Paltalk and Linux

download

Paltalk is an excellent voice chat program where users can chat around the world for free in a wide variety of topics, or they may create their own room for private chats. At any given time there may be 200,000 people online!

If you use a Windows-based machine or phone you may download paltalk at http://www.paltalk.com

 

Unwanted Windows 10 Upgrade Comments

Reports of unwanted Windows 10 upgrades have been circulating for the past few days on Reddit and Twitter, after the last Patch Tuesday. These users say they never approved or initiated the upgrade, and were dragged away from their Windows 7 (or perhaps Windows 8) installs anyway.

This is all part of Microsoft’s plan, of course. Last October, the company announced that it would reclassify Windows 10 as a “Recommended” update from older versions starting in early 2016, at which point many more users would get the upgrade without explicit permission. That reclassification began on February 1, and auto-upgrades have been rolling out ever since. If complaints are reaching a higher volume now, perhaps it’s because the rollout is getting more aggressive.

Here’s what the Recommended update looks like, according to ZDNet’s Mary Jo Foley: First, users will receive a notification saying their PCs are scheduled to receive Windows 10 in the next three or four days. Users can click a small link to cancel or postpone the update, but simply closing the window will cause the notification to appear again one hour before the scheduled update time. If users don’t cancel or postpone within that timeframe, the update will begin automatically.

At that point, the only way to back out of the Windows 10 update is to “Decline” the End User License Agreement that appears during the installation. This will cause the system to roll back to the previous Windows version (though this is a somewhat time-consuming process).

For users who haven’t upgraded yet, it’s possible to avoid installing Windows 10 by heading to Windows Update in the Control Panel, and unchecking the box under Recommended updates, which reads “Give me recommended updates the same way I receive important updates.” A registry tweak can help prevent Microsoft from sending upgrade reminders in the future.

The impact on you at home: Unless you’re a regular reader of PC-centric news sites, you may not have realized that Microsoft would upgrade PCs to Windows 10 automatically. Although Microsoft claims that users are fully in control of the process, the sudden confusion from users indicates that the company either failed or didn’t care to give users enough of a heads up. There’s a lot to like in Windows 10, but the way Microsoft is delivering it leaves much to be desired.

Switching Back from Windows 10 to an Older OS

Yes, there are a few different ways for you to go back from Windows 10 to a previous version of Windows:

  • If it’s been less than a month since you’ve upgraded to Windows 10, you’ll be able to go back to your previous version of Windows from Settings > Update & security > Recovery.

  • If your PC manufacturer provided the option, you might be able to restore your device to factory settings.

  • If options to go back and restore factory settings aren’t available, you can use installation media and a product key to install a previous version of Windows.

What is malware?

 

cartoon-stop-virus-green-virus-red-alert-sign-illustration-34607939

What is malware?

Malware is bad software, plain and simple. It’s code that was created for the purpose of doing something sinister to your computer. Most of the time, it infiltrates a person’s system without their knowledge.

There are many different types of malware, and here’s where it starts to get confusing. Types of malware were typically named not for what they do but how they attack the machine. This is because engineering nerds who were the first to encounter malware were more interested in the method of delivery instead of the end-goal—which is why one category of malware that “tricks” a system in order to invade it is called a Trojan horse and not, say, a data deleter.

Other types of malware include viruses, which infect legitimate files, backdoors, which can open programs and steal data from your computer, and rootkits, which can spy and collect passwords. One of the more dangerous forms of malware, aptly named ransomware, literally holds your files for ransom by encrypting them. If you pay up, you might get the decryption key to regain access to them. If you don’t, they’re unavailable forever.

Another form of malware that is perhaps a little less mal is called a Potentially Unwanted Program (PUP). “Potentially Unwanted Programs is a euphemism,” says Scott Wilson, Technical Product Manager at Malwarebytes. “These are programs you actually agree to install, but the agreement is generally obtained in a sneaky manner, such as having a pre-checked box on one of the many installation pages you need to click through. Many people find these programs to be annoying—interfering with your search behavior or displaying advertising on your computer are common behaviors—so anti-malware products help you deal with and remove such programs.”
So what, exactly, is anti-malware software?

Now that you know a little bit about malware, let’s discuss the programs that were designed to it fight off. Anti-malware is a piece of software that you knowingly install on your computer with the purpose of protecting your system from malware infiltration and infection. Anti-malware programs are able to do this in three ways: they detect malware on your computer, safely remove it, and clean up any of the damage to the computer that the malware may have caused.

In addition, some premium programs, like Malwarebytes Anti-Malware Premium, have malicious website blocking and real-time protection. In plain English, this means the programs block websites created with the intent of delivering malware as well as those that might be compromised by malware. It also means that the anti-malware runs continuously in the background so that if a piece of malware does try to install on your system, it steps in and shows the bad guys who’s boss.
How does anti-malware software do its job?
Definitions

Many programs scan for malware using a database of known malware definitions (also called signatures). These definitions tell what the malware does and how to recognize it. If the anti-malware program detects a file that matches the definition, it’ll flag it as potential malware. This is a good way to remove known threats, but it does require regular updates to make sure the program doesn’t miss out on newly developed malware.
Heuristics

Another way anti-malware (AM) detects bad software is a form of analysis called heuristics. An alternative to database scanning, heuristic analysis allows anti-malware programs to detect threats that were not previously discovered. Heuristics identifies malware by behaviors and characteristics, instead of comparing against a list of known malware.

For example, if an application is programmed to remove important system files, the anti-malware software may flag it as malware (since applications should not be doing that). But, heuristic analysis can sometimes result in “false positives,” or programs flagged as malware that are actually legitimate.
Sandboxing

A third way AM software can find malware is by running a program it suspects to be malicious in a sandbox, which is a protected space on the computer. The program believes it has full access to the computer when, in fact, it is running in an enclosed space while the anti-malware monitors its behavior. If it demonstrates malicious behavior, the anti-malware will terminate it. Otherwise, the program is allowed to execute outside the sandbox. However, some forms of malware are smart enough to know when they’re running in a sandbox and will stay on their best behavior…until they’re allowed free access to the computer. Sneaky little scoundrels.
Removal

Thankfully, anti-malware doesn’t just flag malware and be on its way. Once malware has been found on a system, it needs to be removed. Many threats can be deleted by the anti-malware program as soon as they are detected. However, some malware is designed to cause further damage to your computer if it is removed. If your anti-malware suspects this is the case, it will usually quarantine the file in a safe area of your computer’s storage. Basically, the anti-malware puts the malware in a timeout. Quarantining a malicious file prevents it from causing harm, and allows you to remove the file manually without damaging your computer.

So there you have it! That’s anti-malware in a nutshell. Now that you’re armed with this knowledge, you can calm your conspiracy theory uncle down when he worries about the hackers who are going to steal information from his online Christmas orders. The fact that he knows this is a possibility is a step in the right direction. And the fact that you can now educate him is a win in the fight against malware.