Welcome to Newbies PC Computer Tutorials
There is no security in links PDF Print E-mail
About newbies-pc.com! - Our Community
Written by weebit   
Friday, 26 July 2013 20:52

*There is no security in links*

If you are like me you scrutinize every website you visit. You look for wording that may give you a clue to what the content may be.   Then you decide if you want to click the link or not.  A link is a link regardless, it doesn't reveal much of anything until you click the link. All links are a risk.

This morning I was given a so called security lesson.   Your content on your website(s) is always being tested by someone.   The eye candy you display, grammar,  spelling,  and reputation is always a sliding slope to rather if visitors will return or not, and what they think of you.   Your website can become "word of the day" and they either love you or hate you, or they want to gripe.

It's not easy running a website and even if you put your all into it you can never please them all.   So don't bother trying to please them all, just go after the audience you intended to go after, and let the rest have their fit of rage.  The Internet is too vast to worry about what one person thinks.

The one thing I learned is that every time you open an e-mail and click a link, do a search and click a link, go to twitter and click a link, or even click a link on G+ you are taking a chance that the website you are visiting is either safe or not.   It has nothing to do with cover pages.  Some websites have them, others do not.   All Links really are not safe unless you have first hand knowledge otherwise.   Because the cover page is just that so is your e-mail, G+, search, and twitter account.  You click a link in each including the cover page.  So you are at risk.   The same website puts you at risk every day because everyone knows that a safe website can be compromised at any time. Just because it has a seal of approval means NOTHING. 

 My particular cover page is not made for the 20ish or 30ish generation.  It is made for the late 40ish and 50+ generation.  Mine is liked only because of the meaning behind it.  As a matter of fact I get compliments on mine because many say it brings back memories. That was the whole point behind creating it in the first place. 
Calling it a security risk just because the pic is outdated is childish. So love it or hate it what ever you chose be sure that you love or hate it for the right reasons.  I myself will keep thinking those reasons are sound and fair instead of showing you are pointless and have no clue.  URLs are here to stay, but cover pages are not.  My cover page will stay to the end as is. I have had it for years, and it has even generated a few laughs.  But it's the memories that people tell me about that make it worth keeping. 


cover page

Last Updated on Saturday, 27 July 2013 04:12
Bug 174897 - powerdevil causes X server to hog cpu PDF Print E-mail
Linux - Linux
Written by weebit   
Sunday, 19 December 2010 05:28
checkbox "Let powerdevil manage screen powersaving" in the general tab. By unchecking it, Powerdevil will bypass dynamic DPMS changes, and you will not experience this kind of problem. Unfortunately there is no other solution, since the problem lies at a very lower level.

After working with someone on this issue a user found out that he had two APPs doing system monitoring on his box. Simply shutting one of these down resloved his issue. He shut down the powerdevil CPU monitor widget since it was mentioned in the bug report.  He kept System Monitor. System Monitor is a widget that does the same monitoring as powerdevil.

Last Updated on Sunday, 19 December 2010 06:11
Some Humor PDF Print E-mail
Security - Security
Written by weebit   
Monday, 11 October 2010 03:14

Here is some humor


Last Updated on Monday, 11 October 2010 03:20
Google search tips PDF Print E-mail
User Rating: / 4
Written by weebit   
Sunday, 27 June 2010 18:02

Find a gift for him or her that's in your budget range by searching for pages containing price numbers in that given range. Just type two numbers, separated by two periods, with no spaces, into the Google search box along with your other search terms. You can use this to set ranges for everything from prices, dates or any other term involving a number. Try searching:      toy $25..$50. The idea is to put your search term in but include the price range also, so you need not be bothered with over priced items.

For dates do the following...  somebooknamehere daterange:2008-01-13..2010-01-13   look very carefully.  The name of the book, and then a space, the rest has no spaces in it!

The last tip is for omitting certain words in your search.  If you put a search in for girls toys... You certainly don't want the word boys showing up in your search results.  So.  You put  Nameoftoy/toytype then you put a space and then -boys  the search will look like this  nameoftoy/ortoytype -boys  if you don't want any bikes in your search results then you put nameoftoy/ortoytype -boys -bikes


You can also put emphasis on certain words.  You want these or this word included in the search terms.  So you put  in the search box          dolls -boys -bikes +furniture

IT Education channels PDF Print E-mail
Exclusive For Members Only - IT Professionals video
Written by weebit   
Tuesday, 20 April 2010 22:11

five YouTube Education channels from colleges and universities. Complete course lectures. (not in any type of order) Worth checking out these are channels with many courses. 

Stanford University




UC Berkeley







Error Messages PDF Print E-mail
User Rating: / 2
Windows - Windows
Written by weebit   
Saturday, 04 September 2010 06:01

1. Invalid Page Fault.

This occurs when the operating system (Windows) fails to actually
access information (data) that was requested by one of your
solve? Close the offending application that caused the error.

2. Fatal Exception Error.

This happens when a program or the system itself tries to work
with sickly data, such as a corrupt file. Files get corrupted if
all the ducks aren't lined up just so. Everything has to be
absolutely precise, or wham! Fatal Exception. Nobody was hurt,
were they? I hope not!
Remedy: Close the offending application. Sometimes it's Windows.

3. General Protection Fault (GPF).

Your computer has to have enough resources to support everything
going on inside. If it runs low, or resources leak into space,
you may see a GPF. This may also happen if two applications try
to use the same memory location, like two cars attempting the
same parking place
Remedy: Again close the offending application.

4. Runtime Error.

These occur while applications are running. The only way to cure
them is to restart the application.

Test Your Facebook Privacy Settings PDF Print E-mail
Security - Security
Written by weebit   
Monday, 17 May 2010 22:40

When your privacy went south at Facebook many cried foul.  They had every right to cry foul.  But now you have a tool to make sure that your Facebook account is private, and as secure as it can be. 

Last Updated on Monday, 17 May 2010 23:27
Stats On Malware PDF Print E-mail
Security - Security
Written by weebit   
Saturday, 17 April 2010 11:13

According to Symantec, malware's million mark was reached in the latter portion of 2007(1). 

In 2006 Microsoft released a report stating that for fifteen months their malware removal tool scanned and found 16 million instances of malicious software on 5.7 million unique Windows-based computers.(2)

For the month of March 2010 1,456,524 give or take a few computers were infected.(3) Keep in mind this is just one report from a on-access scanner. Which literally means the anti-virus software was downloaded and installed and run a scan  for the first time which found the malware.

For some time now I have checked the stats on what the malware is up too.  How much malware is there? How many computers were infected? How many websites?   ...So how many websites were infected? Sophos detected an average of roughly 5,000 infected Web pages a day for 2007.(4)  Then in 2008 they detected an average of around 15,000 infected Web pages a day. 79 percent of those 15,000 are legitimate websites.

In 2008 Symantec observed an average of 75,158 active bot-infected computers per day.(5)

Today Trend Micro reports 26,669 computers were scanned this past 24 hours, and found to be infected after a scan done by HouseCall, on-line virus scanner for PC. In the past thirty days Trend Micro's on-line scanner  HouseCall scanned and found 16,488,049 infected computers.(6) That number is rising every second you read this article.

Kaspersky noted In 2009, the system for analyzing vulnerabilities identified 404 different vulnerabilities, and a total of 461,828,538 vulnerable files and applications were detected on users’ computers. They analyzed the 20 most common vulnerabilities, which made up 90% (415,608,137) of all vulnerable files and applications identified on computers running their anti-virus software.(7)

The number of computers infected with Conficker.A or Conficker.B dropping from a high of around 6.7 million in late October 2009 to around 6.3 million machines in January 2010. The number of Conficker.C infections has declined from 400,000 computers in late October 2009 to roughly 280,000 in January 2010.(8)(9)

The number of malware (malicious software) samples that Symantec saw in 2009 was 71% higher than in 2008. In total, Symantec identified almost 2.9 million items of malicious code during that 12 month period. (10)

Amazing?  I just wanted you to see some numbers here so you could grasp somewhat of a count.  Keep in mind that I just gave you stats from just a few websites over a few years. It is no where near the total for all infected computers.  It does not give a accurate count on total on-line, and on-access scans for ALL computers active on the Internet today, and a few years past. Plus at any time the number of malware can change.  You are just seeing a small percentage of the amount of infected computers online.

You need to see these numbers because, just having someone tell you to keep your computer secure is not enough.  Today's computer users are vast.  You are always a target.  Regardless if you are reading e-mail, or visiting a webpage you are at risk. This also is regardless if the e-mail or website you are visiting or reading has a good reputation or not. It does not matter. YOU are a target. YOU need to have a secure computer. 

Security list links:

Some of these links are pdf files


Last Updated on Tuesday, 20 April 2010 23:28
<< Start < Prev 1 2 3 4 5 6 7 Next > End >>

Page 1 of 7