Google-Fiber

Google Fiber promises super fast broadband, but it remains out of reach for many people. However, it now looks as though it will shortly debut in San Jose.

The days of conducting business over a 56k dial up modem seem like a lifetime ago and in the last decade the speed offered by broadband has rapidly increased. It may seem as though it can’t get any quicker, but believe me it can! And it’s all thanks to ‘gigabit internet’ services.

Google, always at the forefront of internet technology, has been working on Google Fiber for the last 5 years and it promises a huge connection speed of 1,000 megabits per second. Despite first launching in 2011 expansion has been slow, but it’s strongly rumored that it’s debut in California will be in San Jose.

Let’s take a look at exactly what’s known about this launch and what it means for your business!

The Rumors Behind San Jose’s Launch

GoogleFiber

Despite there being no official announcement over Google Fiber’s expansion into San Jose there remains many indicators that it’s almost a done deal.

Perhaps the biggest shred of evidence is that Google has already got the ball rolling by applying for planning permission to construct two ‘Fiber Huts’ – these buildings house all the fiber optic equipment necessary to provide the regional network with gigabit access. And there are also proposals to build a further 8 in the city which would indicate a very strong drive to make Google Fiber a viable option.

Google has been discussing their plans for Google Fiber with city officials for some time now, but it had been difficult to reach a compromise. As a result, the discussions had broken down on at least two occasions leaving the move in jeopardy. However, it appears that progress has been made and the noises from City Hall point towards an announcement towards the end of November.

Why Will Google Fiber Be a Big Deal?

kQSlvYr

Google Fiber, then, seems to be on its way to San Jose, but what benefits is this going to bring to businesses in the city?

  • It will far outstrip the services currently provided in the area. At present the quickest internet service offered in San Jose is 250 megabits through Comcast.
  • The speed offered by Google Fiber will make cloud computing more viable due to the increases in accessibility and speed of available cloud services.
  • Video conferencing will become more accessible and will increase the potential for workers to work from home and connect with geographically separated colleagues like never before.

Google Fiber Is Only a Matter of Time

Google Fiber in San Jose feels as though it’s only a matter of time and I wouldn’t be surprised to see it launch in 2016. And if it does then it’s going to be incredibly exciting for the residents and businesses in the city. The potential to improve their digital lives is huge and promises to make dramatic changes to the way we do business.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


larger-15-ROUTERS-WiFi-generic2

Malware is generally viewed as a nasty virus which causes nothing but chaos. However, a new piece of malware called Linux.Wifatch seems to improve security.

Usually the preserve of security breaches and data privacy concerns, malware is mostly in the news for disrupting commercial and domestic PC activity. Naturally, it’s an area where everyone needs to be on their guard to protect their data.

However, what if there were a new type of malware which bucked the trend and actually protected you from other forms of malware? It would be pretty special, right? And, it looks like it’s already here in the form of Linux.Wifatch, so let’s take a look at exactly how it works.

How Has Linux.Wifatch Found a Niche?

Internet routers are wonderful little devices, but the majority of users are notoriously sloppy when it comes to safeguarding them. You see, people are eager to get it out of the box and connected to the net as soon as possible, so they don’t even consider adjusting the default password or admin settings.

And it’s this neglect towards security that has allowed hackers easy access to countless networks in the past. In fact, November 2014 saw a huge security breach in Vietnam where millions of broadband routers had their traffic hijacked to mask online cyber crime being carried out by hackers.

Linux.Wifatch, however, looks to be a unique remedy to this potential threat.

What is Linux.Wifatch?

virus-de-computador

Linux.Wifatch is an intriguing piece of code which – as per most malware – sneaks into your system in a rather underhand manner. In the case of Linux.Wifatch it’s believed that it breaches your router by way of the telnet protocol – this software helps test connections to servers.

However, once it’s made its way into your router, it does the decent thing and closes the connection it’s got through on to prevent any more malware sneaking in. Not content with closing the doors, Linux.Wifatch will then prompt the router administrator to then change the router password. And it’s final chivalrous act is to set off in search of other malware in the router to destroy.

Is Linux.Wifatch All Good?

It may sound like a friendly virus, but don’t forget that Linux.Wifatch is still malware and the ‘mal’ stands for malicious! Sure, it provides some protection to your router, but it simply shouldn’t be there in the first place.

1afca28

And Linux.Wifatch itself actually has a number of backdoors built into it to allow the author of the virus to use your router as they please.

With the virus spreading globally and affecting tens of thousands of users, it’s creating a lot of panic that this seemingly ‘white hat’ piece of software could suddenly turn nasty. So, in my opinion, the uncertainty surrounding Linux.Wifatch means a much better solution is to take your router security seriously from day 1 to prevent any security breaches.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


c

By now you will have seen the ‘Get Windows 10’ popup on your PC, but did you know that it’s being downloaded to your system even if you haven’t opted in?

Microsoft has decided to start installing Window 10 on systems and this, of course, is eating into people’s broadband usage, so it’s riled many consumers. It’s not the first time that Microsoft has ‘borrowed’ peoples broadband, so let’s take a look at this latest scandal in a little more detail.

Pushing Windows 10

Many users of previous Windows are more than happy with their current operating systems; after the criticism of Windows 8 it’s no surprise that consumers are a little reticent to trust Microsoft’s software.

windows-10-upgrade-notification

Even though Microsoft is working hard to shout “IT’S FREE!” from every available rooftop, some people are still refusing the upgrade. However, it’s been discovered that Windows is prepping your system to accept the upgrade.

Microsoft is so confident that users will want Windows 10 eventually that they’re downloading it to a hidden folder on people’s systems. The folder – labelled ‘$Windows.~BT’ – is around 3.5GB to 6GB, so counts for a significant section of your hard drive.

It’s an intrusive move on Microsoft’s part and, given the recent spate of Windows 10 security concerns, highlights the software giant as being somewhat arrogant and out of touch.

Microsoft Responds

When questioned about this latest accusation, Microsoft has been keen to point out this being for the customer’s benefit:

“For individuals who have chosen to receive automatic updates through Windows Update, we help upgradable devices get ready for Windows 10 by downloading the files they’ll need if they decide to upgrade.”

Now, of course, almost all of us sign up to the automatic updates as we’re advised it’s the best way to protect the security of our systems. However, it feels as though Microsoft is exploiting this need for security to push their own products at the expense of their users’ choice.

How Do You Remove Windows 10?

Understandably, many users are unhappy with Microsoft’s underhanded tactics, so are intent on removing Windows 10 for good and taking back control of their system.

Remove-Upgrade-to-Windows-10

It’s not as simple as just deleting the ‘$Windows.~BT’ folder as it will just keep re-populating and using up more of your broadband allowance. However, it is possible by going through the following steps:

  1. Go to Windows Updates and click on Installed Updates
  2. Locate update KB3035583 as this is the update which downloaded Windows 10
  3. Windows 7 users need to delete and hide this update along with KB2952664, whilst Windows 8 users should delete KB3035583 and KB2976978
  4. Head to the root directory where your current Windows OS is installed and delete $Windows.~BT
  5. Run ‘Disk Cleanup’ on your system and delete all ‘Temporary Windows installation Files’

Final Thoughts

Is it right to sneak a product onto everyone’s system through the patch management interface?

Despite most Windows updates installing new files on our systems the size has never been an issue. In this instance, however, Microsoft may have forced some users into unknowingly exceeding their broadband limits.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Lenovo-Yoga-658x370-2212b47ff38e685e

Several weeks ago, Lenovo was found to be preloading spyware onto their laptops; now it’s been discovered they’re loading spyware onto their Thinkpads.

Yes, Lenovo has certainly disgruntled a whole new sector of customers. And what with the Thinkpad range being marketed as a business laptop it’s particularly worrying for business customers.

After all, which business wants to get caught up in any type of security threat which could potentially distribute their customers details to third party sources?

Let’s take a quick look at exactly what’s happening.

The Spyware Scandal

spionage_w492_h312

The Thinkpad range was purchase by Lenovo from IBM and these refurbished models are being packaged with a piece of software called ‘Lenovo Customer Feedback Program 64’ which is causing the latest controversy.

But what exactly does this spyware do?

Well, it’s there to send customer feedback back to Lenovo’s servers to help improve their products and service. There’s not anything particularly nefarious about that. However, it’s also been discovered that this piece of software contains the following files:

  1. TVT.CustomerFeedback.OmnitureSiteCatalyst.dll
  2. TVT.CustomerFeedback.InnovApps.dll
  3. TVT.CustomerFeedback.Agent.exe.config

It’s the first file which is interesting as it relates to Omniture who are an online marketing and web analytics company. What they do is monitor people’s behaviour online to help build a snapshot of how internet traffic is moving across the web.

Now, although Lenovo do disclose in their EULA (End User Licence Agreement) that software will be transmitting customer feedback to the Lenovo servers it is buried away amongst a lot of text. Additionally, there is no mention that internet usage will be monitored and passed on to Omniture for what is surely financial profit.

Just imagine the security risks this could have with your business if hackers are able to find a loophole in this spyware and can piggyback onto your internet connection? It could spell serious security issues for the security of yours and your customers’ data.

Removing the Spyware

Virus-Removal

Thankfully, it’s not a mammoth task when it comes to removing the spyware, so just follow these steps:

  1. Download ‘Task Scheduler View’ which is a useful piece of software which displays all the tasks running in Windows
  2. Within Task Scheduler View you will want to disable anything which is related to Lenovo customer feedback and/or Omniture
  3. It’s also recommended to rename the folder “C:\Program Files (x86)\Lenovo” e.g. “:\Program Files (x86)\Lenovo-test” to help prevent any other dubious files being activated or installed

This should that your Thinkpad and your confidential data remain secure and are not at risk of being exploited.

When Will Lenovo Stop?

This is the third security scandal to hit Lenovo this year after the Superfish and BIOS modifying controversies, so consumers are understandably losing their patience with Lenovo.

Although Lenovo claims on their website that “Lenovo takes customer privacy very seriously and the only purpose for collecting this data is to improve Lenovo software applications” it remains to be seen when they will follow through on this pledge.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


hard-drive-failure

Hard drives are valuable containers of data, so when they fail it can be costly. Therefore, it’s essential you know how to monitor your hard drive’s health.

Now, you don’t need to worry, as you don’t need a PhD in computer health to analyze the health of a hard drive. Instead, you just need to refer to a monitoring system known as SMART (Self-Monitoring, Analysis and Reporting Technology) to investigate whether your hard drive is on the edge of failure.

It’s a good idea to integrate SMART into your monitoring procedures, so let’s take a look at exactly what it does and how to use it.

What is SMART?

Smart-HDD-Virus

SMART helps to keep an eye on your hard drive’s health by monitoring various attributes (up to 30 depending on the manufacturer) present. These attributes may vary slightly in description between manufacturers, but are all essentially the same.

Now, these attributes are assigned certain parameters which can provide definitive information that your hard drive is struggling for breath. And the parameters you really need to pay attention to are:

  • Value – This property indicates the current health of the attribute and starts off as a high number, but declines over the hard drive’s lifetime.
  • Identifier – This provides a description of what the attribute means and is indicated by a number, but will also have a text description too e.g. ‘Reallocated Sectors Count’
  • Threshold – This parameter tells you the failure limit for this attribute, so once the threshold is passed it spells trouble for your hard drive.

How Can You Monitor SMART?

It’s possible to view SMART data by using the ‘command prompt’ option in Windows, but many users are unfamiliar with command prompt, so it’s not always recommended.

Luckily, there are many third party pieces of software such as CrystalDiskInfo which allow easy navigation of SMART data, so it’s well worth downloading as it’s free and tells you everything you need to know.

CrystalDiskInfo

If, however, you do want to go the command prompt route then take the following steps:

  1. Hit the Windows key and do a search for ‘Command Prompt’
  2. Open command prompt and type in the following: wmic diskdrive get status

If your hard drive is working just fine then you’ll get an ‘OK’ status displayed. This can give you a quick bit of reassurance, but you’re unable to get an overall picture of the hard drive’s health with this approach.

What Do You Need to Look for in SMART Data?

Now, having a long list of data in front of you is all well and good, but you need to know what you’re looking for. Thankfully, Backblaze has investigated the most crucial attributes to monitor and these are:

  • SMART ID 5 – Reallocated Sectors Count
  • SMART ID 187 – Reported Uncorrectable Errors
  • SMART ID 188 – Command Timeout
  • SMART ID 197 – Current Pending Sector Count
  • SMART ID 198 – Uncorrectable Sector Count

If these values are sitting at 0 then you can sigh a sigh of relief as it demonstrates a healthy hard drive. Anything above 0, however, and it’s a telltale sign that your hard drive is at risk from failure.

It’s a good idea, though, to keep your eyes on all the attributes to try and identify any potential problems.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More

1 2 3 14