Visit My Sponsors

BrickHouse Security

20100915

How To Program Your Direct TV Remote

Contemporary remote controls have become quite complex. In the old days, it used to be that a remote control was a simple electronic device- one power button, a volume up and down button, channel selections and perhaps a mute control. Remote controls today have become more universal, programming the user̢۪s television, satellite receiver, VCR, DVD player, stereo and any other part of the user's home entertainment system.

The problem arises when the viewer is not able to understand the options on the remote control and it becomes useless. DirecTv's remote control can be simply understood if these directions are followed. DirecTV incorporates specific features and special options. A four-position slide switch for easy component selection , code library for popular video and stereo components, code search to help program control of older or discontinued components and memory protection to ensure that the user will not have to reprogram the remote when the batteries are replaced.1. The user chooses the Device

The first thing the user is required to do is choose which device is desired for programming. Most remotes have separate buttons that correspond to the various devices:

SAT - controls the satellite receiver

TV - controls the television set

VCR - controls the VCR

AUX - controls one of several additional units, such as a home stereo

The user presses the button of the device to program until the corresponding light on the remote control begins to flash.

2. The user finds the Code

Once the device desired for programming is chosen, the appropriate code for the particular unit is needed.

Codes for most manufacturers and brands can be found in the back of the remote control user manual. Satellite subscribers can also typically go online
to their provider's website and if all else fails, contact the manufacturer of your remote to get the necessary codes.

3. Program the Device

Using the keypad on the remote control, enter the number that's listed first for the device. When this is finished, enter the appropriate key to indicate completion of input. For some remotes, this might be the asterisk (*) while other remotes might use the pound key (#). The mode light on the remote control will flash again and, if the code was correct, the device can now be controlled with the remote control. The user should test the results by turning the power on and off. Does it work? If so, the device is now programmed.

There is no cause for alarm if the code doesn̢۪t work the first time.

Remotes come with several codes for the various device brands. If the first code doesn't work, start over using the next code and the next and the next until the right one is discovered and the device is programmed.

What if the device isn't listed at all? Look through the list for "general" codes. If those codes are not found, then try scanning for the device. The user manual should have specific advice for devices without a listed code.

Top Three Antivirus Software of 2010

Every year, new breeds of computer threats are created. This is why every year new versions of antivirus firewall software solutions are developed to counter any possible virus that may come up.

A simple scan and virus detection is usually not enough for most people anymore. We want to make sure that every time we use the computer or enter a website, it is safe to do so. Many antivirus firewall software applications today have a complete package and provide features that are not only limited to preventing viral infection to your computer. Out of the many antivirus applications out there in the market, here are three of the best there is for the year 2010.

Shield Deluxe-Antivirus Protection provides updates every hour and totally protects your computer from spyware and viruses. The program will scan all of your email and instant messages immediately without any delay. It monitors your computer traffic so it will detect any activity in your computer. You don't have to worry every time you enter a site or if your email contains a threat. This software will immediately hinder any unnecessary window pop-outs, unsafe websites, and suspicious email. Another good thing with this program is that it provides free-of-charge technical support in case you are having trouble with the program. It is compatible with Windows Vista and requires only minimal system resources. You can get this for about 20 dollars.
Bitdefender Antivirus 2010 is a user-friendly antivirus solution. It has a three-level interface: novice, intermediate, and expert. It has a superb real-time protection and does not need a large usage of system resources. It also has an antispyware protection, so your personal data are safe from being hacked. Just like the Shield Deluxe-Antivirus Protection, it has a technical support service running 24/7. The price of this antivirus is about 25 dollars.

Norton Antivirus has been improved with 3-15 minute updates. It has a two-wall firewall and protects the computer from rootkits, which the program can detect immediately. This blocks any virus-infected sites and any suspicious and unauthorized changes in your computerapplications. Even of your computer is in idle mode, Norton Antivirus 2010 will automatically scan and download updates. Another best thing about this is that it has personal information and logging in storage and security. It also provides a phone and chat technical support with no charge whatsoever. This is also helpful for those who have wireless network for it provides maps for your network. The price of this program is around 40 dollars.

It is good to say that the security programs of today have now become even better. They are more user-friendly and require minimal system requirements, which is also good for those who don't have the latest computers. Identity theft and hacking can now be avoided more efficiently due to the advanced technologies of new and improved antivirus firewall software.


Staying informed and is the best way keep safe in this technology era. Stay tuned and subscribe to this blog for information and help.

20100914

Stuxnet

Stuxnet is a new piece of malware that is spreading widely through the use of USB flash drives. It is starting to be quite a danger, especially in industrial plants, and many in the security business are getting very nervous. What follows is an FAQ about the Stuxnet malware.

How does Stuxnet spread?

Stuxnet spreads through USB devices. A recently discovered Microsoft Windows vulnerability has been found to allow a program to run just by browsing to a folder that contains a shortcut to it, or a ".lnk" file. Once the worm runs it scans to see if the computer is running software created by a company known as Siemens, which is very popular in certain industries. If this is the case, the worm is able to install itself on the victim computer. It will infect all future removable media that is connected to the computer and installs a rootkit, a very sophisticated type of software that deletes all record of the worm existing on the computer. After that the computer continues to steal as much data as possible from the computer and transmit it back to a remote location.

What does Stuxnet do?

Stuxnet is considered by many people to be the first-ever "control system" malware. What this means is that it has the capability of infecting control systems for large companies and factories that use software created by Siemens. Unfortunately, this software is very widely used, especially in large industrial manufacturing organizations, small and large utilities, and even defense systems. In one case it was found that this software could infect nuclear-powered aircraft carriers.

How widespread is Stuxnet and where is it most common?

At the moment Stuxnet is not that widespread. It is most common in India, Indonesia, Iran, Pakistan, Afghanistan, the United States, and Malaysia, in that order. However, it has the potential to spread very rapidly. It only affects computers running Siemens software, but computers without that software can still act as "carriers," infecting other removable media that is inserted into them. Other countries have seen infections, but mostly they have been localized and have not caused any damage so far.
 
How dangerous is Stuxnet?

This is always the big question with a large virus outbreak. Right now Stuxnet is not that dangerous. Unfortunately, it is targeted at "Control Systems." Siemens is most known for making software for sophisticated systems used in such areas as the military, large industrial plants, and utility plants. If any of these were to be infected the damage could be irreparable. The infection is clearly tailored to steal confidential information and possibly shut down "smart grids." Therefore, while it is not a danger to consumers, any large corporation or plant must be very careful to avoid this infection.

File Sharing Controversy

File sharing, the practice of distributing or providing access to digitally stored information, such as software, multi-media and documents. File sharing can be implemented through a variety of techniques, common methods include sharing removable media, purposely built distribution networks such as Apples 'iTunes' and the more popular method, peer-to-peer (P2P) networking. Peer-to-peer networks allow users to digitally distribute anything and everything, sounds simple, right?

Whilst in practice it is extremely straight forward and completely harmless, we can't hide from the fact that file sharing (aided by P2P networks) engineered a vast illegal network which is currently thriving. The increasing popularity of the mp3 music format in the late 1990's led to the release and growth of Napster. Napster is still highly regarded as the godfather of P2P file sharing, essentially paving the way for decentralized and semi-decentralised peer-to-peer file sharing networks such as Gnutella, Gnutella2, eDonkey2000 and the Kazaa network. Today, users are more familiar with the term "torrent downloads". Torrents are specialized files utilized in P2P network environments allowing users to download files at a faster rate. Whilst currently not considered illegal, torrents are extremely controversial largely due to the fact they are mainly used to distribute pirated data such as the latest films, music and computer games.

I can see what you're thinking, why not just close down the "networks"? To put it simply, it's impossible. To understand this claim, you have to understand how torrents actually work. Torrents use a toolkit called a "tracker", it's the trackers job to coordinate the P2P transfer of files among users, tracker applications typically run on websites. When initiating the download of a torrent, a user clicks on a link pointing to a torrent meta-data file. These meta-data files are not stored on the torrent trackers server, but are distributed among a number of torrent file servers. Each torrent file points to a tracker, which keeps a global registry of all the downloaders and seeds of the file in question. The tracker then responds to a download request with a list of peers who have (or a part of) the requested file, the user can then establish a direct connection and basically asks for chunks of the download.

To put it simply you are downloading from other users who possess the requested file, also known as peers. The "network" is essentially the entire world, how is one supposed to moderate what the planet is sharing? Putting an end to illegal file sharing and preventing piracy would take something exceptionally groundbreaking and somewhat drastic.

Todays news is littered with short films produced by the media designed to belittle illegal downloaders and "educate" joe public on the damage being caused by such actions. Bold claims are often outlined, "up to 800,000 jobs in the creative industries out of 1.8 million in total are threatened...", "billions has been lost due to piracy...", "record companies forced into liquidation...". More recently the media has been focusing on fines directed towards illegal downloaders, fines ranging anywhere from $1000 to $250,00000, all abit over the top isn't it? Well, according to the Recording Industry Association of America (RIAA) it's only the beginning.

In 2003 the RIAA began legal proceedings againts Jammie Thomas-Rasset for infringing the copyrights of two dozen major-label songs on the popular P2P network Kazaa. The punishment? A cringeworthy fine of $80,000, per song. For the lables themselves, that's roughly equivalent to selling 114,000 songs at Apple's iTunes Store. Thomas-Rasset's was the first trial in the campaign against individual file-sharers that the RIAA began in 2003 and ended late last year. As such, it was one of the few tests of the legal underpinnings of that campaign, including the argument that making tracks available to others online (by keeping them in a folder that was available for sharing) was a form of infringement. Is Jammie's excessive penalty enough to deter you from downloading pirated data?

So, legal action is been presented and taken againts illegal downloaders, but is it enough? Various procedures have been put into place to help combat piracy. Internet service providers (ISPs) for example have been forced to crack down on repeat offenders who insist on constantly downloading pirated data by implementing a "three strikes and your gone" type system. Not exactly $80,000 is it? Whilst we could spend a lifetime discussing possible solutions to preventing piracy, we can't hide from the fact that file sharing in it's most basic terms is here to stay for some time to come.

The economic turmoil throughout our world is financially damaging and hitting familys hard, the solution to this is to spend as little money as possible. Think of it this way, you have had a tough month, scrimped and scraped to pay the bills, you're working six days a week but for what? Survival? To top it off this years most anticipated game has just been released and you can't afford it, but wait, it's available for FREE online, you could be playing it within the hour! We've all been there, whether it's a game, a film, maybe some software.. it's convenient for us to sit on our backsides and wait for said download to reach 100%.

It's all very well ISPs threatening to cut their customers off from the world wide web and large record labels taking legal action, the world in it's entirety is to blame, filesharing is an extremely lucrative market and it's here to stay.

20100301

Scams, Spam and Facebook?

In this blog, I want to warn you of the dangers of spam and scams.

"Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately."

Spam fills your inbox with offers of cheap meds, cheap sex, cheap travel and all kinds of other stuff. I have to be honest. If I responded to every one of the spam emails I got, I'd be broke. I would have my identity stolen. I would probably have a stock pile of sugar pills and vacation after vacation in the ghettos of Mexico and other places.

What I really want to make you aware of is the scam aspect of spam. Emails with subject titles like "I've got a message for you" or "Is this you?" are just ways to get you to open the mail and read the ad that is inside. This is where the scam aspect of spamming comes in. They hook you with bleeding heart messages like "help Haiti" or "Help Chile." Once you have clicked on the link, your computer is infected with viruses and trojans. They use the information you use to "Donate" and keep your money. The best guideline for spam - dont open email if you don't know who it is from. The "from" part of your mailbox is like the peephole on your front door, if you don't know the person knocking...you simply do not let them in.

Here is where I get to talk a little about the new Facebook scams going on. The newest spam/scam is made to look like it comes from your friends. You get a nice little invite in your message folder from what looks like your friends. The message says "Click here to RSVP." Well, clicking this link takes you to another website that infects your computer. Again the best way to prevent this is to not click on "it." Nine times out of ten, a person will tell you about an event before it hits Facebook. If you don't know about it...don't click on it.


Below are a few guidelines to follow from http://www.usaaedfoundation.org/pdf/572.pdf



How can you have fun online while protecting yourself?

-Do not post information that will identify you, including:

● Your full name.

● Your home address or phone number.

● Your Social Security number.

● Passwords.

● Credit card or bank account numbers.

● Names of family members or friends.

● Your workplace or favorite hangout.

● Names of clubs or organizations to which you belong.

● Historical information that could identify your past residences.

● Do not use a nickname that can be used to identify you (for example, “CharlestonLawyer,” “CindyFromTulsa” or “KyWildcatMom”).

● Never share your account password.

-Protect Your Computer System

● Consider using encryption to protect your personal information.

● Shut down your computer when it is not in use — especially in public places, such as Internet cafes, coffeehouses or airports.

● Keep your antivirus and antispyware programs, other software and operating systems updated to protect against new attacks.

● Consider using a firewall on your system to protect against hackers accessing your system remotely.

● Think about how your e-mail message will be read by others. Do not say anything online that is cruel or may damage someone’s reputation. Doing so puts you at risk of being accused of slander or defamation, or may cause a dangerous escalation of hostilities.

● Do not give out personal information about someone else.

● Do not forward another individual’s e-mail without their permission.

● Never allow anyone to photograph you in an embarrassing or compromising situation.

● Never post anything that would cause you embarrassment or shame. The Internet is the most public of forums — once you have posted a comment, a photo or a video, it cannot be erased or taken back. You cannot control its duplication and it may be used against you.

● Do not send photos of yourself or family members to Internet acquaintances. Photos can be altered and sent to others, and elements in photos — a landmark or a street name, for example — can be used to identify your location.

● Remember that, once posted, the information can be seen by anyone with a computer and an Internet connection: family and friends, employers or potential employers, admissions officers at schools you might like to attend — even police and other law-enforcement authorities.



Following these guidelines and taking to heart the information I have written about are just small steps that will have a huge effect on keeping you, your computer and your family safe from Scams, Spam, and Facebook.
Follow these steps to add product previews to your blog posts. (What are product previews?)