Saturday, July 18, 2009

Network Your Home Computers

Computer Care: Networking your PCs is a snap

By Arthur Glazer
arthur@glazerthepctech.com
UPDATED July 18, 2009 12:33 a.m.

Networking your computers can be an asset to your home environment if you have more than one computer. By combining your desktop with your spouse’s laptop and your child’s PC via a home network, there are obvious benefits. All could share one Internet connection, one printer or all have access to many. You would also be able to share files.

Adding wireless to the network could enhance it even more. You would then have the ability to check your e-mail or update your Facebook account from the kitchen table or backyard lounger using a laptop.

Networking has gotten easier since Windows XP and even more so with Vista. With Win 7 coming this fall, it will be even easier still. Not to oversimplify matters, but Windows practically networks for you. The operating systems each have wizards to follow.

Providing you have the proper equipment, you could be up and running in no time. Really.

Assuming you have a broadband connection, DSL or cable, you already have a modem. Some ISPs provide a combination router/modem. If yours is just a modem, then you’ll need a router. This is where you’ll have to decide if you want wired or wireless. Routers start at about $40 and can be purchased at online retailers or locally just about anywhere.

You should have all the cables you need. The router or modem usually ships with both a USB and an Ethernet cable, the one that looks like a fat phone wire. Forget about the USB and use the Ethernet instead. Many people get into trouble thinking both cables need to be used; they don’t.

Depending upon which type of connection you have, you’ll see either a phone wire or a coaxial cable coming from the wall. That’s what you’ll want to connect to the back of your modem. If you have a separate router, use an Ethernet cable from the modem to the router. The router usually has four ports together and one by itself. The one alone is the input, the rest are outputs for a wired network.

Don’t stack the devices if you have two. Keep them at least a foot or more apart as they may cause interference. This is also true of wireless phones on the 2.4 GHz frequency. If you have one on your desk, you may want to find another place for it.

Wireless computing has a range of about 300 feet. It can connect through floors, but you may need to adjust the antennas downward. Metals studs and microwaves may also get in the way. You’ll have to experiment with placement to get an optimum signal.

Should you lose your signal, and you will, you’ll need to reset your modem. Whether it be a thunderstorm or an outage for another reason, rather than call your ISP and wait 45 minutes, do this instead: Unplug both router and modem and wait half a minute. Plug in the modem and wait for the lights to stop flashing, about 15-20 seconds. Then plug the router back in and wait for it to settle down. You should then have your connection back.

Setting up the computers: First you need to make sure all computers involved are called something different and are all in the same workgroup. If you use XP, right-click on My Computer and go to Properties. Under the Computer Name tab, give your system a unique name and click Change to rename the workgroup. Click Apply, OK and reboot.

In Vista, right-click on My Computer and click Properties. Then click on Advanced System Settings on the left, then the Computer Name tab as in XP. Give the computer a unique name and click Change to rename the Workgroup. Agree to everything and reboot.

Next, you’ll need to run the Network Setup Wizard. Depending on what you plan to do, from here on there are options, too many to cover in the constraints of this column. You’ll have to make choices and follow the prompts. They are not difficult; they have explanations and troubleshooters.

Look in Control Panel. From either XP or Vista, click the start button and look on the right column for Control Panel. XP will have both Wireless Setup and Network Setup wizards. Vista has a Network and Sharing Center under Network and Internet. There are various subheadings within that group.

Keep a USB flash drive handy. You’ll need it to save and transfer settings from one computer to the next.

In either OS, whatever it is you want to share is easily done with a right-click. If you want to share the Photos folder for example, right-click on it and choose “Share.” A hand will appear beneath the newly shared folder.

There are lots of other things to cover, including security, but as I mentioned, there’s not enough room here for it all. In a nutshell, don’t ignore it. WEP is good; WPA is better. The system will assist you in choosing. An unsecured system invites hackers and leaves you open to threats.

Worst case scenario, you’ll need to call a local technician. I hear there are a few good ones in town.

Arthur Glazer is a freelance writer and computer technician in Gainesville. His column appears biweekly. Arthur welcomes your computer questions and ideas for future columns.

Saturday, July 4, 2009

Phishing for data

Computer Care: Don’t take the hook with data phishing games

By Arthur Glazer
arthur@glazerthepctech.com
POSTED July 3, 2009 11:41 p.m.

Phishing is a relatively new term that has roots in its homophone water sport, in that it means one is looking for something that’s not readily available. But as opposed to looking for fish, it is searching online for data: yours.

Those phishing for your information are not phooling around. Unlike its fun counterpart, phishing is not a leisure sport. It’s a full-time business. It employs professional thieves stalking you on the Internet.

The most common phishing trap you could fall for is the e-mail scam. You might get something in your inbox that appears to be from your bank, utility, retailer or credit card company. The ploy is to get you to refresh or confirm your personal information because your account is supposedly being updated or is about to be closed. It preys on your fears and hopes that in your moment of anxiety, you’ll cooperate.

Upon close scrutiny, you can usually tell that these are fraudulent e-mails, but most people are trusting by nature and are tricked into believing they are legitimate. Usually you will not be addressed by your name, but as Client, Patron or Card Holder. The threat may be somewhat vague, yet specific enough to get your attention.

Other e-mails may include a link for you to click on. This will take you to the phisher’s Web site, which may look like those that you do business with, but is not. It will include a blank form with an official-looking header of that company. Any information you type in is then given to the thief, whether it be your account number, password, Social Security number or pin code.

Again, scrutiny will be the tell-all. Look carefully at the web address. It may have your bank’s name in it, but instead of being "www.your-bank.com," it may read something like "www.ag.accounts.your-bank.com."

A good way to tell if a link is legitimate is to hover your mouse over the link. The true destination will appear either in a pop-up or in the browser’s status bar at the bottom of the page.

Alternatively, you may receive an official sounding phone call asking for the same information.

They will be friendly, yet assertive, requesting your personal information. If you didn’t call them, hang up. I guarantee if you ask them for a call-back number, they will hang up on you.

Your bank will tell you that they would never contact you this way. Be aware; be careful; be suspicious. There is a lot at stake: your money or even your identity. If in doubt, call or go to your bank or institution in question.

As always, your best offense is a good defense. Have the proper tools in place and the knowledge of what to do to protect yourself.

Get and use good anti-virus, anti-spam and anti-phishing utilities for your computer and be sure your firewall is in place.

Many companies now have either free downloadable utilities or offer free scans from their Web site. Check out what McAfee has to offer at http://home.mcafee.com/Downloads/FreeScanDownload.aspx?affid=0; McAfee also has a free Site Advisor available that will let you know if the site you are on is legitimate or not.

See what Symantec has at http://security.symantec.com/sscv6/WelcomePage.asp or look at AVG’s LinkScanner at http://linkscanner.avg.com.

Comodo has recently released a new, free utility, Comodo Internet Security, to assist in keeping your system free of malware. It includes a firewall with anti-virus and even comes with a 30 day free trial of LivePCSupport. Download it from their website at http://personalfirewall.comodo.com/download_firewall.html.

Any of these companies also offer full version utilities with more bells and whistles, for a price.

Visit www.staysafeonline.org for some good information including a list of more web sites that will give your system a security scan for free. Here’s a list to help you get started:

Know who you’re dealing with online.

Never click on links in unknown e-mails.

Keep your Web browser and operating system up to date.

Back up important files.

Protect your children online.

Use security software.

Use strong passwords and change them regularly.

Use strong authentication technology.

Don’t use public computers to do your online banking or bill paying.

Learn what to do if something goes wrong.

Other good online resources are www.onguardonline.gov and www.fraud.org.

If you believe you’ve been scammed, file your complaint at www.ftc.gov, and then visit the FTC’s Identity Theft website at www.consumer.gov/idtheft.

Computers are great tools and the Internet is an incredible resource. To think about what the two of them together can accomplish is astounding. But if you’re not careful, you may get caught in someone’s phishing expedition.

Keep your eyes open and be aware of your surroundings as if you were in a bad part of town. These guys don’t phish or cut bait as those in a boat do. They are relentless. Just because the Internet is a virtual place, doesn’t mean you can’t really get ripped off. You can.

It’s virtually the same.

Arthur Glazer is a freelance writer and computer technician in Gainesville. His column appears biweekly. Arthur welcomes your computer questions and ideas for future columns.