Computer News & Safety tips  – Harry Waldron MVP Rotating Header Image

Windows 10 – How to install on Apple iMac using Boot Camp

The NY Times tech section shares an interesting article on how to install on an Apple iMac using a tool called “Boot Camp”

https://www.nytimes.com/2017/04/28/technology/personaltech/running-macos-and-windows

Boot Camp is Apple’s tool for the Mac.  It allows you to install and use the Windows 10 operating system on a separate hard drive partition — if your hardware meets the system requirements. According to Apple’s guidelines, the earliest iMac model that supports running Windows 10 is theLate 2012edition with either a 21.5- or 27-inch screen.

If your iMac passes muster for Boot Camp, make sure you have 55 gigabytes of free space on your start-up drive and an empty USB flash drive with a capacity of at least 16 gigabytes. You also need a copy of the 64-bit version of Windows 10, which you can buy as a download or on a USB drive from Microsoft.

Before you start installing Windows 10, make sure your Mac’s software is fully up-to-date and back up your computer just in case something goes awry. If you have not created a partition on the Mac before nor installed Windows on it, go to the Mac’s Applications folder and to the Utilities folder and open the Boot Camp Assistant program to get started.

Windows 10 – Cleanup Tools to recover disk space APR 2017

The Guardian features a beneficial article on DISK CLEANUP tools.  They delete temp and work files no longer needed by Windows 10. It is beneficial to cleanup wasted disk storage monthly and it will also improve performance.

https://www.theguardian.com/technology/askjack/2017/apr/27/disk-storage-space-windows-10-pc

Before we start, I must remind you that you are totally responsible for your own PC and all your personal data. If you are going to run programs that delete files, or worse, you must have everything securely backed up first. Windows 10 includes a backup program that can back up your hard drive and also take a disk image. It’s also a good idea to create recovery media and to make separate copies of irreplaceable data files and family photos.

Windows includes Disk Cleanup and other facilities for reclaiming hard drive space. However, Piriform’s free CCleaner is the quickest and simplest way to delete temporary internet files, old log files and other accumulated junk. Download it from the original source as there are scammers who charge for it.

CCleaner can delete information you want. This includes your browser history, and website details stored in cookies on your hard drive. Before you run it, make sure you know the log-on details and passwords for all your websites, and save the current tabs in all your browsers.  For the best results, reboot your PC and run it before starting any programs that may object to CCleaner deleting their data.

There are other possibilities, such as a runaway media cache, a PC that is creating too many system restore points, or an overgrown Windows search index file (windows.edb). Also, your file system may have been corrupted so it is showing incorrect values. To fix this, run a command prompt as administrator, type in chkdsk C: /f /v /x and schedule a reboot.

Windows 10 – Cortana digital assistant setup tips APR-2017

Venturebeat offers tips for setting up the Cortana digital assistant that might be helpful to inexperienced WIN10 users. There are many excellent YouTube videos that can also help by searching on “Windows 10 training”

https://venturebeat.com/2017/04/28/how-to-set-up-the-best-features-in-cortana/

Cortana promises to outshine other digital assistance suites by delivering exceptional compatibility with third-party apps. That means we’re not witnessing the full power of the blue-hued digital assistant just yet, but there are still some basic things everyone should set up to get the most out of Cortana

Most of the Cortana program’s essential settings can be configured in Windows 10’s Notebook. Notebook is available from the Start menu when Cortana is running. To access it, start Cortana, click the Windows icon in the bottom left to expand the start menu, and then click the notebook icon, which is located below the home icon on the left of the menu.

The final thing you should do here is enable and configure the “Hey Cortana” feature, which will listen for your voice or respond to anyone’s voice in general. This will allow you to give Cortana verbal commands without clicking or tapping.

Google Chrome – version 62 highlights non-secure sites more prominently

As PC Magazine shares — Google Chrome version 62 will highlight non-secure sites (HTTP) to warn of risks when entering data — as HTTPS encryption is a more secure approach:

http://www.pcmag.com/news/353381/chrome-to-more-aggressively-highlight-insecure-sites

Google has favored sites with secure connections, or HTTPS, in its search results since 2014. In January, the company took things up a notch by showing “not secure” labels next to certain websites in Chrome that use an unencrypted HTTP server.

Until now, Chrome has only displayed this label for sites that transmit passwords or process credit card transactions over HTTP instead of the more secure HTTPS. But beginning in October, Chrome will show the warning in two more situations: when users enter any type of data on an HTTP page; and on all HTTP pages people visit in Incognito mode.

Since adding “not secure” notices in Chrome 56, Google has seen a 23 percent reduction in navigations to HTTP pages with password or credit card forms on desktop, Emily Schechter from the Chrome Security Team. Now wrote in a blog post.

Starting with Chrome 62, the browser will show the “not secure” warning when users type any data into HTTP sites. “Passwords and credit cards are not the only types of data that should be private,” Schechter wrote. “Any type of data that users type into websites should not be accessible to others on the network.”

Windows 10 – Desktop customization techniques APR 2017

PC Magazine shares a comprehensive guide for Windows 10 Desktop customization tips.  It includes screen-by-screen directions for both Anniversary & Creators versions.

http://www.pcmag.com/news/353347/how-to-customize-and-enhance-your-windows-10-display

Your Windows 10 display doesn’t look quite right. Maybe the color is off. Maybe the text is too small (or too large). Maybe the resolution isn’t to your liking. Well, don’t despair. You can customize your display in Windows 10 to make it look just right; resize the text, change the resolution, calibrate the color, and more.

The process for customizing your display varies somewhat depending on your version of Windows 10. If you’re still running a pre-Creators Update version, like the Anniversary Update, you follow one set of steps; Creators Update, which started rolling out in April, requires a different set of steps. You can still accomplish most of steps no matter which flavor of Windows 10 you’re using.

Malware – Hajime IoT botnet has infected 300,000 users

The new Hajime botnet is a new Iot security threat, which has infected 300,000 user as described below.  With peer-to-peer designs, each infected client almost becomes a “server” and researchers are having difficultly finding the true command-and-control servers

http://www.csoonline.com/article/3192898/security/next-gen-iot-botnet-hajime-nearly-300k-strong.html

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated high-profile websites last fall, leading some to think the internet had been broken. Researchers at Kaspersky Lab came up with the number 297,499, says Igor Soumenkov, principal researcher at Kaspersky Lab.

In some ways Hajime is more impressive than Mirai and may be harder to stop if its creators ever decide to put it to malicious use, says Drew. It uses BitTorrent 2.0 to communicate, he says, making Hajime a peer-to-peer botnet. “Everything is a node and everything is command and control,” Drew says. “It’s very, very difficult to cut the head off.  It will upload a file containing an attack module to one device, and it would spread the file among the rest, Soumenkov says. There aren’t just a few command and control servers to knock out and take the botnet down.

Medical Device Security – Improved protection needed

The primary design of “smart” medical devices is to help patients.  Strong security may weak in some cases.  It was not envisioned that malicious individuals would attempt to hack and take over these devices.  But where security is weak, there is a potential to create dangerous health risks. We are likely to see improving IoT security as a better realization of these risks surface. 

http://www.csoonline.com/article/3192357/internet-of-things/medical-devices-that-could-put-you-at-security-risk.html

Everyone has heard of connected insulin pumps and pace makers, but there are some other connected medical devices that might surprise you. Each of them of course pose a security risk to you and your health. Mandeep Khera, Internet of Things security expert at Arxan, ran through some of these lesser known devices.

And while pacemakers and insulin pumps have received their 15 minutes of fame, there are a myriad of other connected medical “things” that are either already available or in development, Khera said. “Although these things have yet to be maliciously hacked, they could pose a threat in the future. There have been attempts made at hacking various connected devices and it’s only a matter of time before it happens,” he said.

Categories include:

1. Brain implants – Connected brain implants are being used to treat seizures, Parkinson’s, and even OCD

2. Vital monitors – Developments in vital monitoring technology now grant healthcare providers with real-time access

3. Connected medication dispensers – To manage chronic illness effectively, patients must adhere to strict medication recommendations

4. MRI scanners – MRI scanners traditionally require a trained technician to operate machinery and record findings

5. Implantable blood flow sensors – Blood flow sensors are used by medical professionals to monitor trends or changes in blood-flow volumes

6. Smart hospital beds – Through touch-free intelligent and cloud connected monitoring platforms, smart beds present around-the-clock data that can be used to make important decisions regarding patient care.

7. Prosthetic devices – By implementing bluetooth technology into prosthetics, owners can take control of their devices and allow for more seamless operation and use.

Windows 10 – Redstone 16184 early features for SEP-2017 release

Windows 10 – Redstone 16184 early features for SEP-2017 release 

As documented below, some very early features have been announced for Microsoft Windows 10 Redstone currently scheduled for September 2017.  

http://www.zdnet.com/article/microsoft-windows-10-redstone-3-test-build-brings-back-my-people-feature/

Microsoft’s latest Windows 10 ‘Redstone 3’ test build, No. 16184, adds back a feature that Microsoft cut from the Creators Update back in January 2017: My People.  My People allows users to pin specific people (current limit is three) to the taskbar; view multiple communication apps together; and choose apps that users prefer for chatting.

The Share capability is not yet ready for testing with My People, according to Microsoft’s April 28 blog post. To test My People, users need to have the latest Windows Store versions of Skype, Mail and People apps on their device.

Microsoft also is rolling out a new Windows 10 Mobile build for the handful of Windows Phone devices that are still in active support and can run Creators Update and beyond. That new Fast Ring test build is 15208. Today’s new test builds include changes and fixes in both versions. Microsoft officials said last week that Redstone 3 will begin rolling out in September 2017.

Microsoft Security Updates – APRIL 2017

Below are key resources documenting this recent monthly Microsoft Patch Tuesday release

https://isc.sans.edu/forums/diary/April+2017+Microsoft+Patch+Tuesday/22288/

http://blog.talosintelligence.com/2017/04/ms-tuesday.html

https://portal.msrc.microsoft.com/en-us/security-guidance

Today on Tuesday 2017-04-11, Microsoft announced its monthly security release (also known as “Patch Tuesday).  Reviewing Microsoft’s Security Update Guide, it looks like there’s 644 updates with 210 of them listed as “Critical” severity.  The highest profile issue from this set of updates invovles CVE-2017-0199.  This vulnerablility was actively being exploited through malicious email campaigns sending Microsoft Office RTF documents as early as this past weekend.

Microsoft’s April 2017 security release consists of security updates for the following software:

***  Internet Explorer
***  Microsoft Edge
***  Microsoft Windows
***  Microsoft Office, Office Services & Web Apps
***  Visual Studio for Mac
***  NET Framework
***  Silverlight
***  Adobe Flash Player

Windows 10 – PC Magazine updates information center APR-2017

PC Magazine has a free comprehensive guide for WINDOWS 10.  This guide was recently updated & a partial list of topics are noted below: 

http://www.pcmag.com/windows-10

//How to Control Updates
//How to Share More (or Less) With Cortana
//How to Tweak Your Tiles
//Start Menu Alternatives
//How to Use Sticky Notes as Reminders in Windows 10
//How to Customize Your Default Apps in Windows 10
//How to Turn on Cortana by Voice in Windows 10
//How to Customize the Command Prompt
//How to Fix Windows PC Problems Via a Restore Point
//How to Check Out Early Versions of Windows 10