My IT guy is pure genies when it comes to computers...wish I knew a 1/1000 of what he does. Since my computer knowledge on a scale of 1-10, I'm about a 2. Needles to say Richard also has a lot of patience, he would have to in order to help me while I'm leaning over his shoulder asking questions, while hes trying to fix my last screw up. But he is always kind, and soft spoken and tells me it's OK to go into the administrative, settings of my computer, that's how I will learn. He know he is close and can get to me quickly if I mess up too much. Richard also takes care of my Network and the 10 computers attached to if for my co. Liz Carter & Team Realty in Katy TX.
Bill told me about this Conficker worm and I thought it was an April Fools jock...no, no, no...it's the real deal. I wanted to share some things I got from my IT Geek to explain, and let you know some things you can do to protect yourself, your business. Since now days when the computer is down everything else is down, and no work seems to get done. I stated selling home in Houston, Katy, TX in 1976, we were upset if our carbon paper was missing from a contact...no faxes, no cell phones, and certainly no Computer/ Internet. I need to write a blog on how I sold real estate in Houston, and Katy Texas in prehistoric days
What does the Conficker worm do?
The Conficker worm has created secure infrastructure for cybercrime. The worm allows its creators to remotely install software on infected machines. What will that software do? We don’t know. Most likely the worm will be used to create a botnet that will be rented out to criminals who want to send SPAM, steal IDs and direct users to online scams and phishing sites.
The Conficker worm mostly spreads across networks. If it finds a vulnerable computer, it turns off the automatic backup service, deletes previous restore points, disables many security services, blocks access to a number of security web sites and opens infected machines to receive additional programs from the malware’s creator. The worm then tries to spread itself to other computers on the same network.
How does the worm infect a computer?
The Downadup worm tries to take advantage of a problem with Windows (a vulnerability) called MS08-067 to quietly install itself. Users who automatically receive updates from Microsoft are already protected from this. The worm also tries to spread by copying itself into shared folders on networks and by infecting USB devices such as memory sticks.
Who is at risk?
Users whose computers are not configured to receive patches and updates from Microsoft and who are not running an up to date antivirus product are most at risk. Users who do not have a genuine version of Windows from Microsoft are most at risk since pirated system usually cannot get Microsoft updates and patches.
What to do if you are infected
If you are reading this page, your computer is probably not infected with Conficker as the worm blocks access to most security web sites.
If you have a computer that is infected, you will need to use an uninfected computer to download a specialized Conficker removal tool from. The tool is available here.
"Symantec is making the following software tool available on a complimentary basis to assist you."
Advice to Stay Safe from the Downadup Worm: Let's let good win over the evil computer hacker!
- Run a good security suite (we are partial to Norton Internet Security 2009 and Norton 360 Version 3.0).
- Keep your computer updated with the latest patches. If you don’t know how to do this, have someone help you set your system to update itself.
- Don’t use “free” security scans that pop up on many web sites. All too often these are fake, using scare tactics to try to get you to purchase their “full” service. In many cases these are actually infecting you while they run. There is reason to believe that the creators of the Conficker worm are associated with some of these fake security products.
- Turn off the “autorun” feature that will automatically run programs found on memory sticks and other USB devices.
- Be smart with your passwords. This includes
- Change your passwords periodically
- Use complex passwords – no simple names or words, use special characters and numbers
- Using a separate, longer password for each site that has sensitive personal information or access to your bank accounts or credit cards.
Now that my Hero Richard has come to my rescue again...tomorrow at Liz Carter & Team Realty in Katy TX will be a "normal" computer running, office full of folks who want to buy or sell Real Estate! Or it could be an April Fools joke after all! Either way I'm ready and hope this helps you too.
Now I just have to think of a great April Fools day prank to play on Brad, oh yes that would be fun! Too bad I'm not closer or you would be in trouble Mr. Wonderful Brad. L
Looking forward to hearing about the great April Fool's jokes.
Comments(8)