Monday, March 28, 2005

Back for the Second Time!

It is the day after Easter, and I am back online .... again. Seems I had no longer finished reformatting and reinstalling all software onto my system, when it nicely crashed again. This time a different Trojan attack, but one that disables each start up process with each restart, with the eventually lock out from all software and processes that need to run. What a mess. The second could be traced to the Win32trojaner which enters on a temp file from a music or AIM download, spreading into multiple channels with each restart. So word to the wise, keep your teens off your computer.

I have been reading everyone's entries and comments from their blogs. Reading back to the start of the class, it is evident how naive we all were regarding virtual communications and avenues to communicate. I think we have developed a better sense of how technology is used to communicate between people(s) for personal and business related matters. And moreso, the issues that surround the need for security for protecting our privacy. This whole 2 week problem I have dealt with dealing with computer issues, trojans, and/or software issues has made me more cautious than ever about who you let use your computer, what you download, and where you visit. It certainly has eaten away at my time off from work.

What I have realized is that I suffered from a false sense of security thinking that my system was safe. I will vow to use every precaution regarding security measures, especially downloads. That is, I will not download anything that doesn't provide an execution file (.exe) to open and run the install. I have learned it is more secure to save the .exe file to the desktop, right click and run the antivirus scan on the file first. Second, that a full system scan should be done at least once a week to remove any source of hidden virus files.


Monday, March 21, 2005

Back to blogging!

I have been away, only able to access our blogs for briefs periods on my work or daughters computers. And that is due to a system crash on my PC, which occured more than a week ago. Reformatting is never a big issue, but reinstalling all the settings and software takes forever. I use a tower to store 70 CD's of various software that I use for different work, class, and personal projects. What a feat this has been, but I think it is nearly set. Seems I picked up a trojan about the time I installed THERE.COM and it took over my system which resulted in having to enter a logon password that I never had set.

I also found that with THERE.COM my video card was not adept at keeping up with the graphics needs the program needed to function properly. I have a 128 AGP video card and they suggest at least 256 to run well without having your system freeze up during use. This happened alot to me. So I ordered a new card, but am reconsidering reinstalling THERE.COM. I am wondering if those seemingly nice people who let me "BORROW" their transportation for a day or two, which were saved to my settings, contained anything. Does anyone know if this is possible. I certainly am suspicious.

Tuesday, March 08, 2005

Taking action against worker blogs.

Responding to Jbellamy's posting to check out this article:
USATODAY.com - Firms taking action against worker blogs

Interesting article! I don't think the firings had so much to do with the fact that they had blogs but the content that they posted. Consider the following quotes from the article:

"... publicized firings have been generally not over blogging but over other violations that happened to be done through blogging."

"... policies can tie the hands of employers."

My understanding is that companies are considering whether to create policy that would ban blogging at work, blogs which identify the company, or puts the employee in a position that reflects badly on the company. The article also said:

"... once you set policies then you get into litigation into which side of the line it fell."

And that setting policy could open up another level of litigation possibilities for the companies and the employees. Seems we are on the verge of greater sensorship. Could it evolve to reflect personal websites or other internet activities that individuals do on their own time? I think most understand that dealing in pornography can result in legal ramifications, but what about what we research or read that may oppose ean employers views?

Sunday, March 06, 2005

~There.com experience ~

Well, I joined There.com as part of our current class assignment and still somewhat confused on the whole process. Though it is interesting how different people have interacted with me. The first day, I met two long time members who provided alot of pointers, and experiences. I was taken for rides on dune buggies, a hummerboard, jetpack, etc. What fun that was trying to manuerver. I did learn quickly that you can't hurt yourself (avatar) or objects. :() They even offered different transportation equipment for me to try on loan. How nice!

I have also encountered a few who had to be very young kids / teens. The conversation topics were a dead give-away. Additionally, I came across a few who I would call creepy and rude. I was warned about these folks from the first two I mentioned above. It would be wise to present myself cautiously in regards to personal information. I was asked outright to offer more about my true self by one of those I referred to as creepy.