Program or Lesson 9:00 - 10:00 AM
One on One Help 10:00-?
In the Library
SPECIAL INTEREST GROUPS:
If you would like to meet in a small group to discuss special computer related subjects or form a Special Interest Group lets discuss it.
Our bulletin is also available on line by visiting tecc.apcug.org and clicking on bulletin.
|Our weekly program or
lesson is intended
to be of interest to all computer users.
Following the program an allotment of time will
be available for one on one help to those
who want a better understanding of something done during the presentation.
Upcoming EventsWednesday NOVEMBER 16, 2016 Meeting in the Library
8:45 AM Set up your computer
9:00 AM Season start-up meeting. Discussions of what you want out of the club (very important that you take part in the discussion).
Hello Fellow Members,
I do hope you all had a great summer and that this email finds you all happy, healthy and looking forward to another warm winter in our little part of southern Texas.
Seeing as I didn't receive a termination notice last spring I guess its time to get our meetings started for the season.
"A club is an association of two or more people united by a common interest or goal."
With this in mind, remember I am a co-coordinator and as such expect input (both pro and con) and help (such as setup and tear down) from the other members.
I propose we start our meetings Wed. Nov. 16/2016 at 9:00am in the library (same as last year). This first meeting will be to determine the starting direction and format for the season. I propose alternating between a specific subject one week and trouble shooting / problem solving the next week.
Now for the input part. Please, please, please let me have your ideas and suggestions. Think about what you hope to get from your club and tell me. I will be asking. Feel welcome to email your thoughts, comments and suggestions if you prefer (email@example.com). Remember last year when someone asked a question they thought was "dumb" there were always others with the same question but didn't want to ask. SO ASK!!!
Hope to see at the meetings.
SHARINGBy Harold Buechly, Trails End Computer Club, Weslaco Texas, http://tecc.apcug.org/
Because we can store recipies on a computer, should we have a cooking class during a computer club meeting? I don't think so but we could use a demonstration on how to create a personal or family cook book. After such a demonstration, each attendee will have learned a new way of creating documents that interest ones self.
When we were kids, we shared our knowledge and experiences with other kids.
What happened over the past 50 years that we don't share our knowledge and experiences with others as freely as we did in our youth! It seems to me that ones audience is often anxious to criticize our statements.
I feel that TECC (Trails End Computer Club) needs to broaden its' scope to "All Things Technical" including smart phones, smart TV's, the web of things and all the new technology on the near horizon. There is so much now just opening up to consumers with all the APPS available for tablets and smart phones.
I have mentioned many times Special Interest Groups where the club promotes members to get together with similar interests to share their interests where there is only a few members with that interest.
There are also some computer clubs that are more social than educational.
I am asking all members to share their thoughts, knowledge and experiences with Bill and possibly the membership.
What Bill has done for the club is remarkable. It takes quite a bit of time each week to produce a program for the next meeting. Show him your appreciation.
Something I need to know very soon.
Shall we continue our membership in the APCUG?
The Association of Personal Computer User Group membership consists of computer clubs and offers many services to keep a computer club active. The clubs pay an annual membership fee of $50.00. We as TECC use several services they provide including articles written by and for other computer clubs and shared with all members of APCUG. Web site hosting where our web site is made available to the WWW. Virtual Technology Conferences, Free on line lessons on many subjects. If this service is beneficial to TECC, we must request the membership fees of $50.00 from the Trails End B of D very soon. To continue the web site and this bulletin there must be interest in continuing it by its members.
Please indicate whether you would like it continued or discontinu in a e-mail to firstname.lastname@example.org .
By Dick Maybach, Member, Brookdale Computer Users’ Group, NJ, www.bcug.com n2nd (at) att.net
(1) Their attack method (how they access your PC, your data, or you),
(2) Their behavior (how they get established and perhaps spread), and
(3) Their payload (what they do).
To a great extent, these characteristics are independent, and we can look at each in turn. Much of the confusion about malware arises because authors don't make it clear whether what they are describing is an attack method, a behavior, or a payload.
First consider network attacks, which may not affect your computer at all. The first type, network monitoring is passive and is a digital version of a phone tap; everything you send and receive is recorded by a third party. This is easily done at a public hot spot, and requires only a laptop and widely-available software. It also can occur at ISPs and Internet relay points, either by the facility owner or by government agencies. A second type, the man in the middle attack, is active and is much more specific. Here, a computer is set up to mimic, for example, your Internet bank. If you can be fooled into logging into it, the attacker can capture your password and other account details before forwarding your traffic to the bank site you think you are using. This is more difficult to set up than simple network monitoring and is thus less common.
Let's now look at computer attack methods, which include
(1) Physical access,
(2) Social engineering,
(3) Trojan horses, and
(4) Unethical suppliers.
Someone with physical access to your PC can install malicious hardware or software. Although this is sometimes called the evil maid attack (presumably because it's done by a hotel's housekeeping staff), it more commonly occurs when someone uses your PC with your permission and inadvertently infects it during, for example, a careless Internet browse. You now have a compromised PC for such tasks as your Internet banking. Social engineering or phishing occurs when someone tries to convince you to disclose sensitive data or perform some action that compromises your computer. You might receive a phone call or an e-mail message claiming to be from your credit card company requesting your account information, or one from tech support offering to remove a virus they somehow have detected remotely. Many attacks occur as Trojan horses, where malevolent software hides inside something that appears useful, interesting, or at least harmless. Examples include e-mail (often appearing to be from somebody you know) with an attachment that installs software, Web pages that run programs on your PC, and macros embedded in office files. Finally, there are unethical suppliers that include software you neither need nor want with their products. Although the most common culprits are Websites, it can take the form of shovelware, useless and sometimes intrusive programs installed on PCs, and malicious software on supposedly blank media.
Once malware (which malicious software is often called) infects your PC, it can behave in four different ways:
(1) Reside there as a normal program file,
(2) Attempt to hide by changing its form or the operating system configuration,
(3) Spread through your computer by attaching a portion of itself to other files, or
(4) Send copies of itself to other computers, usually via the Internet.
(4) Key loggers,
(5) Botnets, and
By far the best time to defend your computer is in the attack phase, where healthy suspicion is your friend. Be careful reading e-mail, surfing the Internet, and using your laptop in public places. Note that some form of social engineering is a component of most attacks. After the attack, an anti-virus program may be able to recognize the malware's behavior and prevent it from delivering its payload. Here, you depend on the malware spreading relatively slowly, so that anti-virus vendors have had time to develop a defense before you encounter it, and fortunately this is most often the case. Once the payload has been delivered, the damage has been done, and you will have to stop using the computer until it can be cleaned, change your passwords, and work with your bank, credit card vendors, and others to repair the damage.
We usually think of malware defense only for PCs, but it also infects all computer-driven devices, such as smart phones and network routers. It's important that you include these in your safe computing plan.
Your ultimate defense against all malware is a backup made before your PC became infected. Wiping and restoring your hard disk will almost always restore your system, except in the rare cases where the malware resides in your PC's BIOS firmware, in which case you probably need expert help. Unfortunately, the Unified Extensible Firmware Interface (UEFI) adds a new vulnerability as it includes a writable boot partition on your hard disk. Since the code residing here executes before your operating system; any malware installed there becomes active before any anti-virus program. Re-installing the operating system will probably leave the infected partition unchanged. So far, this is only a theoretical threat. I mention it only to make the point that threats evolve continuously, which requires that you keep all your software, not just your anti-virus programs updated, and conscientiously practice an effective back up discipline.
To summarize, we can classify computer threats according to their attach method, their behavior, and their payload. Attack methods include physical access to a computer, social engineering, Trojan horse software, and unethical suppliers. Once established, malware can behave as normal software, a rootkit, a virus, a worm, or a combination of these. Typical payloads are ransomware, spyware, key-logger, botnet, and hijacking. Network attacks are special in that they occur outside your computer.
Your article; deadline for next bulletin is Friday
noon each week. Only what you write may be published. We cannot
without written permission. Simply
click here EDITOR AT TECC
and paste your write-up to submit it.
Share your computer experiences with other members. We need articles to publish in the TECC Bulletin each week.
YOUR MEMBERSHIP INFORMATION Change
unsubscribe to this bulletin, etc. Use link below.
UPDATE YOUR MEMBERSHIP