Monday, May 22, 2017

What Kind of Currrency Is Bitcoin


   Bitcoin is a type of digital currency. It is not controlled by anyone. There is no bank, credit card or third party that you have to go through.. It is not a printed currency. Bitcoins are produced by people . Transactions do not need any middlemen. Transaction fees ear not needed.  You do not even need to give your real name.  Persons and companies dealing with wholesale trade are beginning to accept this currency also known as cryptocurrency. With Bitcoins you can buy things electronically. It’s similar to dollars and euros that can be traded digitally.
  The thing that makes Bitcoins different it is because it is decentralized.  No single organizations like ( Banks ) control their money. In some ways, it makes people safe because no large institution controls their money. This currency is not printed by a Central Bank. It is not accountable to people as a whole because it makes it’s own rules. Bitcoin is created digitally by people . This cryptocurrency is created digitally by group or community of people and anyone can join. This currency is mined using computing power in a distributed network.
   
   You cannot have unlimited bitcoins and that is their official procedure. Only 21 million bitcoins can be created by miners and this is what make bitcoins work. It can be divided into smaller parts ( the smallest divisible amount is one hundred millionth of a bitcoin and it is called Satoshi after the founder of Bitcoin ). It’s founder is Satashi Nakamoto. it’s an alias for an anoymous programmner launched in 2009. Conventional currency is based on gold and silver. That is not so with bitcoin , it’s based on mathematics.  There is a mathematical formula done by people that produces bitcoins . This formula is available and you can check on it. It is an open source. You can take a peep on it and see what it does

   Here are it’s Features:

1, It Is Not Controlled By One Central Authority

There is no one central governing authority. Every machines that mines bitcoins and summons a series of transactions is part of the network and the machines work together. That means that one machine can’t play around with monetary policy and cause a disastrous event. It cannot take away bitcoins from them.  If the network goes off line, the network keeps on running.

2. Very Easy To Set Up

With Banks you will have to sign a lot of documents to open a bank account. You can set up bitcoin addresses in seconds. There are no questions asked and no fees to be paid.

3. Your Identity is Anonymous

You can have multiple addresses and  they  are not connected to names, addresses and your personal identification is not known.

4. Transactions are Transparent

Bitcoins keep every details of your transaction by using a general ledger called blockchain which reveals everything. If your bitcoins are on a public address. They can tell how much bitcoins are kept on that address. They just won’t know it’s yours. You may make your transactions non-transparent on the bitcoin network. You may do this by not using the same business addressses consistently and do not distribute a lot of bitcoins to the same addresses.

5. Transactions Fess Are Almost Nothing

Banks will charge you a certain amount for transferring fees while Bticoins won’t charge you. If they do it’s just a tiny amount.

6. Sending Money is Fast

Send money anywhere and it will arrive in minutes , when the bitcoin has processed.

7. Non-Refundable

The moment you send your bitcoins, you cannot get it back. The sender has to give it back to you.

1 bitcoin as of today cost $2,165.51 dollars.






Friday, May 19, 2017

What are The Two Types of Ransomware

  Ransomware is a type of malware that will limit or stop computers users from accessing their system. It will lock your system screen or lock the user’s files until you pay the ransom.There are two types of Ransomware:


1. CRYPTO RANSOMWARE - This is a kind of ransomware that encrypts files on your computers and even your mobile devices . The encryption will scramble the contents of the file. When this is done, your files become illegible. This means it becomes unreadable. You need a decryption key for your device to become normal again. The hacker is holding you as a hostage until you pay the ransom demand. You will see the demand of payment on your screen. When payment is paid, they will give you the decryption key. There are many forms of crypto – ransomware.
   Here are some types of CRYPTO RANSOMWARE:

a. Apocalypse  Ransomware - This ranmsomware encrypts the victim’s file and then it will change the extension of the encrypted files to .encryption files.  The victim now will have to send an email for instructions on how the ransom must be paid. It spreads through spam email.

b. Crypto  Ransomware 2.0 - This ransomware also encrypts the files and it becomes inaccessible. Your files will be all muddled up. This way you cannot get your files back. Your restoration mode and return to previous mode is taken out from the system. Spam campaigns and malvertising are used to distribute this ransomware

c. CryptoLocker Ransomware - This ransomware spreads through infected email attachments and botnets. Botnet is a collection of internet – connected user computers infected by malware that allows computers to be controlled by a bot herder ( operator ). The ransomware encrypts certain types of files that are kept on network drives using RSA public- key cryptography. The key is kept on the malware’s control services. This ransomware will display a message which offers to decrypt the message when payment is made. You are not sure whether the cyber hacker will decrypt the message.

d. Decryption Max Ransomare - It encrypts the file of a victim. It will add .Crypt,.pzdc.extension after each file that was encrypted.  The ransomware will now change the wallpaper of the victim with a snapshot image of how the ransom must be paid so that you can get the key for the encryption.

2. LOCKER RANSOMWARE - It is also known as computer locker. It will not encrypt your files but it will not allow access to your computers and other mobile devices.  It will lock the user interface and then it will order you to pay the ransom. It will leave you very few choices. You could communicate with the hacker ( attacker ) or just pay the ransom.

    Here Are Some Of Forms LOCKER RANSOMWARE:

a. Department Of Justice Ransomware -  This ransomware will create a registry entry. Once this is running on your computer, your device will shut down and your system will be completely locked . You will not be able to do any work or task. This ransomware will order you to pay a certain amount of cash through Paysafe or Moneypak card. This is a big scam and you won’t be able get your money back.

b. Urausy Police Ransomware - Also known as Police Virus or FBI virus ( Trojan ). It will determine the place and country location. It will download a variety of Trojans.  After this is done, it will start creating false notices from a police force in your location. This is usually spread through fake updates and email attachments. Once this gets in to the system of your device, it will show a ransom note page. It will now order you to pay the ransom using money gram, money pak and Bitcoin. You may never get your files back if you don’t pay.  This is another scam.

c. Ophion Locker - It will encrypt  data with ransoms that will differ from country to country. This  ransomware  is dispersed through online advertising campaigns. It will trick you to click on a certain part of a website. When you do this, it takes hold of your computer.




Wednesday, May 17, 2017

What You Can Do To Prevent Ransomware Attacks

   Last May 14, 2017 was D-DAY for a lot of companies that were using Windows OS Systems . I am referring to Windows XP, 7, 8 and 10. Thousands of computers were struck hard by the ransomware Wanna Decrptor Ransomware more popularly known as WannaCry Ransomware.  A lot of big organizations in 150 countries were hit and were asked to pay a ransom amounting to $300. The total amount syphoned off by these cyber criminals reached $53,000 plus. Cybercriminals are the worst and most vicious hackers out there on the internet. There are around 450 types of rmalware that can infect your computers If you are not protected. Ransomware is a kind of malware.
   Here are some ways you can protect your computers from infections of these kinds:

1. Know the Patch Of Your Windows OS  - Every Windows OS has a patch. If you are using an older verison of Windows, you will have to go to the Microsoft Windows Website to get the right patch. A patch is a code that is used as an add - on to update a software. In this case it is Windows OS.  You can do the same thing for Windows 10. I know that Microsoft issued a patch last March for Windows 10.

2.  Always Enable Your Automatic Updates - Everyone who uses Windows OS must enable their automatic updates. It is for your own good.   This will help you in protecting your computer from malicious software. Security issues can be identified when your Operating System is updated. You may be running an anti – malware or anti – virus program but you still need to be amply protected.
3. Use Only Proper Software – many causes of infections come from third party software.  Pirated software are the causes of a lot of infections . Your Windows OS must be a legal copy. You won’t be issued patches if you are using an illegal Windows OS.  If you are using an illegal Windows OS, you are susceptible to all kinds of attacks.

4. Always Be Protected  - Do not just keep on downloading files and not knowing that the files have been infected. Get a credible Anti - Malware Security software.

5. Backup Your Files - You need to backup your system on a constant basis. If you lose your data, you can recover it. You can use an external hard drive or store data on Cloud for this purpose.  Catastrophes can happen like being hacked by cybercriminals who use any type of ransomware to demand payment.  Companies and other large organizations should have a systems administrator that will regularly update their network.
   It is always better to be alert and aware that the e are cyber criminals out there ready to steal documents and demand payment.

   

Monday, May 15, 2017

What Is Wanna Decryptor Ransomware

   Wanna Decryptor Ransomware ( A.K.A. WannaCry )  is a type of malware comes in the form of a Trojan and it is transmitted through a loaded hyperlink that can be transferred through a loaded hyperlink that can be unintentionally opened by a victim through an email, advert on a webpage or Dropbox link. Once it is activated, this program spreads through the computer and all the files will be locked down with the same encryption used for instant messages. The moment the files have been encrypted , all original files will be deleted.  It will now give out a ransom note in the mold of a readme file. Your wallpaper will be changed and will demand payment to return the files.  It’s a type of malware that modifies files in the /Windows and/windows/ system32 directories and it can identify other users on the network that it will infect.  Both these actions need administrative privileges. This type of attack also can spread by phishing emails and unpatched systems like a computer worm. The payment is usually done in Bitcoins. One bitcoin is equivalent to $400. This problem can occur when you do not update your Windows OS.
   Last Friday, this vicious ransomware hit at least 200,000 computers  in at least 150 countries. Hospitals, major companies and government were the ones really affected by this malware. A 22 year old security researcher whose identity is known as Malwaretech  was able to register the domain  and keep it from spreading. Although, it  has stopped  spreading for awhile. It still can damage computers when people open their computers on Monday morning May 15, 2017. This malware is still hanging around inside computers that have not been used since Friday May 12, 2017.  Other attacks may still emulate. I call this a criminal attack because it affected hospitals in the U.K. and Scotland. They cannot use their s MRI scanners and other equipment like refrigerators for blood storage. As of May 14, 2017 $33,000.00 has been paid in ransom. It still may escalate higher come Monday morning May 15, 2017. Just be careful and always be protected by acquiring very good AV products.



Sunday, May 14, 2017

What Is Backdoor. Mac.Eleanor Malware

   This Malware was discovered by Bitdefender in May 2016 and they named it Backdoor. Mac. Eleanor.  This was the second malware to attack APPLE Computers . The first malware to do this was KeRange. This malware can come in to your computer when you open the app called EasyDoc Converter. This is a drag and drop converter. EasyDoc converter will install a wide range of malware in your laptop or destop computer. This fake file converter app once installed will download a malicious script. After it is installed, it will pick up a lot of tools that can take hold of Face Time camera. It will download files and execute  commands and it will send emails that have attached files. Face Time camera  can be accessed because this dubious app has a tool known as “ wacaw .” This is an open camera tool.
  

   If you do not have a tool known as little Snitch, this malware will creep in by installing three launch agents in the user folder and it will have a folder that is hidden. All of these folders contain executable files. They seem to be legitimate Dropbox  elements but they are not. The legitimate Dropbox is located in your user user folder. This fake dropbox is located in your  user's library folder. This three launch agents will trigger the Tor hidden service, a web service and a Patebin service. What the Tor service will do is set up an address. This way the hacker can send commands to the computer that has been infected. Patebin is used to upload the infected Mac. Tor address  to Patebin where the hacker can find it. Patebin is a popular website for storing and sharing text. It’s usually used to distribute legitimate data. Hackers use it to deposit stolen information,

    This is really dubious and bad malware. Apple has removed EasyDoc converter from it’s update. It is still out there in the internet . Do not download this type of software from the internet. Do not download apps that have not been updated. Always be aware of what you are downloading. It maybe 2017 now but this malware might still be on the internet. It is best to be protected. Get an Anti-Malware that is suitable for Macs and always keep your Gatekeeper enabled.

Wednesday, May 10, 2017

What Are The Types Of Spyware That May Invade Your Computer

   Spyware means any software that can get information from your Laptop and Desktop computer  without your prior knowledge. There are two classes of spyware: ( Domestic and Commercial ). Domestic spyware is a software that you buy and it acts like a watchdog. It tracks down the behavioral patterns of your internet activity. Business owners buy this type of software so that they can look into the online activities of their employees. Parents can even buy this type of software so that they can look into the internet activities of their children. All you need is a computer network and these things can be done. A third party can also install this software onto your Laptop or Desktop without your knowing it. These criminal hackers will do this to get valuable information from you.  Commercial Spyware is known as adware.  Companies that usually sell things use this kind of software to track down what you do on the internet and then they sell the information to marketers. These marketers will then send you advertising ads that will fit your needs.  Never click on suspected malicious links or any link that you are uncomfortable with.  It may be disastrous because you might be allowing hackers to steal your important passwords.

   Here are the most common spywares:
1. Chat loggers and email recorders  - These types of  Domestic  spyware will make a duplicate copy of all your chats, outgoing and incoming email.

2. Keyloggers and Password recorder - When this type of spyware enters your laptop or desktop computer it will record any key entry you make on your keyboard.  It is risky because someone out there is on the prowl looking at every key entry you make. Passwords can be stolen
3. Internet URL loggers and screen recorders  - This Domestic spyware  looks in to whatever you are doing online. URL loggers record the sites that you visit. Screen recorders take photos of your screen every time it is changed.

4. Browser Hijacking - There are a lot of hijackers on the web and they accomplish this by putting a lot of traffic stats on their website. Their aim is to have higher advertising revenues.

5. Web Bugs - This is just annoying because you will have a lot of pop  up ads showing even if you are not online.
6. Modem Hijacking – If you are using a telephone modem for your internet needs, you can be at risk. No passwords are stolen but it will install an online dialer. These may come in spam and porn emails. Never click on these type of emails. This will install a new internet connection that may be real expensive. You will get shocked when you receive your next phone bill.

7. PC Hijacking – If you are using a high speed internet, you can become a primary target.  These criminal hackers will use your IP address to send a lot of spam emails.  You will not know but you will be receiving many complaints about spam emails coming from your IP address.

8. Trojans and Viruses -  Trojans  may seem harmless but for me it is not. It can destroy your data, copy it and even distribute it. A virus is almost the same, it can repeatedly copy itself and it can damage many computers. Trojans can also be used to transfer a malicious virus or other spywares without being detected by an anti – virus program.


   My advice is that people using Laptops and Desktops must get  a reliable anti – spyware program.

How To Keep Your Laptop In Shape And Safe

   You need to take good care of your laptop because all of your important documents are stored in this machine. If you do so then your laptop can last for a long time.  Give this machine your attention and treat this like your own precious possession. If you can take care of your car, why not take care of your laptop. You need to check on your laptop, since you use it frequently. A damaged laptop is of no use to anyone. The performance of your laptop may suffer, if you do not keep it in shape.
    Here Are Some Ways To Keep Your Laptop In Shape:

1. Clean The Screen of Your Laptop  -   Use a microfiber cloth to clean your screen. Dust can stick to your screen. You can buy a certain type of liquid that is designed to clean laptop screens. Do not use any kind of cleaner because this can ruin your screen.  As for me, the microfiber cloth is the best way to clean your screen because it does not produce lint.  Just wipe your screen gently and this type of cloth will remove the dust.   Do not use alcohol because this can permanently damage your screen.

2. Drain Your Battery  -  Do not keep on using your laptop when your battery is fully charged and your charging adapter is plugged to an electrical outlet.  Doing this will ruin your lithium-ion battery in the long run. Drain your battery to at least 20% and then recharge it. You can use it by removing your battery and using the electrical outlet to power your laptop.

3. Clean Your Keyboard  -  Before doing this power off your laptop. Use a melanine sponge and soak it in water. Let it dry. This way there won’t be any speck of water left in it. Gently rub the corner of the sponge on the dusty and dirty pats of the keyboard. Do not rub so hard because the letters on the key characters may be removed. You can use other kinds of sponge but it will not be as effective a s the melanine sponge.

4. Do Not Eat Or Drink Near Your Laptop -  You have to keep your laptop out of danger.  Spilling any type of liquid like water on your laptop can ruin your motherboard. Laptop motherboards are very expensive. It is better to be aware of this, then feel sorry afterwards.

5. Keep Your Laptop On A Flat and Clean Surface – This way your laptop will not fall and  get damaged.  A clean surface is better because your laptop will not accumulate dust. Do not use your laptop while you are in bed because it can accumulate dust.

6. Have The Right Bag For Your Laptop – Since a laptop is a portable machine, you will have to carry it using a shoulder bag or a backpack. It must have padded portions that are made especially for laptops.

7. Clean Your Laptop Fan – You can do this by acquiring a camera lens air duster. Make sure that your laptop is powered off before you start.  After that, you can insert the nozzle of the air duster into the vents. Make sure you get as close as you can and then start blowing the dust. The fan blades should stop turning and this can be done by inserting a long plastic object to stop it from doing so. You can also open the laptop. If you are not accustomed to this step, bring it to a certified computer technician and let him do it. You will have to pay a certain fee.  If your laptop starts to hum, it might mean that you have to replace your fan.

8. Never Leave Your Laptop Inside Your Car - There are prowling thieves out there. If they see a laptop in your car, they can cut out the window glass of your car and get hold of your laptop.  This is a valuable item.  Do not tempt the thieves.

   
   These are just some tips that any laptop owner must know.