Wednesday, April 28, 2010

How to Seamlessly Run That One Windows App You Need on a Mac

Want to run Windows app on a Mac with OS X? Computer Renaissance would like to share with you these useful tips.

How to Seamlessly Run That One Windows App You Need on a MacLove OS X but have that one stubborn app you can only run on Windows? With the right tools and setup, you can run individual Windows apps seamlessly on your Mac desktop, as though they were always meant to be there.

Over the years, we've covered virtualization, virtual machines—that is, running full-blown operating systems inside your main OS—quite a bit. What we're going to detail here, however, is not so much the setting up of one operating system (Windows) inside another (Mac OS X), but a setup that makes running one or a handful of must-have Windows applications on a Mac simple and seamless. It makes things much easier for non-expert computer users who just need access to an app that there isn't a Mac version for, and it makes the user experience feel less disjointed and cobbled together. When you're done here, you should be able to run that must-have Windows app on your Mac as though it's just another Mac application.

We'll highlight two methods for achieving this kind of setup. One is with Parallels, which is easy to set up, offers great OS X integration, and isn't entirely cheap. The other is withVirtualBox, an app that's free on any platform, but requires a good bit more fiddling, and doesn't offer all the just-works options of Parallels. (Skip straight to the Parallels orVirtualBox sections.)

Method One: The Parallels Solution

At about $80 for a license, Parallels (Desktop 5 for Mac, in this case) is not exactly free, we know. Parallels is, however, a really smart, attractive, and powerful virtualization tool built for one purpose: making Windows applications accessible on a Mac. If you have a Windows disc and license handy—especially Windows 7—it makes Microsoft's operating system feel like it was made to fit inside a Mac.

The shortlist pitch for why you should consider Parallels for your Mac:

  • Windows app icons on your Dock: Not everybody uses the Dock, but those who do will find it very helpful to have both individual application icons on it, rather than having to hunt them out in a virtual Windows desktop.
  • Virtual Windows folder: If you need access to a few Windows apps and components on a regular basis, Parallels keeps a Windows-badged folder stocked with everything stashed inside your virtual Windows installation.
  • File type associations: If you need to open Microsoft Word .doc files inside an actual Word app inside Windows, and not with Mac's own TextEdit app, Parallels can make that happen. If the Mac has no idea what the file is, but a Windows app might, Parallels is on top of that, too.
  • Look and feel: It's not an essential tool to getting work done, but having your desktop feel integrated, and your applications feel like they belong on your computer, can matter more than you'd think. Parallels does a pretty great job of forming the windows, buttons, and frame of Windows applications so that they feel right on a Mac.

Adam had previously detailed running Windows apps on a Mac with Parallels, but Parallels has come a long way since 2006, and it's worth taking a look at the most seamless integration around.

How to Seamlessly Run That One Windows App You Need on a MacIt's also worth noting that Parallels doesn't always cost $80. You can try it free for 15 days, upgrade from older versions for $50, and often find promotions around the web that get you the app for less, or get you Parallels in combination with other software. I found a coupon link that bundled Parallels with H&R Block at Home. I didn't really need that, but it also mailed me a CD copy of Parallels (normally $6 extra) and a year's license to download the software (another few dollars extra), and it all came in under the total cost of what you'd normally pay. Shop and Google around.

I'm going to run through the installation of WordPerfect, an application some engineers, lawyers, and folks working in offices with IT policies that refuse to die must sometimes rely on. I'm setting it up on a MacBook so that the user—who may, in fact, be married to me—has the easiest possible access to it. When a WordPerfect file arrives via email, double-clicking it opens up WordPerfect. WordPerfect is added to the Dock, it looks (mostly) like a Mac app when it runs, and the virtual machine that supports it in the background disappears when it's closed down. Here's how to get there.

Install Parallels and Your Windows Application

Installing Parallels itself is fairly easy—grab the download from Parallels' site, double-click the resulting file, and enter your Mac administrator password to proceed. When it's finished installing, if it doesn't happen automatically, go ahead and run Parallels Desktop yourself for the first time—head to the Spotlight menu in the upper-right corner, type in Parallels, and hit the result.

How to Seamlessly Run That One Windows App You Need on a MacYou'll get a window that only has one real option, to create a new virtual machine. The easiest way to go through the process is use an installation DVD, though if you've got your installation disc stored as an ISO or Mac disk image, you can go ahead and point Parallels at that, too. Proceed through the Windows installation, and when you're done entering your license key, user name, time zone, and the like, and moved through the virtual reboots, Parallels will be running on your desktop—a full Windows installation inside a little window.

How to Seamlessly Run That One Windows App You Need on a MacIf you've got an installation disc for your application, the easy thing is to just insert it. Parallels will likely detect that it's a disc with a Windows auto-run application and launch a familiar Windows pop-up, asking if you want to run "Install.exe," "Setup.exe," or whatever your disc offers. If not, open the CD from your Mac desktop, then double-click on any install/setup files that seem to have two red lines, looking like a pause symbol, attached to them.

If you're looking to install from an executable package you can download, the easy solution is to open Internet Explorer from the Windows frame (or the Windows-badged folder that just showed up on your Dock), head to the software's web site, then download and run the installer right from the web. If that doesn't fly, you can always just drop the .exe file or installation folder onto a USB drive from your Mac OS, then un-plug it and plug it back in. By default, Parallels should automatically pick up the device and offer it to Windows. If it doesn't, right-click on the glowing Windows-like icon on your dock, hover over the Devices menu, and then select the drive you've dropped it on.

Got your application installed? Let's make it so it runs like any other Mac application.

Fine-Tuning Your Parallels Setup

How to Seamlessly Run That One Windows App You Need on a MacSee that folder that's now sitting on the far-right side of your folder bookmarks? It contains the majority of applications contained in your little self-contained Windows installation. Click on it, then pick out the application you just installed and click that. In almost every case, you'll witness the small miracle of a Windows application launching inside a Mac. It may look a little incongruous, with its Windows title bar and coloring, but we'll fix that right now.

How to Seamlessly Run That One Windows App You Need on a Mac

Once your virtual Windows is launched, Parallels adds a Start-Menu-style Windows icon to your dock. Right-click on it. Head up to the View menu that pops out of the Start button and select "Coherence" in the top-most section, if it's not already selected. If you don't see it, your Windows machine has already paused or suspended, but you can start it back up by hitting "Resume" from the Actions menu. This sets Parallels to hide away the bulk of Windows—the desktop, the taskbars, nearly everything—so that the only evidence of Windows you see is the window for the application you're using, along with one or two Dock icons. From the same right-click menu, under the "View" section, choose "Use MacLook." This applies a theme to Windows that makes it a good bit less incongruous when its applications are running on your Mac screen.

How to Seamlessly Run That One Windows App You Need on a MacBack to that application you've got running in Windows. If you're using your Mac Dock to launch applications, right-click on the icon of your Windows app and choose "Keep in Dock." If you're more inclined to launch an application from Spotlight or Quicksilver, you should be able to find your app, since there's already a shortcut created inside that "Windows Applications" folder on your Dock. Want to put the shortcut somewhere else? Right-click on that folder full of Windows applications, then simply make a copy of the shortcuts you need, wherever you need them.

File Associations, Shared Folders, Auto-Suspending

We're now going to configure our Windows virtual machine for a little smoother integration. Open up Parallels Desktop from Spotlight, hit the Virtual Machines menu, and select "Configure." If you're using a Dock, you can also right-click on the glowing Windows orb and select "Configure."

How to Seamlessly Run That One Windows App You Need on a Mac

Hit the Shared Applications category on the left, select your crucial Windows application, then click the SmartSelect button in the resulting panel.

How to Seamlessly Run That One Windows App You Need on a MacIn the case of WordPerfect, it uses pretty specific file formats not used by other applications, so you can see that Parallels has already informed the Mac that if it encounters a .wpd file, it should launch the virtualized WordPerfect and pass that file to it. Other applications may use formats that a Mac can open, too—Word files, particular image files, and the like. You can get specific in this menu, parceling out, for example, basic JPG and PNG opening to Mac's Preview, but opening TIFF files in that one Adobe app you only have a Windows copy of. In any case, when you see a file in your Mac that your Windows application will end up opening, you'll know it—the icon will be formatted for that app, and have the distinct Parallels "stripes" in the bottom-right.

How to Seamlessly Run That One Windows App You Need on a Mac

Now, in the Shared Folders category, you can choose to keep your Mac home folder—containing Documents, Music, Pictures, and all your stuff, really—shared with Windows, which makes it fairly easy to trade files back and forth to an application like WordPerfect. You can go one further, though, by "sharing" your Desktop or Documents folder with Windows. Check off the options if they're there, or hit the + button and set up the synchronization between your Mac and Windows desktops and documents. Now, when you've got an app like WordPerfect running, you don't have to dig into your Mac home folder to find a place to save. Save a file to what Windows considers its own Desktop, and it'll show up on your Mac Desktop.

How to Seamlessly Run That One Windows App You Need on a Mac

Finally, in the Startup/Shutdown category, I recommend the setup pictured above. Your virtualized Windows suspends itself when nothing is happening with any Windows application, which saves you memory and battery power, but makes it fairly quick to pull applications back up when you need them. Setting the startup view to Coherence also eliminates having to watch a glitchy Windows desktop appear and disappear as it boots up. On the Mac's shutdown, I like to quit out of Parallels, so it's a clean slate when starting up again, but you can set Parallels to suspend its machine instead when you power things down.

That's how I set up WordPerfect to run on a MacBook in such a way as to be nearly invisible as a Windows application. There are many, many more settings you can explore, including those that set up the keyboard shortcut equivalents between Windows and Mac applications, but those are best discovered and configured to one's own tastes.

Not quite sold on the utility of Parallels over a DIY solution? Here's how you can achieve nearly the same end result, though with, admittedly, less convenience and cohesion.

Method Two (the Free One): VirtualBox in Seamless Mode

How to Seamlessly Run That One Windows App You Need on a Mac
VirtualBox requires a bit more hands-on operation to get Windows 7 installed. Luckily, we've run down those operations before. Consult our beginners guide to creating virtual machines in VirtualBox for help getting Windows installed. If you'd been considering a Boot Camp installation, or already have Windows installed in a Boot Camp partition, you can still benefit from VirtualBox. Blogger and entrepreneur Anil Dash has written up a guide to running Windows 7 under Mac OS X 10.6 for free, which makes your Boot Camp installation VirtualBox-friendly and then links the two up for the best of both worlds.

How to Seamlessly Run That One Windows App You Need on a MacAfter you've got Windows 7 installed, you'll want to be sure to install VirtualBox Guest Additions, which is really a two-click process—hit "Install Guest Additions" from the Devices menu of VirtualBox, and then choose to run the installer when when it pops up. Restart your Windows installation after it finishes. Fire up a new "Seamless" option by selecting it from the Machine menu, or hitting Left Command+L.

How to Seamlessly Run That One Windows App You Need on a Mac

You'll notice that Windows basically disappears—except for your toolbar/taskbar, which hovers over your Dock, or at the bottom of your screen, if you don't use a Dock. That's, well, ugly. Right-click on the Windows taskbar, select Properties, and look for the option to auto-hide the taskbar.

How to Seamlessly Run That One Windows App You Need on a Mac

Now it's out of the way, but what about when you need to get to something? VirtualBox lets you assign a key, or key combination, on your Mac to represent the Start menu. It's Ctrl+Esc by default, but you can change it in your VirtualBox preferences. Given the power of the Start Search feature in Windows Vista and 7, it's easy to launch applications by typing out the first few letters—kind of like Spotlight. When applications launch, they get a Mac-like window frame, and closing them means Windows basically disappears.

How to Seamlessly Run That One Windows App You Need on a Mac

Be sure to head into the settings of your Virtual Machine for Windows and set up the Shared Folders. It's not that much harder than Parallels, really, but the way they show up—as network drives—is a bit different. You can connect your Windows and Mac desktops and document folders for easy file saving and retrieval.

How to Seamlessly Run That One Windows App You Need on a Mac

To finish up making your VirtualBox a bit more convenient than just running a Virtual Machine, learn the keyboard shortcuts for pausing the machine when not in use (Left Command + P), and be sure to choose the "Save Machine State" option when shutting down VirtualBox. That way, when you fire up Windows 7 again, it will resume in its Seamless state, waiting for you to launch the Start menu and get at what you need.

Another Possible Option: WineBottler/CrossOver

How to Seamlessly Run That One Windows App You Need on a MacWhen WINE works, it's a great thing, running applications meant for Windows on Mac or Linux, without the overhead of an entire virtual machine. Thing is, it doesn't always work. Luckily, two applications that make it easy to try out an app in WINE on Mac exist: CrossOver Mac, a paid application that offers a trial period, and WineBottler, a custom build of WINE that works great at framing small Windows apps as native OS X programs. Both are worth looking into if you've got one or two applications you need to run, but don't necessarily need access to an entire Windows OS.

Source: http://lifehacker.com/5521308/how-to-seamlessly-run-that-one-windows-app-you-need-on-a-mac

Monday, April 26, 2010

Boost Netbook Speed with an SD Card & ReadyBoost

Want to increase the perfomance of your netbook? Computer Renaissance would like to share with you this article.

Looking for a way to increase the performance of your netbook?  Here’s how you can use a standard SD memory card or a USB flash drive to boost performance with ReadyBoost.

Most netbooks ship with 1Gb of Ram, and many older netbooks shipped with even less.  Even if you want to add more ram, often they can only be upgraded to a max of 2GB.  With ReadyBoost in Windows 7, it’s easy to boost your system’s performance with flash memory.  If your netbook has an SD card slot, you can insert a memory card into it and just leave it there to always boost your netbook’s memory; otherwise, you can use a standard USB flash drive the same way. Also, you can use ReadyBoost on any desktop or laptop; ones with limited memory will see the most performance increase from using it.

Please Note:  ReadyBoost requires at least 256Mb of free space on your flash drive, and also requires minimum read/write speeds.  Most modern memory cards or flash drives meet these requirements, but be aware that an old card may not work with it.

Using ReadyBoost

Insert an SD card into your card reader, or connect a USB flash drive to a USB port on your computer.  Windows will automatically see if your flash memory is ReadyBoost capable, and if so, you can directly choose to speed up your computer with ReadyBoost.

sshot-9

The ReadyBoost settings dialog will open when you select this.  Choose “Use this device” and choose how much space you want ReadyBoost to use.

sshot-10

Click Ok, and Windows will setup ReadyBoost and start using it to speed up your computer.  It will automatically use ReadyBoost whenever the card is connected to the computer.

sshot-245

When you view your SD card or flash drive in Explorer, you will notice a ReadyBoost file the size you chose before.  This will be deleted when you eject your card or flash drive.

sshot-240

If you need to remove your drive to use elsewhere, simply eject as normal.

image

Windows will inform you that the drive is currently being used.  Make sure you have closed any programs or files you had open from the drive, and then press Continue to stop ReadyBoost and eject your drive.

sshot-247

If you remove the drive without ejecting it, the ReadyBoost file may still remain on the drive.  You can delete this to save space on the drive, and the cache will be recreated when you use ReadyBoost next time.

Conclusion

Although ReadyBoost may not make your netbook feel like a Core i7 laptop with 6GB of RAM, it will still help performance and make multitasking even easier.  Also, if you have, say, a memory stick and a flash drive, you can use both of them with ReadyBoost for the maximum benefit.  We have even noticed better battery life when multitasking with ReadyBoost, as it lets you use your hard drive less.

SD cards and thumb drives are relatively cheap today, and many of us have several already, so this is a great way to improve netbook performance cheaply.

Source: http://www.howtogeek.com/howto/15265/boost-netbook-speed-with-an-sd-card-readyboost/

Wednesday, April 14, 2010

How to Stay Safe on Public Wi-Fi

Friendly Computers found this tips about staying safe on public Wi-Fi very useful and would like to share it with you.

Picture this: You're at a café with your laptop and latte in hand, getting ready to review new sales leads and the quarterly financial projections. First you hop on the free Wi-Fi that the shop's management provides. Then you connect your laptop to a projector so that the entire café can take a look, and finally you hand out some printed copies of your confidential product specifications to the other patrons so that they can follow along.

That may sound ridiculous, but if you're using public-access Wi-Fi without taking the proper precautions, you might as well be asking your coffee compatriots to partake in confidential company information.

Nothing Is Private on Open Wi-Fi

Today, most tech users know how (and why) to secure their home wireless routers. Windows 7 and Vista now pop up a dialog box to warn you when you're connecting to unencrypted wireless networks.

In a coffee shop, an airport lounge, or a library, however, people frequently connect without thinking twice--and though using an unencrypted connection to check a baseball score or a flight status might be acceptable, reading e-mail or performing any Web activity that requires a login is akin to using your speakerphone in the middle of a crowd.

So why don't all businesses encrypt their Wi-Fi networks? The answer lies in the difficult key distribution system in the IEEE 802.11 design specification: To encrypt traffic, the network owner or manager needs to select a password, also known as a "network key." The arrangement requires one password per network, shared among all users whether the owner has selected the less secure, outdated WEP or the more secure WPA or WPA2.

Wi-Fi encryption settings

At home, all you have to do is set it up once, tell your family the password, and surf worry-free from a poolside lounge chair. In a coffee shop, the barista would have to tell each patron the password (or the 26-character hexadecimal WEP key) and perhaps even troubleshoot their connection--definitely not a chore that your typical java slinger would relish. In that situation, nothing beats a blank password for ease of use.

Even if the network is encrypted, however, you're still not completely safe. Once your computer knows the password, your communication is safe only from people who aren't on the network; all the other diners in the café can see your traffic because they are using the same password.

Your Personal Business Is Your Competitors' Business

But what if you think that your data isn't important enough for someone to snoop on? Perhaps you're just browsing Websites, not logging in to any e-mail systems or Web applications that require passwords. You should be safe then, right? Not necessarily.

Imagine you're on airport Wi-Fi while you're returning from an industry trade show. Instead of checking the hundreds of e-mail messages waiting for you (unlikely, right?), you decide to browse your competitors' Websites, looking for ideas. Or maybe you elect to research potential acquisition targets.

In the background, however, your e-mail client detects an Internet connection and starts to download your e-mail. A colleague back at headquarters sees your instant-messenger status change to 'online' and sends you a panicked plea: "Huge problem @ factory. Possible recall. Call Bob ASAP!"

WiresharkArmed with nothing more than wireless packet analyzer software, a fellow conference attendee in the same seating area may be able to glean competitive intelligence based solely on the Websites that you visit and your (probably unencrypted) instant messages--not to mention the personal e-mail from the recruiter indicating you're ready to jump ship, or the notes reflecting your relationship problems with your significant other. In short, the "other guy" is reading your messages before you are, and you didn't even do anything.

Stick to SSL for Webmail

First, to combat mail snoops, use a Webmail system with HTTPS for the whole session. Almost all Webmail systems use HTTPS when asking you to log in, so your password is transmitted securely. However, after authentication, they usually switch back to HTTP because it reduces the computational strain on their servers and makes serving advertisements easier.

That means that everyone who is on the same wireless network (either unencrypted or with a shared password) can read the content of your e-mail. In some cases, a person can steal your session cookie and log in to your Webmail session without your password. (That is, until you click the 'Logout' link--which you do every time, right?)

Gmail offers HTTPS encryption by defaultTwo very notable exceptions are Gmail and your corporate e-mail system (such as Outlook Web Access). Earlier this year, Gmail switched from the common practice of using HTTPS just for logins to using HTTPS throughout the entire Webmail session.

Google Apps users were previously able to opt in to this feature, but it is now the default with the ability to opt out (if you hate security). This change, combined with Google's new suspicious-login detection algorithms, make Gmail a standout among free Webmail providers. If you were looking for a reason to switch from your AOL, Hotmail, or Yahoo account, you've found it.

Your company's Webmail system is also likely protected by HTTPS at all times, because that is the default configuration for most systems. However, if you check your work messages using local software (Outlook, Thunderbird, Mac OS X's Mail) instead of HTTPS Web-based e-mail, you may or may not be using encryption.

Paid Hotspots: Safety Not Included

While researching this article, I found a common misconception among travelers and coffee enthusiasts--namely, the idea that commercial hotspots that require pay-per-hour or monthly subscription fees (AT&T, Boingo, GoGo, T-Mobile) are more secure than their free counterparts because a payment and a password are involved.

In fact, these hotspots are almost always unencrypted, and they employ what is called a "captive Web portal" only to prevent access to the Internet until you enter a payment method (or subscriber password). Though this "gateway" Web portal is usually delivered over HTTPS (to protect the credit card information or the password), once authenticated all the traffic is unencrypted on the wireless network.

As a result, your $10 monthly fee gives you access but not security. In fact, due to the nature of radio frequency transmissions, another person--even if they aren't a subscriber--can still view any unencrypted traffic that you send, just by joining the same SSID wireless network.

This means that outsiders can easily observe and capture any regular HTTP Websites you visit, any unencrypted POP3 e-mail you access, and any FTP transfers you make. Talented hackers can even modify their wireless card to clone the identity of your wireless card, thus obtaining free access through a commercial hotspot by "piggybacking" on your signals.

Use Your VPN

If your company offers a VPN (virtual private network) connection with Internet access, you should take advantage of that functionality when using either free or subscription Wi-Fi hotspots. By enabling the VPN function on your laptop, you ensure that all of your communication is encrypted with high-strength ciphers and tunneled from the Wi-Fi hotspot, across the Internet, and into your company's data center, where it is unpacked and sent out on the company's Internet connection.

This is a secure method of accessing company resources (intranet, e-mail, databases) because no matter who is also on the shared wireless network, you have a private tunnel back to your company. In some companies' VPN configurations, you can also browse the Internet in addition to accessing company resources.

Such an arrangement may be slightly slower than unencrypted Web browsing, but the security makes it worthwhile. Additionally, if you are traveling in a country that imposes Internet restrictions (such as China or Egypt), you can tunnel your traffic back through your U.S.-based VPN connection and reach sites as if you were stateside.

If your company doesn't offer a VPN service or has a "split tunneling" VPN (in which only requests to company resources travel through the encrypted tunnel, and all other traffic transmits unencrypted directly to the target), don't worry--you can still stay safe.

Hotspot Shield by AnchorFreeTry out HotSpot Shield, a no-cost VPN service from AnchorFree. The company offers its own VPN software that you install on your laptop prior to using public Wi-Fi.

Once you enable the software and service, it encrypts your traffic and sends it through a tunnel to the HotSpot Shield data center and then out to the Internet, in much the same way a company's VPN server does. HotSpot Shield even has mobile VPN settings (with no downloads necessary) to protect your Web surfing on your iPhone using the built-in Cisco VPN client software that Apple provides.

By using a such a service, you make your connection secure all the way from the coffee shop to the AnchorFree data center in Northern California. Once there, your traffic travels unencrypted to its final destination on the Internet, as if you were browsing from a laptop plugged directly into the company's data center.

Logging in to Hotspot Shield

This arrangement isn't perfectly secure, since the encrypted tunnel does not travel all the way to the Website you visit. However, it's certainly more secure than a setup with no VPN at all; to get in, would-be data thieves would need access to the AnchorFree data center, not just the Wi-Fi network you're on.

Wi-Fi Surfing Safety Summary

So, to recap:

1. If your company has a VPN that you can use for Web browsing, use it.

2. If you can't use a company VPN, give HotSpot Shield a try.

3. Don't equate subscription (paid-for) Wi-Fi Internet with secure browsing.

4. On unencrypted wireless networks, everyone can see where you are surfing (except on HTTPS Websites).

5. On encrypted wireless networks, everyone with the password can see where you are surfing (this could be a handful of people in your house, or hundreds of people in an airport).

6. If you must use a Wi-Fi hotspot without any form of VPN, imagine that your laptop is connected to a stadium Jumbotron. Don't visit any sites you wouldn't visit with 80,000 people looking over your shoulder.

Source: http://www.pcworld.com/businesscenter/article/194062-3/how_to_stay_safe_on_public_wifi.html

Monday, April 12, 2010

Send Secure Info Over the Internet

Don’t know how to safely email passwords, account numbers, and other sensitive information. Computer Renaissance would like to share these useful tips with you.

You can't trust Internet email with potentially compromising information, such as your credit card or account numbers, social security numbers, or important passwords. As your message moves from one server to another, several people have the opportunity to read it.

So what should you do when you have to get sensitive information to someone, and snailmail just isn't fast enough? I'll give you several solutions.

Whatever option you pick, see What Is the Best Way to Create Strong Passwords? And if you have to share the password with the recipient, use the phone--just to be safe.

Public/Private Key Encryption: This elegant solution is supported by several programs, including Outlook 2007. The public key can encrypt but not decrypt, so you can safely share it with anyone. You keep the private key, which does the decrypting, to yourself.

Unfortunately, both the sender and the recipient must set up this type of encryption, and it's not easy for the less technically inclined. That makes this a good choice in a business environment where everyone has an IT department, but not for occasional, personal communication.

Password-Protected .Zip Files: Depending on what software you use to create compressed .zip archives, you may or may not have an option to password-protect the files inside it. And that option may or may not support high-quality AES encryption.

And don't go this route if it doesn't support AES. The .zip format's standard password protection is easy to hack.

Luckily, many third-party .zip programs support AES encryption, and they're compatible with each other. These include industry leader WinZip, and the free, open-source7-Zip. Whatever program you use, make sure you pick the AES option when you compress and encrypt your files.

Unfortunately, Windows' built-in .zip tool doesn't support AES, so you can't simply assume that your recipient will be able to open your archive. If they don't have a compression program that supports AES .zips, don't want to install one, or don't know what you're talking about, this isn't your option.

Secure Message and File-Sending Services: You don't have to actually email your private information. You can upload it to a secure web site, and let the recipient download.

I'm recommending one service in particular: Send.(the period is part of the company name). It's free, and you don't even have to share your password with the recipient. Each person has their own private password.

When you post a message on Send., the site emails a notice to the recipient, who will need their own free Send. account to access your message.

There's a slight chance that a criminal will intercept that first email and create the account before the legitimate recipient does. To avoid this, send an initial message with nothing confidential in it. That way, the recipient will be safely signed up, with their own, hopefully strong password, before you send them something important.

Source: http://www.pcworld.com/article/193892/send_secure_info_over_the_internet.html

Wednesday, April 7, 2010

Scan a Windows PC for Viruses from a Ubuntu Live CD

Got a virus and can not boot into Windows? Computer Renaissance would like to share this helpful article with you.

Getting a virus is bad. Getting a virus that causes your computer to crash when you reboot is even worse. We’ll show you how to clean viruses from your computer even if you can’t boot into Windows by using a virus scanner in a Ubuntu Live CD.

There are a number of virus scanners available for Ubuntu, but we’ve found that avast! is the best choice, with great detection rates and usability.

Unfortunately, avast! does not have a proper 64-bit version, and forcing the install does not work properly. If you want to use avast! to scan for viruses, then ensure that you have a 32-bit Ubuntu Live CD.

Once Ubuntu 9.10 boots up, open up Firefox by clicking on its icon in the top panel.

Navigate to http://www.avast.com/linux-home-edition.

Click on the Download tab, and then click on the link to download the DEB package.

sshot-3

Save it to the default location.

sshot-4

While avast! is downloading, click on the link to the registration form on the download page. Fill in the registration form if you do not already have a trial license for avast!.

sshot-5

By the time you’ve filled out the registration form, avast! will hopefully be finished downloading.

Open a terminal window by clicking on Applications in the top-left corner of the screen, then expanding the Accessories menu and clicking on Terminal.

sshot-6

In the terminal window, type in the following commands, pressing enter after each line.

cd Downloads
sudo dpkg –i avast*

sshot-7

This will install avast! on the live Ubuntu environment.

To ensure that you can use the latest virus database, while still in the terminal window, type in the following command:

sudo sysctl –w kernel.shmmax=128000000

sshot-7b

Now we’re ready to open avast!. Click on Applications on the top-left corner of the screen, expand the Accessories folder, and click on the new avast! Antivirus item.

sshot-8

You will first be greeted with a window that asks for your license key. Hopefully you’ve received it in your email by now; open the email that avast! sends you, copy the license key, and paste it in the Registration window.

sshot-9

avast! Antivirus will open. You’ll notice that the virus database is outdated.

sshot-10

Click on the Update database button and avast! will start downloading the latest virus database.

sshot-11

To scan your Windows hard drive, you will need to “mount” it. While the virus database is downloading, click on Places on the top-left of your screen, and click on your Windows hard drive, if you can tell which one it is by its size.

sshot-13

If you can’t tell which is the correct hard drive, then click on Computer and check out each hard drive until you find the right one. When you find it, make a note of the drive’s label, which appears in the menu bar of the file browser.

sshot-xx

Also note that your hard drive will now appear on your desktop.

sshot-14

By now, your virus database should be updated. At the time this article was written, the most recent version was 100404-0.

In the main avast! window, click on the radio button next to Selected folders and then click on the “+” button to the right of the list box. It will open up a dialog box to browse to a location.

sshot-15

To find your Windows hard drive, click on the “>” next to the computer icon. In the expanded list, find the folder labelled “media” and click on the “>” next to it to expand it. In this list, you should be able to find the label that corresponds to your Windows hard drive.

sshot-16

If you want to scan a certain folder, then you can go further into this hierarchy and select that folder. However, we will scan the entire hard drive, so we’ll just press OK.

sshot-17

Click on Start scan and avast! will start scanning your hard drive.

sshot-19

If a virus is found, you’ll be prompted to select an action. If you know that the file is a virus, then you can Delete it, but there is the possibility of false positives, so you can also choose Move to chest to quarantine it.

sshot-18

When avast! is done scanning, it will summarize what it found on your hard drive. You can take different actions on those files at this time by right-clicking on them and selecting the appropriate action. When you’re done, click Close.

sshot-20

Your Windows PC is now free of viruses, in the eyes of avast!. Reboot your computer and with any luck it will now boot up!

Alternatives to avast!

If avast! and a liberal amount of Googling doesn’t fix your problem, it’s possible that a different virus scanner will fix your obscure issue.

Here are a list of other virus scanners available for Ubuntu that are either free or offer free trials. See their support forums for help on installing these virus scanners.

Avira AntiVir Personal for Linux / Solaris

Panda Antivirus for Linux

Installation and usage guide from Ubuntu

F-PROT Antivirus for Linux

ClamAV installation and usage guide from Ubuntu

NOD32 Antivirus for Linux

Kaspersky Anti-Virus 2010

Bitdefender Antivirus for Unices

Conclusion

Running avast! from a Ubuntu Live CD can clean the vast majority of viruses from your Windows PC. This is another reason to always have a Ubuntu Live CD ready just in case something happens to your Windows installation!