desired results show up faster. You can also simply change the order in which the search-result categories display by dragging them up and down, so that your more frequently used search categories appear at the top of the page.

Turn off in-app purchases: Go to Settings, General, Restrictions and tap Enable Restrictions to selectively enable restrictions for your apps, content, Game Center, and more. If you’re worried about other people breaking your bank account on in-app purchases, just disable In-App Purchasesunder the ‘Allowed Content’ setting.

iPad Tips and TricksSwitch up the fetching frequency: Your iPad automatically grabs new data, such as incoming email. However, the iPad also periodically activates apps that don’t support iOS’s Push feature so that they can go fetch new data–which uses the tablet’s battery life. You can tweak your Push and Fetch settings in Settings under the Mail, Contacts, Calendars menu by toggling the Fetch New Data option.

Change your email signature: Don’t be one of those people who leave the default ‘Sent from my iPad’ signature on all their messages. Change it in Settings, Mail, Contacts, Calendars, Signature to something more interesting.

Master multitasking gesture controls: Enable multitasking gesture controls in any iPad running iOS 5 or later by navigating to General, Settings and toggling Multitasking Gestures on. Now you can place four or five fingers on the screen at once and swipe them left or right to switch between open apps, or swipe up to display the multitasking bar. You can pinch your fingers together on the screen to return to the iPad home screen.

Sync your iPad wirelessly: To set up iTunes wireless syncing, plug your iPad into your PC, make sure both devices are connected to the same wireless network, and then boot up iTunes on your PC. On your iPad, navigate to Settings, General, iTunes Wi-Fi Sync, select the computer you want to sync with, and tap the Sync Now button. Your iPad should sync wirelessly with your computer, and will now do so automatically whenever you have it plugged in and connected to the same Wi-Fi network as your computer.

By Alex Wawro and Patrick Miller, PCWorld

How to master the art of passwords

Passwords are a way of life for nearly everybody who uses any kind of software. No viable alternative is imminent: fingerprint readers, retina scanners, voice identification, and USB tokens all have limitations. Nothing is as simple and inexpensive as an old-fashioned string of keystrokes.

Web services and network managers nearly always require a minimum degree of password difficulty to prevent standard password-cracking techniques from guessing them quickly. We’re also cautioned not to reuse the same passphrases on different sites and are routinely blocked from recycling the passwords we’ve used previously.

Considering the number of times PC users sign into a service or network each day, we may need to remember a half-dozen hard-to-guess passwords, not to mention the various sign-in IDs we use along with the passwords (full name or first initial-last name? Case sensitive? An e-mail address?). Many computer professionals need access to dozens of secure systems, which stretches the limits of anyone’s memory.

Your three options are to use a password-management program, to write your passwords down on paper (or record them in an encrypted text file), or to devise a method for memorizing hard-to-guess passphrases. While no single technique is right for everyone, here’s why I suggest the memorization approach.

The pros and cons of password managers
For many people, the best way to protect their data and identity is to use a password manager, which either stores your passwords in the cloud or on a local drive–often a USB thumb drive or other portable storage device. The obvious risk is that the vendor’s server is hacked or you lose the drive that stores your passwords.

Last May, the LastPass password-management service reported a breach that may have exposed users’ passwords, although LastPass CEO Joe Siegrist stated that people who used strong master passwords were not threatened.

LastPass is available as a Firefox add-on and as an extension for Internet Explorer, Chrome, and other browsers. The version for mobile devices costs $1 per month.

Other password managers work without storing your passwords on a Web server. The Tech Support Alert site recently compared several free password-management programs, including LastPass, RoboForm, and KeePass.

The hard-copy approach to password management
If you forgo the password-manager route, your options are to write your passphrases down or to memorize them. Whenever you record your passwords on paper–even if you record only a mnemonic that reminds you of the actual characters–you’ve made your accounts a little more susceptible to unauthorized access.

That hasn’t stopped computer experts from recommending that users jot down their passwords and keep the paper in a secure location. Gunter Ollman, a researcher for security firm Damballa, concludes that recording your passwords on paper is the lesser of several password evils; more risky is using the same password at multiple sites, setting your software to remember passwords, failing to change passwords frequently, using an easy-to-guess password, and reusing past passwords.

Likewise, computer expert Bruce Schneier reiterated on his Schneier on Security blog the advice of Microsoft executive Jesper Johansson to record your passwords on paper to encourage use of strong passwords.

The obvious downside of the paper approach is that someone will find the paper taped to the bottom of your keyboard or tucked into your wallet and access your private data before you’re able to take preventive measures. Or you may simply lose the paper and have to do the recover-password-by-e-mail two-step for each network and service you need to access.

The wetware approach to password storage is still the safest
As you might have guessed, Mr. Schneier’s 2005 post recommending that you write down your passwords generated quite a few comments to the contrary. Most of the commenters suggested their own technique for remembering strong passwords.

Of course, the bad guys pay close attention to this information and will attempt to incorporate the approaches in their password-cracking efforts. The key is to get creative in altering something you’ve already memorized, such as song lyrics, family members’ first names, or place names from your past.

An alternative method leverages something nearby. For example, there may be a product near your workstation that has a prominent model or serial number, or a book within view of your seat has an ISBN number on the back cover. Rather than using the exact number, add or subtract two or three numbers or letters, so “1158748562″ becomes “3370960784,” or “BCGA1339″ becomes “DEIC3551.”

The only problem I’ve encountered with my own password-mnemonic creation is that some vendors require a mix of upper and lower case letters and numbers. I have become resigned to having to go through Apple’s “Forgot your password?” e-mail routine about every other week.

This is doubly upsetting because my system uses from 12 to 16 random alphabetic characters (found in no dictionary and following no discernible pattern). As the How Secure Is My Passwordsite indicates, the all-text, all-lower-case password I devised would take much more effort to crack than an eight-character password that meets Apple’s requirements.

 

How Secure Is My Password siteCheck the strength of your passwords at the How Secure Is My Password site, which indicates how difficult your password is to crack, and whether it’s on the site’s common-password list.(Credit: screenshot by Dennis O’Reilly)

Only time will tell whether PC users will ever be able to securely store their sign-in credentials in their systems’ software or on a service’s Web server. For most people, the safest approach to passwords is to rely only on their own personal gray matter. Let’s hope a secure alternative to passwords arrives before our memories give out.

 Dennis O’Reilly @ CNET

Kevin Mitnick shows how easy it is to hack a phone

British tabloid News of the World said today it is closing down over a phone hacking scandal in which workers for the Rupert Murdoch-owned newspaper allegedly snooped on voice mail messages left on the mobile phones of murder victims, as well as celebrities, politicians, and the British royal family.

If unethical journalists can do it chances are anyone can, right?

To test my theory I called up Kevin Mitnick, who wrote about the hacking and social engineering that landed him in jail in a fascinating book coming out this summer, “Ghost in the Wires,” and who serves as a security consultant, helping clients protect against privacy breaches such as this.

Phone hacking, also known as “phreaking,” is easy to do, Mitnick said, adding that he could demonstrate it on my phone if I wanted proof. So I gave him permission to access my voice mail and told him my mobile phone number.

He called me right back on a conference call so I could hear what was going on. First he dialed a number to a system he uses for such demonstration purposes and entered a PIN. Then he was prompted to enter the area code and phone number that he wanted to call (mine) and the number he wanted to be identified as calling from (again mine). Next thing I know I’m listening to a voice message a friend of mine left me last night that I hadn’t erased.

“See how easy it is?!” Mitnick says as my jaw drops.

He was able to get into my voice mail by tricking my mobile operator’s equipment into registering the call as coming from the handset–basically pretending to be me. To do this, he wrote a script using open-source telecom software and used a voice-over-IP provider that allows him to set caller ID, but there also are online services that provide similar capability that non-hackers could subscribe to. It might be easier or harder to accomplish depending on the mobile operator, he said. (I’m keeping some of the details sketchy to avoid providing a how-to for phreaking.)

“Any 15-year-old that knows how to write a simple script can find a VoIP provider that spoofs caller ID and set this up in about 30 minutes,” Mitnick said. “If you’re not adept at programming, you could use a spoofing service and pay for it.”

This technique, called Caller ID Spoofing, has been used and abused for years. In 2006, a caller ID spoofing account in the name of Paris Hilton was suspended for voicemail hacking, with other celebrities, including Lindsay Lohan, allegedly being victims, according to IDG News Service.

The method is more sophisticated than that allegedly used by the British journalists who are accused of using default PINs to access victims’ voicemail accounts, assuming correctly that many people wouldn’t bother to change the PINs. Since the phone hacking scandal first erupted about five years ago, mobile operators in the U.K. have changed their practices and most now require people to set their own PINs for remotely checking voice mail.

If I want to avoid having anyone use Caller ID Spoofing to access my voice mail again, I need to change my phone settings to require a PIN even when checking voice mail from my mobile device. But that doesn’t address the fact that mobile operators don’t authenticate caller ID. “The magic is that my VoIP provider allows me to set any caller ID and the other operators trust it,” Mitnick said. “Caller ID is automatically trusted.”

Mobile phone industry specialist David Rogers suggests on his blog that operators should consider preventing people from accessing mobile voicemails remotely at all.

Meanwhile, the Truth in Caller ID Act of 2010, which was signed into law late last year, prohibits anyone intending to defraud, cause harm, or wrongfully obtain anything of value from knowingly causing any caller ID service to transmit or display misleading or inaccurate caller ID information. This could send the caller spoofing services off shore but likely won’t put an end to the practice.

 

by Elinor Mills @ cnet.com

Report: Spam down, but malware continues hold

Spam may be down but malware marches merrily on.

That’s the message from the “November Threat Landscape Report” released yesterday by security vendor Fortinet.

Global spam levels ultimately fell 12 percent in November after Dutch authorities took down a large Bredolab network made up of 140 different servers. The Bredolab botnet was typically used by cybercriminals to send out spam selling fake drugs, according to Fortinet. Spam had actually fallen as much as 26 percent the week after the network was dismantled but was able to stage a bit of a recovery afterward.

(Credit: Fortinet)

 

The ever-present Koobface botnet, known for affecting Facebook users, also suffered a hit on November 14 when U.K. Internet service provider Coreix took down three of its central “MotherShip” servers. The perpetrators of Koobface use these MotherShip servers as their main command-and-control systems to direct the spread of the botnet and control infected PCs. The bad guys communicate with the MotherShip machines through intermediary servers.

Though the takedown of the MotherShip servers dealt Koobface a severe blow, the success was short-lived as the botnet operators were able to use stolen FTP accounts to hijack other servers, according to Fortinet.

“We confirmed that on November 14, when the primary servers were taken offline, the intermediary servers failed to proxy content, which effectively crippled the botnet,” Derek Manky, project manager for cyber security and threat research at Fortinet, said in a statement. “Unfortunately, we saw communication restored five days later on November 19th. This is likely due to the fact that Koobface contains an FTP harvesting module.”

Looking at other botnets, Fortinet found another prominent threat in November in the form of Sasfis, a botnet that infects PCs by using the standard port 80 reserved for HTTP traffic. Increasingly, botnets are using common ports to spread in an effect to blend in with normal traffic. Detections of Sasfis command-and-control servers were third on the top 10 attack list maintained by Fortinet.

Fortinet also discovered in November that the Hiloti botnet was using legitimate DNS queries to report back to its command-and-control servers, another example of a botnet trying to use standard protocols to avoid being detected.

Finally, zero-day vulnerabilities were found last month in Adobe Shockwave, Adobe Flash, Microsoft PowerPoint, Apple QuickTime, and Microsoft’s Internet Explorer. All of these weaknesses were cited by Fortinet as critical as they leave the applications open to attacks that are able to run code remotely.

In terms of sheer malware attacks among the top countries hit in November, the U.S. accounted for 35 percent, up from 32 percent in October. Japan took 22 percent of the total attacks, up from 16 percent the prior month. And Korea took the brunt of 12.5 percent of the world’s total malware attacks, up from less than 9 percent in October.

(Credit: Fortinet)

Read more: http://news.cnet.com/8301-1009_3-20024432-83.html#ixzz186DmrR3M

Lance Whitney, CNET

Feb 9 Microsoft has Big Security Patches for all OS

Here are two keys words for Microsoft Windows shops to remember come this Patch Tuesday: “six” and “restart.” Six is the number of a critical bulletins Microsoft will release on February 9 that affect all the currently supported versions of Windows on both the desktop and server. And a system restart will be required for these Windows patches, which will mean down time for servers. In fact, 10 of the record-tying 13 bulletins require a restart. In all, five are listed as critical, seven important and one moderate. Microsoft getting better at Patch Tuesday updates, experts say The last time Microsoft had so many bulletins was in October 2009. In the preliminary patch information issued Thursday, Microsoft does not say how many total vulnerabilities are in those 13 bulletins. In October, the number was 34. Experts say on average there are two vulnerabilities per bulletin. “Bulletin six is definitely key, we can see that both server teams and desktop teams are going to be impacted,” says Don Leatham, senior director of solutions and strategy for Lumension. Leatham says IT teams should look at their maintenance windows and see how and when they can get these critical patches out. “With bulletin six it might be worthwhile to move up the maintenance window if need be,” he says. Many organizations with patching policies time server maintenance with patch releases. Leatham says users should not wait to scramble on Tuesday but instead should start prepping as soon as possible. “Usually when there have been bulletins like this in the past that cover every single Windows platform it means it could be fairly low level in the OS,” he says. This month, the other trend is that there are fewer patches on the applications side. Only two patches address applications and both are for Microsoft Office. Microsoft had a single patch last month, which was in the font engine of Windows. Follow John on Twitter: twitter.com/johnfontana

Microsoft to release free security software soon

Microsoft plans to release the final version of its free antivirus software soon, according to a note sent to testers late Sunday.

“The final version of Microsoft Security Essentials will be released to the public in the coming weeks,” Microsoft said in the note.

Microsoft first announced its plans for the product, then code-named Morro, last November, at the same time the company said it was scrapping its paid Windows Live OneCare product.

Public beta testing of Security Essentials started in June, with Microsoft reaching its goal of 75,000 testers just one day after it issued a call for them.

 

Ina Fried, CNet

Dell launches first laptop with Intel’s Core i7

SAN FRANCISCO–Dell is launching its first laptops with Intel’s new Core i7 processor for laptops.

The Intel “Clarksfield” Core i7 processor boasts four cores and is the chipmaker’s first mobile chip based on its new Nehalem microarchitecture. Most Intel processors will move to this design in 2010.

Dell is trying to take an early lead in embracing the new technology. Dell’s flagship product for the mobile Core i7 will be the 15-inch Alienware M15x gaming laptop. Dell is also offering the chip as an option on other laptop models worldwide, including the Studio 15 and Studio 17.

At the Intel Developer Forum today, David Perlmutter, executive vice president and co-general manager of Intel Corporation’s Intel Architecture Group, is discussing Intel’s mobile Nehalem platform that also includes a future chip codenamed “Arrandale,” which will integrate graphics into the CPU, or central processing unit.

The Core i7 is packaged with the Intel PM55 Express chipset–companion silicon that assists the processor in communicating with the rest of the system. Two features that differentiate Core i7 from Core 2 Duo processors (the most-widely-used chips in laptops today) is Turbo Boost and Hyper-Threading. Turbo Boost speeds up and slows down individual cores to meet processing and power-efficiency needs, respectively. Hyper-Threading can double the number of tasks–or threads–a processor can execute.

The Alienware M15x configurations include the Intel Core 920XM CPU and 1GB NVIDIA GeForce GTX 260M graphics chip.

The Dell Studio 17 will feature the Intel Core i7 720QM 1.6GHz processor, a 1GB ATI Mobility Radeon HD 4650 graphics chip, 17.3-inch HD+ (1600×900) display, and 9-cell battery.

The Studio 17 starts at $1,099.

Dell will also offer the Studio 15 with Core i7. Configurations include Core i7 720QM 1.6GHz, 512MB ATI Mobility Radeon HD 4570 graphics chip, and 4GB of memory. Pricing start at $999.

And the Dell Studio XPS 16 will come with a Core i7 option, with a starting price of $1,249, Dell said.

Brooke Crothers, CNet

Is It a Virus?

I get a lot of email from people who believe their computer is infected by a virus. In most cases, it’s not infected at all–evil software designers are still outnumbered by incompetent ones.

And even if there is malware involved, it’s almost certainly not a virus.

The word virus refers to a very specific way that malware spreads from one PC to another. A computer virus infects an executable file, like a program, the way a biological virus infects a cell. When it gets the chance, it infects another file, and thus spreads.

Or perhaps I should say used to spread. Over the last few years, rogue programmers have found better ways to infect your computer, more suited for the Internet and email age. For instance, Trojans–programs that trick you into opening them, and infect your computer when you do–are quite popular among the tech-savvy criminal set.

Yet the word virus stays around. Why?

Because viruses were the most prominent form of malware when large numbers of people finally figured out that this was something to worry about. Everyone was talking about viruses in the 1990′s. One of them destroyed an evil corporation in seconds, and another saved the world from alien invasion. (And no, I’m not going to tell you what movies I’m talking about; that would be spoiling.)

Thus, to the uninformed, the word virus came to mean any malicious computer program. It’s like using the name Frankenstein to refer to the monster rather than the monster maker.

So check yourself before you tell someone your computer has a virus. You’re probably admitting your own ignorance.

Lincoln Spector, PCWorld

Remove a Virus or Other Malicious Infection

Ineptitude and arrogance cause most PC problems, but vicious software designed to trick you, steal from you, and use your computer to hurt other people do the worst damage. After all, bugs aren’t designed to protect themselves, but “viruses” are.

(Why did I just put the word viruses in quotation marks? Anything that infects your PC today is almost certainly not, technically, a virus. But the word has become a common term for any malicious software, whether it spreads like a virus or not. See Is It a Virus? for details.)

What are some of the signs that you may have an infection?

* Your home page keeps changing, or web searches keep taking you to the wrong page.

* Software that should protect you, like your anti-virus program, can’t update or no longer works properly.

* Common programs you can use to configure your system, such as msconfig or System Restore, stop working.

* Your computer accesses the Internet a lot when you’re not using the Internet.

* Your security software tells you that you have an infection, but can’t get rid of it.

If you think you have an infection, try the following four fixes, in this order. And use them all, even if the second one solves the problem.

1) Accept that your anti-virus program has failed. Don’t be too hard on it; you just had the misfortune to get the malware before the update that would have protected you from it. But until everything else is fixed, your current software probably isn’t working.

2) Restore the system. Select Start, All Programs, Accessories, System Tools, System Restore. Follow the prompts to restore from a time before you starting having the problem. If you don’t have a restore point that old, go on to step 2. If System Restore fails to work, reboot into Safe Mode (reboot, then press F8 before Windows starts loading (it may take a few tries to get the timing right) and try System Restore there.

3) Get a second opinion from another security program. I recommend the free version of either SUPERAntiSpyware or Malwarebytes’ Anti-Malware. Download the program, install it, and have it scan your hard drive and eliminate what it finds.

4) Get a third opinion. Repeat with the other of those two programs.

If you’re not satisfied that you’re now clean, download and install another free program: Trend Micro’s HijackThis. This one doesn’t actually fix anything, but it gives you a very thorough, and for most people, thoroughly unreadable report. But someone who knows what they’re doing can study this report and figure out what your problem is and what you can do about it.

Lincoln Spector, PCWorld

What is spyware

Spyware is a general term used to describe software that performs certain behaviors, generally without appropriately obtaining your consent first, such as:

  • Advertising
  • Collecting personal information
  • Changing the configuration of your computer

Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.

Trading tracking for services

That does not mean all software that provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but you “pay” for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

What spyware does

Other kinds of spyware make changes to your computer that can be annoying and can cause your computer slow down or crash.

These programs can change your Web browser’s home page or search page, or add additional components to your browser you don’t need or want. They also make it very difficult for you to change your settings back to the way you had them.

Know what you’re installing

The key in all cases is whether or not you (or someone who uses your computer) understand what the software will do and have agreed to install the software on your computer.

A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Whenever you install something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of unwanted software in a given software installation is documented, but it might appear at the end of a license agreement or privacy statement.

There are a number of ways spyware or other unwanted software can get on your computer. To learn more about spyware, read How to help prevent spyware.

Microsoft