Sunday, August 16, 2015

How To Check Wifi Strength

Below are some tools that will assist in checking wifi strength.

Desktop Software

WifiInfoView by NirSoft 
"WifiInfoView scans the wireless networks in your area and displays extensive information about them, including: Network Name (SSID), MAC Address, ...."

"Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, ...."

Smartphone Apps
Wifi Analyzer for Android
The advantage of having such smartphone app is that it is easier to carry the smartphone around the premises and analyse the wifi signal strength instead of carrying the laptop around. 

Wifi Solver FDTD
$0.99 to buy (as of 17 Aug 2015)
This app is supposed to be based on some seriously advanced computational solver on electromagnetics signal. The downside is that the app is not free.

Sunday, August 09, 2015

News - Windows 10

Windows 10

Here are some articles and links to things associated with Windows 10


// CRN

Not so fond of the new OS? 


// CRN

And how to avoid them. 


// Lifehacker

With Windows 10, settings are split between the Control Panel and the Settings app. If you’d like an all-inclusive starting point for Windows commands, enable God Mode.
, and it’s alive and well with Windows 10.

To enable it, you do the same thing as previously: Create a new folder on your Windows desktop (New > Folder) and save it with the text below:
When you open that folder, you’ll have god-like access to 260+ functions and tools, some of them different from previous Windows versions. You can also drag and drop any of the commands to your desktop to create a shortcut for the command, which is especially helpful since the settings that have moved to the Settings app, while pinnable to the Start screen, aren’t able to be drag-and-dropped into shortcuts.
 | SuperSite for Windows

Sunday, June 21, 2015

Privacy for Linkedin

A few tips regarding privacy on using LinkedIn.

1. Click on your little photo on the Top-Right of LinkedIn page (after you have signed in)

2. When the Drop Down menu appears, choose "Privacy and Settings"
Then it will present on the bottom half of the page, four tabs on the left side:
- Profile
- Communications
- Groups, Companies & Applications
- Accounts

Choose Profile

3. Stealth Mode 
After choosing Profile, then under the Privacy Control, choose:
"Turn on/off activity broadcasts"

This appears to be the best option if you are finding job, updating your profile, and don't want your connections to know about your activity.

After choosing Profile, then under the Privacy Control, choose:
"Select who can see your activity feed".

I think this is also needed to be controlled, to be in stealth mode. Choose the "Only you" option.

"Your activity feed displays actions you've performed on LinkedIn. Select who can see your activity feed."

4. Blocking
After choosing Profile, then under the Privacy Control, choose:
"Manage who you are blocking"

Be careful with this because this will break your connection with another person. Although they are not notified, they will know that you are no longer connected if they check their connections list.

"Need to block or report someone? Go to the profile of the person you want to block and select "Block or Report" from the drop-down menu at the top of the profile summary. Note: After you’ve blocked the person, any previous profile views of yours and of the other person will disappear from each of your "Who’s Viewed My Profile" sections.

5. Manage your connections 
After choosing Profile, then under the Privacy Control, choose:
"Select who can see your connections."

Not sure how useful this is. The tip says:
"Note: people will still be able to see connections who endorse you and connections they share with you. (Don't want your endorsements visible? Just choose to opt out.)"

Hiding LinkedIn Job Hunting Activity from Your Connections

How to Make LinkedIn Updates Without Showing It in the Stream

Showing or Hiding Activity Updates About You
How do I control the updates I broadcast about myself?

5 LinkedIn Privacy Settings You Need to Know

5 LinkedIn Privacy Settings For Job Hunters

LinkedIn Best Practices
Manage Account Settings

Saturday, April 04, 2015

Security - USB Antivirus, Scanners, Immunizers

Here is a list of possible software to guard your PC against an infected USB key flash drive

Panda USB Vaccine
Immunizes both the PC and the USB key.

Bit Defender USB Immunizer
"The USB Immunizer replaces any autorun file on the drive with a special one that can’t be deleted or modified by malware anymore. If you plan to to use your own autorun.inf file, then we’d recommend that you don’t immunize the drive, as you’ll lose your original file. Unfortunately, this is the only available approach to mitigate the effect of autorun malware.
Gaijin USB Write Protector
Make the USB key write protected. Does not need to install software.

Autorun Disable

USB Guardian
Isolates the autorun.inf file and prevent access to it.
Parses the autorun.inf to look for other executables, then locks those executables too.
The user can run any other files which are not locked.

USB Defender Mbentefor Projects

USB Flash Security
Protects the contents of the USB key with a password.

TrendMicro USB Security
Not Free. $19.95

One way a malware can make use of USB to transfer malicious code, is to modify the autorun.inf found in the USB to automatically run malware. Knowing this, one way to solve this problem would be to make the autorun.inf unmodifiable.

Sunday, February 01, 2015

Uninstall - Trend Micro Titanium Antivirus Security Suite

Uninstalling the Trend Micro Titanium Security suite has not been a pleasant experience for me. The usual techniques below don't work.

  1. Uninstall by going to "Programs and Features"
  2. Stopping Trend Micro services from the "Services". Even "Run As Administrator" would not allow the service to be stopped.

At the moment I have found a few useful links from other sites such as:
One trick that seemed to work, thanks to the links above, is go to the START button on Windows (sorry Windows 8), 
- look under All Programs 
- look for Trend Micro folder
- go to something like More Tools and Help
- look for something like: Trend Micro Diagnostic Toolkit - run this.

Group Feature selection -a Binary Way

Suppose there are T distinct types and each of these types is labelled as 1,2,3,4,....,T. Let any of these types be represented as t.
And suppose we want to have various groups and each group is a combination of types. There are G groups in total and each of these groups can be labelled as g = 1,2,3,....G.

Each group can be composed of types as the following example:
g=1 has types  {2,3}
g=2 has types {1,2,3}
g=3 has types {1,2}

Then suppose that for each group g, it is required to randomly select a type which belong to the group.
Here is a method that is designed to be general and although may not be the the most efficient, should be efficient enough for small T.
The types are represented as binary as follows. Example with T=3
t=1 -> 001
t=2 -> 010
t=3 -> 100

The groups can be represented by combining the binary representation for the types. So using the example of the groups above, if g=1 has types {2,3}, then the group is the binary sum of the types:
   g=1 -> 010 +100 = 110
   g=2 -> 001 + 010 +100 = 111
   g=3 -> 001 + 010 = 011

Now for a particular group, it is required to select types which belong to that group. However for general efficiency, it is desired NOT to distinguish between any groups while selecting the random types. So there will be some wastage in this procedure, but it should be fast.

So here is the general random selection process to select any type t from 1....T. Let r be a random integer number from 1....T. Construct a binary representation of the random number, such that:  b=2^(r-1).
The table below shows the representation for various random numbers:
r=1: b=0 -> 001
r=2: b=1 -> 010
r=3: b=2 -> 100

To apply the random selection, simply apply the AND operator on r and g. So using the example of g=1->110, the combination with each of the random numbers would yield the following:
g->110 AND r->001 => 000 no type is selected
g->110 AND r->010 => 010 type 2 is selected
g->110 AND r->100 => 100 type 3 is selected

This algorithm can of course be made more efficient, but that is left for another bright person to accomplish. The present algorithm is efficient already due to use of simple random integers and binary operations and avoiding the use of decision logic like if-else.

Monday, January 26, 2015

Where to get free graphics

Graphics or pictures or images are very useful when we want to illustrate something on our webpages, blogs or other work. It is very easy, but sometimes not right to simply search for images on the internet and use them without permission. There are however, places on the internet that allow pictures to be used for free.

The aim of this post is to put up a list of sites that allow users to use the images for free.
2. Images under Creative Commons licence.

Friday, January 16, 2015

How to Check for Spyware, Malware Infection

This article will present various ways to check whether your PC is infected by malware, virus and other nasties. Firstly, here is a recollection of other related posts in this blog, so I will show the link here instead of writing the same material again. The new material will be after that.

How to Check for Botnets

Security - Protection against Botnets

Windows Server 2008 - Firewall, Antivirus, AntiSpyware

Security Software Review, Discounts and Special Deals

Links to Smartphone Mobile Security Software

Malware: Windows Enterprise Defender and Windows Diagnostics

Online Scan - PC tools

Online Scan - Websites

Online Scanning websites and links for virus, malware, spyware

Online Scan - AntiVirus

Now for some new stuff. Some tools that can be downloaded and used are:

Google and download: TDSSKiller
- Start tdsskiller - Run as Administrator.
- Click on Change parameters.
- Check all options except "Loaded modules" and click OK.
- Then click on Start scan.
- When threats are found, choose the Skip option for all of them, instead of deleting.
- To open the log file, click on Report. Or it can be found in :\TDSSKiller.<version_date_time>_log.txt

Google and download: Farbar Recovery Scan Tool.
- Start FRST - Run as Administator.
- Select the option Addition.txt as well as others selected by default. Press the Scan button.
- FRST will create two logs - FRST.txt and Addition.txt - in the same directory the tool was run from.