Wednesday, October 3, 2012

Recall notice

Check your GE Profile front load washing machine. Recall. Baskets can separate, break top panel.

http://t.co/pcCf4wCZ

http://t.co/CG0ADXsq

Posted via email from Don Peer

Friday, September 28, 2012

Adobe hacked

The eyebrow-raising hack effectively gave the attackers the ability to create malware masquerading as legitimate Adobe software and signals a raising of the stakes in the world of Advanced Persistent Threats (APTs).

http://www.zdnet.com/adobe-code-signing-infrastructure-hacked-by-sophisticated-threat-actors-7000004925/?s_cid=e539

Posted via email from Don Peer

Wednesday, September 19, 2012

How to delete offensive comments on your YouTube content

This isn't a Windows issue, per se, but it's something that may happen to you as you participate in the digital world via your Windows PC. YouTube provides a great way to share your videos with the world but sometimes the world can be a pretty obnoxious place. Most of the comments I've gotten on the videos I share there were friendly or at least neutral, but occasionally someone will post something that goes beyond disagreeable.

If someone decides to spew obscenities in the comments section of one of your posts, you probably don't want those comments to be there when your mom, kids or boss drop in to check out your movie. Dave Taylor shows you how to remove offensive YouTube comments in a recent installment of his blog.

The link I here:

http://www.thewindowsclub.com/enable-hidden-aero-lite-theme-windows-8-aero-lite-tweaker

Thanks to WinNews for this one!

winnews@message.gfi.com

Posted via email from Don Peer

Monday, September 17, 2012

"Father of the Blues"

18 years ago today, they put #Blues #Music great Robert Johnson on a stamp... but not without controversy! http://t.co/S1Qra2jo

Posted via email from Don Peer

Saturday, September 15, 2012

Guitar lessons!

A nice collection of YouTube video lessons which ProFuzz has mined mined. The wheat has definitely been separated from the chaff here!

http://www.profuzz.com/buzz-time/top-30-youtube-guitar-lessons-channels/

Posted via email from Don Peer

Thursday, September 13, 2012

Hubble Ultra Deep Field

Image001

It doesn't look like much, does it? Just a boring collection of dots and smudges like the ones you've seen in every science book you've ever picked up. But there's a reason why this one is special, and if you don't have a bandwidth cap with your Internet provider, it would help you understand the magnitude and importance if you got the original 110 MB file.

See, back in 2004, scientists decided to point Hubble at a patch of sky that was pure black. No stars. No galaxies. Just black. They left the lens open for a little over 11 days to capture as much light as possible, because the more light a telescope captures, the clearer the image is. What we got was that image above ... only 6,200 pixels wide and just as tall. In other words ...

All of that, extracted from a pinpoint patch of empty, black sky. Every dot in that photo is a galaxy. Ten thousand of them. Every one of them previously unknown to us.

Read more: 11 Deep Space Photos You Won't Believe Aren't Photoshopped | Cracked.com http://www.cracked.com/blog/11-deep-space-photos-you-wont-believe-arent-photoshopped_p2/#ixzz26NB5HTZK

Posted via email from Don Peer

Wednesday, August 15, 2012

WARNING: iTunes phishing emails

-----Original Message-----

From: iTunesStoreSupport@apple.com [mailto:iTunesStoreSupport@apple.com]

Sent: Wednesday, August 15, 2012 9:31 AM

To:

Subject: Re: EL : (en_US) Account Management; Follow-up: 222697715

Dear _,

Welcome to iTunes Store Customer Support. This is Manoj and I am happy to help you today.

I understand you're concerned about an email you received that looked like it might be an iTunes Store receipt. I am sure you are anxious at this time and I would be happy to share information with you.

_, a number of customers have recently reported they received a similar email. I've looked into this for you and found that neither the email nor its sender are affiliated with Apple. The email appears to be a phishing attempt, designed to trick users into visiting a website. Fortunately, the purchase indicated in the email is not a real charge. I've checked your account to be certain.

If you still have the email, please forward it to reportphishing@apple.com so that Apple can investigate further.

If the email contains links or attachments, please don't open them. Since this particular email targets Windows customers, we recommend that any customer using Windows who received this email use anti-virus and anti-malware software to help ensure that their computers are not affected.

For future reference, the following articles contain helpful information:

Identifying fraudulent "phishing" email

http://support.apple.com/kb/HT4933

Identifying legitimate emails from the iTunes Store

http://support.apple.com/kb/HT2075

_, I also recommend following the suggestions in this article, if you haven't already:

Apple ID: Tips for protecting the security of your account

http://support.apple.com/kb/ht4232

If you're not sure how to review your iTunes Store account's purchase history, just follow the steps in this article:

iTunes Store & Mac App Store: Seeing your purchase history and order numbers

http://support.apple.com/kb/HT2727

I hope you find this information helpful. If you have any further questions, please feel free to let me know.

I hope that the above provided information would be helpful for you. If you have any other questions for me, please reply back to this email.

Have a nice day!

Sincerely,

Manoj

iTunes Store Customer Support

http://www.apple.com/support/itunes/ww/

I work Sunday to Thursday, 07:00 AM to 04:00 PM CST.

Thank you for allowing me the opportunity to assist you.

First Name :

Last Name :

Email :

Apple ID (Optional) :

Lang_Country : en_US

Product : iTunes Store

Support Subject : Account Management

Sub Issue : iTunes Store account security GCRM Case ID : 340081039 See additional info below Please tell us more about the issue:  Email received Choose the iTunes Store or App Store for your country:  United States

Details:

I received the email below regarding a purchase that I don't know about and did not make.  Is it valid or bogus?:

From:iTunes <itunes@new.itunes.com>

 

 

 

                Order Number: M1V27518911

Receipt Date: 8/15/2012

Order Total: $699.99

Billed To: Credit card

Item Number    Description         Unit Price

1              Postcard (View\Download )

  Cancel order   Not your order?Report a Problem

$699.99

Subtotal:              $699.99

Tax:        $0.00

Order Total:        $699.99

               

Please retain for your records.

Please See Below For Terms And Conditions Pertaining To This Order.

Apple Inc.

You can find the iTunes Store Terms of Sale and Sales Policies by launching your iTunes application and clicking on Terms of Sale or Sales Policies

FBI ANTI-PIRACY WARNING

UNAUTHORIZED COPYING IS PUNISHABLE UNDER FEDERAL LAW.

Answers to frequently asked questions regarding the iTunes Store can be found at http://www.apple.com/support/itunes/store/

Apple ID Summary •  Detailed invoice

Apple respects your privacy.

Copyright © 2011 Apple Inc. All rights reserved

Posted via email from Don Peer

About time!

Friday, August 3, 2012

Government at work

Oh, great!

WASHINGTON — The Internal Revenue Service may have delivered more than $5 billion in refund checks to identity thieves who filed fraudulent tax returns for 2011, Treasury Department investigators said Thursday.

They estimate another $21 billion could make its way to ID thieves’ pockets over the next five years. The IRS is detecting far fewer fraudulent tax re­fund claims than actually occur, according to a gov­ernment audit that warned the widespread problem could undermine public trust in the U.S. tax system. Although the IRS detected about 940,000 fraudu­lent returns for last year claiming $6.5 billion in re­funds, there were potentially another 1.5 million un­detected cases of thieves seeking refunds after as­suming the identity of a dead person, child or some­one else who normally wouldn’t file a tax return.

In one example, investigators found a single ad­dress in Lansing, Mich., that was used to file 2,137 separate tax returns. The IRS issued more than $3.3 million in refunds to that address. Three ad­dresses in Florida, the epicenter of the identity theft crisis, filed more than 500 returns totaling more than $1 million in refunds for each address.

In another troubling scenario, hundreds of re­funds were deposited into the same bank account — a red flag for investigators searching for ID thieves who may be filing for refunds for multiple people. In one instance, the IRS deposited 590 refunds totaling more than $900,000 into one account.

“We found multiple reasons for the IRS’s inability to detect billions of dollars in fraud,” said J. Russell George,the Treasury Department’sinspector gener­al for tax administration. “At a time when every dol­lar counts, these results are extremely troubling.”

Topping the list of concerns is the IRS’s lack of timely access to third-party information it needs to verify returns and root out fraud.

Many Americans are struggling to pay their bills and the IRS takes pride in processing returns and is­suing refunds promptly. But taxpayers can start fil­ing their returns in mid-January, while employers and financial institutions don’t have to submit with­holding and income documents for taxpayers to the IRS until the end of March. That means the IRS often issues refunds long before it can confirm the verac­ity of what’s listed on taxpayer returns.

Thieves are also exploiting vulnerabilities in the way the IRS delivers refunds, investigators found. Of the 1.5 million undetected cases of potential fraud, 1.2 million used direct deposits, including pre­loaded debit cards. Thieves often prefer those meth­ods to a paper check, which require a physical ad­dress to receive the check and photo ID matching the taxpayer’s name to cash it.

Posted via email from Don Peer

Wednesday, July 11, 2012

Oh, great! Just what we need... :(

A new cross-platform Trojan downloader has been discovered. It detects if you're running Windows, Mac OS X, or Linux, and then downloads the corresponding malware for your platform.

http://www.zdnet.com/cross-platform-trojan-checks-your-os-attacks-windows-mac-linux-7000000656/

Posted via email from Don Peer

Thursday, July 5, 2012

Your internet connection may go down Monday

http://www.theglobeandmail.com/technology/tech-news/malware-could-disconnect-your-computer-from-internet-monday/article4391412/

To check whether a computer is infected, users can visit this website ( or click the link below) run by the group brought in by the FBI.

The site includes links to respected commercial sites that will run a quick check on the computer, and it also lays out detailed instructions if users want to actually check the computer themselves.

The testing site: http://www.dcwg.org/

Posted via email from Don Peer

Friday, June 22, 2012

Job opening

ComputerLand Reno has an opening for an Administrative Assistant

  If interested, please call (775) 689-8320

Posted via email from Don Peer

Monday, May 21, 2012

Facebook rules: Everyone can vote on new privacy policy

Facebook’s rules state if there are 7,000 comments on a new privacy policy, the company has to take it to a worldwide vote. Activists made sure that threshold was broken. Are you ready to vote?

Posted via email from Don Peer

Friday, May 18, 2012

Russia’s most effective cybercriminals

Russia’s most effective cybercriminals
Author: Stu Sjouwerman
Publish Date: May 16 2012
Rod Rasmussen over at SecurityWeek has a really interesting article about a Russian cyber gang driving a massive wave of fraud: “Tucked away in a small town outside Moscow, Russia one of the world’s most prolific and effective cybercriminals works away on the next version of malicious software that will enable the theft of millions of dollars from unsuspecting victims around the world.
Going by the online moniker of “Paunch,” he is continuously updating his browser exploit software, called “Black Hole” and it is wreaking havoc daily amongst many of the world’s largest brands and government organizations. Full Article at Security Week: http://www.securityweek.com/black-hole-exploit-business-savvy-cyber-gang-driving-massive-wave-fraud

Posted via email from Don Peer

Thursday, May 3, 2012

evolution of cross-platform malware

Malware isn’t just for Windows anymore. As the number of Macs rise, the economic incentive for criminals to build cross-platform attacks rises. And so do the stakes.

Posted via email from Don Peer

Friday, April 6, 2012

New tunes!

If you’re subscribed to my Blues play list, I’ve just added songs by these greats:

Arthur "Big Boy" Crudup
B.B. King
Bessie Smith
Big Joe Turner
Bobby "Blue" Bland
Charley Patton
Elmore James
Freddy King
Howlin' Wolf
Jimmy Reed
John Lee Hooker
Leroy Carr
Little Junior Parker
Little Walter
Lowell Fulson
Memphis Slim
Find this playlist here: Blues essentials

Posted via email from Don Peer

Thursday, April 5, 2012

Over 600,000 Macs infected with Flashback Trojan

Over 600,000 Macs infected with Flashback Trojan
The Flashback Trojan botnet reportedly controls over 600,000 Macs. Thankfully, Apple yesterday released a patch for Java, which the Trojan exploits, so make sure you install it.

Posted via email from Don Peer

Tuesday, April 3, 2012

Essential Blues music

Check out my Spotify play list of the best Blues on the planet. I include classic songs and original artists as well as the top tunes from the masters of the Blues. I guarantee you’ll be satisfied!

Posted via email from Don Peer

Friday, March 30, 2012

Credit card information leaked

The personal data of thousands of customers — from all major credit card brands — has been leaked from a third-party processing company.
The massive leak was first reported by the security news blog Krebs on Security
, following reports that MasterCard and Visa were warning banks of a possible breach.
According to a follow-up story from The Wall Street Journal, the breach came from the Atlanta-based payment processing firm Global Payments, not from a credit card company. Global Payments works with debit cards, credit cards and gift cards.
The Wall Street Journal’s report suggests the possible window for the breach was between Jan. 21 and Feb. 25.
So far, there are no indications that any customers have experienced fraudulent transactions on their accounts.
MasterCard said it was investigating the breach, and that its core network was not hacked.
“MasterCard is currently investigating a potential account data compromise event of a U.S.-based entity,” MasterCard said in a statement. “As a result, we have alerted payment card issuers regarding certain MasterCard accounts that are potentially at risk. It is important to note that MasterCard’s own systems have not been compromised in any manner.”
MasterCard added that it has notified law enforcement of the breach and an “ongoing forensic review” has been launched.
Visa also acknowledged a “data compromise” of an outside company, but said there was no breach of Visa’s own network.
“Visa Inc. is aware of a potential data compromise incident at a third party entity affecting card account information from all major card brands,” Visa said in a statement. “There has been no breach of Visa systems, including its core processing network VisaNet. Visa has provided payment card issuers with the affected account numbers so they can take steps to protect consumers through independent fraud monitoring and, if needed, reissuing cards.”
Neither Visa nor MasterCard issue their own credit cards. Instead, they process transactions made on cards issued by banks and other financial institutions.

Posted via email from Don Peer

Tuesday, March 27, 2012

Malicious Chrome extensions hijack Facebook accounts

Malicious Chrome extensions hijack Facebook accounts
Cybercriminals are pushing malicious Google Chrome extensions that hijack Facebook accounts. To make matters worse, the extensions are being hosted on Google's official Chrome Web Store.
 | SHARE ON FACEBOOK

Posted via email from Don Peer

Thursday, February 16, 2012

Travelling out of the country?

0-day email attacks

A rare universal attack campaign aimed at taking over Webmail accounts via Flash:

A dangerous zero-day Flash attack revealed yesterday by Adobe patched along with other flaws in the application is the dreaded and relatively rare universal cross-site scripting threat. The vulnerability was spotted being exploited in the wild in targeted, email-based attacks.

"Universal XSSes are rare enough, but a zero-day floating around targeted attacks: wow," says Jeremiah Grossman, CTO for WhiteHat Security.

Ryan Barnett, senior security researcher for Trustwave, says it sounds a like a cyberespionage-type attack trying to remain under the radar.

Adobe's security update affects vulnerabilities in Adobe Flash Player 11.1.102.55 and earlier versions for Windows, Macintosh, Linux and Solaris; Adobe Flash Player 11.1.112.61 and earlier versions for Android 4.x; and Adobe Flash Player 11.1.111.5 and earlier versions for Android 3.x and 2.x. If exploited, the vulnerabilities could allow an attacker to crash and take over the victim's machine.

Posted via email from Don Peer

Tuesday, February 14, 2012

Sunday, February 12, 2012

Gathering the best info

I've been reading Music Radar for several weeks now and find it totally chock-full of great information for musicians. Everything from recording your music to improving your technique. The latest one I read is my favorite so far - "50 steps to better electric guitar tone". Even though I'm not a guitar player, per se, this article has so many great tips in it that I've copied down every one of them and intend to pass them out to musicians that I play with. After all, if they sound better the whole group will sound better!

http://www.musicradar.com/news/guitars/50-steps-to-better-electric-guitar-tone-528489#!1

Tuesday, January 10, 2012

For those shortened links

I didn’t know how badly I needed this!

5 URL Expanders to Help You Avoid Spammy Links - http://t.co/qDjfnoZj

Posted via email from Don Peer

Monday, January 2, 2012

Juke'n Jam Band for the win!

New Year's Eve party

I was asked to join a group of musicians for a New Year's Eve party - with 3 1/2 weeks to get ready! Well, here's a snippet of our successful gig!


New Year's Eve party