Windows XP SP3 Can Corrupt TIFF Images – A hotfix is available from Microsoft – Softpedia

Microsoft has warned users of Windows XP Service Pack 3 of an issue that can lead to digital pictures becoming corrupted. According to Microsoft, the problem is limited to XP SP3. Microsoft has explained that when using Windows Picture or Fax Viewer to manage TIFF images, in the eventuality that a specific picture is rotated either clockwise or counterclockwise, that document will become corrupted.

A hotfix is available for this specific issue, but affected customers will have to contact Microsoft here (http://support.microsoft.com/kb/970922)  in order to get it. “This problem only occurs to a TIFF document that is compressed in CCITT Group 3 format with 2D encoding. This problem does not occur if the TIFF document is set to read-only.

via Windows XP SP3 Can Corrupt TIFF Images – A hotfix is available from Microsoft – Softpedia.

Windows Updates – Were They Installed Without Permission?

I’ve been reading recently that on some computers Microsoft’s updates are happening automatically, even though the user has  set the update settings to download but notify before updating, or even set to check for updates but not download or install without prompting.  Microsoft has mentioned on their blog “Update Notifications and Install-at-Shutdown Behavior” that they “are investigating the reports and trying to clarify with the community exactly what people are experiencing.” They then go on to clarify how the update notifications work.

As I’ve written in the past, certain updates cause more harm than good on some computers so the ability and choose which updates to install and when is important. Certain updates could conflict with programs or hardware and cause computer instability.

A more comprehensive article from windowssecrets.com on this issue can be found here. In this article, it is mentioned that “One theory to explain the forced installs is that the large number of patches Microsoft released on June 9 overwhelmed the Redmond company’s download servers…The extra demand may have caused some downloads to be incomplete. Incomplete downloads are known to disable the notification icon and possibly the approval dialog that’s supposed to appear during shutdown.”

Something to be aware of if your computer has been giving you problems over the past couple of weeks, it may be because of some unwanted updates.

AskBillFirst Newsletter #11

My monthly technology newsletter, the 11th issue, is available – http://tinyurl.com/macuv5. Additional issues can be found at my website, www.askbillfirst.com

Disposable Email Address – What Is It Good For?

Filling out online forms these days is often times an invitation for disaster. Most of the form is okay, until you get to the part where you’re asked for your email address. Depending on the site, once you fill in that field, you’re setting yourself up for spam, even though the site says it protects your privacy.

That’s where a disposable email address comes in handy. Yahoo Mail Plus, $19.99/year, offers what it calls “AddressGuard“. “It lets you create disposable email addresses to use whenever you don’t want to give out your real Yahoo! Mail address, but when you do think you’ll probably want to receive what this source sends you—a receipt, or an invoice, or some other valid communication. Yahoo! AddressGuard directs messages sent to these addresses into your Inbox so you can see them.

You can create many alternate addresses and access them all from your Yahoo! Mail Plus account. If any of your disposable addresses starts getting spam, you can just delete that address.

If you don’t have, or don’t want to have a Yahoo! address, Anonymizer Nyms, $19.99/yr, is a tool that allows you to create and destroy alias email addresses in an instant. Anonymizer Nyms shields your real email address by allowing you to create a unique Nyms (disposable, email alias) every time you need to provide an email address or send an anonymous email. Anonymizer Nyms allows you to send email anonymously since Nyms email aliases can’t be linked to you. One click turns a Nyms alias address off to stop spam instantly.
You can use a different Nyms alias for every site you visit or correspondent you email.
All emails from your Nyms account are delivered to your real email account. You can set your Nyms addresses to auto-expire after a period of time you choose. (Taken from www.anonymizer.com)

Google mail doesn’t offer disposable addresses per se, but there is a way to set up aliases and filter the mail. There’s a great article on it here.

To sum up, a disposable email address is great when you want to sign up for something online, or when you need to give your email address to someone, and you want the ability to delete that address if it starts getting hit with a lot of spam. The email sent to the disposable address will be delivered to your regular email address but will identified as from the alias email so you’ll know which address is getting spammed. You protect your main email address and have the ability to control spam, by deleting the alias/disposable address when it starts to get hit.

Windows Updates – Revisited

With the most recent patches and updates from Microsoft, I received a lot of questions on which ones are safe to install and which ones should be avoided. I wrote about this last year and will revisit that post below.

Microsoft introduced the concept of Patch Tuesday a few years ago. The idea is that security patches are accumulated over a period of one month, and then dispatched all at once on the second Tuesday of the month. Windows Update is a service that provides updates for the operating system and its installed components. Microsoft Update is an optional feature that can be enabled to provide updates for other Microsoft software installed on a Windows computer, such as Office. These updates can come anytime throughout the month.

If your computer is setup to automatically download and install updates, you will get any and all updates and patches, both good and bad. By default, the automatic settings will check for updates at 3:00 in the morning, every morning. If you turn your computer off at night, it never has a chance to check for updates so if you want to keep the automatic settings, you should change the settings to a time when you know the computer will be on. To change the settings, open the Control Panel and double click on Security Center. At the bottom, you can choose to manage settings for Automatic Updates.

My recommendation is to change the setting to the second option, which is to download the updates but let me choose when to install them. What happens then is that the updates will download and there will be a yellow shield down on the right by the clock. When I double click on it, I will have the option for an “Express Install” or a “Custom Install”. I always choose the custom install. That choice lets me pick which updates and patches to install.

I will always install security patches and program patches, but I never install new service packs when they’re first available. I’ll uncheck those and install the rest. I’ll continue to uncheck them until I know they are safe to install.

Just to be clear, when I see that shield, I will always check what’s downloaded and install what’s appropriate. The bad guys out there wait for the patches to come out also so they can create programs that hit all computers that aren’t patched. Lately, that attack will come the day that the patches are released so it is very important to install them.

Every so often, you will get a notice from another program, such as Adobe, that it has an update available. Should you install those as well? I’d say yes, since virus writers look for holes in most of the popular programs that people will have on their computers and will attack those programs as well.

I know it’s a hassle to do these updates, but do them since it’s more of a hassle cleaning an infected computer.

NOTE: One other important matter; create a system restore point before doing any updates. That way, if an update messes up the computer, you’ll be able to restore it to the point just before you did the updates. For instructions on creating a restore point in Vista, click here, For XP, click here. You can download a great document from Microsoft for securing your Vista computer here.

Fix a Noisy Laptop

The other day, I was sitting with a friend who had her laptop on. I noticed that the fan was going non-stop and it was making quite a bit of noise.

Knowing that desktops and laptops both suck up dust and dirt, I knew that that was most likely causing the problem, making it to run loud and hot. I also knew that if it continued that way, it was only a matter of time before the machine would start overheating and locking up.

Fortunately, this is very easy to fix. What is needed is a small screwdriver and a can of compressed air, which you can pick up at Radio Shack or electronics store.

What I did was to turn off the laptop, unplug the power cord, turn it over, and remove the battery. On some laptops,  there may be an access panel on the bottom close to an air vent on the side or back of the laptop. Unscrew the panel and remove it. You should see the fan right underneath.

Now it’s time to blow out the dust.  Hit the fan in short bursts from lots of different angles, making sure to blow most frequently in the direction of the air vent. If there isn’t a panel, spray through the air vents.

After blowing a fairly substantial amount of dust out of the laptop, I replaced the panel and battery and powered up the system.  If your laptop is more than a year or two old, it’s probably overdue for a similar cleaning.

Report: Spam now 90 percent of all e-mail | Security – CNET News

Spam now accounts for 90.4 percent of all e-mail, according to a report released Monday from security vendor Symantec. This means that 1 out of every 1.1 e-mails is junk. The report also notes that spam shot up 5.1 percent just from April to May.

Symantec’s May 2009 MessageLabs Intelligence report reveals other disturbing trends, as well. Rather than just hijack disreputable Web sites, cybercriminals now favor older and well-established domains to host their malware. The report says 84.6 percent of all domains blocked for malicious content are more than a year old. One type of domain now especially vulnerable to threats is social networking, since most of the sites’ content is created by users.

“Spammers using better-known and thus more widely trusted Web sites to host malware is reminiscent of the spammers who rely on well-known Web mail and social networking environments to host spam content,” said Paul Wood, Symantec’s MessageLabs Intelligence senior analyst. “The trustworthy older domains can be compromised through SQL injection attacks while newer sites are more likely to be flagged as suspicious–a temporary site set up with the sole purpose of distributing spam and malware–and thus faster to get shut down.”

Where you live also determines when you’re spammed, says the report. For people in the U.S., spam hits its peak between 9 a.m. and 10 a.m. and then drops overnight. Europeans get a solid stream of spam throughout the day, while users in Asia-Pacific countries find most spam waiting for them in the morning. One reason for this trend, says the report, is that most spammers are at their busiest during U.S. working hours.

The popular CAPTCHA program, which asks the user to type in a series of random characters, is no longer proving as effective as once hoped. Many Web sites have relied on CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) to ensure that accounts are created by actual human beings.

But criminals have now succeeded in generating profiles with random names, apparently by using automated CAPTCHA breakers. The report notes that some major Web sites are now exploring other ways to block automated accounts, such as using photographic images that a user must analyze.

Spam levels had dropped for a short while last year after the closure of several malware-hosting Internet providers. But spammers have since bounced back from those losses by rebuilding their networks.

Symantec’s MessageLabs Intelligence gathers research on spam and other malware from global data centers that track e-mails and Web pages. Symantec releases a new intelligence report each month.

via Report: Spam now 90 percent of all e-mail | Security – CNET News.

HP Recalls Notebook Computer Batteries Due to Fire Hazard

HP Recalls Notebook Computer Batteries Due to Fire Hazard

WASHINGTON, D.C. – The U.S. Consumer Product Safety Commission, in cooperation with the firm named below, today announced a voluntary recall of the following consumer product. Consumers should stop using recalled products immediately unless otherwise instructed.

Name of Product: Lithium-Ion batteries used in Hewlett-Packard and Compaq notebook computers

Units: About 70,000

Importer: Hewlett-Packard Co., of Palo Alto, Calif.

Hazard: The recalled lithium-ion batteries can overheat, posing a fire and burn hazard to consumers.

Incidents/Injuries: The firm and CPSC are aware of two reports of batteries that overheated and ruptured, resulting in flames/fire that caused minor property damage. No injuries have been reported.

Description: The recalled lithium-ion rechargeable batteries are used with various HP and Compaq notebook computers.  See the list of models that are affected here

Sold at: Computer and electronics stores nationwide, hp.com and hpshopping.com from August 2007 through March 2008 for between $500 and $3000. The battery packs were also sold separately for between $100 and $160.

Manufactured in: China

Remedy: Consumers should immediately remove the recalled battery from their notebook computer and contact HP to determine if their battery is included in the recall and to request a free replacement battery. After removing the recalled battery from their notebook computer, consumers may use the AC adapter to power the computer until a replacement battery arrives. Consumers should only use batteries obtained from HP or an authorized reseller.

via HP Recalls Notebook Computer Batteries Due to Fire Hazard.

Overheating Prompts Acer Desktop Recall

Acer America reports to CPSC that burn hazard and overheating prompt about 215 units of Acer Predator Desktop computer recall.

Acer desktop safety recall was voluntarily conducted by the Acer America in cooperation with the CPSC. Consumers should stop using the recalled desktop immediately unless otherwise instructed.

The recall includes about 215 units of Acer Predator Desktop Computers. Acer America Corp., of San Jose, Califonia is the importer of the recalled desktop that were manufactured in and shipped from China.

The insulation on Acer Predator desktop’s internal wiring can become bent or stripped, causing the wires to overheat while the product is in use. This poses a burn hazard to consumers.

Acer has received two reports of computers short circuiting, resulting in melted internal components and external casing. Neither incident occurred in the U.S. No injuries have been reported.

This recall involves Acer Predator desktop computers. The high-end gaming machines have model numbers ASG7200 and ASG7700. Model numbers are printed on the bottom right corner of the panel on the right side of the system.

The recalled Acer Predator desktop is sold by computer and electronic stores nationwide from May 2008 through December 2008 for between $2,000 and $6,000.

Consumers should immediately stop using these recalled computers and contact Acer to schedule a free repair.

Consumer Contact: For additional information, contact Acer toll-free at (866) 695-2237 anytime, or visit the firm’s Web site at http://www.acer.com

Based on the information provided from CPSC.gov. The alert number is 09-731.

via Overheating Prompts Acer Desktop Recall.

Filtering Incoming EMails

Have you ever waited for an email from someone and it got lost in all of the other email in your inbox, or worse yet, while cleaning out your inbox, you accidentally deleted an email that you had wanted to save?

Of course, you can create folders in your email program and drag the emails you want to save to the folders to keep them, but what if you could setup your email program  so that when mail comes in from certain individuals, or mail comes in with a certain subject, it automatically gets filtered to an email folder and stays out of your inbox. I have a filter for some mail from marketers that I automatically send to my deleted items folder so I never have to look at it. Others, from family members, that automatically go to a “Family” folder. Some friends have their own folders where their email gets delivered to. Some folders receive newsletters that I’ve signed up for.

Every popular email program allows filtering of some sort. You can setup filters for almost anything you receive. Not only does it keep your inbox clean, it sorts and separates your email so it’s easier to find.

I’ve included a link to a pdf file that lists the email programs Hotmail, Yahoo, Google, Outlook Express and Outlook, and described how to set up the filters. You can find it here. If you are using an email program that is not listed, please let me know and I’ll find out for you how to do it.