21
Utah’s Award Winning Computer Magazine! www.ucs.org This Month’s Meeting: Wednesday 8th at 7 pm Volume 30, No. 8 August 2012 ISSN 1061-5725 This Month’s Presentation Check Out Vipre A/V 2012 Part 2 aka S-R #31 Starting on on page 4 Roots Magic on-line Video Important

Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Utah’s Award Winning Computer Magazine!

www.ucs.orgThis Month’s Meeting:Wednesday 8th at 7 pm

Volume 30, No. 8 August 2012

ISSN 1061-5725

This Month’s Presentation

Check Out

Vipre A/V2012 Part 2

akaS-R #31Starting onon page

4

RootsMagic

on-line

Video

Important

Page 2: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 2 Blue Chips Magazine — August 2012

RecentObservations

By Cliff Millward, [email protected]

Finè

The researchers believe their image is at the limit of resolution because of light’s diffraction limit: if the print “dots” get too small, diffraction between neigh-boring dots will blur the image. The visible spectrum of light centres at around 500nm (nanometers), resulting in a diffraction limit of 250nm, according to Nature, which is the spacing the researchers used.

Another fact is that industrial ink jet and laser printers can only reach a resolution of 10,000 dpi, while higher dpi research printers have only been capable of printing in a single color. But because color in Lithography is created not by ink, but by the structure, the researchers say their images would be very durable, and while the printing process might never replace the home

ink jet, it could be used for creating watermarks, in high-density permanent data storage, or in cryptog-raphy. If I am correct, It could also be used to expand photos for huge posters without worrying about pixilation. I’ll bet Weldon Anderson (for those who remember him) would be interested in this!

Google Eats AppleOn the operating system front, Google’s Android

extended its lead as the world’s single most popular mobile phone platform.

The Galaxy S III was the best-selling Android product in the quarter. The numbers could have been even higher had it not been for shortages of the new items.

Apple’s iPhone could become the leader again, but it depends very much on when Apple puts the iPhone 5 on the shelves If it’s in time for the end-of-year shopping season - a traditionally strong period of consumer purchasing - it could help Apple recover.

I wonder if Mountain Lion will help?

InformationGetting personal for a moment, August is a special

month for me as my birthday is August 10th. I almost can’t believe my age, its for old people. What am I doing here?

The signature on my emails will now have to be changed. I have had the following signature:

“Only people my age will understand this, but . . . On the turntable of life, I have been 33 1/3 , I have been 45 and now I am 78!

I don’t know what to say now that I am 79. Any suggestions? (Keep it clean!)

Morality PoliceThe Kingdom of Saudi Arabia has

a problem with the Internet. They seek to ban words such as virgin, sex, wtf and many more. They believe such words will encourage pornography.

They also object to anything relating to alcohol and gambling (wine, beer, poker, etc.) Another string of words is hot, porn, gay, etc. and (believe it of not) Bible, Catholic, Islam.

I have always been told that you cannot legislate morality. I have also been told that wealthy Saudi’s travel to large Western cities to get what is prohibited in Saudi Arabia; so much for morality control! I wonder how this will play out.

Get Your Camera ReadyA*STAR (Agency for Science, Technology and Re-

search) researchers have rendered an image at just 50 x 50 microns, with a resolution of around 100,000 DPI.

The key was to switch from a dye-based process to a lithography-type process. Lithography refers to process that deposits coating material in a static pat-tern on another material.

Page 3: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 3 Blue Chips Magazine — August 2012

Blue Chips Magazine

Magazine Staff

Editor in Chief — Cliff Millward 619-9633Review Program Editor — James Alexander 250-2269Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy JohnsonProof Readers — Larry Lamph, Doug Jackson

Advertising Rates

Ad costs 1 month 3 months 6 months 12 months2 Page Spread $150 $400 $700 $1200Full Page $100 $275 $500 $900Half Page $50 $130 $250 $450Quarter Page $25 $70 $130 $225Business Card $15 $30 $60 $120

Full page size is 7½ x 10 inches. All other page sizes are based on a 7 x 10 inch page in order to conform to editorial style. Half-page ads may be 7 x 5 inches or 3½ x 10 inches. Quarter-page ads are 3½ x 5 inches. Business card ads are 3½ x 2½ inches.

Classified Advertising Utah Blue Chips members may place personal classified ads at no charge. Maximum ad size is 7 lines, 35 characters per line.

Submissions Members are encouraged to submit text articles for publication in ASCII text only. Photos in .TIF or .JPG format only. Line graphics, tables, in almost any vector or .TIF format. Do not imbed graphics or tables in text files. All articles must be received by the 15th of the month preceding the month of publication. All articles become the property of the Utah Computer Society and by submitting an article, the author gives permission for the Blue Chips Magazine Staff to edit the submission. The author also gives permission for republication in other users groups’ communications.

Permission to Copy Permission is granted to other nonprofit PC user groups to reproduce any article published in this newsletter, provided credit is given Blue Chips Magazine and the author (s) of the reproduced materials. Reprinted articles are subject to the terms of their respective copyright holders.

“Utah’s Award Winning Publication”

Charter Member of theAssociation of PC User Groups

MONTHLY MEETING LOCATION2nd Wednesday of every month

University of Utah, Union Building, 7:00 p.m.

Officers and Trustees Eve. Phone E-mailPresident, Stuart Gygi 576-1891 [email protected]. Pres., Larry Lamph 571-2908 [email protected], Lowell Kenedy 278-3035 lkenedy@ucs,orgTreasurer, John Witzel 296-1390 witzelj@ucs,orgttDoug Jackson 322-2337 [email protected]

InformationPersons or companies may join or renew at the meeting, or by sending a check payable to the Utah Computer Society to:

Utah Computer Society Membership Secretary 5435 Riley Lane Murray, Utah 84107

Individual memberships are $25/year. Business Memberships are $35.00 a year.Corporate sponsorships are available at two levels. Corporate Sponsors enjoy all benefits of membership including multiple individual membership and prepaid advertising coverage. Contact a Board Member for more information.

Other important information:Meeting Information http://www.ucs.orgGroup Business (James Alexander) 250-2269Magazine (Cliff Millward) 955-9633Web Site http://www.ucs.orgWebMaster 262-6045Membership (evenings) (Bob) 262-6045

Monthly Meeting:at

U of U

Page 4: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 4 Blue Chips Magazine — August 2012

VIPRE Antivirus 2012 (Part 2)The Anitvirus that doesn’t slow down your PC.

Software Review

By Don Nendell

Manufacturer:GFI SoftwareURL: www.gfi.comUSA, Canada and Central and South

AmericaHome/Consumer Support:Toll Free: 1-877-521-5832Business Support:Toll Free: 1-855-TEAM-GFI Toll Free: 1-855-832-6434System RequirementsYour computer must meet the following

system requirements in order to run the VIPRE Antivirus software effectively:

Supported Operating SystemsWindows XP SP2+ (32- & 64-bit) Windows 2003 Server SP1+ (32- & 64-bit) Windows Vista, Vista SP1+ (32- & 64-bit) Windows 7 (32- & 64-bit) Windows Server 2008+ (32- & 64-bit) Note: Installation is not supported on

Windows 95, 98, ME, NT 4, Win 2000, XP with SP1 or older, Macintosh or Linux com-puters.1 GHZ Computer with 512 MB of RAM (memory) and 300 MB of available free space on your hard drive.

MiscellaneousMicrosoft Internet Explorer 6.0 or higher Internet access for definitions updates

(broadband recommended) 2x CD-ROM if you are having the CD shipped

to you (not necessary for online download) Supported Email Clients (applies to

Email Protection):Microsoft Outlook 2000 or newer, including

Outlook 2013 Outlook Express on Windows XP Windows Mail on Windows Vista Other email products that use SMTP/POP3

for sending and receiving messages, including Windows Live Mail, Mozilla Thunderbird, and many others.

Please note that the SSL and TLS se-curity protocols are only supported with Microsoft Outlook and Windows Outlook Express.

Free technical support. Have a ques-tion? We’re here to help! Contact the friendly and knowledgeable security experts on VIPRE’s tech support team via email, chat or phone for step-by-step help downloading and managing your VIPRE subscription - at no additional charge (See GFI Technical Support Info graphic on page XX, See also Below, and See Footnote 6, #18).

Dear Reader,If you are reading this in a

non-PDF format, you are missing a large part of the whole Report/Review 1 & 2. You should, therefore, stop reading and immediately fol-low the steps outlined in the Foot-notes 1 & 2 below. Which BTW are:

1. “If you are reading this Report/Review 1 & 2 from directly off of an Internet search, you could very well be seeing it in HTML (or text) format. Yuk! There’s No Graphics there! To see all the beautiful Graphics in this Report/Review 1 & 2 - the ones that we’ve worked so very hard to entertain you with - you will need to follow the procedures outlined in 2 below. Enjoy! Again, our web page is: (www.ucs.org).”

2. “See the actual Reports/Re-views 1 & 2 in the Blue Chips Maga-zine (BCM) Archives (i.e., begin your search on left-hand side of web page) at: (www.ucs.org).

Note. Always choose the top option, i.e., PDF format for its beauty.”

3. After a successful debut the past few months, I am going to present the News and Views to you once again in an entirely different format than I’ve used in the 14-15 years I’ve been doing these Reviews/Security-Related Reports for you. Once again, I am going to list all the URL’s and Titles of all of the articles/topics/videos I’ve researched for this S-R Review, and then some, that I intend to present to you herein this month. That list will appear in the Footnotes 5 and 6 and be designated #X), where X is the order in which it ap-pears in the Footnotes 5 and 6 respec-tively. In this way you can (cherry) pick (i.e., highlight it, copy it and paste it in your Browser Search Window) plus you can also choose which one(s) appeal(s) to your sense of urgency and/or secu-rity, and thenceforth follow the same procedure(s) I would go through (i.e., if you so desire?) so as to bring them to life and thus sh[r]ed (pun intended) greater illumination on the subject for you as it appears here in this BCM.

BTW And just like it always is, month after month, and although you may not have known, nor been aware, of it, or not, it’s a huge list, too! En-joy! ;-}

Prolog(Repeat from S-R #28, #29 &

#30 1 & 2) I’ve been associated with Security-Related (S-R) subjects/topics/episodes/relationships in one form or another for over 17 years now. I’ve actually been writ-ing S-R Reports, et al., for going on 13 years, too (FYI This is my 130th S-R to date, if I haven’t lost count, that is). And I swear, with each S-R I write I feel more like I’m actu-ally just a Sprog (i.e., a “Newbie”) after all of the “Things/Stuff/etc.” I have been discovering/uncover-

Page 5: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 5 Blue Chips Magazine — August 2012

ing for myself just in these past 5-6 months of S-R research, plus writing the last five (5) S-R Reports (i.e., Numbers 26, 27, 28, 29 and 30. See my BCM’s starting back in the March and April, 2012 BCM’s, respectively for those beginning S-R’s 1 & 2).

And now, the coup de grace. I’ve just come from the culmina-tion of my previous 13 years of Black Hat Briefings (BHB) and Def Con’s (DC), plus now, a new conference for me, AUVSI’s Un-manned Systems North America 2012 Conference (AUVSI) (See my March, 2012 BCM 1 & 2, plus See also Footnote 6, #2 & #3), all of which can be described in but a single acronym - OMG! I’ll do a Report on those three (3) next month, to be sure...

With that said, even more so now after BHB USA 2012/DC 20/AUVSI, Folks, it is simply “God awful fearful and frightful” what is currently and/or has been go-ing on with the American citizen’s right to privacy/civil liberties and/or security ever since before

WWII, even, under the guises of National Security, War on Terror, and false aims like Domestic Secu-rity, etc. All the pieces have been properly setup on the board, and are already in play, as we speak. And, it is growing worse by the day, I feel, with no end in sight, ap-parently; and strangely enough, it seems, with the foci, “Right Here, And Right Now!”

IntroductionFar from being a coincidence then,

and really very apropos (See Above), this is, after all, that belated (See graphic) and oft-promised Part 2 of the 2-part Review of GFI’s wonderful VIPRE An-tivirus 2012 program (See my Part 1 (i.e., S-R #30) in the July 2012 BCM 1 & 2). Ta Dah!

I had prepared a “barn burner” of a Report for you this month, but a “little diffuglety” reared its ugly head some-where along the way. I was anxiously waiting for this moment to come as I was going to have GFI Tech Support go over my sick Gateway PC with a “fine tooth comb” looking for that dastardly Trojan, again. Truth be known, I had not used that Gateway PC with Windows 7 OS on it for almost a month, because I was absolutely sure that the tail end of the “Trojan from Hell” (See my November 2011 BCM S-R 1 & 2) had jumped up and bit me on the tail bone one more time.Here’s what happened

1. Every time I booted that PC up I would get the screen “Re-boot and Se-lect proper Boot device o r I n s e r t Boot Media in selected Boot device and press a key”. And, as Jed Clampett would say, “Well, doggies!” 9 ;

2. When I pressed the F-12 (i.e., boot menu, See also #7 Below) Key (upon

rebooting) as Windows 7 was booting I then got the screen saying, “There is a problem with this website’s security certificate”. This, of course, elicited another,”Well, doggies!” 9

FYI Actually I used stronger lan-guage than that, but then you get the general idea here? I was in some kind of trouble, you think? 4 (See also the graphics on pages 13 & 14);

3. BTW I had also taken that very same PC back to the Doctor’s of Tech-nology a couple of times already to be cured of its affliction(s), again, but un-fortunately, my technician friend there, Ben, had just recently run away with a girl and was last seen heading back East with her somewhere. Ergo, Phil kept resetting the BIOS so the computer would boot correctly, but lo and behold the very next time it was booted up again (at home again, of course) it got that exact same screen again. OK! Another, “Well, doggies!” 9 was in order, of course?

Note. The last time it happened Phil showed me that all I had to do was to remove the PC battery and it would automatically reset the BIOS. But he also said it was fixed;

4. I did as instructed (i.e., removed and replaced the PC battery) and called

Page 6: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 6 Blue Chips Magazine — August 2012

GFI tout suite;5. For the very first time in probably

7+ years of dealing with the fabulous TS crews at Counter Spy/Sunbelt/GFI, respectively, the original Tech Rep I got on this particular call wasn’t all that clandestine at hiding his “rolling eyes” throughout his vocal responses to my pleas to him about the possibil-ity of the return of the “Trojan from Hell” in my BIOS boot up problem. He said that it was a BIOS problem and clearly above the ability of GFI to solve, and that “I should contact my manufacturer about the problem?” Case closed, right? “Well, doggies!” 9 Of course, Not!;

6. As it turns out, I had forgotten that I had to discuss another problem with VIPRE (i.e., on the updating of VIPRE’s latest definitions on Donna’s computer, which is also a Windows 7 PC BTW). So, I called GFI TS back, and my prayers were answered; I got a dif-ferent Tech Rep this time. He was just great, exactly like his predecessors have always been. Get this, folks! The only problem was that he could not find any, repeat ANY, record what-so-ever of my ever having visited GFI TS that day, or that I had even talked to “any, repeat ANY,” GFI TS Rep at all - let alone “silent snickers himself,” - ABSO-LUTELY NONE! But, my “buddy” did report this minor discrepancy to his

higher ups, so I felt pretty good about that anyway, OK?

Note. Another, “Well, doggies!” was in order, quite naturally, you see, but sadly he also couldn’t correct my PC problem with the BIOS screw up either, unfortunately? (See graphic on page 20);

7. Long story, short story. I ac-cidently discovered by researching the Windows Error code referenc-es that the date/time setting was actually reading incorrectly (i.e., it was reading “January 10, 2010” after all those Doctor’s of Technol-ogy visits, battery tricks, et al.). I reset the clock and time, and Lo and behold the “Certificate prob-lem” went “Poof!” Which meant that problem #2 (See Above) was immediately solved - by none other than myself, you see. Ta! Da! 3 This of course required another, “Well, doggies!” but this time only with a different inflection of my voice, of course ;-}

8. I took the F$%@#& PC back to the Doctor’s of Technology again, in desperation, again (See #2 Above plus See my November 2011 BCM S-R 1 &

2), and Phil finally found through “exhaustive testing,” so he says, that the second 1TB HD that I in it had failed, and he declared, again, that “the BIOS problem was solved, again!” HEY, YOU BETCHA, another, “Well, doggies!” was in order, so I shook my head in disbelief, and said it, of course.

Oh! Oh! Hey, “wait a second there pardner, I’m not done yet?” There is only one problem with Phil’s analysis, I checked that “BAD BOY 1TB HD” in a separate external Hard Drive Enclosure, and what do you think happened?

Three (3) guesses and the first two (2) don’t even come close to counting? That’s right, you over there, the F$%@#& 1TB HD WORKED PERFECTLY, JUST EXACTLY AS MYSTERIOUSLY AS THE WINDOWS 7 GATEWAY DOES NOW???? GO FIGURE?; and finally,

9. Can I have your permission NOW for another, “Well, doggies? HIAWPC” 4

“Blasphemy is an epithet bestowed by superstition upon common sense.” - Robert Green Ingersoll”

“Common sense is instinct. Enough of it is Genius.” - George Bernard Shaw

Page 7: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 7 Blue Chips Magazine — August 2012

“Common sense is not so common.” - Voltaire

Guess what?That only leaves us with the

Techie Stuff now! Yep, it’s just ‘lil ‘ol VIPRE Antivirus 2012 “only time.”

Total security that doesn’t slow down your PC

“Fool me once, shame on you; fool me twice, shame on me.” - Old English Proverb. 8

With over 100,000 new web threats created every day, or said another way, with close to 3 million new viruses and malware threats being created every month, you can’t afford not to use anti-virus software, because every single one of those malicious threats are designed solely with the purpose of simply “fooling you somehow!” With VIPRE Antivirus software, your PC is protected. GFI states, “Choose VIPRE to keep your data safe, the viruses out and your PC running fast.” Sage ad-vice yours truly adheres to religiously, and have done so for many years now ((See my VIPRE and CounterSpy Reviews, for instance, in the July 2005 BCM, March 2009 (Part 1) and April 2009 (Part 2) BCM’s, November 2011 BCM Security-Related Report #25, i.e., page 11, et al., respectively 1 & 2. See also the GFI White Papers: Cybercrimi-nals and security attacks (See Footnote 6, #19; Basic security - Why purchasing antivirus, anti-spyware and a firewall is a must, (See Footnote 6, #1; Hackers don’t discriminate: Viruses attack all platform users, (See Footnote 6, #20); and, Protecting Against the New Wave of Malware, an Oster-man Research White Paper sponsored by GFI, Published September 2008, (See Footnote 6, #21).

Powerful Protection. VIPRE

Antivirus 2012 protects your computer from viruses and malware as well as your personal and financial information from malicious online threats, and you won’t even notice its running; VIPRE antivirus software simply will not slow down your computer.

At VIPRE, they take protecting your PC very seriously, and they want to make it as easy as possible for you to choose an antivirus solution. Please do yourself a favor and go to their web site (See Above) and compare the features of their two (2) related Antivirus products, VIPRE Antivirus and VIPRE Internet Security, side by side to decide the level of protection you need for your comput-ers and/or system(s) (See also graphic).

The only question remaining then is, which VIPRE version is right for you?

1. VIPRE Internet Security. In a nutshell, VIPRE Internet Security pre-vents viruses and other web threats from ever reaching your PC. Watch their video to see the ex-tra security features that make VIPRE Internet Se-curity their premium an-tivirus solu-tion (See GFI C o m p a r i -son charts Graphic on

page 18 and the VIPRE Internet Se-curity Video at Footnote 5, #1).

Exclusive features in VIPRE Internet Security 2012

Spam blocking. VIPRE Internet Security features anti-spam technology that protects against spam, phishing and malicious URLs.

Smarter firewall. The VIPRE Internet Security firewall is auto-config-ured and easy to use, protecting against inbound and outbound internet traffic quickly. More tech-savvy users can adjust advanced settings to customize the firewall based on their personal preferences.

We continue with:

2. VIPRE technology. VIPRE puts your safety first

Advanced technology. VIPRE utilizes an advanced technology stack to scan large volumes of information quickly, with minimal performance impact. VIPRE is next-generation, high-performance PC security. VIPRE combines antivirus, antispyware, anti-rootkit and other security technologies into a seamless, tightly-integrated secu-rity solution that won’t slow down your computer. VIPRE delivers comprehen-sive protection against today’s highly complex spyware, viruses, and blended malware threats for superior PC and email security.

Advanced anti-rootkit technol-ogy. VIPRE finds and disables malicious hidden processes, threats, modules, services, files and alternate data streams (ADS) on user systems.

Real-time monitoring and pro-tection. VIPRE monitors and protects against malware threats including zero-

Page 8: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 8 Blue Chips Magazine — August 2012

day threats, in real time. It leverages multiple detection methods, including heuristics, behavioral analysis and tra-ditional signature based technologies, to analyze malware.

Antivirus, anti-phishing email security. VIPRE includes comprehen-sive protection against email viruses and phishing scams, with direct support for Outlook, Outlook Express, Windows Mail and any email program that uses POP3 and SMTP.

Remote device scanning. VIPRE includes a remote device scanner that auto-scans removable drives and files for threats.

How does VIPRE compare with other antivirus programs?

1. Powerful Virus Protection. Ranked one of the top-performing anti-virus products in the world for malware detection, VIPRE detects, removes and blocks all types of PC threats, all while keeping your computer running faster than ever (See graphic on page 17).

2. VIPRE is one of the best antivirus programs when it comes to detecting viruses and malware. See how VIPRE compares to the competition at detect-ing all types of malware including: backdoors, Trojans, financial malware and password stealers, worms and other types of malicious threats.

3. Detection of Trojan viruses (*). Taking its cue from the mythology of the Trojan horse – a Trojan virus looks legitimate on the outside, but once it gets onto your computer, it can wreak havoc. When you click on a Trojan, it can look like something is happening or it can look like a program failed to start up. Trojans are designed to do a vast number of things, from changing the ap-pearance of your computer display to de-stroying files or essential programs that keep your computer running. VIPRE

identifies the behavioral characteristics of Trojan viruses and stops them before they can harm your PC. The graphic (See graphics on pages 15 thru 19) shows how VIPRE and other antivirus products per-form in threat scenarios which closely map to real-world usage.

4. Detection of worms (*). Worms are viruses that replicate or copy themselves from one computer to another. They are a special class of malicious software that does not require human intervention or action to travel. Worms takes advantage of the built-in features of your computer that transport data from one place or file or computer to another. One of the major dangers of a worm is that it can copy itself over and over, using up all your system resources, effectively shutting you down. It can also send out copies of itself to your contacts and do the same to your friends and associates. VIPRE shuts down worms by cutting off their access to your PC before they can do any damage. The graphic (See graphic on page 18) shows how VIPRE and other antivirus prod-ucts perform in threat scenarios which closely map to real-world usage

5. Overall malware detection rate (*). VIPRE’s overall malware de-tection rate is superior to many other leading antivirus products. Best of all, it takes a non-invasive approach to malware detection, providing complete security without hogging your com-puter’s memory or CPU. So you can work or play freely without interruption, knowing that you’re safe from all types of malware.

(*) All competitive data from MRG

Effitas - Comparative Assessment of GFI VIPRE Antivirus Premium - September 2011.

VIPRE FeaturesVIPRE Antivirus defends your digi-

tal life from identity thieves, spammers, hackers and cybercriminals without slowing down your PC. Learn more about the features and functionality of VIPRE Antivirus software.

Next-generation anti-malware technology. VIPRE antivirus software detects and remediates viruses, spyware, rootkits, bots, Trojans and other mal-ware via a single, powerful anti-malware engine.

Advanced anti-rootkit technol-ogy. VIPRE antivirus software finds and disables malicious hidden processes, threats, modules, services, files and alternate data streams (ADS) on user systems

High-performance PC security. VIPRE antivirus software utilizes an advanced technology stack to scan large volumes of information quickly, with minimal performance impact.

Real-time monitoring and protection. VIPRE antivirus software monitors and protects against malware threats including zero-day threats, in

Page 9: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 9 Blue Chips Magazine — August 2012

real time. It leverages multiple detection methods, including heuristics, behav-ioral analysis and traditional signature based technologies, to analyze malware.

Antivirus, anti-phishing email security. VIPRE antivirus software includes comprehensive protection against email viruses and phishing scams, with direct support for Outlook, Outlook Express, Windows Mail and any email program that uses POP3 and SMTP

Remote device scanning. VIPRE antivirus software includes a remote de-vice scanner that auto-scans removable drives and files for threats

Award-winning protection. Leading security testing labs acknowl-edge that when it comes to protecting against all types of malicious threats, including viruses and spyware, VIPRE does the job – with advanced detection and removal technologies that don’t slow down your PC.

VIPRE is recognized as an industry leader in defending against viruses and other web threats to deliver complete PC security. VIPRE has received certifica-tions from leading security testing labs, such as ICSA Labs, West Coast Labs and AV-TEST, as well as multiple VB100 Awards for malware detection.

Note: Clicking on a logo on the VIPRE web site will redirect you to that award or certification’s website.

VIPRE ReviewsFrom virus prevention and removal

to leading technical support, there are so many reasons why security experts and security-conscious people love VIPRE (and why you will too!)

1. Expert reviews2012 Editor’s Choice. pcAnti-

virusReviews.com gave VIPRE a 94% rating for doing virus prevention, virus removal and tech support better than anyone else and found, “From top to bottom, VIPRE was the most consistent performer... offering better protection, even against brand new viruses, than any other software.”

Ten-pack is a great value. Note-bookReview compared VIPRE to Sy-mantec, McAfee and Kaspersky and found “... the value prop is best for the $69.95 ten-license pack, which brings the cost down to only a few dollars per li-cense... That’s a better deal than you can receive with any of the competing suites we’ve reviewed in this series so far.

“Faster, easier to use, and won’t slow you down.” PC & Tech Authority found VIPRE products to be very low-impact on system resources, stating, “they’re so lightweight. Even when scanning your system and dis-playing the program’s interface, we saw no more than three running processes, which rarely reached 10% CPU...”

“The lightweight security suite.” PC Advisor reviewed VIPRE Internet Security 2012 and concluded it has “a strong antivirus engine, with both fast on-demand scanning and in-depth real-time protection. An email filter keeps you spam-free, while browsing protection checks your downloads for safety, and prevents you from reaching dangerous websites.”

9 ½ out of 10 stars. When com-pared to other antivirus products, VIPRE ranked high in stealth, speed, price and support with Top Ten Anti-virus, providing “maximum protection while staying easy on system resources.”

“Internet security with bite.” Andrew Zarkesh of Computeractive gave VIPRE 5 out of 5 stars for being a “fast, feature packed and powerful [and] easy to use” product that lived up to its claim of not slowing down PCs.

2. User reviews“Safe with great support.”

Hands down, the best endpoint security software on the market. I recommend it to everyone I know. I feel safe and secure with VIPRE protecting me while I’m on the Internet, and the support staff is impeccable!” - R. Haze

“So good, it’s poetic.” Internet surfing without any worries, no slow-

down like others can cause, happiness knowing my computer is safe, running without a terrifying pause.” - V. Wolter

“Sticking with the best” I started out with the first VIPRE beta even before the firewall was merged into the Internet package. I have never looked back or even wanted to try the “Big Boys” again. VIPRE’s tech support is 2nd to none! I would remain with VIPRE just for that tech support group alone.” - J. Smith

“Better than the other guys.” VIPRE has outperformed all the other security programs that I have used, even with my ESP giving me Norton free I choose to pay for VIPRE. Two thumbs up for VIPRE!” - D. Stange

“Protects without interfering.” VIPRE is the program you don’t have to think about, because it’s always working in the background to guard and protect your computer” - D. Harvey

“All the hype was true.” When I first heard about VIPRE I thought this can’t be true about how fast and light it was on memory, let alone its good detec-tion rate. I just thought it was another gimmick. Well wasn’t I wrong! Fantastic product at a great price!” - R. McKinney

“What you see is what you get.” Unlike other major anti-virus programs [VIPRE has] nothing to hide...” - D. Everson

VIPRE Support Top Answers1. A sampling of some Tech

Support Top Answer topics is shown below (See graphic GFI TECH SUPPORT HELP on page 19 plus refer to the GFI web page for more on the subject(s)):

How to Install VIPREHow to Register VIPRE OR

VIPRE Says ‘Invalid license key’ When registering VIPRE says

it has improvements. What does this mean?

How to solve VIPRE install Errors

2. A sampling of some Search Results topics is shown below:

How to manually remove VIPRE Antivirus and VIPRE Internet Security?

How to check for definition up-dates?

How to Uninstall VIPRE Antivirus and VIPRE Internet Security?

What do the VIPRE Tray icon colors mean?

How can I tell if VIPRE is blocking

Page 10: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 10 Blue Chips Magazine — August 2012

my internet connection? How to disable VIPRE temporarily

to install software? How to manually install full defini-

tions for VIPRE Antivirus 2012? 3. Available VIPRE Guides

from GFIGetting Started Guide (PDF) User Guide (PDF) Latest Malware Definitions4. A sampling of some FAQ top-

ics is shown below:If you have questions, they have

answers. View their frequently asked questions about VIPRE Antivirus soft-ware on their web site (See also Above).

a. What is GFI VIPRE Antivirus 2012?

VIPRE Antivirus is next-generation antivirus and anti-spyware software that protects your PC without slowing it down.

b. I’ve installed VIPRE and am experiencing performance issues. What should I do?

First, make sure you are not running VIPRE with another antivirus program. If performance issues still occur, please contact technical support (See also Above).

c. Do I need to uninstall my current antivirus software before I install VIPRE?

We highly recommend removing any other antivirus software from your PC prior to installing VIPRE. Multiple antiviruses on one computer can cause the machine to run extremely slow and a multitude of other problems.

d. Is “VIPRE” a typo? Did you mean it to be “VIPER?”

No, it’s not a typo, but an acronym. VIPRE stands for Virus Intrusion Pro-tection Remediation Engine.

e. If I have 10 PCs at home, does the VIPRE Home Site License cover them all?

Yes. The VIPRE Home Site License protects up to 10 PCs.

f. How do I know VIPRE will really protect my PC against all viruses and other malware?

Year after year, VIPRE is recognized for its industry-leading malware detec-tion rates. VIPRE antivirus software is certified by ICSA Labs, West Coast Labs and AV-TEST and has won multiple VB100 awards for virus detection

g. Can I run VIPRE on Win-dows (XP, Vista, 7)?

Yes, VIPRE antivirus software will run on 32-bit and 64-bit versions of Windows XP Service Pack 2 or above, Windows Vista, and Windows 7

h. When I download a file, does VIPRE check it for viruses?

Yes. VIPRE compares a file to its threat definitions and list of known bad programs during download. It then scans the file completely when you run a system scan.

i. How do I turn off the popup balloons in VIPRE?

Right-click on the VIPRE icon in the lower right-hand corner of the screen. Uncheck “Show Balloons” to turn off alert pop-ups.

Note. Didn’t find what you were looking for? Contact VIPRE Technical Support.

From S-R #30. Talk about your coincidences? Interestingly, just today I received an e-mail from my friend, Caleb, at GFI concern-ing my “Trojan of the Decade” case they helped me with back in November 2011 7.

Re. Case# GFI-120706-681542 for Vipre Internet Security: Questions about DNS changer - Routing ID: [ ref:00D8ZQDU.500CKqbLW:ref ] ref:[ ref:00D8ZQDU.500CKqbLW:ref ] (See also my November 2011 BCM S-R #25 1 & 2).

Caleb, [email protected] To [email protected]: Technical Support (product-

[email protected])Sent: Fri 7/06/12 10:27 AMTo: DonThere has been an update to case

GFI-120706-681542 concerning your product, Vipre Internet Security, with the subject: Questions about DNS Changer.

Caleb

Hello,The DNS Changer malware has been

the focus of several recent reports by CNN, Fox News and the FBI Website. VIPRE has been protecting our custom-ers from DNS Changer since it emerged in 2007. However, we suggest that anyone concerned their computer may be infected visit the DNS Changer Work-ing Group at (http://www.dcwg.org/detect/). There, a quick, non-intrusive test will let you know if a PC is at risk from DNS Changer.

Good luck!

In SummaryI can’t say that I wasn’t altogether

scared sheetless (See graphic) in an-ticipation of writing this Review! I was a bit disappointed, however, in the amount of trouble I had to go through to get my PC to work properly again, plus that it really wasn’t all that difficult actually, that is, if you understand PC’s? GFI did it’s share of the load bearing, I did mine, and, the Doctors of Technol-ogy (operative term here) “should have” been able to make short work of those trials and tribulations that I brought to the table here? That’s it in a nut shell.

I absolutely love those guys at GFI, each and every one of them and I wish

to publically thank them at this time. They have been taking “fantastic, TLC

Page 11: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 11 Blue Chips Magazine — August 2012

personal-feeling” care of me and my family for a great many years now (For example, See From S-R #30 Above). Trust me, they will continue to do so for a long time to come, too!

I guess that they would have to be given a 10 rating, if I were into rating ap-plications, that is? They are first class all the way round, and best of all, they have American-based (not out-sourced), live, on-call, phone Tech Support. In addition to the standard e-mail support, you can even “Chat live” with Tech Sup-port, if you’d care to?

You can also participate personally in the fight against malware, et al., and I respectfully suggest that you do so, immediately, if not sooner.

On a personal note. I have been hav-ing a great deal of trouble 4 from many, many unknown sources ever since I developed and patented my security IT 15+ years ago (See mysterious GFI TS person narration Above?) And just

like the Naked City (i.e., 50’s B&W TV show), where they say at their show’s conclusion; “There are 8 million stories in the Naked City; this has (merely) been one (1) of them.”

Continued Good Luck, GFI, “Job and Product(s) - ‘Well done!’ “

Ciao!

Footnotes1 If you are reading this Report/

Review from directly off of an Inter-net search, you are seeing it in HTML (or text) format. Yuk! There’s No Graphics there! To see all the beauti-ful Graphics in this Report/Review - the ones that we’ve worked so very hard to entertain you with - you will need to follow the procedures outlined in Foot-note 2 below. Enjoy! Again, our web page (www.ucs.org).”

2 “See the actual Reports/Re-views in the Blue Chips Magazine (BCM) Archives (i.e., begin search on left-hand side of web page) at (www.ucs.org).

Note. Always choose the top option, i.e., PDF format for its beauty.

3 Feature(s) precisely identi-fied as reason(s) for designating this Review/Report as “Security-Related.” In this case, everything.

4 My Hard Earned Byline: Hap-piness Is A Working Computer (HIAWC).

5 Videos Referenced to in S-R #30:

_1_http://www.vipreantivirus.com/

6 List of URL’s Used in/Re-searched for VIPRE Antivirus 2012 Review (Part 2):

_1_Basic security Why purchasing antivirus,anti-spyware and a firewall is a must.pdf (Source: GFI White Paper)

_2_DARPA Funds Phase 2 of Nano UAV Development _ 10 gram Fake

Hummingbirds.htm_3_Drones in American airspace

need to be regulated _ Los Angeles Times.htm

_4_Feds preparing for possible riots at conventions, presidential in-auguration or elsewhere Government Security News.htm

_5_Enterprises waste time with revenge counter strikes against hackers Itworld.htm

_6_Full Senate begins consider-ation of cyber security legislation _ SC Magazine.htm

_7_Internet blackout looms for thousands What you need to know The Lookout _ Yahoo! News.htm

_8_Leftover computer virus threat-ens Internet access _ Worldnews_com.htm

_9_Leftover Computer Virus Threatens Web Access, FBI Says _ Bloomberg.htm

_10_Patexia_com FAA legalizing UAVs in civilian airspace Flying robo-cop drones patrolling the neighborhood Patexia_com.htm

_11_Researcher CIA, NSA may have infiltrated Microsoft to write malware Itworld.htm

_12_Senate shelves cyber legisla-tion and goes on month_long recess Government Security News.htm

_13_Sharing the pie Threat collabo-ration _ SC Magazine.htm

_14_U_S_ Cyber Commander urges Senate on electronic protections Government Security News.mht

_16_U_S_ drone war Spies in the sky signal new age of surveillance _ thestar_com.htm

_17_Windows Ultimate Safeguard Rogue « Rogue Antispyware « Malware Protection Center.htm

_18_VIPRE Antivirus Official Sup-port Center.htm

_19_www.gfi.com/whitepapers/viprebusinesscybercriminals_en_gen.pdf

Page 12: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 12 Blue Chips Magazine — August 2012

_20_www.gfi.com/whitepapers/viprebusinesshackersplatform_en_gen.pdf

_21_www.gfi.com/whitepapers/vipre_business_protecting_against_the_new_wave_of_malware.pdf

7 Just to refresh your memory, that was when all “Hell broke loose” on my Win 7 PC. Actually, it was more like “Stopped!” I got smacked in the kisser with an extremely vicious Trojan, which my friend at the Doctor’s of Technology called, “The Trojan of the Week!” NOT THE MEEK, OR WEAK, mind you, but ... THE WEEK! For me, it may be the “Trojan of the decade.” I originally thought it was the deadly SIREFEF Tro-jan; but the consensus opinion was that it actually turned out to be the Antivir Solutions Pro (Trojan) (See also my November 2011 BCM S-R #25 1 & 2).

8 For those who have ever wondered what the quote “Fool me once, shame on you. Fool me twice, shame on me”

means, there are many interpretations. This is another way of saying “once bit-ten, twice shy.” In other words, there are people out there who are not what they seem. Some people will pretend friend-ship for all of the wrong reasons, such as for money, or something else that can benefit them.... Unfortunately, this is not always the case. Friendship is only one case where this quote has significance. It is also appropriate in love, war and various situations. If someone intention-ally fools a person once, they will most likely try to fool them again. This quote deals generally and primarily with de-ception and human naivete. Deception does not even have to have a human face to it, but the underlying message is that there is no excuse for falling for the same things more than once. While this quote does not discourage trust, it discourages trusting too much when the evidence is against it. Human nature is to learn from experience, another aspect

of this quote (Source: www.reference.com/motif/reference/quotes_fool_me_once_shame_on_you_fool_me_twice)

9 Jed Clampett: [bounces a golf ball on the kitchen table, thinking it’s a “golf egg”] “Well doggies! Strictly speakin’, I don’t think these are fresh laid.” (Source: Memorable quotes for “The Beverly Hillbillies” (1962).

Page 13: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 13 Blue Chips Magazine — August 2012

Page 14: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 14 Blue Chips Magazine — August 2012

Page 15: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 15 Blue Chips Magazine — August 2012

Page 16: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 16 Blue Chips Magazine — August 2012

Page 17: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 17 Blue Chips Magazine — August 2012

Page 18: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 18 Blue Chips Magazine — August 2012

Page 19: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 19 Blue Chips Magazine — August 2012

Page 20: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

Page 20 Blue Chips Magazine — August 2012

Page 21: Volume 30, No. 8 August 2012 Video · Review Program Editor — James Alexander 250-2269 Business/Technology Editor — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Proof

UCSBoard ofTrustees

C&C Bldg.RoomN3005

6:30 p.m.

Blue Chips — Utah’s Computer Guide in the 21st Century

Utah Blue Chips CalendarAugust 2012, September 2012

RootsMagic

MagazineDeadline

U of U7:00pm

MagazineDeadline

TBA