12 Tips to Save on Your Cell Phone Bill

Why pay more than you have to every month? These tips, tricks, and services can help you SAVE plenty of money on that monster cell phone bill.

See that cell phone next to you? Unfortunately, you’re paying too much money for it–every month. If overpaying for what you need sounds like a bad idea to you, stop doing it. We’ve assembled 12 simple actions that you can take to reduce your cell phone bill, so that some of the cash you now spend for service–maybe even half of it–remains in your possession. So check out our tips, and use one or more of them to save big bucks on your bill.

 

Covering the Basics

1. Find the right plan for you: Carefully review how often and in what ways you use your phone. Ideally, you should do this before signing a cell phone contract, but of course it can be difficult to know exactly how you’ll use your phone until you spend time with it every day.

If you’re already using your phone, take a close look at your cell phone plan, examining the calling, messaging, and data plan options you’ve chosen. Then scrutinize your usage pattern. Check several months of phone bills to see whether you pay for more minutes and megabytes than you use, or whether you regularly exceed your usage limits.

How much can I save? Let’s use a Verizon Wireless plan as an example

Possible Savings on Monthly Cell Phone Voice Plan (One Example: Verizon Wireless)

USAGE LIMITS Price per month Overage fee (per minute) Cost of using 750 minutes in one month Savings Advice
450 minutes per month $39.99 $0.45 $135 over your $39.99 monthly fee You don’t have any–and you’re paying much more than your monthly fee Bump up the minutes on your voice plan if you consistently exceed your minutes limit.
900 minutes per month $59.99 $0.45 $59.99 $135 versus the 450-minute plan with overage charges Drop to a lower monthly rate if you would almost never exceed its lower minutes limit.

On the other hand, if where you exceed the 450-minutes-per-month maximum just once during the life of your two-year service plan–even if you exceed it by a lot that one time, you still come out ahead with the lower limit overall. Suppose that you incur $157.50 in overage fees one month but stay under the 450-minute limit during the other 23 months of the service contract. Then you’ve saved overall by opting for the $39.99-per-month contract instead of the $59.99-per-month contract, since paying $20 more each month for 24 months would cost you an extra $480. Suddenly, that one-time surcharge of $135 seems like a bargain.

2. Trim the fat: Examine your cell phone plan to see what services you’re paying for above and beyond your voice and data plan. Are you paying your carrier for mobile insurance? A GPS service? Roadside assistance? Visual voicemail? Then think about whether you need these extras. In the case of voicemail, for example, your call log shows you the name and number of incoming callers, anyway–and that’s free.

How much can I save? This time, let’s use AT&T as an example.

Monthly Costs of AT&T’s Extra Services

AT&T Navigator $9.99
AT&T Family Map for iPhone $9.99
AT&T Mobile Insurance $6.99
Smart Limits for Wireless Parental Controls $4.99
Enhanced Voicemail $1.99
Detailed Billing $1.99

Opting out of just half of these billing add-ons can save you anywhere from $7.97 to $26.97 each month.

Get the Details on Data

3. Go data-free: Kick it old-school style by dropping your data plan altogether. This option may not be available if you’ve purchased a smartphone that requires a data plan; but for some consumers it’s a sensible move.

And it is possible: When my iPhone 4 suffered a fatal fall recently, I went back to my elderly flip phone and relied on an iPod Touch for apps and Internet services. When I wanted to check email or browse the Web, it was Wi-Fi only.

My pockets were heavier, in part because I was carrying two devices around, but also because my pockets had more cash in them thanks to my lower monthly bill.

How much can I save? $15 to $50 a month, or more.

4. Go on a data plan diet: Not ready to opt out of a data plan completely? Try cutting back instead.
Opt for the lowest-tiered data plan that your carrier offers, and make sure that you stay within your limits. Visit WhatIsMyCap.org, a handy site that offers tips on avoiding overage charges, using your current data plan as an example.

Also, find out what apps are claiming most of your bandwidth; the culprits may be obvious ones like Pandora and Netflix, or sneaky ones like Google Maps that increase your data usage by serving up ads.

How much can I save? $15 to $35 a month, or more.


5. Compress, compress:
 Having trouble reducing your data usage? Check out Onavo’s free iPhone and Android app, called Onavo Extend, which claims to make your data usage up to five times more efficient.

How much can I save? $15 a month or more.

Shake Things Up

6. Switch carriers: AT&T, Sprint, T-Mobile, and Verizon Wireless are the big four in cell phone service, but they’re hardly your only options.

Signing up with a smaller carrier, like Boost Mobile or US Cellular, can cut your monthly cost significantly

How much can I save? Boost Mobile offers an unlimited Android Plan for $55 per month, and an unlimited BlackBerry Plan for $60. (Both of these plans cover unlimited nationwide talk, text, Web access, 411 service, instant messaging, and email.)

In contrast, opting for a similar plan from Sprint, which is one of the only big carriers still offering an unlimited data plan option, will cost you $99.99 a month for unlimited voice, data, and messaging.

How much can I save? $40 to $45 per month.

7. Go contract free: It may seem counterintuitive, but one way to lower your monthly cell phone bill is to go contract-free. This isn’t the same as buying a prepaid cell phone (we’ll get to that next); here, you still pay your carrier month-to-month for cellular service, but you pay less. The trade-off is that you pay more for the phone itself up-front. But depending on the phone you choose, you could save big in the long run with this strategy.

How much can I save? You’ll pay T-Mobile $350 for its MyTouch Android phone, but you won’t sign a contract. A monthly service plan from T-Mobile with unlimited talk, text, and data costs $59.99 per month, so the cost of buying and using this phone (spread over two years) is about $1790.

That may sound like a lot, but consider this: It’s actually a savings of $180 over buying the phone with a two-year contract. In the latter case, T-Mobile subsidizes the cost of the phone, so the same myTouch device will cost you just $50, but the monthly service charge rises to $79.99 (or roughly $1920 over the life of the contract). So over two years, the total cost of the same phone and service comes to $1970–and you’re locked into a 24-month service contract.

8. Go prepaid: Paying for your phone service ahead of time is a sure-fire way to save money. After all, it guarantees that you pay only for minutes that you’ll use. And prepaid phones have come a long way in recent years, with carriers offering various cell phones and smartphones with prepaid plans.

How much can I save? With one of Virgin Mobile’s prepaid “PayLo” plans, you can spend as little as $20 per month for cell phone service. The lowest-cost plan includes 400 voice minutes.

charges messages (at 15 cents per message) and data (at $1.50 per megabyte of data used) on this plan against your $20 balance, and your credits are valid for 30 days. In one month, a light user could save as much as $40 off the price of a standard cell phone plan with messaging and data from a major carrier.

9. Dump the smartphone: Sure, your smartphone is cool. And you may think that you can’t live without it…but giving it up can be surprisingly easy. If you can’t bear to surrender access to the Web, email, and apps, try using a Wi-Fi-device, such as an iPod Touch, instead.

How much can I save? $15 to $50 a month–that’s how much you’re likely paying for the data plan on your smartphone.

Use the Web to Your Advantage

10. Go VoIP only: If you’re paying for a data plan on that smartphone, why not put it–and your phone’s Wi-Fi access–to good use?
Fring is one of a number of budget-friendly Voice-over-IP phone services.Dump your voice plan (if your contract permits you to, of course) and use a voice-over-IP service, such as Fring, Google Voice, or Skype, to make calls. A PCWorld writer took the plunge, and lived to tell the tale. Voice quality may not be perfect, but when was the last time your cell phone offered perfect voice quality?

How much can I save? $40 a month, or more–whatever the monthly cost of your voice plan is.

11. Get texting help: When it comes to texting, you probably think that you have to pay for a texting plan (at anywhere from $5 to $20 per month) or have to pay a per-message fee (of around 20 cents).

But you have a third alternative, and it’s free: Use an app to text at no charge. Free texting apps–which include Nimbuzz, WhatsApp,GroupMe, among many others–let you text and IM for free, using popular messaging networks such as Facebook and AIM.
You may have to get your friends or family to sign on in order to obtain completely free texting, but convincing them of the app’s merits is likely to be worth your while.

How much can I save? When you kiss your texting plan goodbye, you’ll be able to pocket an extra $5 to $20 per month.

12. Get outside help:Not sure which path will save you the most money? Get help at BillShrink.com. This very cool site analyzes your cell phone usage (you can grant it access to your account or enter the information manually), and points out plans that will save you money while meeting your needs.

How much can I save? BillShrink alerted me to a $30-per-month plan on T-Mobile that would save me about $50 per month.

And when I requested to keep using an iPhone, it alerted me to a $70-per-month plan on Sprint, which would save me $10 per month or more. (AT&T charges for data overages, while Sprint offers unlimited data.)

I think it’s time to make a change.

To View Entire Article Click Here

How do I open an additional mailbox in Outlook?

Description

This FAQ describes the steps you have to follow to open a second mailbox in Outlook. Before following the procedure, be sure you have the sufficient rights to see the e-mails in the additional mailbox. The additional mailbox must exist on an exchange server where you have access to.

Solution

1. Start Outlook (icon on the system tray).

or  Start > All Programs > Microsoft Office > Microsoft Office Outlook 2007.

2. Open the properties of the “Microsoft Exchange Server” Service. Tools > Account Settings … (The “E-mail Accounts Wizard” pop-up window appears).

3. Select ‘Microsoft Exchange‘ and press ‘Change…

4. On the ‘Microsoft Exchange Server Settings‘ tab, select ‘More Settings …

5. On the ‘Microsoft Exchange Server‘, add the additional mailbox select the ‘Advanced‘ tab.

In the section ‘Mailboxes‘, select ‘Add‘ (The “Add mailbox” pop-up window appears).
Fill in (part of) the name of the user who’s mailbox you want to open.
(If more then one name exist, a ‘Check Name‘ window appears from which you can choose the correct name.

6. Once the correct name is found, the name is listed in the list ‘Open these additional mailboxes’.

7. Click ‘OK‘, ‘Next‘ and ‘Finish‘ to close all windows.

8. The additional mailbox can be accessed through the ‘Folder List’.

Enable ‘Folder List’ view through View > Navigation Pane (ALT+F1).

To View Entire Article Click Here

Five Uninstall Tools That Really Work

Takeaway: Remove all traces of unwanted programs with the help of these uninstall tools.

It never ceases to amaze me how many applications include built-in uninstallers, yet leave fragments behind when you remove them. Fortunately, you don’t have to be at the mercy of an application’s own uninstall tool. A number of commercial uninstall tools are available that do a good job cleaning up your computer. Here are five to consider.

1. Revo Uninstaller:

When you launch Revo Uninstaller, it automatically displays a list of the applications it can uninstall (Figure A). However, this is far from being the software’s only useful function. The Tools section provides access to commonly used operating system tools, such as the Registry Editor, Group Policy Editor, and the System Properties Sheet. Even better, the software offers an option for getting rid of junk files. This includes things like temporary files that were created upon opening Microsoft Office documents but that were never removed. The software also features something called Hunter Mode, in which you can drag a bull’s-eye icon over a file or an icon and then click the mouse to remove that particular item. You can download a free trial of Revo Uninstaller.

2: Your Uninstall Tool

Another uninstall tool worth considering is Your Uninstaller. As with the Revo Uninstall Tool, launching Your Uninstaller displays a list of the items that can be removed. On my lab system, however, your uninstall tool found significantly more software than The Revo Uninstall Tool did.

In addition to its software removal capabilities, Your Uninstaller contains a disk cleaner, which gets rid of junk files. There is also a feature called Trace Erase, which helps protect your privacy by clearing your history.

My two personal favorite features are the File Shredder, which securely deletes files, and the Startup Manager. The Startup Manager allows you to control what gets launched at system startup. This feature could prove invaluable in cleaning malware infections. You can download a trial version of Your Uninstall tool.

3: IObit Uninstaller

Like the other uninstall tools, IObit Uninstaller starts by listing all the programs that can be uninstalled. Although this program lacks the bells and whistles of some of the other utilities, it has two features that make it worthwhile. One is the Forced Uninstall button, which is great for removing stubborn applications. The other is the way that IOBit Uninstaller categorizes applications. The software will tell you which applications are rarely used, recently installed, or consume a lot of disk space. IOBit Uninstaller is FREE.

4: Advanced Uninstaller Pro

Advanced Uninstaller Pro is a more comprehensive software removal application than some of the others. In addition to offering basic removal capabilities, this free tool can monitor the installation of an application to ensure that the application can be completely removed later on without leaving behind any fragments. Advanced Uninstaller Pro also offers several specialized cleaning utilities that are designed to clean up things like the Windows Start menu, the registry, and even your fonts.

5: Cleanse Uninstaller Pro

Cleanse Uninstaller Pro offers basic software removal capabilities, along with a number of other useful features. It includes a Force Uninstall option and a Startup Manager, as well as a junk finder. It also provides some more unusual features, such as registry backup capabilities (as well as the ability to do a system-level restore) and even a file burner that lets you burn files to disk prior to removing them. You can download a free trial of Cleanse Uninstaller Pro.

To View Full Article Click Here

Speeding Up Your Home Internet: Tricks and Tips

Though we live in an age of nearly-ubiquitous broadband, it still seems like certain pages don’t load as quickly as one would like.  After you’ve tried changing your ISP (Internet service provider), or ordering a T1 internet connection, consider that many problems can be solved with a series of tips and tricks, outlined below.

  • The first area to make changes is your browser.  Microsoft’s Internet Explorer once held an overwhelmingly large market share, but that’s no longer the case.  Browsers such as Mozilla Firefox, Google Chrome, and Safari from Apple have all become increasingly popular.  They are free to install and render websites much more efficiently than Internet Explorer.  Plus, they have two additional benefits, both of which can help keep your computer and internet running fast.  First, these browsers are more secure, including precautions to prevent malware such as viruses from being installed, a common cause of computer slowness.  Also, these browsers allow the user to install extensions, or programs designed to modify the browser’s functionality.
  • Extensions can be used to remedy another common cause of perceived Internet slowness.  More and more websites include Flash and JavaScript.  While neither is inherently bad, more content takes more time to load and render.  Of you feel you can do without the bells and whistles, there are extensions designed to block this content from being downloaded and shown on your computer.  AdBlock Plus just blocks advertising, but Flashblock blocks all Flash content.  If you’re not ready to go that far, ClickToFlash is a great extension.  It stops Flash content from being shown initially, but gives the user the option of clicking to display it.
  • If checking out your computer yields no positive results, your router might be to blame.  The router’s function is to take a single Internet connection and split it so that every device in the house can make use.  This is very handy, but if the router is wireless and the person installing it does not know better, it can open your network to attack.  All routers should be password protected and secured using the strongest method supported by your devices.  WPA2 authentication is currently the best.  If the network remains unprotected, your connection may be slowed by neighbors leeching from your connection.

These are only a few of the most common causes of Internet slowness.  Hopefully one of the solutions will work for you!

When will the cloud burst?

Cloud Burst

The ‘Cloud’ has been at the horizon for quite some time and is now slowly moving to the center stage. A lot has been written about this topic and spoken of at numerous meetings and seminars for long. Both business magazines and IT journals have carried stories on this subject and some have even put them on the cover page. Such is the importance that ‘cloud computing’ enjoys.

 

The Cloudy Outlook

CIOs have often been accused of ignorance or for resisting application of this new technological phenomenon. CIOs perhaps are not the only ones to blame, as technology vendors, service providers, and the media, all have played a part and have done their bit, to create confusion. The hype that surrounds this subject is phenomenal and perhaps equals or exceeds the buzz created on new technologies in the past. Articles in business magazines, discussions on television and direct mailers to senior corporate honchos touted ‘cloud’ as the single most important thing to happen and as a harbinger for all ills. Speakers were eloquent about the transformation that ‘cloud’ could bring to the enterprises.

To View Full Article Click Here

4 WAYS TO SPEED UP YOUR PC

Speed Up Computer

How to make a computer faster: 4 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer, help increase your PC speed, and help keep it running smoothly. This article discusses how to use the tools installed on your computer, plus a few safe and free downloads, to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you’re online.

Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren’t logged on as an administrator, you can only change settings that apply to your user account.

1. Remove spyware, and help protect your computer from viruses

Spyware collects personal information without letting you know and without asking for permission. From the websites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer’s performance. To combat spyware, you might want to consider using Malwarebytes. This scan is a free service that helps check for and remove viruses. You should also download Microsoft Security Essentials for free to help guard your system in the future from viruses, spyware, adware, and other malicious software (also known as malware). Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system protected from emerging threats.

2. Free up disk space

The Disk Cleanup tool helps you to free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete and then enables you to choose whether you want to delete some or all of the identified files.

Use Disk Cleanup to:

– Remove temporary Internet files.
– Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.
– Empty the Recycle Bin.
– Remove Windows temporary files, such as error reports.
– Delete optional Windows components that you don’t use.
– Delete installed programs that you no longer use.
– Remove unused restore points and shadow copies from System Restore.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.

To use Disk Cleanup:

Windows 7 users

1. Click Start, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

2. When Disk Cleanup has calculated how much space you can free up, in the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

3.  Clear the check boxes for files that you don’t want to delete, and then click OK.

4.  When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner, performing better, and potentially increasing your PC speed.  For more options, such as cleaning up System Restore and Shadow copy files, under Description, click Clean up system files, and then click the More Options tab.

Windows Vista users

1. In the Start menu, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup.

2. In the Disk Cleanup Options dialog box, choose whether you want to clean up your own files only or all of the files on the computer.

3. If the Disk Cleanup: Drive Selection dialog box appears, select the hard disk drive that you want to clean up, and then click OK.

4. Click the Disk Cleanup tab, and then select the check boxes for the files you want to delete.

5. When you finish selecting the files you want to delete, click OK, and then, to confirm the operation, click Delete files. Disk Cleanup then removes all unnecessary files from your computer. This may take a few minutes.

The More Options tab is available when you choose to clean files from all users on the computer.

Windows XP users

1.  Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

2.  In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

3.  Clear the check boxes for files that you don’t want to delete, and then click OK.

4.  When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and potentially performing better.

3. Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk as a file is opened (to piece it back together). The response time can be significantly longer.

Disk Defragmenter (sometimes shortened to Defrag by users) is a Windows utility that consolidates fragmented files and folders on your computer’s hard disk so that each occupies a single space on the disk. With your files stored neatly end to end, without fragmentation, reading and writing to the disk speeds up.

When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals (weekly is optimal), there are other times you should run it, too, such as when:

– You add a large number of files.
– Your free disk space totals 15 percent or less.
– You install new programs or a new version of the Windows operating system.

To use Disk Defragmenter:

Windows 7 users

1. Click Start, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter.


2. In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze disk button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  You can also schedule the Disk Defragmenter to run automatically. (Your computer might even be set up this way by default.) Under Schedule, it reads Scheduled defragmentation is turned on and then displays the time of day and frequency of defragmentation. If you want to turn off automatic defragmentation or to change the time or frequency, click Configure schedule (or Turn on Schedule, if it is not currently configured to run automatically). Change the settings, and then click OK.

7.  To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Windows Vista users

1.  Open Disk Defragmenter: Click the Start button, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

2.  In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze diskbutton. After the disk is analyzed, a dialog box appears letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  You can also schedule the Disk Defragmenter to run automatically. (Your computer might be set up this way by default.) Click Modify schedule….

7.  In the Disk Defragmenter: Modify Schedule dialog box, choose how often, which day, and at what time of day you want defragmentation to occur, and then click OK.

8.  Click OK again.

Windows XP users

1.  Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.

2.  In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment button. Note:In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.  After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Running Disk Cleanup and Disk Defragmenter on a regular basis is a proven way to help keep your computer running quickly and efficiently. If you’d like to learn how to schedule these tools and others to run automatically, please read Speed up your PC: Automate your computer maintenance schedule.

4. Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult or even impossible. The Error Checking utility scans the hard drive for bad sectors and scans for file system errors to see whether certain files or folders are misplaced.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

Run the Error Checking utility:

1.  Close all open files.

2.  Click Start, and then click Computer.

3.  In the Computer window (My Computer in Windows XP), right-click the hard disk you want to search for bad sectors, and then click Properties.

4.  In the Properties dialog box, click the Tools tab.

5.  Click the Check Now button.

6.  In the Check Disk dialog box (called Error-checking in Windows 7), select the Scan for and attempt recovery of bad sectors check box, and then click Start.

7.  If bad sectors are found, choose to fix them.

Tip: Only select the “Automatically fix file system errors” check box if you think that your disk contains bad sectors.

To see the original article in its entirety click here.

How To Remove Windows 7 Antispyware

Remove Windows 7 Antispyware 2012, Vista Antivirus 2012, and XP Security 2012 (See Uninstall Guide Below)

Win 7 Antispyware 2012, Vista Antivirus 2012, and XP Security 2012 are all names for the same rogue anti-spyware program. This family of rogues is promoted in two ways. The first is through the use of fake online antivirus scanners that state that your computer is infected and then prompt you to download a file that will install the infection. The other method are hacked web sites that attempt to exploit vulnerabilities in programs that you are running on your computer to install the infection without your knowledge or permission. Regardless of how it is installed, once it is running on your computer it will install itself as a variety of different program names and graphical user interfaces depending on the version of Windows that is running. Regardless of the name, though, they are all ultimately the same program with just a different skin on it. This rogue goes by different program names, which I have listed below based upon the version of Windows that it is installed on:

Windows XP Rogue Name Windows Vista Rogue Name Windows 7 Rogue Name
XP Antispyware 2012 Vista Antispyware 2012 Win 7 Antispyware 2012
XP Antivirus 2012 Vista Antivirus 2012 Win 7 Antivirus 2012
XP Security 2012 Vista Security 2012 Win 7 Security 2012
XP Home Security 2012 Vista Home Security 2012 Win 7 Home Security 2012
XP Internet Security 2012 Vista Internet Security 2012 Win 7 Internet Security 2012

When installed, this rogue pretends to be a security update for Windows installed via Automatic Updates. It will then install itself as a single executable that has a random consisting of three characters, such as kdn.exe, that uses very aggressive techniques to make it so that you cannot remove it. First, it makes it so that if you launch any executable it instead launches Vista Home Security 2012, XP Internet Security 2012, Win 7 Security 2012, or any of the other names it goes under. If the original program that you wanted to launch is deemed safe by the rogue, it will then launch it as well. This allows the rogue to determine what executables it wants to allow you to run in order to protect itself. It will also modify certain keys so that when you launch FireFox or Internet Explorer from the Window Start Menu it will launch the rogue instead and display a fake firewall warning stating that the program is infected.

Win 7 Antispyware 2012 Screen shot

Once started, the rogue itself, like all other rogues, will scan your computer and state that there are numerous infections on it. If you attempt to use the program to remove any of these infections, though, it will state that you need to purchase the program first. In reality, though, the infections that the rogues states are on your computer are all legitimate files that if deleted could cause Windows to not operate correctly. Therefore, please do not manually delete any files based upon the results from this rogue’s scan.

While running, XP Internet Security 2012, Win 7 Antivirus 2012, and Vista Security 2012 will also display fake security alerts on the infected computer. The text of some of these alerts are:

XP Home Security 2012 Firewall Alert
XP Home Security 2012 has blocked a program from accessing the internet
Internet Explorer is infected with Trojan-BNK.Win32.Keylogger.gen
Private data can be stolen by third parties, including credit card details and passwords.

Malware Intrusion
Sensitive areas of your system were found to be under attack. Spy software attack or virus infection possible. Prevent further damage or your private data will get stolen. Run an anti-spyware scan now. Click here to start.

System danger!
Your system security is in danger. Privacy threats detected. Spyware, keyloggers or Trojans may be working the background right now. Perform an in-depth scan and removal now, click here.

System Hijack!
System security threat was detected. Viruses and/or spyware may be damaging your system now. Prevent infection and data loss or stealing by running a free security scan.

Privacy threat!
Spyware intrusion detected. Your system is infected. System integrity is at risk. Private data can be stolen by third parties, including credit card details and passwords. Click here to perform a security repair.

Stealth intrusion!
Infection detected in the background. Your computer is now attacked by spyware and rogue software. Eliminate the infection safely, perform a security scan and deletion now.

XP Antispyware 2012 Alert
Security Hole Detected!
A program is trying to exploit Windows security holes! Passwords and sensitive data may be stolen. Do you want to block this attack?

Just like the scan results, these security warnings and alerts are all fake and should be ignored.

While running, Win 7 Home Security 2012, XP Antivirus 2012, and Vista Antivirus 2012 will also hijack Internet Explorer so that you cannot visit certain sites. It does this so that you cannot receive help or information at sites like BleepingComputer.com on how to remove this infection. When you attempt to visit these sites you will instead be shown a fake alert stating that the site you are visiting is dangerous and that the rogue is blocking it for your protection. The message that you will see is:

Vista Security 2012 Alert
Internet Explorer alert. Visiting this site may pose a security threat to your system!

Possible reasons include:
– Dangerous code found in this site’s pages which installed unwanted software into your system.
– Suspicious and potentially unsafe network activity detected.
– Spyware infections in your system
– Complaints from other users about this site.
– Port and system scans performed by the site being visited.

Things you can do:
– Get a copy of Vista Security 2012 to safeguard your PC while surfing the web (RECOMMENDED)
– Run a spyware, virus and malware scan
– Continue surfing without any security measures (DANGEROUS)

Just like the fake security alerts, the browser hijack is just another attempt to make you think that your computer has a security problem so that you will then purchase the program.

Without a doubt, this rogue is designed to scam you out of your money by hijacking your computer and trying to trick you into thinking you are infected. Therefore, please do not purchase this program , and if you have, please contact your credit card company and dispute the charges stating that the program is a computer infection. Finally, to remove Win 7 Antispyware 2012, Vista Antivirus 2012, and XP Security 2012 please use the guide below, which only contains programs that are free to use.

Tools Needed for this fix:

  • Malwarebytes’ Anti-Malware

 

Automated Removal Instructions for Win 7 Antispyware 2012 & Vista Antivirus 2012 using Malwarebytes’ Anti-Malware:

  1. Print out these instructions as we will need to close every window that is open later in the fix.
  1. It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If this is the case, then you will need to download the files requested in this guide on another computer and then transfer them to the infected computer. You can transfer the files via a CD/DVD, external drive, or USB flash drive.
  1. This infection changes settings on your computer so that when you launch an executable, a file ending with .exe, it will instead launch the infection rather than the desired program. To fix this we must first download a Registry file that will fix these changes. From a clean computer, please download the following file and save it to a removable media such as a CD/DVD, external Drive, or USB flash drive. FixNCR.reg.  Once that file is downloaded and saved on a removable devices, insert the removable device into the infected computer and open the folder the drive letter associated with it. You should now see the FixNCR.reg file that you had downloaded onto it. Double-click on the FixNCR.regfile to fix the Registry on your infected computer. You should now be able to run your normal executable programs and can proceed to the next step.If you do not have any removable media or another clean computer that you can download the FixNCR.reg file onto, you can try and download it to your infected computer using another method. On the infected computer, right click on the Internet Explorer’s icon, or any other browser’s icon, and select Run As or Run as Administrator. If you are using Windows XP, you will be prompted to select a user and enter its password. It is suggested that you attempt to login as the Administratoruser. For Windows 7 or Windows Vista, you will be prompted to enter your Administrator account password.Once you enter the password, your browser will start and you can download the above FixNCR.reg file. When saving it, make sure you save it to a folder that can be accessed by your normal account. Remember, that you will be launching the browser as another user, so if you save it to a My Documents folder, it will not be your normal My Documents folder that it is downloaded into. Instead it will be the My Documents folder that belongs to the user you ran the browser as. Once the download has finished, close your browser and find the FixNCR.reg file that you downloaded. Now double-click on it and allow the data to be merged. You should now be able to run your normal executable programs and can proceed to the next step.
  1. Now we must first end the processes that belong to Win 7 Antispyware 2012 & Vista Antivirus 2012 and clean up some Registry settings so they do not interfere with the cleaning procedure. To do this, please download RKill to your desktop from the following link.RKill Download Link.  When at the download page, click on the Download Now button labeled iExplore.exe download link . When you are prompted where to save it, please save it on your desktop.
  1. Once it is downloaded, double-click on the iExplore.exe icon in order to automatically attempt to stop any processes associated with Win 7 Antispyware 2012 & Vista Antivirus 2012 and other Rogue programs. Please be patient while the program looks for various malware programs and ends them. When it has finished, the black window will automatically close and you can continue with the next step. If you get a message that RKill is an infection, do not be concerned. This message is just a fake warning given by Win 7 Antispyware 2012 & Vista Antivirus 2012 when it terminates programs that may potentially remove it. If you run into these infections warnings that close RKill, a trick is to leave the warning on the screen and then run RKill again. By not closing the warning, this typically will allow you to bypass the malware trying to protect itself so that rkill can terminate Win 7 Antispyware 2012 & Vista Antivirus 2012 . So, please try running RKill until the malware is no longer running. You will then be able to proceed with the rest of the guide. If you continue having problems running RKill, you can download the other renamed versions of RKill from the rkill download page. All of the files are renamed copies of RKill, which you can try instead. Please note that the download page will open in a new browser window or tab.Do not reboot your computer after running RKill as the malware programs will start again.
  1. There have been reports of this infection being bundled with the TDSS rootkit infection. To be safe you should also run a program that can be used to scan for this infection. Please follow the steps in the following guide:

How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller

If after running TDSSKiller, you are still unable to update Malwarebytes’ Anti-malware or continue to have Google search result redirects, then you should post a virus removal request using the steps in the following topic rather than continuing with this guide:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help Topic

If TDSSKiller requires you to reboot, please allow it to do so. After you reboot, reboot back into Safe Mode with Networking again.

  1. Download Malwarebytes’ Anti-Malware, also referred to as MBAM, from the following location and save it to your desktop:Malwarebytes’ Anti-Malware Download Link (Download page will open in a new window)
  1. Once downloaded, close all programs and Windows on your computer, including this one.
  1. Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MBAM onto your computer.
  1. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked. Then click on the Finish button.
  1. MBAM will now automatically start and you will see a message stating that you should update the program before performing a scan. As MBAM will automatically update itself after the install, you can press the OK button to close that box and you will now be at the main program as shown below.

 

 

  1. On the Scanner tab, make sure the the Perform full scan option is selected and then click on the Scan button to start scanning your computer for Win 7 Antispyware 2012 & Vista Antivirus 2012 related files.
  1. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.

 

 

  1. When the scan is finished a message box will appear as shown in the image below.

 

You should click on the OK button to close the message box and continue with the Vista AntiSpyware 2012 & Win 7 Home Security removal process.

  1. You will now be back at the main Scanner screen. At this point you should click on the Show Results button.
  2. A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.

 

You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

  1. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.
  1. You can now exit the MBAM program.
  1. As many rogues and other malware are installed through vulnerabilities found in out-dated and insecure programs, it is strongly suggested that you use Secunia PSI to scan for vulnerable programs on your computer. A tutorial on how to use Secunia PSI to scan for vulnerable programs can be found here:How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector

Your computer should now be free of the Vista AntiSpyware 2012 & Win 7 Home Security program. If your current anti-virus solution let this infection through, you may want to consider purchasing the PRO version of Malwarebytes’ Anti-Malware to protect against these types of threats in the future.

If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help

To see the original article in its entirety click here.


Top IT skills wanted for 2012

 

Takeaway: A new Computerworld survey indicates the nine IT skills that will be in demand in 2012.

Nearly 29 percent of the 353 IT executives who were polled in Computerworld’s annual Forecast survey said they plan to increase IT staffing through next summer. (That’s up from 23% in the 2010 survey and 20% in the 2009 survey.)

Here are the skills that the IT executives say they will be hiring for:

  1. Programming and Application Development61% plan to hire for this skill in the next 12 months, up from 44% in the 2010 survey. This covers the gamut from website development to upgrading internal systems and meeting the needs of mobile users.
  2. Project Management (but with a twist) The twist is that they’re not going to just be looking for people who can oversee and monitor projects. They also want people who can identify users’ needs and translate them for the IT staffers-the increasingly popular business analysts.
  3. Help Desk/Technical SupportMobile operating systems have added a new dimension to help desk and tech support.
  4. NetworkingThis demand is being fueled partially by virtualization and cloud computing projects. The survey also revealed that execs will be looking for people with VMware and Citrix experience.
  5. Business IntelligenceComputerworld interprets this uptick to a focus shift in many companies, from cost savings to investing in technology. That will be nice if it pans out that way.
  6. Data CenterVirtualization and the Cloud could also be behind the increased need for IT professionals with backgrounds in data center operations and systems integration.
  7. Web 2.0Tech skills centered around social media will be in demand, with .Net, AJAX and PHP as key back-end skills, with HTML, XML, CSS, Flash and Javascript, among others, on the front end.
  8. SecurityAlthough down from 32 percent in the 2010 survey, security stays a top concern of IT executives.
  9. TelecommunicationsThe survey indicates a demand for people with IP telephony skills, and for those familiar with Cisco IPCC call center systems.

Comcast Launches Xfinity Wi-Fi Hot Spots in Philadelphia, N.J.

Comcast on Monday launched Xfinity Wi-Fi, which will provide free wireless Internet access to customers in Northern New Jersey, areas along the Jersey Shore, and the Philadelphia metro area.

Users who subscribe to Comcast Xfinity Internet service will be able to log-in to more than 2,000 wireless hot spots with their Comcast username and password. The hot spots have been placed in areas like parks, shopping districts, boardwalks, and transit stations.

In Philadelphia, for example, customers can access Wi-Fi at SEPTA’s Suburban and Market East Stations, many train platforms along the Paoli/Landsdale and the Manayunk/Norristown Line, the Wells Fargo Center, and the South Street shopping district.

In New Jersey, access has been enabled in towns like Berkeley Heights, Livingston, Long Branch, Montclair, New Brunswick, Perth Amboy, Red Bank, Rumson, Summit, and Trenton.

Comcast said it would increase the number of hot spots in the NJ-Philadelphia area by year’s end, but does not have plans to expand into other markets or nationally in the near future. Earlier this year, Comcast announced a roaming agreement with Cablevision and Time Warner Cable that lets Xfinity Internet customers access hot spots in the New York Tri-State area.

A map of available hot spots is posted on comcast.com/wifi.

“With the explosion of wireless Internet devices, new platforms and apps, consumers are increasingly looking to enjoy entertainment and communications on the go,” Cathy Avgiris, senior vice president and general manager of communications and data services for Comcast Cable, said in a statement. “We offer some of the fastest Internet speeds in the home and, by offering Xfinity WiFi, we’re also providing a fast wireless Internet experience for our customers when they are outside the home.”


To read the original article in it’s entirety, Click Here