How To Check If Your Google Account Has Been Breached by “Gooligan”

November 30, 2016

Gooligan is a new malware campaign that has been engineered to infect Android phones by stealing your Google Account Credentials. Anyone who owns a device running Android 4 and 5 that includes Android Jelly Bean, KitKat, and Lollipop — is most at risk  The infection typically occurs via Gooligan infected apps or links in phishing email messages. Once infected, attackers are able to gain access to your sensitive information from Google apps, like Gmail, Drive, Photos, etc… Once attackers hack into the device, they’re buying apps on the Google Play store and writing reviews posing as the phone’s owners. To get the skinny on Googligan please read this article, “More Than 1 Million Google Accounts Breached by Gooligan” at a site called Checkpoint.

To determine if your account has been compromised, go to Checkpoint’s “Gooligan Checker” and enter your Gmail address…

Googligan


Malware Called “DressCode” Found In Android Apps

September 11, 2016

If you think you are immune from malware in Android Apps; “Think Again”…

“Researchers from Check Point discovered malware they’re calling DressCode in 40 Google Play store apps and more than 400 apps listed in third-party app stores”…

“Once installed on the device, DressCode initiates communication with its command and control server,”

READ MORE @ BGR

The following video also explains how DressCode works:


NEW Web Of Trust (WOT) Safe Browsing Tool For Your Android Devices

May 20, 2016

If you are an Android smartphone or tablet user; and, you use the Google Chrome browser (or the native Android Browser), you may want to take a look at (and install) the mobile version of Web of Trust. I currently use the PC version of Web of Trust on all of my computers to help me determine which sites are reputable and which sites are not.

   WOT Mobile Security- screenshot

Against what types of online threats can WOT protect you?

Malware & Viruses – Avoid visiting websites that host malicious software, such as viruses, spyware, and adware that can steal your information and spread to other devices.

Phishing – Turn back from malicious links in fake emails, websites and text messages that are designed to fool you into giving away personal information.

Scams – Users ratings warn you when you visit a site that may host any type of fraud designed to steal money or personal information.

Spyware – WOT can warn you when a site has been reported to host spyware, which collects your personal information without your knowledge.


Malwarebytes’ Junkware Removal Tool

May 2, 2016

… and, MORE GREAT GEEK SQUEAK STUFF (#2016-018)

Malwarebytes has a junkware removal tool that I was unaware about that will aggressively perform the following tasks:

  • Removes adware that spawn popup ads, such as Conduit
  • Uninstalls unwanted toolbars and browser helper objects, including the Ask and Babylon toolbars
  • Removes potentially unwanted programs (PUPs)
  • Cleans up traces left behind by PUPs

I am a big user of the Malwarebyte products and decided to give this tool a test run. To run the tool, simply download and run it. A command-line window will open up that will prompt you to hit a key on your keyboard to launch the program.  If you have any browser windows open, they will automatically be closed. In the end I found that the tool is pretty aggressive in its’ cleaning to the point it actually removed one of my Chrome browser extensions that I use on a regular basis.  With that being said, I recommend you make a note of what extensions you have. If you are in a situation where you find your PC running slow and suspect an infection, you may want to run this tool.

Malwarebytes Junkware Removal Tool

———————————————————

MORE GREAT GEEK SQUEAK STUFF

Free Alternative to Office365 Called Open365I Love Free Software has a great article about LibreOffice’s new alternative to Office365 called Open365. After reading the article I went ahead and opened an account (for FREE) at Open365  (which appears to be in beta). Once I opened the account, client software was downloaded to my PC; which, I opted to not install. Instead, I went directly to the cloud-based version of Open365. First impression, not bad…  Will be keeping an eye on this.

Open365

Open365

———————————————————

ZOTAC ZBOX E series Mini PC
with Intel Core i5 4200U, dual-core, 1.6 GHz, Turbo up to 2.6 GHz Barebone System

ZOTAC ZBOX E series Mini PC

———————————————————

Easy Screen Capture MP3 Direct Cut

 Remove QuickTime Windows 10 Interruption

———————————————————

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment


Microsoft Edge Browser To Get Extensions Support — and MORE GREAT GEEK SQUEAK STUFF (#2016-012)

March 21, 2016

Microsoft Edge Browser To Get Extensions Support – If you use Google Chrome or Firefox, then you are familiar with browser extensions that extend the functionality of the browser. Microsoft recently announced that they have shipped the first preview release of Microsoft Edge with extensions support to Windows Insiders. Microsoft Edge is the browser that we see in Windows 10. To us at home, we will not see this just yet. I am also reading in various places where Microsoft is working on a tool that will let developers port Chrome extensions to Microsoft Edge… READ MORE

Microsoft Edge

———————————————————

Crush Malware With Malwarebytes Anti-Malware – I have featured the FREE version of Malwarebytes Anti-Malware in the past and thought this would be a good time to once again promote this “must have” security software. One thing to point out at the start is that the FREE version of Malwarebytes is only a scanning utility and does not provide real-time protection. You can get the real-time protection by purchasing the commercial version of their software. Don’t let this deter you from downloading the FREE version. I use the FREE version and make a habit to manually download the updates and perform routine scans of my computer.

Malwarebytes Anti-Malware

Malwarebytyes Anti-Malware

 ———————————————————

Launch Your Windows Desktop Like An iPad – How would you like to double click on your Windows desktop and a program (or shortcut) launcher appears that allows you to customize and launch your favorite programs, apps, files, folders or web URLs? If so, you need to take a look at PaperPlane. I have always loved program launchers and this one is no exception. PaperPlane Smart Launch is a free launcher program (shortcut manager) which enables you to launch your desktop like an iPad. If you are familiar with Mac OS Launchpad, you could say that it’s a better Launchpad just for your Windows. It enables you to quickly access your most used apps, open a recent file, visit a website URL, play your favorite game, or open any shortcut etc, in one place.

PaperPlane

PaperPlane

 ———————————————————

A Best Seller Portable Hard Drive – Looking for a way to safeguard your personal files? The WD 2TB Black My Passport Ultra Portable External Hard Drive (w/USB 3.0) may be the solution you are looking for. I currently use a similar Western Digital portable drive to backup my personal files that I then transport and store offsite (away from my home) — READ MORE

WD 2TB Black My Passport Ultra Portable External Hard Drive

WD 2TB Black My Passport Ultra Portable External Hard Drive

———————————————————

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment


TODAY ONLY – Save Over 60% on Norton Security (For 5 Devices)

June 25, 2015

Amazon’s Deal of the Day, for Thursday, June 25, 2015 has Norton Security (for 5 Devices) at 63% off the regular price. The deal remains in effect until 11:59 pm (PT) on Thursday. You can install this on up to 5 devices (PC’s, Macs’, Smartphones and Tablets). After you make the purchase you are provided a key code that will allow you to redeem the product online.

Norton Security

The new Norton Security simply gives you the best of Norton for the many ways you connect with your PCs, Macs, smartphones and tablets. Get comprehensive protection that’s specialized to secure your favorite devices. Stay safe wherever you go with proactive web protection, mobile device location, advanced privacy technology and more. It’s one solution for the different ways you connect.

____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the Day Leave A Comment


Microsoft’s Malware Center Flags The Older Versions Of The “Ask Toolbar” As Malware

June 13, 2015

I have been on numerous computers over the years and the Ask Toolbar always seems to find a way (usually through trickery) to install itself on people’s computers. Well, there is some good news and it is from Microsoft…

Microsoft recently flagged the older versions of the Ask Toolbar and is officially considering it malware. As a matter of fact, to validate this point, Windows Defender for Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista have been engineered to detect the older versions of the Ask Toolbar and remove it.

I don’t know if a lesson has been learned here or not, by the makers of the Ask Toolbar; but, Microsoft’s Malware Protection Center states, “The latest version of this application is not detected by our objective criteria, and is not considered unwanted software”… So, what I get from this is that the new version is ok and the old version is not.

The older version, that I have personally seen on many computers, will hijack your browser and restrict or limit your control over your search provider. I have to wonder if Microsoft became aggressive with this due to the Ask Toolbar, in essence, messing with Microsoft’s own search engine (called Bing).

Either way, I recommend that you avoid installing it (or any toolbar) and be careful when installing any software that allows other third party software to piggy back its’ way onto your computer (see example below of how the Ask Toolbar is along for the ride when Java is updated and installed — unless you uncheck it).

Ask Toolbar with Java

Also, I am not a real advocate of Microsoft Defender and Microsoft Security Essentials. Both, at present, are not rated very well. You may want to consider Malwarebytes Anti-Malware Premium … I prefer the premium version (which has full time scanning) over the free version (which does not have full-time scanning).

 ____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection –

Deal of the Day Leave A Comment


Terminate Known Malware Processes With RKill – Then Run Your Security Software

December 15, 2014

Did you ever wrestle with a Malware infection, think you have the PC cleaned; but, when you reboot the PC it comes back with a vengeance? This is where you need to have the utility by BleepingComputer.com, called RKill in your toolbox.

What RKill does is that it will attempt to terminate known malware processes.  It does not delete any files and only stops the malware processes from temporarily occurring, giving you that window of opportunity to run your security software (such as Malwarebytes Anti-Malware). To learn, in detail, what RKill does and and what it doesn’t — click here

Below is what RKill looks like running, in a console screen. That console screen will continue to run until it RKill has finished. Once finished, the box will close and a log will be displayed showing all of the processes that were terminated by RKill and while RKill was running.

RKill

RKill just kills 32-bit and 64-bit malware processes and scans the registry for entries that would not allow you to run various legitimate programs. When scanning the Registry, Rkill will search for malicious Image File Execution Objects, DisallowRuns entries, executable hijacks, and policies that restrict your use of various Windows utilities. When changing Windows Registry entries it will create a backup of these entries and save them in the rkill folder on your desktop. Each registry backup will contain a time stamp so that the backups are not overwritten on subsequent runs of Rkill. For a list of changes in Rkill, please see the change log at the bottom of this post.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Leave A Comment


A Free AppRemover Utility To Uninstall Antivirus and Security Software, Public File Sharing Applications, Toolbars and MORE

December 4, 2014

AppRemover is a must have utility to have around if you decide to swap out your antivirus or malware software on your computer.

It is important to know that security software installs, such as antivirus and malware software, are very complex in nature; and, if not uninstalled properly can wreak havoc to a PC. Typically, most developers of Security software will provide an uninstaller that you can download from their site; however, most people do not know or think about that. An easy option for removal of security type software is AppRemover.

AppRemover

AppRemover supports the removal of a boat load of applications – see here…  AppRemover is a standalone (portable) application that you simply download and run. You can download AppRemover – from here.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Leave A Comment


Be Ready For When The Cybercriminal That Misrepresents Microsoft Calls You

November 17, 2014

I want to start off this post by stating something I tell people, especially the elderly, who came from a generation that trusted other people.

“If you receive an unsolicited telephone call, whether it be a charity, a politician, an alarm company, your grandson is locked up in a jail in Canada, etc… where the caller is wanting money, PLEASE disconnect the call”.

What I am finding is once you get hooked by these calls you are placed on a call list that is sold to others AND the calls will perpetuate into more calls. It is like getting spammed by telephone and it gets so bad that you do not know what is real and what is not. My general rule of thumb is, when I get a phone call at my house and there is a delay of 3 seconds, GUESS WHAT? You just got disconnected.

 

One of my favorite blogging sites is TCAT Shelbyville – Technical Blog. Recently they posted an article (that I reblogged) titled, “No, you are not a Microsoft employee, no I don’t have a virus and by the way, you are definitely talking to the wrong people” that really hit home with me personally. I actually know several people, including members of my immediate family, where this fraudulent activity occurred.

The fraudulent activity I refer to is where a person (usually with a foreign accent) will randomly call you and tell you that they are a Microsoft Tech and will offer to fix your computer problems or sell you a software license. They will convince you into taking over your computer remotely and then they will go to work attempting one or all of the following:

  • Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software.
  • Convince you to visit legitimate websites (like http://www.ammyy.com) to download software that will allow them to take control of your computer remotely and adjust settings to leave your computer vulnerable.
  • Request credit card information so they can bill you for phony services.
  • Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there

After reading the TCAT-Shelbyville article, I started wondering if Microsoft is aware that they are being misrepresented in this manner. What I discovered is that they do know and actually have a page up on their Safety & Security Site that focuses specifically on this matter. I strongly encourage you to visit Microsoft and read, “Avoid Tech Support Phone Scams” where you will learn the following:

  • Telephone tech support scams: What you need to know
  • How to protect yourself from telephone tech support scams
  • What to do if you already gave information to a tech support person
  • Will Microsoft ever call me?

How to report this crime:

The CyberCriminals that initiate these calls know that most people will not report the crime. I suggest that if you are victim of a call such as this, especially if you find your credit card has been compromised, that you report the matter to the local authorities and contact your credit card company immediately to be issued another card.

Microsoft also encourages you to contact them, as well:

Whenever you receive a phone call or see a pop-up window on your PC and feel uncertain whether it is from someone at Microsoft, don’t take the risk. Reach out directly to one of their technical support experts dedicated to helping you at the Microsoft Answer Desk. Or you can simply call Microsoft at 1-800-426-9400 or one of their customer service phone numbers for people located around the world.

Report phone scams 

In the United States, use the FTC Complaint Assistant form.

In Canada, the Canadian Anti-Fraud Centre can provide support.

In the United Kingdom, you can report fraud as well as unsolicited calls.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Comment


Malware Herd Protection For Your PC

October 11, 2014

What is that old saying, “there is strength in numbers?”… Malware is the leading cause to computer problems today that is also criminal in nature. What I have discovered over the years that no single anti-malware or anti-virus program can give you protection 100 percent of the time.

This is where the cloud sourced program called herdProtect can help, as your second line of defense against malware, by providing strength in numbers. herdProtect utilizes a ‘herd’ of multiple online anti-malware engines (68 engines to be exact) to guarantee the widest coverage and the earliest possible detection. As a second line of defense anti-malware solution, herdProtect is designed to run with any existing anti-virus program already installed on a user’s PC. herdProtect is a free service to help user’s find and remove malicious software; and, is an excellent resource to run, after an infection, when you think you have a computer cleaned of malware using your own anti-malware software. herdProtect is available as a full windows install or can be downloaded and run as a portable app.

herdProtect - Anti-Malware

The herdProtect scanning engine works by monitoring the active objects (processes, modules, drivers, etc.) on a user’s PC as well as the hundreds of auto-start execution points (ASEPs). As new objects such as processes become active in the system, herdProtect will use a secured network tunnel to scan the object for malware against the engines of the top 68 anti-malware scanners. By scanning in the cloud all processor intensive activities are performed independent of the user’s PC. Depending on the aggregate results of the scan, the user can then take the appropriate actions and keep their PC free from any known malware threats.

 


GEEK SQUEAKS – Use Windows 8.1’s Quick Access Menu To Shutdown Windows

March 5, 2014

What gets me about Windows 8 and 8.1 is that you have to go on an Easter egg hunt to find the most basic of functions that we commonly use in Windows. I really think Microsoft has a lost sight of what the end user’s needs are and have never heard of the K.I.S.S. (keep it simple stupid).

For example, anyone who has not experienced Windows 8 or 8.1 will immediately discover that they cannot easily find a shutdown button in order to turn the computer “off”. Recently I set up a Windows 8 box for my parents and I ended up creating a shutdown button on the taskbar so that they would not have to go digging for this function. To the home based end user, these sort of things can be a challenge.

For others out there, in an effort to help you out…  If you have upgraded to Windows 8.1, the easiest way to get to the Shutdown or Signout options, is to right mouse click on the Start Button which is located in the bottom left corner of the screen (or on the very left side of the task bar at the bottom of the screen). If you are not seeing the Start Button, hover your mouse pointer in the bottom left corner and the button will appear.  When the button appears, right mouse click on the Start Menu button and a menu will pop up.  This is called the Quick Access Menu.

Quick Access Menu

One the menu pops up you will see an option for Shutdown or Sign Out; and, if you hover your mouse pointer over that option another menu will appear to the side giving you the ability to Sign Out, Sleep, Shut Down or Restart.

This may sound like a lot, but once you accomplish this feat it will become second nature; PLUS, the bonus to this you will know how to get to many other features in Windows via the Quick Access Menu such as the Control Panel, Task Manager, File Explorer, etc…

[ COMMENTS ARE WELCOME – CLICK HERE ]


MORE GEEK SQUEAKS
FROM AROUND THE NET

[NEWS] Tech Thoughts Daily Net News – March 5, 2014 – 10 Things You Need to Know About Digital Security;  FreedomPop Announces A Fully-Encrypted Smartphone For $10 A Month;  Identity Fraud: It’s Here to Stay;  How to use Chrome’s coming voice search feature today;  5 New Uses for Chromecast;  Free: Tweaking.com – Windows Repair;  Chromebooks are a revolution in Easy;  RadioShack To Close 1,100 Stores;  Apple faces website blacklist in ‘misleading’ warranty claims;  VPN Users ‘Pirating’ Netflix Scare TV Networks;  Google Fixes Nearly 20 Bugs in Chrome 33… @Bill Mullins’ Weblog – Tech Thoughts

[WINDOWS] Free PC cleaner & Privacy Tool – PrivaZer a privacy tool and PC cleaner. It’s free and easy… @PrivaZer

[HARDWARE] WD My Passport Ultra 2TB Portable External Hard Drive USB 3.0 with Auto and Cloud Backup – My Passport Ultra portable hard drive features WD SmartWare Pro backup software that lets you back up to the drive itself or use Dropbox to back up to the cloud. Move files quickly with the blazing speed of USB 3.0 connectivity. Keep your data private with password protection and hardware encryption… @AMAZON

[ANDROID] USA Today – The nation’s news from USA TODAY is accessible 24/7 on your Android phone or tablet. Staying informed has never been this quick, easy or enjoyable… @Google Play

[NEWS] Porn Dethroned as Top Source of Mobile Malware – Pornography is no longer the leading source of malware on mobile devices, according to a new study. The non-honor now goes to Web-based ads, according to Blue Coat, a security firm that analyzed data from more than 75 million global users for a report it released Wednesday… @NBC News

[WALLPAPER] – CATERHAM CT03 RENAULT @wallpaperfusion

CATERHAM CT03 RENAULT

[VIDEO]Jerry Seinfeld Analyzes Modern-Day Parenting

Jerry Seinfeld Analyzes Modern-Day Parenting

Learn a byte at a time with Geek Squeaks’ — featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it… I just plain love tech!

Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com


Today’s Geek Squeaks – October 27, 2013

October 27, 2013

Featuring: Cometdocs, the online document management system, now has a desktop app available; Is the October 31st release of the Nexus 5, a trick or a treat?; What to do if you are infected by Cryptolocker and how to prevent the infection; and, The Xbox One Console, a product that will be in high demand…

Geek Squeaks’ features a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

[ COMMENTS ARE WELCOME – CLICK HERE ]


Convert Files Quickly and Easily By Using Cometdocs
From Your Desktop

Cometdocs is an online document management system where you can convert your PDF files to Word, Excel, Powerpoint and more. You can also convert various formats to PDF. Cometdocs allows you to store and share your documents, online, for FREE. Recently Cometdocs released this desktop application where you can complete various file conversions, from your desktop, without having to go to the Cometdocs site.

image

With one right click on a document, you are presented with the file conversion options for that document type. Once you have chosen your conversion, the file will be automatically converted and download to your computer in a matter of moments… GET IT HERE


Nexus 5 expected to debut October 31 in the US – TechSpot

TRICK OR TREAT?: have been following the announcements leading to the development and release of Google’s Nexus 5 smartphone. According to TechSpot, we can expect the release on October 31st…

image

The anticipation and excitement surrounding the upcoming Nexus 5 smartphone and Android 4.4 Kitkat software update have reached a feverish pace, especially when you consider the phone briefly appeared on the Google Play store last week. And if the latest rumors prove to be true, consumers won’t have to wait much longer for the device as the latest suggests it will launch on October 31 in the US… READ MORE


Cryptolocker: How to avoid getting infected
and what to do if you are

@ ComputerWorld

I know I posted information yesterday about Cryptolocker, but this is extremely important. If you become victim of Cryptolocker, you are at high odds of losing your personal files. I have never seen anything like this and I feel, the more I let people know, the better. If you see the below graphic show up on your PC displaying that your personal files are encrypted, you have been nailed!

image

Cryptolocker comes in the door through social engineering. Usually the virus payload hides in an attachment to a phishing message, one purporting to be from a business copier like Xerox that is delivering a PDF of a scanned image, from a major delivery service like UPS orFedEx offering tracking information or from a bank letter confirming a wire or money transfer… READ MORE


This Product Is Not Guaranteed At Release Date of November 22, 2013 Due To High Demand

Xbox One Console – Standard Edition

I love it when I see a new product that is in such demand, you most likely don’t have a shot at it, until months after its’ release.

image

Introducing Xbox One. Where the best games, multiplayer, and your favorite movies, music, sports and live TV come togeather in one place. Xbox One games look and feel incredibly real, with cinematic gameplay that rivals Hollywood. Watch TV or chat with friends on Skype while you play, and keep on playing while smarter matchmaking happens behind the scenes. With Xbox One, you can snap two things side-by-side on your TV, and switch from one to another instantly. Cloud-powered and built for the digital age, Xbox One is designed to keep getting better over time… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com


Today’s Geek Squeaks – October 26, 2013

October 26, 2013

Featuring: What you need to know about Cryptolocker Ransomware; WinX DVD Ripper Platinum Halloween Edition Giveaway; Microsoft’s two-factor logon authentication process; and, An external hard drive that is built to withstand abuse…

Geek Squeaks’ features a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

[ COMMENTS ARE WELCOME – CLICK HERE ]


Cryptolocker Ransomware: What You Need To Know

@ Malwarebytes

Cryptolocker Ransomware is the first type of malware that I have ever seen where, once on your system, it will look for file extensions to files that you commonly use and will encrypt them so that you cannot access them (unless you have the private decryption key). In essence, your files are held hostage and you can only get them back by paying $300 for the decryption key.

image

Cryptolocker will encrypt users’ files using asymmetric encryption, which requires both a public and private key.

The public key is used to encrypt and verify data, while private key is used for decryption, each the inverse of the other… READ MORE


Giveaway! WinX DVD Ripper Platinum Halloween Edition

WinX DVD Ripper typically sells for $59.99…  You can get it now, for FREE, until November 4th.

image

Enjoy any DVD movies on portable players as you wish on Halloween!

No.1 fast DVD ripper with the best image sound effects in the World.

Rip any DVDs to iPhone(5S/5C), iPad, Android(HTC, Samsung, Kindle Fire), WP8, Surface, etc.

Convert DVD to play with media players in AVI, MP4, FLV, WMV, MKV, M2TS, MPEG, etc.

Clone DVD to ISO image/Folder and copy full title/main content of DVD to MPEG-2 file.

GET IT HERE


Keep your Microsoft account safer with two-factor authentication

@ PCWorld

PCWorld has a nice article about using two-factor authentication with your Microsoft accounts.  I highly recommend a person to use this; not only with your Microsoft accounts, but with your Google accounts, as well…

image

If you use Microsoft services like SkyDrive, Outlook.com webmail, or Xbox Live, you have a Microsoft account. If you have a Microsoft account, you might use it to store personal information that you wouldn’t want hackers to be able to get at. You know, credit cards and tax returns and such. Turning on two-factor authentication can help keep would-be data thieves out, and your secrets secret… READ MORE


Silicon Power SP Rugged Armor A30 1TB Shockproof 2.5-Inch USB 3.0 External Portable Hard Drive

In today’s world of electronics, it is a plus when you can find devices that provide shockproof protection.

image

The Armor A30 simply provides the best all-around protection in an amazingly tough and durable enclosure. It offers military-grade shockproof protection by including a shock-resistant silica gel from the internal structure to the exterior which adds an extra shield to withstand shocks and crushes… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com


Today’s Geek Squeaks – October 8, 2013

October 8, 2013

A summary of Today’s Geek Squeaks:

Squeak #1 – (A FREE Start Menu For Windows 8.1): I keep reading that Windows 8.1 will have a Start Menu; however, I also read that it is not the real Start Menu, as we know it. To help you with this, I encourage you to take a look at Classic Shell. The developers recently updated Classic Shell to make it fully compatible with Windows 8.1 (SEE BELOW);

Squeak #2 – (The 5 Links You Should Not Click): ABC has a nice write-up, that you should read to educate (and remind), on what to look for (and not do) to prevent a malware or ransomware attack to your computer… (SEE BELOW);

Squeak #3 – (Desktop Publishing In The Cloud): As cloud computing continues to move forward, I am seeing more and more complex applications being made available. LucidPress’ online desktop publisher is no exception (SEE BELOW); and,

Squeak #4 – (Easily add 9 USB 3.0 SuperSpeed ports to your PC ): In need of additional USB ports? Always go with a powered USB hub. Today I came across a 9-port hub that has built in surge protection and built in ports to charge your devices (SEE BELOW)…

[ CLICK HERE TO LEAVE A COMMENT ]

Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


Classic Shell Start Menu Updated (Version 4.0)

image

Classic Start Menu can replicate the start menus found in older versions of Windows from 95 to Windows 7. You have 3 styles to pick from – Classic, Two Columns, and Windows 7… GET IT HERE


The 5 Deadly Clicks: The Links You Should Never Touch

@ ABC News

image

Here’s a scary scenario. You’re innocently surfing the Web, maybe on an unfamiliar site, not paying close attention. Suddenly your computer screen fills with illegal pornographic images of minors. You try to navigate away, but a warning screen branded by the National Security Administration’s Internet Surveillance Program pops up with the message: “Your computer has been locked due to suspicion of illegal content downloading and distribution.”

You are then offered a sort of Hobson’s choice: Pay a fine immediately, or face prosecution for downloading child pornography… READ MORE


LucidPress – Online Print and Digital Publishing Software

image

Lucidpress is a design and layout app that enables anyone to create beautiful print and digital documents. Sign up free Try the demo Lucidpress in 60 seconds Perfect for print Create stunning documents in less time than ever before… GET IT HERE


Anker® USB 3.0 9-Port Hub + 5V 2.1A Charging Port with 12V 5A Power Adapter

image

Easily add 9 USB 3.0 SuperSpeed ports to your PC and enjoy data transfer rates of up to 5Gbps for faster sync times.

Additional charging port (2.1A) offers enough current to charge either a smartphone or a tablet at high speed. USB 3.0 ports supply 0.9A each.

Lightweight, “power-bar” design effectively saves space. Blue LED indicates normal operation.

Designed with a built-in surge protector to keep your devices safe. Supports hot swapping. No installation of drivers required for Windows XP / Vista / 7 / 8 or Mac OS X 10.2 and above.

 CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com