Monday, December 14, 2015

Protect Your Internet Business Brand From CyberSquatting


Under ICANN registration agreement, the first person to register a domain name "owns" the domain name and takes responsibility for any trademark and other legal disputes that relate to the domain.

Just in the recent past a company asked me to find a communication solution for them. In the proposal offer i outlined the use of a good and sound domain name for Internet Branding.  I gave the options. After a quiet-feedback i decided to check on the availability of the principle, the optional domain and name variation in my offer and found it was registered barely 24hrs ago. The company took my proposal and went ahead to quickly create and register for the proposed domain name. Imagining i had registered earlier the principle domain name with one or two variations and or  extensions. In the first proposal i would have offered a asking price for domain names, giving that they where already owned. I would have been Cybersquatting. 
.................................................................................................................................................................................................................................................
Cybersquatting (also known as domain squatting) is registering, trafficking in, or using an Internet domain name with bad faith or intent to profit from the goodwill of a trademark belonging to someone else. 

Because domain names can be very valuable, Cybersquatters continuously find new and innovative ways to exploit individuals or companies. This can be easily achieved by anybody with ill-will for a company or otherwise and this process ensures only basic IT skills. That is why today when you look around the internet businesses with good brands have several domains registered to themselves.

A brief view of Companies with most registered domains
  • google.com alone is worthy $2,547,100,006
  • Microsoft owns about 63,000
  • Google  227 known officially though other sources indicate 8,600 +
  • Apple has been slow at 650 but are increasing the number. Imagine an individual owning iphone.com, iwatch.com and how the individuals can tunnel traffic. 
  • Apple does not own ipad.com and only recently it acquired apple.co.uk which redirects to apple.com. I often went to ipad.com before realising. 

Porn Allure
................................................................................................................................................................................................................................................................
If the threat of extortion by a cybersquatter doesn’t convince you to explore your domain name variations, then the possibility of a “porn pirate” should. In an effort to get new visitors, the owner of a pornographic website will register variations of your domain name to funnel traffic to their adult-only site. If this happens to you, potential customers may mistype your URL and end up at a website of pornography. Domain Sherpa advises Imagine how disastrous for Microsoft, typing www.microsoft.com.zm instead of looking for that product Microsoft Dynamics or Office 2016  a user is yielded into a porn site.

Sneaky Competitor And Disappointed Employees
Other risks of unclaimed domain names come from your competitors, who like cybersquatters, may take advantage of unclaimed domains related to your business name as a way to divert traffic and business away from you. Or former employees unhappy with the company can register company domain with -suck.com e.g applesucks.com Ensure your domains take care of the the possible sucks.

Measures For Protection
......................................................................................................................................................................................................................................
  • Register your primary domain name in the three most common generic top-level domains (also known as gTLDs): .com, .net and .org. It is also worth seriously considering .biz and .info. 
  • Buy both the singular and plural forms of any nouns. If your principal domain name squatter.com consider squatters.com 
  • With ICANN launching new generic top-level domain (TLD) extensions, businesses with established brands need to lookout for the; .mining, .lawyers, .clothing, .technology, .club as appropriate with the line of business. Trademark Clearinghouse (TMCH) has given brand owners a key advantage over potential cybersquatters trying to register infringing domains by allowing pre-registration
  • Look into common misspellings of your domain name. It took me a while to know twitter.com as i would often type twiter.com 
A Worthwhile Investment

By doing a little extra work now and investing in domain name variations, you will protect your business against threats to your reputation, bad spelling by your customers, and Internet traffic diversion. The low cost of domain registration is a small price to pay to add to the value and security of your brand for the future.

Tuesday, October 20, 2015

LTE Security Flaw Reveals All Android Devices' are Vulnerable

android app

The Upside
As much as we like to move to newer and latest App, Android or iPhone or Samsung some of us are so at it that we are the first front. We have heard of midnight queues to get the first hands on latest release. Having newer technology and devices feels awesome thats is from experience i imagine. It feeds well rather than waiting to hear from your friend how fast or superb their machine runs

When LTE was launched by my mobile provider, i quickly moved on from the 3G surrounding my iPad, iPhone and the Router. I quickly upgraded to to this new phenomena and the speeds it can offer. LTE  (Long Term Evolution) or mostly marketed as 4G, is a standard for wireless communication of high-speed data for mobile phones and data terminals. Its a natural path for upgrades for Mobile Telecommunication carriers using GSM/UMTS networks and CDMA2000 networks.

The Downside
However this endless satiation has its downside for the "i beta tested" and rather not wait class as the recent CERT report shows; 
Long Term Evolution (LTE) mobile networks are currently deployed through the world. These LTE mobile networks make use of full packet switching and the IP protocol, unlike previous iterations of the mobile network. This change from circuit switching to packet switching allows new attacks not previously possible. Some implementations of LTE networks and mobile applications are currently vulnerable to several issues which may result in loss of privacy, incorrect billing, and data spoofing. 
4G  distribution
Map showing the red countries commercially using LTE, blue deploying and grey in the trial phase

The leading team advisory of Korean origin found the following vulnerabilities. Depending on the carrier implementation one or all of the vulnerabilities may be found with the network. Though Apple reports that the iOS is not affected.

---------------------------CERT Vulnerability Note VU#943167------------------------

Incorrect Permission Assignment for Critical Resource
Call_Phone permission can be overruled with only the INTERNET permission by directly sending SIP/IP packets. A call made in such a manner would not provide any feedback to the user. Continually making such calls may result in overbilling or lead to denial of service. 


Improper Access Control
Some networks allow two phones to directly establish a session rather than being monitored by a SIP server, thus such communication is not accounted for by the provider. This may be used to either spoof phone numbers or obtain free data usage such as for video calls.


Improper Authentication
for every SIP-Session Initiation Protocol- message, allowing the possibility of spoofing of phone numbers.


Session Fixation
Networks allows a user to attempt to establish multiple SIP sessions simultaneously rather than restricting a user to a single voice session, which may lead to denial of service attacks on the network. An attacker may also use this to establish a peer-to-peer network within the mobile network.

------------------------------------------------------------------------------------

As you are using LTE on an Android powered device you risk a remote attacker



1. Establish a peer-peer communication, spoofing your phone call and

2. Retrieve data from your mobile

3. Denial of service and overbilling

3. A malicious mobile app may be able to silently place phone calls without the user's knowledge.

Solution is none at the moment as alerted by the advisory team, but here is a go on, if you feel things aint right try to restrict device to 3G and see how things move.

Friday, October 16, 2015

UK Hit By Serious Cyber Attack - Dridex Malware

Though Dridex has been known to be around for a while UK is more often hit by this threat perversion of online banking crime dating back to 2014 when it spread through a serious annoying spam campaign . Dridex is an evolution of the Cridex malware, which itself is based on the ZeuS Trojan Horse malware. Dridex is a peer-to-peer (P2P) bank credential-stealing malware. It uses a decentralised network infrastructure of compromised personal computers and web servers to execute command-and-control (C2). 

What is Dridex Malware? 

It is also known as Bugat and Cridex, has been developed by technically skilled cyber criminals in Eastern Europe to harvest online banking details, which are then exploited to steal money from individuals and businesses around the world. Global financial institutions and a variety of different payment systems have been particularly targeted, with UK losses estimated at £20m. The National Crime Agency warned.

Computers become infected with Dridex malware when users receive and open documents in seemingly legitimate emails. 
Example of Email Content soliciting for a Dridex Infection
The NCA assesses there could be thousands of infected computers in the UK, the majority being Windows users. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), have also issued warning and Technical Alert to provide further information about the Dridex botnet. These kind of emails have also spread and seen in Africa with reports of such from Zambia

TIPS FOR PROTECTION AGAINST DRIDEX:

  • Ensure your computers have up-to-date Security Software, Operating System and Applications. Malware exploits vulnerabilities in the existing software before an update is done. 
  • Use legitimate Anti Malware tools 
  • Don't click on any suspicious or unknown links and attachments. The cyber criminals are using technics to lure users into clicking on malware infested links 
  • Reduce the value of a criminal knowing your passwords by ensuring you use unique complex passwords for accessing web sites and online banking, and remember to use a different password for each site/account.
  • To limit the surface attack area make your passwords more secure. They should be at least 15 characters long with a mix of letters, numbers and special characters 
  • If you fear a password has been compromised promptly change it on all other web sites where you may have used the same password.
  • Don't click on any suspicious or unknown links and attachments. Don't install unknown software and applications requested from emails.


Tools for Removing Dridex

Tuesday, September 29, 2015

5 Roles Every Windows Server Administrator Must Know


























FSMO- Flexible Single Master Operations                                                                            
In a Windows environment these 5 unique roles are in the most ways a holy grail of every Microsoft Windows Server administrator. If you find yourself unaware of these roles in your troubleshooting just know that most of your network's weird, unproductive activities could as well be well coming from there. An unauthorised access or breach to Active Directory is so dangerous to security expert of the organisations as the AD is the security point of entry. It deserves the at most attention for the smooth domain or forest operations. 
  • Access tokens, 
  • password verification, 
  • account user holder, 
  • service authorisation and so many more services.

Forest Roles                                                                                                                                              
  • Schema Master | The schema master is forest wide and there's one for each forest. Remember the adprep /domainprep command. It worked because this role was operational.
  • Domain Naming | Crucial for upgrades and demotions. It must be online when domains and application partitions in a forest are added or removed.
NetDOM /Query FSMO-Command to use determining the role holder

Domain                                                                                                                                                     
  • PDC Emulator | This role must be online and accessible 24/7 for password and user account updates. Its a default target for the domain group policy and some admin tools
  • RID Master | Must be online for newly promoted domain controllers to obtain a local RID pool thats required to advertise or when existing domain controllers have to update their current RID pool allocation.
  • Infrastructure Master | Responsible for cross-domain reference and phantoms from the global catalog.

Sunday, September 20, 2015

In Cyber Security is Business Continuity and Disaster Recovery Important?


Planning seats as the very key in all organisations. As part of planning organisations ensures that business continuity and disaster recovery are initiated. Even at a very scant scene all organisations and or those entrusted in charge have thought even about what would happen when a disaster occurred affecting the organisation; Questions are raised such as what will happen to customer private information in the case of a public leak, malicious and unauthorised access and distribution of private information? What will become of financial transaction records in the event of a catastrophe like fire, earthquake to the organisation?
dcdr
These key questions are only addressed by the system called Business Continuity and Disaster Recovery. Countries (e.g a "Zambian disaster management act no 13, which was assented to on the 13th April 2010) have gone ahead to develop policies, plan and manage for such uneventful days making this system a very important aspect starting from an individual straight to nations. It makes business continuity a very important part of planning for all organisations. Business Continuity concerned with processes and procedures will address areas such as how the business key functions is going to continue to operate in the and after incidence of disturbances. Potential business continuity problems may include the illness or departure of key organisational members, a supply chain breakdown, catastrophic failures or critical malware infections. On the other hand the Disaster Recovery aspect will be specific and plan for inadvertent events happening and how the business will rise and recover to continue in its operations. e.g How backups will be restored and databases made functional, accessible to the organisation after a malware outbreak . The disaster recovery unit will also ensure and ascertain for mitigations in the and during aftermath ?

Monday, August 17, 2015

The phone Popping Vendor Popped up A Galaxy S6 Edge Plus and Note 5




"When the Samsung Galaxy Note 4 was released last year, I wished I had upgraded from my Note 3 but then I changed my mind." Mutheliso Phiri noted.
So Many Choices
Samsung as a phone dealer and manufacturer gives you so many choices that rarely serves you. If you are not tech savvy whats the point of been lost in a maze of quarterly upgrades that costs fortunes. And thats the biggest problem i have found with Samsung.
"Despite running on Jellybean 4.3 I do not believe the Samsung Galaxy Note 3 is outdated yet because it does not give me any problems."
A look at the layout of Note 3 gives the user lesser differentiation with the upgrades. The software works fine and superb and shows a little difference with the KitKat and Lollipop as later versions.
The 'Milky Way' Galaxy
Since the launch of the Note 3 in October 2013 the following myriads of upmarket phones have been launched by Samsung in the shortest period:
Galaxy S3
  • Samsung Galaxy S Duos 2.....December 2013 
  • Samsung Galaxy S5........................April 2014 
  • Samsung Galaxy Note 4.............October 2014 
  • Samsung Galaxy S Duos 3..........August 2014 
  • Samsung Galaxy Note 4........September 2014 
  • Samsung Galaxy Alpha.........September 2014 
  • Samsung Galaxy S5 plus.......November 2014
  • Samsung Galaxy S6.......................April 2015 
  • Samsung Galaxy Note Edge..........April 2015 
  • Samsung Galaxy S6 Active............June 2015 
And only last week the following 
were launched:
Galaxy Note 5

  • Samsung Galaxy Note 5.................................13 August 2015

  • Samsung Galaxy S6 Edge Plus......................13 August 2015 
The good news about the unveiling these new phones is that the Note 4, S6 and S6 Edge will become slightly more affordable.

I would like to get my hands on the new Note 5 to replace my Note 3 probably by next year when it becomes more affordable - (The Note 5 and S6 Edge Plus priced at approximately $700 a piece will likely cost above $1000 in Zambia)

Prevailing is the Galaxy S6 Edge in MTN and other branded stores is costing as much as 8000 Kwacha, a price pegged as such before the rapid depreciating Kwacha of the past 3 months

Mutheliso Phiri is found at @Mutheliso and www.facebook.com/mutheliso

Wednesday, August 5, 2015

Threatsaurus - A Dictionary Of Malware - Social Networking

Computer threats keep multiplying everyday with sophistication.

------------------------------------------------------------------------------------------------------------------------- 
"Social networking websites allow you to communicate and share information. But they can also be used to spread malware and to steal personal information."
--------------------------------------------------------------------------------------------------------------- 

Social networking sites, such as Facebook and Twitter, continue to grow in popularity as attack vectors. Unscrupulous individuals can use information you post online to learn details about you that can be useful for social engineering or guessing the answers to security questions on other websites.

Easier Way For Malware!

Attackers may also compromise an account of a friend and use it to distribute malware or other malicious content. Be cautious about what links you click on. Make sure any computer you use to connect to the site is protected with the latest security software and patches. Use strong passwords and use separate passwords for each account. Take advantage of two factor authentication, if available. Be thoughtful about what you post online, and use available privacy settings to limit who can see your information. (For more information and how to be safe on the Internet see) - Sophos.

Best Approach!
Be suspicious and look out for anything extraordinary even where none is, just don't be paranoid!

Wednesday, July 29, 2015

Windows 10 Launches and Say Goodbye to Windows 8.

Windows 10 launches today 29th July 2015. Those who have done the windows technical drive and test beginning last September when Microsoft revealed the forthcoming OS, the`previews and the RTM has shown Windows 10 to be superior and what Windows 8 should have been several years back. It is faster, more secure, a new familiar look and feel and technologically superior.

"On July 29, we will make Windows 10 available, across 190 countries, as a free upgrade* or with new PCs and tablets. We are excited to bring Windows 10 and its many innovations to the world".  -----Writes a Blogger

A PC is Personal Again

On a more personal side Windows 10 features;
  • Voice, Pen and Gesture input allow you to more naturally interact with your
  • Cortana is a more personal digital assistant making it easy to find the right information at the right time. 
  • Continuum optimizes your apps and experience beautifully across touch and desktop modes.
  • Windows 10 is free for upgrades. Upgrading to Windows 10 is easy if you have a genuine Windows 7 or Windows 8.1 PC or tablet
To learn more about Windows 10


Thursday, July 16, 2015

Apple OS X EL Capitan Available to the Public


OS X El Capitan Feature Summary
Apple has confirmed that the new version of OS X will build on the strengths of Yosemite with "real refinements". What that really means is that with this release Apple is focusing on performance and introducing only a handful of new features. That’s not to say that there are no new features for Mac users to enjoy. The following tweaks are included:

1. To the interface, 
2. New full-screen views, 
3. Changes to the way you arrange all the windows on your desktop, 
4. A smarter Spotlight that can recognize natural language
5. Several changes to the Mail, Safari, Notes and Photos apps.



Perhaps the favourite new feature might just be the new way to find your cursor – just shake your mouse, or wiggle your finger on the trackpad, as we all do, but doing so will now make the cursor grow in size momentarily. 



In Total

The performance improvements will mean that your Mac should feel faster, for example, opening your first email message will be two times faster, according to Apple, and PDFs will open four times faster.

That’s a very quick summary of what to expect from OS X El Capitan. In this article we will look more closely at all of the new features and also how you can get hold of the beta of El Capitan now. OS X El Capitan is available now for downloads to developers

Sunday, July 12, 2015

Secret Codes For iPhone




Like any other gadget the iPhone has its own 'secret' codes. These short codes will either uncover hidden menus or act as direct commands. They provide additional information about your device and and may tweak current settings. If you are savvy with gadgets and have developed no need to call the center for help every now and then here are some codes that will really help.
1. Your Mobile Device Number | Code:*123#

This code will display your the device currently working mobile number
*101# If you are in Zambia this code will notify you mobile number registration status in compliance with regulatory body ZICTA

2. IMEI Number | Code: *#06#
International Mobile Equipment Identity number is a 15-digit code that uniquely identifies your iPhone within GSM, UTMS and all other mobile phone networks. It’s always printed on your iPhone’s original delivery box and is required in the unfortunate case that your iOS device is lost or stolen. IMEI is required when filing a complaint to the police or any other related issue to the network provider. This identification number can be also found in Settings -> General -> About.

3. Field Test | Code: *3001#12345#* + ‘Call’

By accessing the hidden iPhone field test mode you’re able to find out live updated information about your cell phone network. You can uncover the numerical value of your cell phone signal and read data about surrounding cell towers. If you tap on the numerical valued carrier signal, available in the top left corner of your screen, you can switch between graphic and numerical display. Numerical values are always negative. Figures around ‘-50′ are for optimal reception while those towards ‘-120′ are considered very poor.

4. Call Waiting | Status: *#43#| Enable: *43# | Disable: #43#

This short code interrogates your device if Call Waiting is enabled or not. This setting allows you to be able to receive other calls while you’re already engaged in a conversation. The second and other callers will be cued in the waiting line. You’re notified with a sound alert when another call is waiting for you and have the option to decide if you wish to maintain the actual conversation, decline the new one or keep one of them on hold until you finish the other. Within iOS, call waiting is available in Settings -> Phone -> Call Waiting.


5. Call Forwarding | Status – All: *#21# – Unreachable: *#62# – When Busy: *#67# | Disable All Forwarding: ##002# + ‘Call’

Whenever you’re busy or on holiday you can redirect your calls to another colleague or family member. Use the nearby mentioned secret code and interrogate your iPhone about its current call forwarding settings. Besides voice data, you can also check out forwarding for data and faxes. Redirecting voice calls can be also set up from the iOS Settings -> Phone -> Call Forwarding. Use the other codes to check call forwarding status, when phone is out of reach or when busy.



6.Incoming Call Presentation | Status: *#30# + ‘Call’
Shows if your iPhone will display the number of incoming calls.

Tuesday, April 28, 2015

Windows 10 and The Return Of The Start Menu.

Windows 10 Preview with a familiar start menu.
Though Microsoft has not yet informed us of the release dates for Windows 10 the preview is out and registered users can download the .ISO for preview. They have been indications though that the OS might be out by July this year.
A  test drive however has the following observation.
"Its what Windows 8 should have been" i exclaimed after the Preview Installation and went to observe some new features such as:
...................................................................................................................................................................

Project Spartan
 The latest build of Windows 10 gives us a taste of Project Spartan. Spartan is the browser that will replace the venerable internet explorer. A peek was made early this year. One of the key strength of Spartan is the tolerance to let you capture and share notes on web pages.

Cortana and Hello
Microsoft's virtual assistant Cortana has made her way to the desktop in a slew of countries around the world. And there's still more to come. Windows Hello, for example, will bring biometric authentication to the operating system, letting you scan your face, finger or iris in lieu of typing a password.

Free Upgrades
This is it! Not exactly coming in as manna, but is manna if you know Microsoft. Windows 10 is shaping up to be the best version of Windows yet -- a huge leap over Windows 8, which had a troubled reception. And upgrades to Windows 10 will be free for a year, for folks who are currently running Windows 7, Windows 8.1 and Windows Phone 8. There's no word on pricing after that (or for folks still running Windows XP), but if Microsoft has its way, we will have all made the switch by then anyway.

Return Of The Start Menu
The Tiles have been moved to Start Menu. A click on Windows Logo at the far right of the Start Menu or pressing the Windows Logo on the keyboard yields the familiar start menu of that every Windows user knows

Wednesday, April 8, 2015

Graphene And The Future | Materials For Tomorrow

Through a study of discrete and continuous quantum graphs, in the recent years, an interest has emerged to produce a possible directions of the various research projects by the pioneering Universities. Key interest in the study is;


Transport properties of networks and their complexity. Several projects and research are underway to see how the application of graphene and its manipulation can change the industry standard materials to more efficient robust and effective materials.


What is Graphene?
Its the versatile two dimensional carbon allotrope. Whats amazing about graphene is its properties.
  • Its the Lightest
  • Its the Strongest with
  • Heat and electricity conductivity (than any material known on Earth)
that can easily be integrated into current materials for various applications with future open door to combine it with 2D crystals for more wider amazing compounds.

In The Beginning.
"Graphene’s popularity began when Andre Geim and Konstantin Novoselov won the Nobel Prize in Physics 2010 for discovering the material". Wrote Pablo G. Bejerano | 6 September 2013 at 19:03 at BlogThinkbig. "However, their work had been published years earlier, in October 2004. Since that time, and later when they won the prestigious award that brought fame to the new material, companies and research centers have improved their knowledge of it and their manufacturing techniques."

Graphene Application and Uses.

#Bionic engineering.
High quality headphones, efficient sports tools like a tennis racquet, absoletion of batteries, the list is quite incredible.

#A Download World with Upscale Uploads.
Mega-fast uploads. A mention of a whole terabit in just one second. Wireless uploads of big files take for-ev-er. But researchers at Georgia Tech University have plans for an antenna made of crazy thin graphene that would let you transfer a whole terabit of data in just one second.

#Mobile Devices with optoelectronics engineered
Graphene is an almost completely transparent material and is able to optically transmit up to 97.7% of light. This means its application is all over in optoelectronics; liquid crystal displays ( LCD), touchscreens for smartphones, tablets and laptops






#Energy Storage.
What's the use of the hybrid cars when you quickly run out and have to spend long precious hours recharging? Any battery can potentially hold a lot of energy, but it can take a long time to charge. A capacitor, on the other hand, comparatively speaking can be charged quite quickly, but can't hold that much energy. The solution is to develop energy storage components such as either a supercapacitor or a battery that is able to provide both of these positive characteristics without compromise. Currently scientist are working on incorporating graphene as an anode in batteries. When successful?

Plug your home devices, Tablets, phones just for five seconds and the unit would be charged.

#Cleaner Environment- Ultrafiltration.

Graphene could potentially clump together radioactive waste, making disposal a mere breeze.

Water Desalination Illustration

MIT Water Desalination | We show that nanometer-scale pores in single-layer freestanding graphene can effectively filter NaCl salt from water. This means water almost everywhere.

Plus graphene is stronger and less brittle than aluminium oxide (currently used in sub-100nm filtration-applications). Here graphene can be shown to potentially clump together radioactive waste, making disposal so easy.

#Composite Material.
Graphene is strong, stiff and very light. A good application to employe in the manufacture of vehicles and aerospace. Manufacturers will easily incorporate it into the carbon fibre material. Its preferential because its stronger while much lighter. Military and defense geniuses can, If not already, use these characteristics;
high strength requirement applications such as body armour for personnel and vehicles.
Of course all these applications are only in the initial and it would take a while, but manufacturers have to figure out production (apparently Spain is a country to look to for Graphene production as confirmed by ICEX. Overally   its so interesting to see a promising future.

Tuesday, March 24, 2015

Three Things You Can Do When You Are Bored

1. Update Programs.

  • Check the status of your installed programs for an updated version. Included most and frequently requiring updates are anti virus. Increasingly now versioned for protection are Malware applications. Immediate updates of definitions when should be done. Ensure the OS is updated. 
  • For OS X go to Apple icon on the far top left, click About This Mac, Click Software Update, OS X will take you to the App Store where it will show any available updates. With enough data bandwidth the update is seamless 
  • Install the update manually
    Make sure your PC is plugged in and connected to the Internet using a non-metered connection. Don't disconnect, unplug, or turn off your PC while the update is being installed.
    Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings.
    (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, click Settings, and then click Change PC settings.)
    Tap or click Update and recovery, and then tap or click Windows Update.
    Tap or click Check now.
    If updates are found, tap or click View details.
    In the list of updates, select the update containing KB 2919355, and then tap or click Install.
    If you're prompted for an administrator password or confirmation, enter the password or provide confirmation.
    After the installation is complete, restart your PC and sign in.
  • If you're running Windows 8.1

2. Delete Unnecessary Mails

Email boxes everyday gets clattered with unnecessary mails. Delete these to only remain with the most relevant. Check spam and unsubscribe (often it works and those naughty emails will stop flowing in).
Check the drafts and remove those urgent mails you wanted to send but never got around to do it. Archive some mails if you are running outlook. Empty Deleted `folder

3. Clean Your Laptop 



Get some recommended computer cleaners like computer wipes, form and Screen-clene for the screen and keyboard and make your computer shine again as new. Cleaning the keyboard take care of all the layer of dirty that accumulates from the fingers onto the keys ensuring all the bacteria is taken care of. A cleaner screen relaxes your eyes and improves health.

"Optimise your machine in these possible ways to increase efficiency and a happier work desk." - Funashi

Friday, March 20, 2015

OpenSSL Is Still a Big Threat.

OpenSSL is more than a threat, its awful and the need to apply the patches today other than tomorrow. And below here is a list of the patches that you need to do. Security experts around the globe have revealed that these holes are still a major threat,

"Give it time and it will be used against servers soon enough." Reports ZDNet when citing the point of worry as 'In the case of OpenSSL 1.0.2, the first problem child is "ClientHello signals DoS (CVE-2015-0291)." '

The other serious bug, "RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)," is just as ugly and more insidious. This one builds on top of the FREAK/SMACK OpenSSL security hole.  ZDNet

If you are using any of the following below you need to update immediately
  • OpenSSL 1.0.1 users should upgrade to 1.0.1k.
  • OpenSSL 1.0.0 users should upgrade to 1.0.0p.
  • OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
the key point is to get every system, applications and mobile devices around you to the current state of updates and continually lookout for fresh updates.