Avoid computer viruses that spread over mobile devices

Some mobile viruses -- that is, viruses that infect Smartphones, cell phones, and handheld PCs -- spread in the same way as traditional computer viruses, namely when you download programs or files that are already infected.

In the case of mobile phones, that might mean downloading photos, video clips, ring tones, cell phone themes, or other programs.

Important: Currently, we are not aware of any viruses that can be transferred from your laptop or your desktop to your Windows Mobile-based device.

Other mobile viruses can spread like human viruses do by close contact in the presence of the right host. Some cell phones are equipped with Bluetooth, a technology that allows you to transfer data between different devices, such as sending photos from your cell phone to your printer or transferring addresses stored on your Windows Mobile device to your laptop.

This handy technology comes with a few risks if you don't use it correctly. If you have Bluetooth enabled on your mobile device and in "discoverable mode" (see the manual that came with your device for more information), and you come within 30 feet of another infected device that also has Bluetooth enabled and is running the same operating system as your mobile device, then you might get infected.

Note: Windows Mobile devices equipped with Bluetooth come with that technology turned off by default.
Top of pageTop of page
Help protect yourself against mobile viruses

Follow these general rules to help protect the data on your mobile device.


Only download or accept programs and content (including photos, video clips, ring tones, mobile device themes, and games) from a source you trust.

Our recommendations for surfing and downloading more safely when using your personal computer also apply when you surf the Web, send e-mail, or download programs using a mobile device. If you don't know whom an attachment is from or if you weren't expecting it, your best bet is not to open it or download it at all.


If your phone is equipped with Bluetooth, turn it off or set it to non-discoverable mode when you're not using it. Only accept incoming data from a source you trust. For more information, see the instructions that came with your mobile device.


If your phone is equipped with Beam (also known as Infrared), only allow it to receive incoming beams when you're receiving data from a source you trust.


Download and install antivirus software for your mobile device. You can get antivirus software at Windows Marketplace or in the Windows Mobile catalog.
Top of pageTop of page
Additional ways to protect your mobile device

Currently, the risk of contracting a virus on your mobile device is not even close to the risk of losing it or having it stolen. Remember to treat your phone or other handheld device as carefully you would your wallet, especially in places that are prone to theft, such as airport security checkpoints. Read the manual that came with your device to determine how to lock it or protect it with a password. That way, if you do lose your mobile device, a thief will have a more difficult time using it to make phone calls or access personal information you may have stored on it.

To learn more about mobile virus threats as they develop, visit the Security at Home Web site or sign up for the Microsoft Security Newsletter for Home Users.

Traditional security threats coming soon to mobile device near you

Users have long believed that their mobile devices were free from the threat of Trojans or botnets, but new research from the Georgia Institute of Technology warns that this could soon change. In fact, the first wave of mobile security threats is already here.

"We're trying to be forward looking in this report," said Patrick Traynor, assistant professor at Georgia Tech's School of Computer Science and a co-author of the report, entitled "Emerging Cyber Threats Report for 2009." Although the threat is not quite imminent, Traynor said, a proactive stance by both industry and government could mitigate the danger going forward.

Already two of the newest mobile platforms, Apple's iPhone and Google's Android, have exposed flaws, both of which resemble some of the most popular desktop attacks. They are both browser-based exploits, which Traynor said leaves both corporate and personal users vulnerable.

"The browser has been the way to take control of the desktop," he said. As platforms consolidate and become more standardized, and as phone browsers become more complex, that same avenue will have a greater reach and greater reward for malicious hackers focused on mobile devices. Already, he estimated, there are 100,000 mobile virus incidents a day. Many viruses hop on Bluetooth or wireless data connections to propagate and, in contrast with computers, users generally turn to their service provider first when looking for a fix.

Although there is little hope of stopping an epidemic of mobile viruses and exploits, Traynor said, there are positive signs for long-term remedies if telecoms, enterprises, manufacturers and end users can work together. And the fast refresh cycle for most mobile devices will offer the industry an advantage never enjoyed by the PC industry.

"One of the exciting pieces of this world is that the average lifetime of a PC is 10 years, but people replace their phones every two to three years," he said. "If solutions don't work, we can try something different … we can try to be revolutionary in this space."

Some of the key challenges the report identified include:

Low device battery life spans mean users invariably must choose between running antivirus and a few more hours of device usage. Traynor said the latter camp generally wins, and always-on antivirus is unlikely to be a good solution for most companies, although mobile antivirus products from companies like F-Secure do exist.

Increasingly sophisticated applications mean more valuable data on devices, both corporate and personal. In the Georgia Tech report, Tom Cross, an X-Force Researcher with IBM, wrote: "Financial motivation and increased adoption will increase attacks to smartphones in the years to come. As more payment infrastructure gets placed on these devices, they will become a more attractive target." Cross said he was surprised that more attacks had not already been made on devices like the iPhone.

Mobile Denial of Service (DoS) attacks could potentially take down whole cells of network coverage if a botnet lies dormant and is then activated.

VoIP and mobile VoIP mean cheaper calling but also leave an open window for attackers to send out thousands of spoof calls, trolling for personal data and bogging down already taxed cellular data networks.

Warning over mobile crime clips

Police are urging parents to monitor their teenagers' mobile video phones, following a craze of filming crimes being committed.

Merseyside Police said they had found footage including dog fights, loaded guns and speeding cars being passed around by mainly teenage phone users.

A senior officer said that police had the power to seize phones and can even trace deleted videos.

The recorded incidents are believed to have taken place in Liverpool.

They included clips of loaded guns being brandished and cars and motorbikes being driven recklessly.

I would say to parents 'Are you aware of where you child is and what they are doing?'
Ch Supt Andy Ward
Merseyside Police

Ch Supt Andy Ward, of Merseyside Police, said that it was not only those doing the filming who were at risk of prosecution.

"We will be investigating both the making and distribution of the footage and have the power to seize phones," he said.

"We must also warn people that deleting the footage is not enough - it is still traceable."

He said he was concerned that children may be tempted to join the craze and put their lives at risk.

He added: "I would say to parents 'Are you aware of where your children are and what they are doing?'.

"I'm talking about the 14 to 19 age group here.

"If you get the opportunity, have a look at your sons' or daughters' phones and see what is on it, because some of these children may just be on the periphery and thinking of getting involved in this sort of behaviour because it is glamorised.

"The last thing I want to happen is for me to have to go around to one of their houses tonight and ask them to come to the mortuary to identify their son or daughter."


How to Enable the Windows Task Manager?

Windows Task Manager is used to view the status of running applications, active processes, CPU and Page file usage history and active user in windows environment. As a system administrator you can mange the all features of Windows Task Manager, you can end task any running application and set the priority of any running process according to application importance.


By default Windows Task Manager Status is enabled, but a user can also disable or enable it manually. But some time a registry hack applies on windows task manager to disable it and your system give you a message” Task Manager has been disabled by your administrator.” then you should enable it with editing the system registry or using Group Policy Editor.

Before proceeding further, first scan your system with up-to-date antivirus, and then follow the given steps to enable it using group policy editor.




To enable this feature, you will need to be logged into your computer with administrative rights.


Now click on Start button and type “Gpedit.msc” in Run option then press OK.


In Group Policy Editor, expand the “Administrative Templates” > “System” then “Ctrl+Alt+Del Options”, under the User Configuration option.


Now in right side of panel “Ctrl+Alt+Del Options” double click on “Remove Task Manager” to change it setting. Here set the option “Disable” to “Enable” or “Not configured” and your task manager is available once again.

how to run your computer faster


A stitch in time saves nine! Believe it or not, but this adage works brilliantly for your computer too. Not only will keeping your computer clean help you save on maintenance cost, but it will also keep you stress free so that you can focus on your work and nothing else! So, why is cleaning your computer so important? Well, basically because dust and debris collect in your system, causing your computer to heat up, which can eventually lead to hardware failure.

Here are a few simple tips that will keep you in the clear. Read on!

1.) To clean your computer case, first unplug your system power from the electrical outlet. Remove all the cables and connectors from the back side of your computer. The computer will require the fans to be blown out as well. Some PCs have multiple fans: one on the processor and one or two on the power supply. Make sure you clean them all. The best thing to use is probably compressed air. Just blow that air all around the hardware components, while keeping the nozzle at least four to five inches away from the main board components.

2.) Another good alternative to compressed air is to use a portable battery powered vacuum that can effectively remove the dust, dirt and hair from the motherboard and prevent it from getting trapped within the case. However, do not use a standard electricity powered vacuum, as it can cause a lot of static electricity that can damage your computer. When using the vacuum, it is vital that you stay a couple inches away from the motherboard and all the other components to help prevent contact, as well as, to help prevent anything from being sucked into the vacuum. Ensure that you do not remove any small components with the vacuum, such as jumpers.

3.) To clean your keyboard, pick up a can of compressed air at your local office supply store. In case you're not sure, compressed air is a handy invention that forces air from a can out through a long thin straw. You can use it to clean out dust and debris on your keyboard, without having to take the whole thing apart. Be careful not to blow dust into your hard drive though, as that may cause damage to your machine. It's a good idea to turn the keyboard upside down and give it a few good shakes before you use it again. If you're brave, you can pop off the keys and soak them in a solution of ammonia and water, but be careful, because not all the keys come off easily. If you feel resistance, stop!

4.) If you feel the need to test fate, you can pull out the memory and other cards from your computer and gently rub a pencil eraser on the contacts before putting them back in. However, don't pull any cards out unless you're having problems reaching certain areas.

5.) Remember, never open a CRT monitor. Even when it's unplugged, they retain enough current to seriously harm you.

6.) When cleaning the inside of your computer (motherboard, etc.), make sure your computer is off. Also, never place your computer on the ground. You should always use a computer table or shelf while you're cleaning.

7.) Only use an air duster/canned air to remove dust from your computer's components. It's best to do it outside as well so that it doesn’t end up all over your house!

8.) When cleaning your monitor, make sure you do so with a clean rag and only use cleaning agents designed for electronics.

9.) When you're finished with the inside, use a lightly dampened cloth or paper towel to wipe off the outside of your computer case. Gently wipe down the casing using Q-Tips to clean small places like vent holes and disk drive openings.

10.) Never clean the inside computer components or other circuit boards with a damp or wet cloth.

11.) Wipe down the outside of your mouse with a slightly damp cloth. Next, unscrew the ring from the bottom of your mouse and remove the ball. Dust off the ball with a soft cloth and look inside the cavity of your mouse. There will probably be some dust clinging to the rollers that move the ball and you can just scrape that out with a Q-Tip. When you're finished, replace the ball and ring. Optical mice will require little maintenance, but ball mice can be disassembled. Clean the ball itself, as well as, the X and Y axis rollers.

12.) To keep your computer looking clean longer, purchase an inexpensive plastic covering for your equipment!

If you follow all of these guidelines, your computer and all of its equipment will shine like new!

Top 10 Most Common Credit Card Mistakes

It can be expensive and dangerous to make mistakes with your credit card. In a world where every buck counts, not making the right choices can hit your wallet hard and put you in problem. By far the greatest mistake people make with their credit cards is creating debt that they just can't afford to pay off. Here are 10 most common credit mistakes to avoid at all costs:

1. Using credit card debt management services without having consulted with your credit card company directly:- Credit card debt management services will charge for their services and "you will destroy any relationship you once had" with your credit card companies, Blake says.

2. Accepting the terms of a credit card without understanding them first:- This is especially true when you make new purchases with a balance transfer card, assuming the low APR balance transfer rate applies to new purchases. Cash advances can be a mistake, too, as the interest rates on advances typically tend to be higher than purchases. Be sure to carefully read the credit card application, or call and ask questions.

3. Ignoring credit card monthly statements:-You must read over your statements, checking to see if you were properly billed. Errors do happen, and so does fraud. Keep records of all of your purchases to confirm that your statements are correct. Also check your interest rate to see if it has changed, as well as your credit limit. Going over your credit limit can cost you dearly in fees.

4. Using one credit card to pay off another:-This wastes money paying fees and compounds your interest. Once you start down this road, your debt can easily spiral out of control.

5. Not finding the right credit card for you:-Take the time to shop around and find the best rate and the best card to suit your needs.

6. Missing payments or sending them late:-This is another common mistake that can be expensive and is easily avoided. When you sign up for a credit card, schedule your payments to coincide with the time of month you receive your pay cheque. Mark the calendar so you don't forget.

7. Closing old credit cards:-Eventually the good credit rating that you built up with that credit card will be erased from your credit record. Keep it open by making small purchases once a month.

8. Letting someone use your credit card or making purchases for a friend:- As much as you might like to help someone out, think of yourself first. If your friend can't pay you back, you will pay for their charges as well as interest on those charges.

9. Having too many credit cards:- Every card you sign up for causes a credit inquiry, and frequent credit inquiries will lower your credit rating. It can also be difficult and time consuming to keep track of all your credit cards.

10. Using your credit card online on an unsecured Web site:- Make sure the Web sites you purchase from are legitimate and safe. Use an antivirus program on your computer.

10 tips for safer electronic banking and protecting yourself under the EFT Code

The Electronic Funds Transfer Code (EFT Code) protects consumers who use electronic banking such as ATMs and EFTPOS, or telephone and internet banking, to transfer funds.
Here are some important tips to remember about your rights and obligations under the code.

1. There are a number of situations where, under the EFT Code, you will get all of your money back if there was an unauthorised transaction on your account. For example:

* If a forged, expired or cancelled PIN or card was used;
* If there was fraudulent conduct by employees of your account institution or merchant;
* If the transaction took place before you received your card, PIN or code;
* If a merchant incorrectly debited your account more than once;
* If the transaction took place after you told your account institution that your card had been lost or stolen or that someone else may know your PIN or password; or
* If it’s clear that you haven’t contributed to the loss.

2. You won't get your money back from unauthorised transactions however if:

* You acted fraudulently or didn't keep your PIN or password secret:
* You unreasonably delayed telling your account institution that your card had been lost or stolen or that someone else may know your PIN or code.

Even in these circumstances though the amount you are liable for is subject to certain caps.
3. Liability will be split between you and your financial institution where a PIN or code was needed to perform the unauthorised transaction and none of the circumstances in 6 or 7 apply. In these circumstances your liability will be capped at $150 or any lower figure set by your account institution.
4. Under the code, your account institution is normally liable for any failure of their equipment or system. Also, your account institution can’t avoid their liability just because another party involved in the transaction, such as the merchant, caused the problem. You don’t have to make the complaint to one of these other parties, you can simply take your complaint to your account institution and require them to follow it up.
5. If you have a complaint about an electronic funds transfer you should start by raising the matter with your account institution. The EFT code sets our rules for dealing with these complaints.


6. Read your terms and conditions document. It will tell you your rights and obligations and things such as which accounts can be accessed with your card and/or PIN or code; any restrictions that apply, such as limits on how much money you can withdraw in a day and how to report the loss, theft or unauthorised use of the card or PIN.
7. Always check your statements to ensure there are no unauthorised transactions. Some transactions that look unfamiliar may appear that way because the merchant’s banking is done under another name.
8. Tell your account institution immediately if your card is lost or stolen or someone else may know your PIN or password. Also tell them immediately if you find an unauthorised transaction on your statement.
9. Never tell your PIN or code to anyone, including a friend or family member. Don’t record it on your card or with something you keep with your card.
Most unauthorised transactions happen because a person gave someone else their PIN or code. Safeguarding the secrecy of your PIN is the best way to protect yourself from unauthorised transactions.
10. You should avoid using your birth date or a recognisable part of your name as your PIN or code as this is easy for others to guess.