<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Stellar Solutions &#187; Internet</title>
	<atom:link href="https://stellarsolution.net/category/internet/feed/" rel="self" type="application/rss+xml" />
	<link>https://stellarsolution.net</link>
	<description>Stellar solutions for Business, IT, Energy and Home</description>
	<lastBuildDate>Thu, 08 Oct 2015 20:20:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>Apple Iphone dumped for Nokia windows phone, Why Brett Arends did this, Cost versus benefit, Why I never bought Apple computers and phones</title>
		<link>https://stellarsolution.net/2015/10/08/apple-iphone-dumped-for-nokia-windows-phone-why-brett-arends-did-this-cost-versus-benefit-why-i-never-bought-apple-computers-and-phones/</link>
		<comments>https://stellarsolution.net/2015/10/08/apple-iphone-dumped-for-nokia-windows-phone-why-brett-arends-did-this-cost-versus-benefit-why-i-never-bought-apple-computers-and-phones/#comments</comments>
		<pubDate>Thu, 08 Oct 2015 20:20:23 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[computers]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Windows phone]]></category>
		<category><![CDATA[Apple Iphone dumped for Nokia windows phone]]></category>
		<category><![CDATA[Cost versus benefit]]></category>
		<category><![CDATA[Why Brett Arends did this]]></category>
		<category><![CDATA[Why I never bought Apple computers and phones]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=134</guid>
		<description><![CDATA[Apple Iphone dumped for Nokia windows phone, Why Brett Arends did this, Cost versus benefit, Why I never bought Apple computers and phones &#160; I read the article this morning with delight. Another enlightened soul, another pragmatic businessman who understands cost versus benefit. I have never bought an Apple product even though they are generally [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Apple Iphone dumped for Nokia windows phone, Why Brett Arends did this, Cost versus benefit, Why I never bought Apple computers and phones</p>
<p>&nbsp;</p>
<p>I read the article this morning with delight. Another enlightened soul, another pragmatic businessman who understands cost versus benefit.</p>
<p>I have never bought an Apple product even though they are generally quality devices.</p>
<p>Why?</p>
<p>Cost versus benefit.</p>
<p>They are overpriced.</p>
<p>They may have been more user friendly and less problem prone in the past, but I do not believe that to be true now.</p>
<p>I have encountered as many or more problems with Apple computers in my sphere of influence.</p>
<p><strong>From Market Watch October 8, 2015.</strong></p>
<p>&nbsp;</p>
<p>&#8220;Why I dumped my Apple iPhone for a Microsoft phone</p>
<p>Oh, and I’m not comparing the latest, most high-end models either. I’m not talking about the iPhone 6s or 6s Plus, nor about the latest Windows alternative.</p>
<p>I wanted a solid smartphone for work, including email and various online, social media and professional applications, and a few other things.</p>
<p>At this point, the rate of evolution is such that even basic smartphones would be considered amazingly advanced pocket computers by the standards of a couple of years ago. I didn’t need the absolute latest so I went for the entry level.</p>
<p>I bought a brand-new iPhone 5c on eBay EBAY, +0.00% as soon as Apple discontinued their regular sales last month. The price dropped about 50% overnight. I chose the 5c because it basically does about the same as the 5s for about half the cost, and because the plastic body means it’ll cope better if I drop it. (The 5s looks really beautiful — until you enclose it one of those big, ugly plastic cases.)</p>
<p>Meanwhile, by happenstance I also found myself simultaneously the owner of a Nokia Lumia 635, which costs just $70, compared with around $250 for my discounted 5c, and $450 for a 5s from Apple.</p>
<p>And to my surprise, it’s the iPhone, not the Lumia, that I’m dumping.</p>
<p>The screen is much bigger. The phone is lighter. The keyboard works better for my fingers.</p>
<p>I can add all the memory I want through SD cards. The Windows Phone does absolutely everything I want, just as well as the iPhone or better — for a fraction of the cost. It also comes with Microsoft Office. And it will be updated to Windows Phone 10 later this year.</p>
<p>Oh, and it’s a minor point, but I don’t need to buy a special iPhone cable to charge it. The Nokia uses standard micro-USB. Apple must be the only phone company that still pulls that annoying proprietary-cable crap. Even Sony SNE, +1.63% has given in.&#8221;</p>
<p>Read more:</p>
<p>http://www.marketwatch.com/story/why-i-dumped-my-apple-iphone-for-a-microsoft-phone-2015-10-08?page=1</p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2015/10/08/apple-iphone-dumped-for-nokia-windows-phone-why-brett-arends-did-this-cost-versus-benefit-why-i-never-bought-apple-computers-and-phones/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Domain name searches, Business name selection, Guide to starting a business on internet, .com .net availability, Web hosting providers, Domain name suggestions, Name being used in world or internet, Business organization type</title>
		<link>https://stellarsolution.net/2015/03/05/domain-name-searches-business-name-selection-guide-to-starting-a-business-on-internet-com-net-availability-web-hosting-providers-domain-name-suggestions-name-being-used-in-world-or-internet-b/</link>
		<comments>https://stellarsolution.net/2015/03/05/domain-name-searches-business-name-selection-guide-to-starting-a-business-on-internet-com-net-availability-web-hosting-providers-domain-name-suggestions-name-being-used-in-world-or-internet-b/#comments</comments>
		<pubDate>Thu, 05 Mar 2015 20:17:28 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Ecommerce]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Net programs]]></category>
		<category><![CDATA[Search engines]]></category>
		<category><![CDATA[SEO]]></category>
		<category><![CDATA[Technical support]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[.com .net availability]]></category>
		<category><![CDATA[Business name selection]]></category>
		<category><![CDATA[Business organization type]]></category>
		<category><![CDATA[Domain name searches]]></category>
		<category><![CDATA[Domain name suggestions]]></category>
		<category><![CDATA[Guide to starting a business on internet]]></category>
		<category><![CDATA[Name being used in world or internet]]></category>
		<category><![CDATA[Web hosting providers]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=117</guid>
		<description><![CDATA[Domain name searches, Business name selection, Guide to starting a business on internet, .com .net availability, Web hosting providers, Domain name suggestions, Name being used in world or internet, Business organization type &#160; Thinking of starting a business now or later? Of course you will want a catchy, meaningful and easy to remember business name. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Domain name searches, Business name selection, Guide to starting a business on internet, .com .net availability, Web hosting providers, Domain name suggestions, Name being used in world or internet, Business organization type</p>
<p>&nbsp;</p>
<p>Thinking of starting a business now or later?</p>
<p>Of course you will want a catchy, meaningful and easy to remember business name.</p>
<p>After you have chosen a business name, you should reserve a &#8220;.com&#8221;, domain name.</p>
<p>I have done this on numerous occasions.</p>
<p>First, give some thought to your business name and try not to limit the scope of your potential business activities if applicable.</p>
<p>Next do a search on the internet to see who, if anyone is using your name and what your competition is.</p>
<p>Next, check with your Secretary of State&#8217;s office, or other state agency, to see if the name is being used.</p>
<p>Concurrently have some idea of what type of business organization you will use. Corporation, LLC, etc. You may need to consult a tax/business expert for advice.</p>
<p>As soon as you have a handle on your business name, reserve one or more domain names. If you are reserving a .com you may want to also reserve a .net and other<br />
suffixes to keep a potential competitor from usurping your internet name.</p>
<p>If you have chosen a web hosting provider, you can search for a domain name and purchase it there, although it is often provided with the initial cost of hosting,</p>
<p>If you have not chosen a hosting provider or early on you just want to search for a domain name, here are some suggestions:</p>
<p><strong>InstantDomainSearch.com</strong></p>
<p>&#8220;See Domain Name Search Results As You Type</p>
<p>Just start typing! If the domain name you are looking for is taken, you can click WHOIS to find out who registered it or the URL to visit the website.</p>
<p>We apply a $0.99 coupon for .com domain names when you buy at Go Daddy. The offer is valid for only one .com purchase, and does not include the ICANN fee of $0.18 per<br />
domain name per year. That’s a sweet deal!</p>
<p>Love the site? Spread the word on Twitter and Facebook!</p>
<p>All domain searches are encrypted over https, and searches do not leave our servers. Your search results are not recorded. Pressing Enter or Return will take you<br />
directly to Go Daddy or the registrar you’ve chosen where you can buy your domain name. Good luck!&#8221;</p>
<p><a href="https://instantdomainsearch.com/">Search</a></p>
<p><strong>DomainsBot.com</strong></p>
<p>&#8220;The domain name search engine!</p>
<p>Available domain suggestions + expired, expiring and for sale domain name search + whois lookup. Domain + Twitter + Facebook identity suggesitons.&#8221;</p>
<p><a href="http://www.domainsbot.com/">Search</a></p>
<p><strong>PCnames.com</strong></p>
<p>&#8220;Check Domains, Instantly!</p>
<p>Based on your query, PCNames.com instantly checks whether .com, .net, .org, .info, .biz, .us, .mobi and .name domain names are available. The domain search results<br />
will appear with 2-second delay for your convenience.</p>
<p>Your domain search results are not shared with 3-rd parties. However, we keep history of your recent domain searches and favorite domain picks so you can easily follow<br />
up on all the important search results.&#8221;</p>
<p><a href="http://www.pcnames.com/">Search</a></p>
<p><strong>From Entrepreneur.</strong></p>
<p>&#8220;Do&#8217;s and Don&#8217;ts of Securing a Domain Name</p>
<p>Consider these six tips from small-business owners and experts before deciding on a website name.&#8221;<br />
<a href="http://www.entrepreneur.com/article/219410">Read more</a></p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2015/03/05/domain-name-searches-business-name-selection-guide-to-starting-a-business-on-internet-com-net-availability-web-hosting-providers-domain-name-suggestions-name-being-used-in-world-or-internet-b/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Lenovo admits to putting tracking software on PCs, Superfish software installed,  Hijacks all your secure web connections, Security breach remains after uninstall</title>
		<link>https://stellarsolution.net/2015/02/20/lenovo-admits-to-putting-tracking-software-on-pcs-superfish-software-installed-hijacks-all-your-secure-web-connections-security-breach-remains-after-uninstall/</link>
		<comments>https://stellarsolution.net/2015/02/20/lenovo-admits-to-putting-tracking-software-on-pcs-superfish-software-installed-hijacks-all-your-secure-web-connections-security-breach-remains-after-uninstall/#comments</comments>
		<pubDate>Fri, 20 Feb 2015 20:27:42 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Search engines]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Hijacks all your secure web connections]]></category>
		<category><![CDATA[Lenovo admits to putting tracking software on PCs]]></category>
		<category><![CDATA[Security breach remains after uninstall]]></category>
		<category><![CDATA[Superfish software installed]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=112</guid>
		<description><![CDATA[Lenovo admits to putting tracking software on PCs, Superfish software installed, Hijacks all your secure web connections, Security breach remains after uninstall &#160; From Sovereign Man February 20, 2015. &#8220;“We messed up badly here”: Lenovo admits to putting tracking software on your PC&#8221; &#8220;Lenovo Group, the largest computer manufacturer in the world, has made a [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Lenovo admits to putting tracking software on PCs, Superfish software installed, Hijacks all your secure web connections, Security breach remains after uninstall</p>
<p>&nbsp;</p>
<p><strong>From Sovereign Man February 20, 2015.</strong><br />
&#8220;“We messed up badly here”: Lenovo admits to putting tracking software on your PC&#8221;</p>
<p>&#8220;Lenovo Group, the largest computer manufacturer in the world, has made a rather stunning admission that they have been pre-installing tracking software on their PCs.</p>
<p>The tracking software is made by a company called Superfish, which apparently paid some “very minor compensation” to Lenovo for putting the software on people’s computers.</p>
<p>The Superfish program is a total disaster.</p>
<p>It has image recognition algorithms which essentially monitor what a user is looking at… then suggests relevant ads based on what it thinks you might like.</p>
<p>This is not only REALLY high up on the creepy scale, it also completely destroys Internet security.</p>
<p>Whether you’re buying something online or accessing Internet banking, the Superfish program essentially cuts the secure link between you and sensitive websites that you’re trying to access.</p>
<p>According to the first user who found the vulnerability a few weeks ago, “[Superfish] will hijack ALL your secure web connections (SSL/TLS) by using self-signed root certificate authority, making it look legitimate to the browser.”</p>
<p>This means that the tracking software basically fools a web browser into believing that a connection is secure when it’s not… all for the purpose of pushing more ads in your face.</p>
<p>This scheme is so powerful that even if users uninstall the Superfish software, the security breach still remains.&#8221;<br />
<a href="http://www.sovereignman.com/personal-privacy/we-messed-up-badly-here-lenovo-admits-to-putting-tracking-software-on-your-pc-16144/">Read more</a></p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2015/02/20/lenovo-admits-to-putting-tracking-software-on-pcs-superfish-software-installed-hijacks-all-your-secure-web-connections-security-breach-remains-after-uninstall/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Router use in coffee shops public settings, Non commercial router for dynamic users, Mac address limitations, Reset router wait 10 seconds not myth</title>
		<link>https://stellarsolution.net/2015/02/12/router-use-in-coffee-shops-public-settings-non-commercial-router-for-dynamic-users-mac-address-limitations-reset-router-wait-10-seconds-not-myth/</link>
		<comments>https://stellarsolution.net/2015/02/12/router-use-in-coffee-shops-public-settings-non-commercial-router-for-dynamic-users-mac-address-limitations-reset-router-wait-10-seconds-not-myth/#comments</comments>
		<pubDate>Thu, 12 Feb 2015 20:54:16 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Technical support]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=109</guid>
		<description><![CDATA[Router use in coffee shops public settings, Non commercial router for dynamic users, Mac address limitations, Reset router wait 10 seconds not myth &#160; &#160; A friend of mine has a coffee shop that I frequent. He recently went to Time Warner Business class and installed a faster router. When the router was up the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Router use in coffee shops public settings, Non commercial router for dynamic users, Mac address limitations, Reset router wait 10 seconds not myth</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>A friend of mine has a coffee shop that I frequent.</p>
<p>He recently went to Time Warner Business class and installed a faster router.</p>
<p>When the router was up the speed was fast.</p>
<p>But it began malfunctioning adn requiring numerous resets.</p>
<p>Time Warner technicians came out, diagnosed their equipment and performance and discussed the results and possible problem areas.</p>
<p>I happened to be present then and the question of Mac addresses came up.</p>
<p>I did some research and the new non commercial Linksys router has a limitation of 32 Mac addresses.</p>
<p>After some trial and error testing and more discussions my friend had his technical support person make some adjustments.</p>
<p>This solution seems to work.</p>
<p>There is now a guest signon screen. In this setting many of the customers have computers and almost all smart phones.</p>
<p>It does not take too many customers to hit the 32 Mac address limit.</p>
<p>Also, the router is reset, unplugged, several times a day.</p>
<p>After unplugging, 10 seconds are waited before plugging back in.</p>
<p>This is not a myth. They learned the hard way.</p>
<p>I told them to wait 10 seconds and that has worked.</p>
<p>You may wonder why.</p>
<p><strong>From How To Geek.</strong></p>
<p>&#8220;SuperUser contributor Phoshi offers a great, concise reason why it’s a valid procedure:</p>
<blockquote><p>A lot of modern technology contains capacitors! These are like energy buckets, little batteries that fill up when you put a current through them, and discharge otherwise. <strong>10 seconds is the time it takes most capacitors to discharge enough for the electronics they’re powering to stop working</strong>. That’s why when you turn your PC off at the wall, things like an LED on your motherboard take a few seconds to disappear. You probably could wait a different time, but 10 seconds is the shortest time you can be sure everything’s discharged.</p></blockquote>
<p>Why fully powering down the device matters hinges on how data is temporarily stored in it. A typical modem or router has two types of memory: Non-volatile Memory (NVRAM) and regular old Random Access Memory (RAM) like the kind in your computer. The router boots off the code stored in the NVRAM and then uses the RAM just like your computer would to write temporary variables, execute code, etc. By fully powering down the device and letting the electrical charges dissipate, the RAM is wiped and, upon rebooting the device, the micro operating system in the device has clear RAM to use.&#8221;<br />
<a href="http://www.howtogeek.com/165110/do-i-really-have-to-unplug-my-cable-modem-for-at-least-10-seconds/">Read more</a></p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2015/02/12/router-use-in-coffee-shops-public-settings-non-commercial-router-for-dynamic-users-mac-address-limitations-reset-router-wait-10-seconds-not-myth/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Windows project spartan January preview build, Spartan details from internet explorer team blog, New rendering engine, New platform capabilities, New default engine has interoperability</title>
		<link>https://stellarsolution.net/2015/01/22/windows-project-spartan-january-preview-build-spartan-details-from-internet-explorer-team-blog-new-rendering-engine-new-platform-capabilities-new-default-engine-has-interoperability/</link>
		<comments>https://stellarsolution.net/2015/01/22/windows-project-spartan-january-preview-build-spartan-details-from-internet-explorer-team-blog-new-rendering-engine-new-platform-capabilities-new-default-engine-has-interoperability/#comments</comments>
		<pubDate>Thu, 22 Jan 2015 21:02:01 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Net programs]]></category>
		<category><![CDATA[Notebook]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Search engines]]></category>
		<category><![CDATA[Technical support]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows phone]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=101</guid>
		<description><![CDATA[Windows project spartan January preview build, Spartan details from internet explorer team blog, New rendering engine, New platform capabilities, New default engine has interoperability &#160; &#160; From the Internet Explorer Team Blog January 22, 2015. &#8220;Project Spartan and the Windows 10 January Preview Build Thursday, January 22, 2015 12:08 PM Yesterday, we announced that Windows 10 [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Windows project spartan January preview build, Spartan details from internet explorer team blog, New rendering engine, New platform capabilities, New default engine has interoperability</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>From the Internet Explorer Team Blog January 22, 2015.</strong></p>
<p>&#8220;Project Spartan and the Windows 10 January Preview Build</p>
<p>Thursday, January 22, 2015 12:08 PM</p>
<p>Yesterday, we announced that Windows 10 will ship with a brand new browser, codenamed “Project Spartan.” Designed for Windows 10, Spartan provides a more interoperable, reliable, and discoverable experience with advanced features including the ability to annotate on web pages, a distraction-free reading experience, and integration of Cortana for finding and doing things online faster.</p>
<p>Spartan is a single browser designed to work great across the entire Windows 10 device family &#8211; from keyboard and mouse on the Windows 10 desktop to touch, gestures, voice, controllers and sensors.</p>
<p>Powered by a new rendering engine, Spartan is designed for interoperability with the modern web. We’ve deliberately moved away from the versioned document modes historically used in Internet Explorer, and now use the same markup as other modern browsers. Spartan’s new rendering engine is designed to work with the way the web is written today.</p>
<p>Like Windows 10 itself Spartan will remain up-to-date: as a service, both providing new platform capabilities, security and performance improvements, and ensuring web developers a consistent platform across Windows 10 devices. Spartan and the new rendering engine are truly evergreen.</p>
<p>Spartan provides compatibility with the millions of existing enterprise web sites designed for Internet Explorer. To achieve this, Spartan loads the IE11 engine for legacy enterprise web sites when needed, while using the new rendering engine for modern web sites. This approach provides both a strong compatibility guarantee for legacy enterprise web sites and a forward looking interoperable web standards promise.</p>
<p>We recognize some enterprises have legacy web sites that use older technologies designed only for Internet Explorer, such as custom ActiveX controls and Browser Helper Objects. For these users, Internet Explorer will also be available on Windows 10. Internet Explorer will use the same dual rendering engines as Spartan, ensuring web developers can consistently target the latest web standards.</p>
<p>What does this mean to web developers?</p>
<p>If you are building a public consumer-facing web site here’s what you need to know:</p>
<p>Our new rendering engine will be the default engine for Windows 10, Spartan, and Internet Explorer. This engine has interoperability at its core and consumes the same markup you send other modern browsers. Our standards support and roadmap can be found at http://status.modern.ie.</p>
<p>Public Internet web sites will be rendered using the new engine and modern standards, and legacy Internet Explorer behaviors including document modes are not supported in the new engine. If your web sites depends on legacy Internet Explorer behaviors we encourage you to update to modern standards.</p>
<p>Our goal is interoperability with the modern web and we need your help! You can test the new engine via the Windows Insider Program or using http://remote.modern.ie.</p>
<p>Please let us know (via Connect or Twitter) when you find interoperability problems so we can work with the W3C and other browser manufacturers to ensure great interoperability.&#8221;<br />
<a href="http://blogs.msdn.com/b/ie/archive/2015/01/22/project-spartan-and-the-windows-10-january-preview-build.aspx">Read more</a></p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2015/01/22/windows-project-spartan-january-preview-build-spartan-details-from-internet-explorer-team-blog-new-rendering-engine-new-platform-capabilities-new-default-engine-has-interoperability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Windows 10 features and upgrade information, Microsoft Windows blog upgrade answers for windows 7 8.1 and windows 8.1 phone users</title>
		<link>https://stellarsolution.net/2015/01/22/windows-10-features-and-upgrade-information-microsoft-windows-blog-upgrade-answers-for-windows-7-8-1-and-windows-8-1-phone-users/</link>
		<comments>https://stellarsolution.net/2015/01/22/windows-10-features-and-upgrade-information-microsoft-windows-blog-upgrade-answers-for-windows-7-8-1-and-windows-8-1-phone-users/#comments</comments>
		<pubDate>Thu, 22 Jan 2015 14:30:51 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Net programs]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows phone]]></category>
		<category><![CDATA[Microsoft Windows blog upgrade answers for windows 7 8.1 and windows 8.1 phone users]]></category>
		<category><![CDATA[Windows 10 features and upgrade information]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=98</guid>
		<description><![CDATA[Windows 10 features and upgrade information, Microsoft Windows blog upgrade answers for windows 7 8.1 and windows 8.1 phone users &#160; &#160; Microsoft just announced the release of Windows 10 which will be a free upgrade for PC Windows 7 and 8.1 users and Windows 8.1 phone users. There will be no cost to keep [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Windows 10 features and upgrade information, Microsoft Windows blog upgrade answers for windows 7 8.1 and windows 8.1 phone users</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Microsoft just announced the release of Windows 10 which will be a free upgrade for PC Windows 7 and 8.1 users and Windows 8.1 phone users. There will be no cost to keep it current going forward.</p>
<p>One of the new features, Cortina, is on my Windows Nokia Lumia 630 phone that I have been using for about 6 months. So far this has been one of my favorite cell phones in over 20 years.</p>
<p><strong>From To Market News January 21, 2015.</strong></p>
<p>“What’s new in Windows 10 for PCs? A lot.”</p>
<p>“Coming into today’s Windows 10 event, we already knew a lot about Microsoft’s latest and greatest. The company explained the thinking behind its new OS back in September, and the Technical Preview has been available for months. The core change comes in the form of a revitalized desktop experience — one that puts the best of Windows 7 and 8 into a single package. Windows will also now better match the convertible devices Microsoft is pushing, with a consistent UI across all platforms, but there’s a whole lot more to explore here, including some features detailed today for the first time. Let’s take a closer look.”</p>
<p>“If you’ve been following Windows Phone at all, you’ll know what Cortana is: Microsoft’s take on a personal digital assistant. The mobile version offers features that are a mix between Siri and Google Now, but the PC version has a few added benefits. Cortana plugs into Windows search, meaning if you ask for “PowerPoint slides about the charity account,” it’ll search your computer and OneDrive accounts for relevant files.”</p>
<p>“Perhaps the biggest news, though, even if it doesn’t benefit the majority of Windows users — is that Windows apps will now be universal and run across PC, tablet, phone and even Xbox One. That doesn’t mean PC users won’t be getting new apps as well. Microsoft blazed through a load of new apps for Windows.”</p>
<p>“As early reports suggested, Project Spartan is a new browser for Windows 10, entirely separate from Internet Explorer. Sure there’s a very clean, almost Chrome-like design, and a brand-new rendering engine, but the focus here is on social sharing. You can highlight and annotate websites before sharing them with friends, kind of like having Skitch built right into your browser. There’s also Cortana integration and a reading view that, much like Pocket, lets you read pages offline.”<br />
<a href="http://tomarketnews.com/2015/01/21/windows-10-free-upgrade-for-windows-windows-7-8-1-users-whats-new-for-pc-users-in-windows-ten-cortana-personal-digital-assistant-universal-apps-new-browser-project-spartan-unified-settings-menu/">Read more</a></p>
<p><strong>From the Microsoft Windows Blog January 21, 2015.</strong></p>
<p>&#8220;Today I had the honor of sharing new information about Windows 10, the new generation of Windows.</p>
<p>Our team shared more Windows 10 experiences and how Windows 10 will inspire new scenarios across the broadest range of devices, from big screens to small screens to no screens at all. You can <a href="http://news.microsoft.com/windows10story/">catch the video on-demand presentation here</a>.</p>
<p>Windows 10 is the first step to an era of more personal computing. This vision framed our work on Windows 10, where we are moving Windows from its heritage of enabling a single device – the PC – to a world that is more mobile, natural and grounded in trust. We believe your experiences should be mobile – not just your devices. Technology should be out of the way and your apps, services and content should move with you across devices, seamlessly and easily. In our connected and transparent world, we know that people care deeply about privacy – and so do we. That’s why everything we do puts you in control – because you are our customer, not our product. We also believe that interacting with technology should be as natural as interacting with people – using voice, pen, gestures and even gaze for the right interaction, in the right way, at the right time. These concepts led our development and you saw them come to life today.</p>
<h3><strong>Delivering Windows as a Service and a Free Upgrade to Windows 10</strong></h3>
<p>Today was a monumental day for us on the Windows team because we shared our desire to redefine the relationship we have with you – our customers. We announced that a free upgrade for Windows 10 will be made available to customers running Windows 7, Windows 8.1, and Windows Phone 8.1 who upgrade in the first year after launch.*</p>
<p>This is more than a one-time upgrade: once a Windows device is upgraded to Windows 10, we will continue to keep it current for the supported lifetime of the device – at no cost. With Windows 10, the experience will evolve and get even better over time. We’ll deliver new features when they’re ready, not waiting for the next major release. We think of Windows as a Service – in fact, one could reasonably think of Windows in the next couple of years as one of the largest Internet services on the planet.</p>
<p>And just like any Internet service, the idea of asking “What version are you on?” will cease to make sense – which is great news for our Windows developers. With universal Windows apps that work across the entire device family, developers can build one app that targets the broadest range of devices – including the PC, tablet, phone, Xbox, the Internet of Things, and more.</p>
<p>For our enterprise customers, we’ll continue to support the way many of them work today, with long-term servicing for their mission critical environments. With Windows 10, a best practice we recommend for many enterprise devices is to connect to Windows Update and be kept up-to-date with the latest security and productivity improvements as soon as they are available. You can learn more about our commitment to enterprises <a href="http://blogs.windows.com/business/2015/01/21/windows-10-an-exciting-new-chapter">here</a>, with much more to come in the following months.&#8221;<br />
<a href="http://blogs.windows.com/bloggingwindows/2015/01/21/the-next-generation-of-windows-windows-10/">Read more</a><br />
<iframe width="1170" height="658" src="https://www.youtube.com/embed/teoZk3QEc40?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2015/01/22/windows-10-features-and-upgrade-information-microsoft-windows-blog-upgrade-answers-for-windows-7-8-1-and-windows-8-1-phone-users/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WiFi security, Securing your router from hackers cyber attacks, How to Video, Firmware updated, Change passwords, WPA2, Use MAC addresses if possible</title>
		<link>https://stellarsolution.net/2015/01/19/wifi-security-securing-your-router-from-hackers-cyber-attacks-how-to-video-firmware-updated-change-passwords-wpa2-use-mac-addresses-if-possible/</link>
		<comments>https://stellarsolution.net/2015/01/19/wifi-security-securing-your-router-from-hackers-cyber-attacks-how-to-video-firmware-updated-change-passwords-wpa2-use-mac-addresses-if-possible/#comments</comments>
		<pubDate>Mon, 19 Jan 2015 20:49:06 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Cyber attack]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[Change passwords]]></category>
		<category><![CDATA[Firmware updated]]></category>
		<category><![CDATA[How to Video]]></category>
		<category><![CDATA[Securing your router from hackers cyber attacks]]></category>
		<category><![CDATA[Use MAC addresses if possible]]></category>
		<category><![CDATA[WiFi security]]></category>
		<category><![CDATA[WPA2]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=96</guid>
		<description><![CDATA[WiFi security, Securing your router from hackers cyber attacks, How to Video, Firmware updated, Change passwords, WPA2, Use MAC addresses if possible &#160; If you read our article yesterday, January 18, 2015, you know that no router is safe from hacking. Read more So, what can you do to improve your odds of not being [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>WiFi security, Securing your router from hackers cyber attacks, How to Video, Firmware updated, Change passwords, WPA2, Use MAC addresses if possible</p>
<p>&nbsp;</p>
<p>If you read our article yesterday, January 18, 2015, you know that no router is safe from hacking.</p>
<p><a href="http://stellarsolution.net/2015/01/18/router-security-101-wpa2-not-foolproof-security-not-optional-when-buying-or-using-routers-any-router-can-be-hacked-cnet-warning-from-2013-goes-unheeded/">Read more</a></p>
<p>So, what can you do to improve your odds of not being hacked?</p>
<p><strong>From We Live Security July 22, 2014.</strong></p>
<h3>&#8220;Wi-Fi security – steps you can take now</h3>
<p>A We Live Security <a title="Wi-Fi security" href="http://www.welivesecurity.com/videos/router-attacks-five-simple-tips-lock-criminals/" target="_blank">video guide offers basic tips on how to secure home routers </a>- and offers a good starting point for ensuring a Wi-Fi network isn’t vulnerable to snoopers and other unwanted ‘guests’.</p>
<p>Harley says, “Firstly, ensure your firmware is kept updated.” Firmware is the code and data which allows routers to function – similar in some ways to a computer operating system, but with the crucial difference that updates (to protect against bugs) often have to be installed manually.&#8221;</p>
<h3>&#8220;Check your settings again</h3>
<p><a href="http://www.welivesecurity.com/videos/router-attacks-five-simple-tips-lock-criminals/" target="_blank">Changing passwords is an essential first step</a> – but it’s worth checking back that your router’s settings haven’t changed, as this can be a problem with some models.</p>
<p>Harley says that users should always, “Change default router administrator usernames and passwords, and change the default SSID.” The SSID is the name of the network – which is broadcast to anywhere within Wi-Fi range. Leaving it as a default can broadcast information that is useful to an attacker – such as the model of router you are using, or whether you are using one supplied by your ISP. When choosing a new network name, avoid any personally identifying information such as your name or house number.</p>
<p>It’s worth considering making yours a “hidden network” – disabling the broadcast of the SSID’s name. That way you’re less visible to attackers – and to connect new devices, simply type in your network’s name on the gadget.</p>
<p>Harley warns that these precautions can be wasted if your router’s software is updated – which can occasionally revert settings to the default. “After any update, check these settings have not reverted,” he says.</p>
<h3>WEP is not your friend</h3>
<p>If your family or business has had the same router for  a long time, you may be using WEP – an outdated form of encryption that can be cracked easily, even by unskilled hackers. Most new routers will use the more secure WPA2 standard – but if your router has been around for a while, it’s possible family members may have chosen WEP to connect older devices such as Nintendo’s first DS handheld. “Don’t use WEP encryption, if anyone still is,” Harley says. “If the router doesn’t allow anything else, time to change it. WPA2 is reasonably secure.”</p>
<p>Even if you’ve had trouble connecting mobile devices to a network, leaving it “open” is always a bad idea. Harley says, “ If you’re not using encryption at all, fix it.”</p>
<h3>Know who is connecting to your network</h3>
<p>Harley says that controlling which devices can connect to a network offers another layer of reassurance. “MAC filtering reduces the risk from intruder machines using your network,” he says.</p>
<p>Any PC or mobile computing device has a unique identifying number known as a MAC address. If you access your router’s settings, you can select which devices can and cannot connect to your network – meaning for instance, a neighbor couldn’t log in, or a teenage visitor could not access unsuitable sites via a smartphone.</p>
<p>Add the MAC addresses of all authorized devices in the home – iPhones, tablets, laptops etc. – to the router’s authorized list. No other device will then be allowed on the network. You can find the MAC addresses of mobile phones and other portable devices under their network settings, though this will vary for each device. Check with the manufacturer.&#8221;<br />
<a href="http://www.welivesecurity.com/2014/07/22/wi-fi-security-2/">Read more</a></p>
<p><iframe width="1170" height="658" src="https://www.youtube.com/embed/bu0vlpfxfnI?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2015/01/19/wifi-security-securing-your-router-from-hackers-cyber-attacks-how-to-video-firmware-updated-change-passwords-wpa2-use-mac-addresses-if-possible/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Router security 101, WPA2 not foolproof, Security not optional when buying or using routers, Any router can be hacked, CNET warning from 2013 goes unheeded</title>
		<link>https://stellarsolution.net/2015/01/18/router-security-101-wpa2-not-foolproof-security-not-optional-when-buying-or-using-routers-any-router-can-be-hacked-cnet-warning-from-2013-goes-unheeded/</link>
		<comments>https://stellarsolution.net/2015/01/18/router-security-101-wpa2-not-foolproof-security-not-optional-when-buying-or-using-routers-any-router-can-be-hacked-cnet-warning-from-2013-goes-unheeded/#comments</comments>
		<pubDate>Sun, 18 Jan 2015 14:53:11 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Cyber attack]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technical support]]></category>
		<category><![CDATA[Any router can be hacked]]></category>
		<category><![CDATA[CNET warning from 2013 goes unheeded]]></category>
		<category><![CDATA[Router security 101]]></category>
		<category><![CDATA[Security not optional when buying or using routers]]></category>
		<category><![CDATA[WPA2 not foolproof]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=90</guid>
		<description><![CDATA[Router security 101, WPA2 not foolproof, Security not optional when buying or using routers, Any router can be hacked, CNET warning from 2013 goes unheeded &#160; &#160; Computer system security, especially in regard to internet access, is in the forefront of technical and business reporting. We are constantly being told about major corporations being hacked [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Router security 101, WPA2 not foolproof, Security not optional when buying or using routers, Any router can be hacked, CNET warning from 2013 goes unheeded</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Computer system security, especially in regard to internet access, is in the forefront of technical and business reporting.</p>
<p>We are constantly being told about major corporations being hacked and sensitive data being breached.</p>
<p>Target and Sony are some of the more prominent examples.</p>
<p>What is less conspicuous is the hacking of routers, used by businesses and many homeowners.</p>
<p>From setting up my own routers I was aware of important details when configuring them.</p>
<p>What I was not so aware of is the frequency of router hacking and just how vulnerable they are.</p>
<p>A friend of mine owns a coffee shop in NC. Recently 2 of his routers were hacked. He knew this because of performance and setup problems and ultimately by confirmation from the tech support at Linksys.</p>
<p>Of course this has more far reaching consequences such as potential compromise of customer debit and credit card information.</p>
<p>And don&#8217;t forget, when you are using someone&#8217;s WIFI internet access, you should be mindful of this fact and probably not enter or access important information while using their router.</p>
<p>From what I have uncovered from research over the past several days, this problem has not been taken seriously enough by the public and router manufacturers.</p>
<p>A great article from CNET in 2013 explains the extent of the problem and provides a clear warning.</p>
<p><strong>From CNET April 17, 2013.</strong></p>
<p>&#8220;Top Wi-Fi routers easy to hack, says study<br />
The most popular home wireless routers are easily hacked and there&#8217;s little you can do to stop it, says a new study by research firm Independent Security Evaluators.&#8221;</p>
<p>&#8220;The Wi-Fi router you use to broadcast a private wireless Internet signal in your home or office is not only easy to hack, says a report released today, but the best way to protect yourself is out of your hands.</p>
<p>The report, written by research firm Independent Security Evaluators of Baltimore, found that 13 of the most popular off-the-shelf wireless routers could be exploited by a &#8220;moderately skilled adversary with LAN or WLAN access.&#8221; It also concludes that your best bet for safer Wi-Fi depends on router vendors upping their game. All 13 routers evaluated can be taken over from the local network, with four of those requiring no active management session. Eleven of the 13 can be taken over from a Wide-Area Network(WAN) such as a wireless network, with two of those requiring no active management session.&#8221;</p>
<p>&#8220;Before you dismiss router hacks as exceptionally rare, it&#8217;s important to note that they&#8217;ve been a small but growing segment of computer security threats. In 2011, one firmware vulnerability affecting six hardware manufacturers combined with two malicious scripts and 40 malicious DNS servers to attack 4.5 million Brazilian DSL modems, with the goal of stealing bank and credit card information.</p>
<p>Craig Heffner, a vulnerability analyst at Maryland-based Tactical Network Solutions, said that he isn&#8217;t familiar with the Brazil story but isn&#8217;t surprised by it. &#8220;In a lot of countries, there&#8217;s only one or two ISPs, and you get whatever router they give you,&#8221; he said. &#8220;They often enable remote administration by default, so any vulnerability would be amplified.&#8221;</p>
<p>And just yesterday, ReadWrite reported on wireless router hacking, based in part on research conducted by security firm Rapid7. ISE&#8217;s study, while similar, reports &#8220;all-new findings,&#8221; said ISE&#8217;s marketing head, Ted Harrington.</p>
<p>Harrington further explained why router hacking could turn into a big problem. &#8220;What&#8217;s notable about this is that if you compromise the router, then you&#8217;re inside the firewall. You can pick credit card numbers out of e-mails, confidential documents, passwords, photos, just about anything,&#8221; he said.</p>
<p>He added that ISE plans to release additional information from the study in the coming weeks, following the routine security community best practice of giving vendors a chance to respond to vulnerabilities that have been uncovered before publishing them.</p>
<p>&#8220;We notified all vendors about all vulnerabilities that we found,&#8221; said ISE security analyst Jake Holcomb. &#8220;We&#8217;re in the process of receiving Common Vulnerability and Exposure (CVE) numbers&#8221; for tracking information security vulnerabilities.</p>
<p>Some vendors, Holcomb said, got back to ISE quickly and had beta firmware with fixes ready to test within 72 hours. &#8220;Other vendors escalated their Tier 1 support up the chain but we never heard back from them,&#8221; he said.&#8221;</p>
<p><a href="http://www.cnet.com/news/top-wi-fi-routers-easy-to-hack-says-study/">Read more</a></p>
<p>I have been referring to PC Magazine in print and on the internet for 30 years. They have some pretty good reviews. However, the following article on purchasing routers is an example of downplaying the importance of security.</p>
<p><strong>From PC Magazine January 31, 2014.</strong></p>
<p>&#8220;First, ask yourself how high-end you want to go with a router. If you need nothing more than to create a wireless network, you can get away with a fairly cheap router—spending less than $100 should do. If you want extras such as security, parental controls, and the ability to connect USB printers and external storage drives for sharing data, you&#8217;ll want to look at higher-priced premium routers.</p>
<p>What Type of Security?<br />
Most of the newer routers support the highest level of security, WPA2. If in the market for a new router, make sure it supports WPA2.&#8221;</p>
<p><a href="http://www.pcmag.com/article2/0,2817,2347539,00.asp">Read more</a></p>
<p>&#8220;extras such as security&#8221;</p>
<p>Really??</p>
<p>Selecting WPA2 for security is important. However, apparently, WPA2 scurity and the latest firmware cannot be counted to stop hackers.</p>
<p>Just this morning I was discussing this with a friend who owns a tax/accounting business.</p>
<p>Forget the bells and whistles that PC Magazine focused on.</p>
<p>When I am purchasing a router, I first want it to be reliable, i.e, keep functioning and be secure.</p>
<p>I spoke to another friend a few hours ago. He is charge of network security for a NC company. In college he was taught to expect routers to be hacked.</p>
<p>Here are some more warnings and useful precautionary steps.</p>
<p><strong>From Tom&#8217;s Guide.</strong></p>
<p>&#8220;Your Router&#8217;s Security Stinks: Here&#8217;s How to Fix It&#8221;</p>
<p>&#8220;Earlier this year, <a href="http://www.tomsguide.com/us/malware-spreading-worm-linksys,news-18316.html">a router worm called TheMoon</a> used the HNAP protocol to identify vulnerable Linksys-brand routers to which it could spread itself. (<a href="http://www.tomsguide.com/us/how-to-update-linksys-router,news-18325.html">Linksys quickly issued a firmware patch</a>.)</p>
<p>&#8220;As soon as you get home, this is something you want to do with all your routers,&#8221; Horowitz told the tech-savvy crowd. &#8220;Go to /HNAP1/, and, hopefully, you&#8217;ll get no response back, if that&#8217;s the only good thing. Frankly, if you get any response back, I would throw the router out.&#8221;</p>
<h3><strong>The WPS Threat</strong></h3>
<p>Worst of all is Wi-Fi Protected Setup (WPS), an ease-of-use feature that lets users bypass the<a id="itxthook4" class="itxtnewhook itxthook" href="http://www.tomsguide.com/us/home-router-security,news-19245.html#" rel="nofollow"><span id="itxthook4p" class="itxtrst itxtrstspan itxtnowrap"><span id="itxthook4w" class="itxtrst itxtrstspan itxtnowrap itxtnewhookspan">network</span><img id="itxthook4icon" class="itxtrst itxtrstimg itxthookicon" src="http://images.intellitxt.com/ast/adTypes/icon1.png" class="grouped_elements" rel="tc-fancybox-group90" alt="" /></span></a> password and connect devices to a Wi-Fi network simply by entering an eight-digit PIN that&#8217;s printed on the router itself. Even if the network password or network name is changed, the PIN remains valid.</p>
<p>&#8220;This is a huge expletive-deleted security problem,&#8221; Horowitz said. &#8220;That eight-digit number will get you into the [router] no matter what. So a plumber comes over to your house, turns the router over, takes a picture of the bottom of it and he can now get on your network forever.&#8221;</p>
<p>That eight-digit PIN isn&#8217;t even eight digits, Horowitz explained. It&#8217;s actually seven digits, plus a final checksum digit. The first four digits are validated as one sequence and the last three as another, resulting in only 11,000 possible codes instead of 10 million.</p>
<p>&#8220;If WPS is active, you can get into the router,&#8221; Horowitz said. &#8220;You just need to make 11,000 guesses&#8221; — a trivial task for most modern computers and smartphones.&#8221;&#8221;</p>
<p>&#8220;Regardless of whether a router is commercial- or consumer-grade, there are several things, varying from easy to difficult, that home-network administrators can do to make sure their routers are more secure:</p>
<p><strong>Easy fixes<br />
</strong></p>
<p><strong>Change the administrative credentials</strong> from the default username and password. They&#8217;re the first things an attacker will try.</p>
<p><strong>Change the network name, or SSID</strong>, from &#8220;Netgear,&#8221; &#8220;Linksys&#8221; or whatever the default is, to something unique — but don&#8217;t give it a name that identifies you.</p>
<p>&#8220;If you live in an apartment building in apartment 3G, don&#8217;t call your SSID &#8216;Apartment 3G,'&#8221; Horowitz quipped. &#8220;Call it &#8216;Apartment 5F.'&#8221;</p>
<p><strong>Enable WPA2 wireless </strong><a href="http://www.tomsguide.com/us/-encryption-definition-sndmp,news-17507.html"><strong>encryption</strong></a> so that only authorized users can hop on your network.</p>
<p><strong>Disable Wi-Fi Protected Setup</strong>, if your router lets you.</p>
<p><strong>Set up a guest Wi-Fi network</strong> and offer its use to visitors, if your router has such a feature. If possible, set the guest network to turn itself off after a set period of time.</p>
<p>&#8220;You can turn on your guest network, and set a timer, and three hours later, it turns itself off,&#8221; Horowitz said. &#8220;That&#8217;s a really nice security feature.&#8221;</p>
<p><strong>Do not use cloud-based router management</strong> if your router&#8217;s manufacturer offers it. Instead, figure out if you can turn that feature off.</p>
<p>&#8220;This is a really bad idea,&#8221; Horowitz said. &#8220;If your router offers that, I would not do it, because now you&#8217;re trusting another person between you and your router.&#8221;</p>
<p><strong>MORE: </strong><a href="http://www.tomsguide.com/us/pictures-story/514-security-fixes-right-now.html"><strong>7 Computer-Security Fixes to Make Right Now</strong></a></p>
<p><strong>Moderately difficult<br />
</strong></p>
<p><strong>Install new firmware</strong> when it becomes available. Log into your router&#8217;s administrative interface routinely to check. With some brands, you may have to check the manufacturer&#8217;s website for firmware upgrades. But have a backup router on hand if something goes wrong.</p>
<p><strong>Set your router to use the 5-GHz band</strong> for Wi-Fi instead of the more standard 2.4-GHz band, if possible and if all your devices are compatible.</p>
<p>&#8220;The 5-GHz band does not travel as far as the 2.4-GHz band,&#8221; Horowitz said. &#8220;So if there is some bad guy in your neighborhood a block or two away, he might see your 2.4-GHz network, but he might not see your 5-GHz network.&#8221;</p>
<p><strong>Disable remote administrative access</strong>, and <strong>disable administrative access over Wi-Fi</strong>. Administrators should connect to routers via wired Ethernet only.</p>
<p><strong>Advanced tips for more tech-savvy users</strong></p>
<p><strong>Change the settings for the administrative Web interface</strong>, if your router permits it. Ideally, the interface should enforce a secure HTTPS connection over a non-standard port, so that the URL for administrative access would be something like, to use Horowitz&#8217;s example, &#8220;https://192.168.1.1:82&#8243; instead of the more standard &#8220;http://192.168.1.1&#8243;.</p>
<p><strong>Use a browser&#8217;s incognito or private mode</strong> when accessing the administrative interface so that your new URL is not saved in the browser history.</p>
<p><strong>Disable PING, Telnet, SSH, UPNP and HNAP</strong>, if possible. Instead of setting relevant ports to &#8220;closed,&#8221; set them to &#8220;stealth&#8221; so that no response is given to unsolicited external communications that may come from attackers probing your network.</p>
<p>&#8220;Every single router has an option not to respond to PING commands,&#8221; Horowitz said. &#8220;It&#8217;s absolutely something you want to turn on — a great security feature. It helps you hide. Of course, you&#8217;re not going to hide from your ISP, but you&#8217;re going to hide from some guy in Russia or China.&#8221;</p>
<p><strong>Change the router&#8217;s Domain Name System (DNS)</strong> server from the ISP&#8217;s own server to one maintained by OpenDNS (208.67.220.220, 208.67.220.222, 208.67.222.220, 208.67.222.222) or Google Public DNS (8.8.8.8, 8.8.4.4).</p>
<p><strong>Use a </strong><a href="http://www.tomsguide.com/us/what-is-vpn,news-18480.html"><strong>virtual private network (VPN)</strong></a><strong> router</strong> to supplement or replace your existing router and encrypt all your network traffic.</p>
<p>&#8220;When I say VPN router, I mean a router that can be a VPN client,&#8221; Horowitz said. &#8220;Then, you sign up with some VPN company, and everything that you send through that router goes through their network. This is a great way to hide what you&#8217;re doing from your Internet service provider.&#8221;</p>
<p>Finally, <strong>use Gibson Research Corp.&#8217;s Shields Up</strong> port-scanning service at<a href="https://www.grc.com/shieldsup" target="_blank">https://www.grc.com/shieldsup</a>. It will test your router for hundreds of common vulnerabilities, most of which can be mitigated by the router&#8217;s administrator.</p>
<ul>
<li><a href="http://www.tomsguide.com/us/scariest-security-threats,review-2144.html">7 Scariest Security Threats Headed Your Way</a></li>
<li><a href="http://www.tomsguide.com/us/identity-theft-what-to-do,news-18696.html">Identity Theft Victim? Here&#8217;s 6 Things You Need to Do</a></li>
<li><a href="http://www.tomsguide.com/us/secure-facebook-privacy-security-settings,news-18864.html">10 Facebook Privacy and Security Settings to Lock Down</a></li>
</ul>
<p><em>Follow Paul Wagenseil at </em><a href="https://twitter.com/snd_wagenseil" target="_blank"><em>@snd_wagenseil</em></a><em>. <em>Follow Tom&#8217;s Guide at </em><a href="https://twitter.com/tomsguide" target="_blank"><em>@tomsguide</em></a><em>, on </em><a href="https://www.facebook.com/Tomsguide" target="_blank"><em>Facebook</em></a><em> and on </em><a href="https://plus.google.com/u/0/113097864502537730990/posts" target="_blank"><em>Google+</em></a><em>.&#8221;</em></em><br />
<a href="http://www.tomsguide.com/us/home-router-security,news-19245.html">Read more</a></p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2015/01/18/router-security-101-wpa2-not-foolproof-security-not-optional-when-buying-or-using-routers-any-router-can-be-hacked-cnet-warning-from-2013-goes-unheeded/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WordPress used by numerous Fortune 500 companies, Not just blogging, SEO Search Engine Optimization, Free and affordable themes, Plugins, Ease of setup and maintenance, Hosting sites make easy, Social Media Friendly, Look and content changed without professional help</title>
		<link>https://stellarsolution.net/2014/12/20/wordpress-used-by-numerous-fortune-500-companies-not-just-blogging-seo-search-engine-optimization-free-and-affordable-themes-plugins-ease-of-setup-and-maintenance-hosting-sites-make-easy-social/</link>
		<comments>https://stellarsolution.net/2014/12/20/wordpress-used-by-numerous-fortune-500-companies-not-just-blogging-seo-search-engine-optimization-free-and-affordable-themes-plugins-ease-of-setup-and-maintenance-hosting-sites-make-easy-social/#comments</comments>
		<pubDate>Sat, 20 Dec 2014 20:52:48 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Ecommerce]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Search engines]]></category>
		<category><![CDATA[SEO]]></category>
		<category><![CDATA[Social networking]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[Ease of setup and maintenance]]></category>
		<category><![CDATA[Free and affordable themes]]></category>
		<category><![CDATA[Hosting sites make easy]]></category>
		<category><![CDATA[Look and content changed without professional help]]></category>
		<category><![CDATA[Not just blogging]]></category>
		<category><![CDATA[Plugins]]></category>
		<category><![CDATA[SEO Search Engine Optimization]]></category>
		<category><![CDATA[Social Media Friendly]]></category>
		<category><![CDATA[Wordpress used by numerous Fortune 500 companies]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=61</guid>
		<description><![CDATA[WordPress used by numerous Fortune 500 companies, Not just blogging, SEO Search Engine Optimization, Free and affordable themes, Plugins, Ease of setup and maintenance, Hosting sites make easy, Social Media Friendly, Look and content changed without professional help I have been using WordPress for blogging and website creation for many years. I am sold on [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>WordPress used by numerous Fortune 500 companies, Not just blogging, SEO Search Engine Optimization, Free and affordable themes, Plugins, Ease of setup and maintenance, Hosting sites make easy, Social Media Friendly, Look and content changed without professional help</p>
<p>I have been using WordPress for blogging and website creation for many years.</p>
<p>I am sold on it.</p>
<p>I highly recommend it for small businesses, but what is surprising is the number of Fortune 500 companies using it.</p>
<p>Why?</p>
<p>It is flexible, cost effective and facilitates getting great SEO, Search Engine Optimization, ranking.</p>
<p>It is far more than a blogging platform.</p>
<p>I was preparing this article and as I normally do, did a search to see what the competition is on the subject.</p>
<p>I found an article ironically written by someone with the same last name. William H. Wells III, as the saying goes, took the words right out of my mouth.</p>
<p>&nbsp;</p>
<p><a href="https://ref.webhostinghub.com/scripts/click.php?ref_id=stella69&amp;ad_id=0e41874e" target="_top"><img src="https://ref.webhostinghub.com/accounts/default1/banners/hub_banner_WP_installer_250x250.jpg" class="grouped_elements" rel="tc-fancybox-group61" style="border: 0;" alt="" width="250" height="250" /></a><img style="border:0" src="https://ref.webhostinghub.com/scripts/imp.php?ref_id=stella69&amp;ad_id=0e41874e" width="1" height="1" alt="" /></p>
<p><strong>From William H. Wells III</strong>, Internet marketing strategist, consultant and public speaker.</p>
<p>&#8220;As a web developer for twenty years now, I’ve been privileged to be part of the continuous evolution of Internet technology, website development and SEO (Search Engine Optimization).  Small businesses and non-profit organizations have been forced to balance affordability with having a professional looking website which would also obtain high search engine rankings.  They needed what they couldn’t afford… and what they COULD afford wasn’t what they needed.</p>
<p>Some made the mistake of letting family members, rookies, and novices do it for them to “save” money.  The result was generally amateur looking websites with no search engine optimization at all.  These novices eventually disappeared… sites quickly became outdated and business owners found themselves back at square one… starting over while losing valuable months and perhaps years in the process.  The “you get what you pay for” idea was never more true.  Read some fun articles I wrote on this topic back in the “old days”.&#8221;</p>
<p>&#8220;WordPress is now considered the “industry standard” website platform and has leveled the playing field when it comes to websites and search engine visibility.  You can now use the exact same platform that many Fortune 500 companies and major brands have chosen to use!  Who’s using WordPress?&#8221;</p>
<p><strong>&#8220;5 Reasons to Switch Your Website to WordPress</strong></p>
<ol>
<li><strong>Cost Effective</strong><br />
As with any website, you’ll have your annual domain name renewal and website hosting fees.  The platform software is free and can be found at <a title="WordPress" href="http://www.wordpress.org/" target="_blank">wordpress.org</a>.  Most add-on modules (plugins) are free.  I’d strongly suggest you <a href="http://www.williamhwells.com/services-offered-2/web-development-seo/" target="_blank">seek the help of a professional</a> to assist with the original installation and software set-up.  This should be a one-time fee with minimal or no monthly maintenance fees.</li>
<li><strong>100% Total Control</strong><br />
You have <strong>100% control</strong> over every aspect of your website.  Appearance, layout, categorized links and content, add-on modules (plugins), SEO, photos, videos, calendars, contact forms, PayPal integration, and so much more.</li>
<li><strong>SEO (Search Engine Optimization)</strong><br />
Search engines love WordPress… especially Google.  Easily include Google Analytics.  Virtually every aspect of WordPress offers the ability to include meta tags, descriptions, keywords and phrases.  From individual pages and posts to images, videos, links, categories, and more.  Each of these plays a crucial role in helping with search engine visibility.</li>
<li><strong>Social Media Friendly</strong><br />
WordPress provides users with the ability to easily include icons, links, and streams for Facebook, Twitter, LinkedIn, YouTube, Pinterest, and others.  It’s, by far, one of the easiest platforms for connecting your website with your social networking tools!</li>
<li><strong>Communication, Interaction, and Lead Generation</strong><br />
WordPress comes complete with powerful communication and consumer interaction tools.   Built right in is the ability for visitors to post comments on articles you’ve written, pages you’ve created, and content you’ve provided.  You can easily add a “Log In” area for users and provide them with “Member Only” content.  Want people to sign up for your newsletter?  Most newsletter services such as “Constant Contact” or “MailChimp” provide you with the code you need.  Insert it anywhere in your website.  The opportunities are endless.&#8221;</li>
</ol>
<p>Read more:</p>
<p><a href="http://www.williamhwells.com/2012/04/21/website-woes/">http://www.williamhwells.com/2012/04/21/website-woes/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2014/12/20/wordpress-used-by-numerous-fortune-500-companies-not-just-blogging-seo-search-engine-optimization-free-and-affordable-themes-plugins-ease-of-setup-and-maintenance-hosting-sites-make-easy-social/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack, FBI claims North Korea source of attack, The Interview comedy about CIA attempt to assassinate Kim Jong Un</title>
		<link>https://stellarsolution.net/2014/12/20/sony-hires-fireeye-inc-mandiant-forensics-unit-to-clean-up-massive-cyber-attack-fbi-claims-north-korea-source-of-attack-the-interview-comedy-about-cia-attempt-to-assassinate-kim-jong-un/</link>
		<comments>https://stellarsolution.net/2014/12/20/sony-hires-fireeye-inc-mandiant-forensics-unit-to-clean-up-massive-cyber-attack-fbi-claims-north-korea-source-of-attack-the-interview-comedy-about-cia-attempt-to-assassinate-kim-jong-un/#comments</comments>
		<pubDate>Sat, 20 Dec 2014 15:01:49 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Cyber attack]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[FBI claims North Korea source of attack]]></category>
		<category><![CDATA[Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack]]></category>
		<category><![CDATA[The Interview comedy about CIA attempt to assassinate Kim Jong Un]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=56</guid>
		<description><![CDATA[Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack, FBI claims North Korea source of attack, The Interview comedy about CIA attempt to assassinate Kim Jong Un &#160; &#160; From Reuters. The FBI claims to have evidence that the Cyber attack upon Sony computer systems came from North Korean sources. &#8220;Sony [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack, FBI claims North Korea source of attack, The Interview comedy about CIA attempt to assassinate Kim Jong Un</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>From Reuters.</strong></p>
<p>The FBI claims to have evidence that the Cyber attack upon Sony computer systems came from North Korean sources.</p>
<p>&#8220;Sony hires Mandiant to help clean up after cyber attack&#8221;</p>
<p>&#8220;Pictures Entertainment has hired FireEye Inc&#8217;s Mandiant forensics unit to clean up a massive cyber attack that knocked out the studio&#8217;s computer network nearly a week ago, three people with knowledge of the matter said on Sunday.</p>
<p>Computer systems at the Sony Corp unit went down last Monday after displaying a red skull and the phrase &#8220;Hacked By #GOP,&#8221; which reportedly stands for Guardians of Peace, the Los Angeles Times reported.</p>
<p>Technicians are making headway in repairing damage caused by the attack and expect to have the email systems back online Monday, said one of the people, who were not authorized to publicly discuss efforts to deal with the attack.&#8221;</p>
<p>&#8220;Mandiant is an incident response firm that helps victims of breaches identify the extent of attacks, clean up networks and restore systems.</p>
<p>The technology news website Re/code reported on Friday that Sony was investigating to determine whether hackers working on behalf of North Korea might be responsible for the attack, possibly in retribution for the studio&#8217;s backing of the film &#8220;The Interview,&#8221; which is to be released on Dec. 25 in the United States and Canada.</p>
<p>The movie is a comedy about a CIA attempt to assassinate North Korean leader Kim Jong Un.&#8221;</p>
<p>Read more:</p>
<p><a href="http://www.reuters.com/article/2014/11/30/sony-cybersecurity-mandiant-idUSL2N0TK0R920141130">http://www.reuters.com/article/2014/11/30/sony-cybersecurity-mandiant-idUSL2N0TK0R920141130</a></p>
<p><strong>From Fireeye:</strong></p>
<div class="title entrytitle">
<div class="entrytitle_wrap">
<h2>&#8220;Security Predictions</h2>
</div>
<div class="entry-meta-block selfClear"><time class="entry-date">December 19, 2014</time> <span class="sep">| </span><span class="by-author">By <a title="View all entries filed under 'Fireeye - Authors : Bryce Boland'" href="https://www.fireeye.com/blog/executive-perspective.html/category/etc/tags/fireeye-blog-authors/cap-bryce-boland">Bryce Boland</a></span></div>
</div>
<div class="summary entrytextteaser"></div>
<div class="par parsys">
<div class="section entrytext">There’s no crystal ball, but based on what we saw in 2014, we can predict trends we’re likely to see in the coming year. Here are a few technical and business insights from our experts to help security professionals prepare for 2015.&nbsp;</p>
<p>1)    <b>The rate of &#8220;cataclysmic events&#8221; such as Heartbleed and Shellshock will likely increase in 2015.  </b>It won&#8217;t be just one thing, but a combination of unrelated events that have the capability to destabilize &#8220;the internet of things.&#8221;  Organizations need to get better at dealing with these storms. We believe that 2015 will bring more of these far-reaching attacks that are tough to patch and cause widespread damage. Our advice: Put processes in place to discover vulnerabilities and react immediately with patches as needed.</p>
<p>&nbsp;</p>
<p>2)    <b>Linux POS malware increases. </b>We’ve seen plenty of Windows-based Point-of-Sale (POS) malware. Watch for Linux-based POS to become a new playground for attackers. Linux-based POS systems are in use all over the world, some are even free, open source or far less expensive than their Windows-based counterparts. Operators likely have minimal experience and in-house expertise to address threats and maintain updated configurations. Our advice: Understand the attack surface of your Linux hosts, the attack vectors they are exposed to, and initiate robust operational processes to manage, monitor and maintain their security.</p>
<p>&nbsp;</p>
<p>3)    <b>No more AV for me</b>.  IT security organizations will stop paying third-party vendors and consider Microsoft-provided AV as &#8220;good enough.&#8221; Instead, they’ll spend more on other endpoint solutions to address advanced detection, response and forensics. Our advice: Evaluate your security investments, considering both how your organization has changed and how the threat landscape has matured. Focus your investments on threat detection and protection.</p>
<p>&nbsp;</p>
<p>4)    <b>Supply chain attacks will increase</b>. Attackers will leverage less-mature companies that are the weak entry point into the more-mature enterprises – making the supply ecosystem an increasingly key part of cyber strategies. Our advice: Build security requirements into your MSAs with suppliers to improve their security, and require them to demonstrate that your supply chain is operationalizing their security. Look for measurements of security effectiveness such as a time to detect a new threat, and time to remove the threat.&#8221;</p>
<p><a href="https://www.fireeye.com/blog/executive-perspective/2014/12/security_predictions.html">https://www.fireeye.com/blog/executive-perspective/2014/12/security_predictions.html</a></p>
<p>&nbsp;</p>
</div>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://stellarsolution.net/2014/12/20/sony-hires-fireeye-inc-mandiant-forensics-unit-to-clean-up-massive-cyber-attack-fbi-claims-north-korea-source-of-attack-the-interview-comedy-about-cia-attempt-to-assassinate-kim-jong-un/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
