Pages

Thursday, April 14, 2011

Protecting Your System from Nasty Parasites!!


A question I get asked frequently when I’m walking through the halls at work is “Do you work here” We always see you walking around?” no I keed I keed!! But, occasionally I do get asked that question. Many people always ask me how do I keep my computer virus free or is there an antivirus that I recommend that is reliable and not to overwhelming for them to use. As usual I give them advice on some of the programs that I use and have been using for years. Today I am going to share with you some info on the programs that I recommend and that in turn will help you in protecting your PC from nasty viruses and malware. Oh and did I mention that these programs are FREEEEEE!!!!!!


The Antivirus

Let’s go ahead and start off with The Antivirus. You might ask yourself “why do I need an Antivirus program “? Well first off out there in the interwebz there are a lot of pesky little creatures that like to get into your computer when they see it as vulnerable and like to corrupt your files, delete documents as well as use your computer to spread its self to other computers. With an antivirus you can protect yourself from many of these dangers.  Now you may ask, “But Fern there are so many antiviruses out there, which one is the best one for me?”  Yes I know, I also get told “well my computer came with McAfee or Norton pre-installed, should I just renew the subscription? “ In my opinion I always say No!, and that’s because in my personal experience I have found for those two antivirus in particular to bog down the machine. Also these two antivirus are very well known and are most of the time circumvented my malicious threats. In my opinion why pay for something that you can get for free.

For the past 6 years or so I have recommended Avast Free Antivirus. I have used this program for about 7 years now and have had great results with it and many of the people I have recommended it too have had great results from it as well. So, what makes Avast Antivirus better than the rest other than being free! Well for starters it doesn’t bog down your system like Norton or McAfee do. Avast Antivirus provides good all-around virus detection in a speedy, well-designed package. Avast runs in the background and protects you when you are online, surfing the internet, playing an online game, chatting with friends using any IM like Windows Messenger, Gtalk, Yahoo Messenger, etc.. One of the great things that I see with Avast Antivirus is that if you stumble onto a website that has malicious software embedded and it automatically tells you and blocks you from accessing the site. It also works very well when you are downloading files from the internet as your downloading the file, Avast is already scanning it to make its not infected. I luv the on demand scanning capability!!

If you want to try out Avast Antivirus for yourself click (here) for your free copy. There is a registration in order to get a product key for your software but it’s a free registration, this is just to keep track of how many licenses our out there. The product key that they issue out to you lasts for a year and then you just reregister again for another product key.


The Anti-Malware

When it comes to securing my PC, for me one single point of security is not enough, I like to secure my PC with an Anti-Malware program as well. You may ask well I already have an Antivirus installed why would I need an Anti-Malware program? Well malware is a little different than a virus. A virus always works behind the scenes and users would not know whether they have been infected or not; unless they have a  working and updated antivirus software installed in their computer. Although other malwares like worms also operate this way, most Trojans, spyware, and many others are executed by unsuspecting users who expect them to be something else. Viruses also need host files to infect. Having a host file means it is a bit harder to detect as there are no distinct files to compare to. A virus also relies on the host file to be run in order to execute its code. A good way to avoid viruses is to refrain from launching files whose origins you are not sure of. Other malwares do not rely on a host file and employ other means to get executed. Some use trickery by masquerading as a photo or video that would seem interesting to users. In most cases an Antivirus is not able to pick up all forms of malware and that’s when an Antimalware program is needed.

An Anti-malware program that I have been using for years is Malwarebytes Anti-malware. Malwarebytes has been a great program for me. I have been using the free version and have had no issues with it. Malwarebytes does have a pro version for sale, the only difference between the free version and the pro version is that the pro version gives you real time scanning as oppose to the free version where you have to manually run the program in order to scan your pc. What are some of the features of Malwarebytes that will help you combat against malware? Well, Malwarebytes is able to provide light speed quick scans what this means is that it scans the known areas where malware is known to hide and scans those areas first. You are also able to perform full scans on all drives on your system. This process takes a little longer due to the fact that it searches your entire drive for any malicious files. With Malwarebytes the definition database for known malware is updated on a daily basis, unlike other Anti-malware programs that update on a weekly basis or a monthly basis. This gives you a greater fighting chance when it comes to new malware.

Malwarebytes Anti-malware is a nifty little tool that work very well in my own opinion. If you want to give it a try click on the link (here) and download a copy for yourself and see what malicious programs you have running in your pc that your previous software has not been able to detect.

The Cleaner

When we are surfing the interwebz many many many temporary files get stored onto our computer, cookie files are created and keeps track of what websites you visited. This helps build what is a cache and when you visit that website again it loads quicker because files have been previously stored on your computer. Well as time goes on more and more files keep getting stored onto your computer, and as time goes on this can bog down your system and start to lag. But not just surfing the internet can sotre temporary files onto your computer, programs that you have recently installed or uninstalled store file onto your computer as well. When a program is installed onto your computer certain key files are saved on your computer in order to help it install quicker as well as when you uninstall a program, many of the files that are part of the program stay behind on your system and this in turn takes up space on your hard drive.

So you ask, how do I delete these files or what files do I need to look for to delete them? Well my friend never fear, there is a neat little program that can do it all for you. For the past couple of years I have recommended CCleaner to many people to install and run on their computers and I can’t tell you how many times people have told me thank you for recommending this program to them and the improvements that it has made to their computers. CCleaner supports the cleaning of temporary or potentially unwanted files left by certain programs, including Firefox, Opera, Internet Explorer, Safari, Google Chrome, Windows Media Player, Microsoft Office, Nero, Adobe Acrobat,  WinZip, and other applications along with browsing history, cookies, Recycle bin, memory dumps, file fragments, log files, system caches, application data, autocomplete form history, and various other data. The program also includes a registry cleaner to locate and correct problems in the Windows registry, such as missing references to shared DLLs, unused registration entries for file extensions, and missing references application paths. The program is very simple to run and helps improve your systems speed.

CCleaner is a great tool to have as part of your arsenal of defense. If you want to give it a try click on the link (here) and download a free copy for yourself. Once you have installed it and ran it on your system you will see a great difference in speed as it will delete any files that have been left behind by other programs.

As you can see I have giving you some great recommendations on some great tools that you can use to secure your system and as well keep it running at optimal speeds. These tools have served me great service for the past several years and have kept my pc from getting viruses and keeping my pc nice and fast by deleting temporary files that were bogging down my system. So go ahead and give them a try and see what you think of them. Leave your comments below of what you think of the programs that I mentioned above or if you have any suggestions of programs that you have used leave them in the comments below and I will check them out for myself and possible do a review on them. 

Saturday, April 9, 2011

How to Tunnel your Traffic with FreeSSHD and Plink and Encrypt your Data!!

Have you ever wanted to go to Facebook, Myspace or play that game that your addicted to only to find out that it is being blocked by your company or school. What if I told you that you could evade ‘em easily with your own private web proxy and as well be able to securely tunnel your traffic through an SSH session?



How proxies work

In a nutshell, what you’re doing with a proxy is setting up a middle-person between you and the internet. Using the proxy, your browser hands off web page requests to the proxy server, which handles the request and fetches the page for you from the internet. The web site actually thinks the request is coming from the proxy server, not your computer, which is a good way to obscure your originating IP address.
Additionally, the connection between your computer and the proxy happens over SSH, an encrypted protocol. This prevents wifi sniffers from seeing what you’re doing online.


What you’ll need
An SSH server to act as your proxy.
Simple enough really! If you’re using windows I highly recommend freeSSHD (available here). If you’re on a mac check out this page for instructions on how to enable remote logon. Linux users, you should know how to do this.
An SSH client on the computer you’re using.
Mac and linux machines have SSH built right in at the command line. Windows users you can download plink (available here).
How to set up freeSSHd
  1. Double click the freeSSHd installer that you have downloaded to get started.
  2. Click Next -> Click Next (or you can change the default installation directory) -> Click Next (Full Installation) -> Click Next (Start Menu Folder) -> Click Next (Create a desktop icon) -> Click Install (ready to install) -> Wait until installation has been finished -> Click Close
  3. Do you want to run freeSSHd as a system service?” I choose “No” so I can start freeSSHd manually. This is a good security practice because you don’t want to have running applications in the background if you are not using it. Only turn freeSSHd on when the need for remote connections arise!
  4. Click Finish to complete freeSSHd installation. (Duh simple enough even a caveman can do it)
  5. Double click the freeSSHd icon on the desktop to load your SSH server. You can see the freeSSHd icon on your system tray.
  6. Right click on the icon located on the taskbar lower right hand corner and click Settings.
  7. Make sure that the freeSSHd settings page (Server Settings tab) shows that your“SSH server is running”.
  8. Click on the Users tab. You need to create at least one user account that will act as your SSH remote user account.
  9. Click “Add” to create a new user. Fill in the user details, following the example shown below (with your own unique username and password, duh!). Click OK and make sure it appear on the Users tab list
  10. Using the same computer that you install freeSSHd previously, download Putty (available here). Putty is a desktop command line client that you can use to access SSH servers.
  11. Double click the Putty installer to run it. Fill in the details as shown in the diagram below. 127.0.0.1 means that you are testing the SSH access from a local connection.


Press “Yes” on the security alert screen. Insert your SSH username and password that you have created previously.
If you get a Windows command prompt, you have successfully access your SSH server! Congratulations! Woot, Woot!
Start your SSH tunnel
So you’ve got your ssh server setup at your house or workplace. Great! To connect to it we’re going to setup a local proxy server on your client that you’ll be browsing the internet from, which will then “tunnel” web traffic from your local machine to the remote server over SSH. 
Connecting using your Mac/Linux
The command to run on your linux / mac client in a terminal window is:
sssh -ND 9999 you@example.comsh
Connecting using Windows
For Windows it’s as simple as browsing to the directory you saved plink to and runningplink.exe
-N -D 9999 you@example.com

Of course, you’re going to replace the you with your username on your SSH server and example.com with your server domain name or IP address.

What that command does is accept requests from your local machine on port 9999 and hands that request off to your server at example.com for processing.
When you execute either of those commands, you’ll be prompted for your password. After you authenticate, nothing will happen. The -N tells ssh not to open an interactive prompt, so it will just hang there, waiting. That’s exactly what you want.
Set Firefox to use SOCKS proxy
Once your proxy’s up and running, configure Firefox to use it. From Firefox’s Tools menu, choose Options, and from the Advanced section choose the Network tab. Next to “Configure how Firefox connects to the Internet” hit the “Settings” button and enter the SOCKS information, which is the server name (localhost) and the port you used (in the example above, 9999.)
Save those settings and hit up a web page. When it loads, visit http://www.ipchicken.com to see if it’s using your remote ssh server to tunnel traffic. If you are, you may yell out Woot, Woot! In excitement
Also remember that you’ll need to open your firewall a bit by cracking open port 9999 on your local machine and port 22 on your server for SSH.

Let me know how things work out for you and if you have any questions on setting up in the comment section below.






USB Toolkit v.1 (Hiren’s Boot USB)

Have you ever been in a bind where your PC crashed and you need it to get in to get a file, or a virus got into a friends computer and it was so bad that you couldn’t get into it to run a virus scanner. (Tisk Tisk, shouldn’t be surfing that pron, lol) Well today my friend I’m going to show you how to build a bootable USB tool kit and be able to boot into any PC and be albe to extract files as well as to run a virus scanner, and various other tools from a miniature version of Windows XP. Our baseline for out toolkit will be Hiren’s Boot CD. Lets go ahead and get our hands dirty. (no not like that, god get your head out of the gutter!)
What You Need:
A USB flash dirve (2Gb should be enough)
A copy of USBFormat (available here)
A copy of grub4dos (available here)
A copy of AnytoISO to extract our ISO (available here)
and finally a copy of Hiren's Boot CD (available here)
Formating the USB Flash Drive
ok lets start off by preparing our flash drive and getting it ready to make it bootable.
  1. open up USBFormat.exe
  2. Make sure under divice your Flash Drive is selected
  3. For the filesystem select FAT32
  4. Go ahead and give it a volume name (I named mine "Intruder")
  5. click on start to go ahead and format the USB Flash Drive (Warning: This will erase will erase everything on your Flash Drive, please back up any important information that my have on it)
(Refrence to the Picture below for guidance)

Setting up Grub4Dos on your Flash Drive

Sweet, now that we have our Flash Drive formatted we can now go ahead and install Grub4Dos on our Flash Drive!


  1. Open up grub4dos.exe
  2. click on the radio button for disk, select your flash drive from the drop down menu
  3. once you have selected your flash drive, click on the refresh button located under the Part List section
  4. once refreshed select Whole Disk (MBR) under the part list drop down menu
  5. click on install and you are set!
(Reference to the picture below for guidance)



At this point grub4dos will go ahead and edit the grldr file and the menu.lst file located in the directory of grub 4dos. Once completed copy the "grldr" and "menu.lst" over to your flash drive.


Extracting Hirens ISO with AnytoISO

Now that we have configured grub4dos to be compatible with our flash drive and is set as a bootable device, we are now going to extract our toolkit on to the flash drive.


  1. Install AnytoISO on your system and follow the on screen instructions to install it
  2. once AnytoISO is installed, go ahead and open AnytoISO.exe
  3. click on "Open Image" and browse to the directory where you have saved Hirens boot CD
  4. select the Hiresn ISO and click open
  5. click on select folder and browse over to the root of the flash drive and click ok
  6. click on extract (at this point, the files on the ISO will be extracted to the flash drive)
  7. Exit out of the AnytoISO application



We are done!!!


Wow, we have finished our creation, you now have a bootable USB Flash Drive loaded with tools to do some serious work. Go ahead and test out your creation. Start up a computer and make sure your Bios is set up to boot from USB (Removable) Devices. (refer to your computers documentation on how to set this up) With this USB toolkit you will be able to change passwords, clone hard drives, boot into a miniature version of Windows XP. Their you will be able to extract files, run virus scans on a system and many, many other things, the tasks are limitless.

Enjoy your creation and let me know what you thing of it in the comments.

Screenshots provided by:


Tuesday, April 5, 2011

Hi Everyone!!

Hi everyone! My name is Fernando and I have serious some “Technolust” when it comes to technology, computers and things of that nature. I am a networker, been in the IT field for 6 years now and enjoy what it do. I have been writing tutorials on computers, tips and tricks, for the public for about 2 years now on a website called TXLANS. There I am part of an elite group of individuals who live and breathe technology. There you are able to find tutorials from graphic design to game reviews, as well as tutorials on networking and security.  Click on the link here and check out some of the articles I have written as well as other article from my buddies.


On this site I will be focusing on giving tips and tricks when it comes to computers. I always get asked that question “hey I got a virus on my computer how do I get it off?” My first response is “to be going to “those” websites” lol, but none the less I tell them go to this website download this software, then run against your machine and that should do the trick. Here I will be giving you some advice and tools you can download to protect yourself from viruses. I will also focus on networking as well as on network security and various tools that can be used to scan a network for threats. There will be some articles on hacking tools, and give you advice on how they are used and how you can protect yourself. Well enough jiber jabber, lets get down to what we came here for, some serious Technolust.