Windows 7 “Training” for Small Businesses in a Nutshell

For medium and small businesses that’re concerned about training expenses for moving from WinXP or Vista to Win7, I’ve outlined a short lil tutorial on how to train users on Win7.

1. Restrict each worker to non-admin user accounts only
2. Put icons to everything they need to do their work on the desktop.
3. REMOVE icons from their desktop to anything they do NOT need to do their work
4. Restrict their access to the Start orb to ONLY those applications they need to do their work and the ability to shut down, log off or restart the computer.

While you’re at it, set your network up so that all internet access is restricted to only those sites that are needed for work-related functions. Use OpenDNS or some such free site if you wish. It’s easy and unobtrusive (just returns a “not available” when ever someone attempts to log onto a site of a type you’ve blocked–auctions, webmail, whatever. Sites can be blocked by IP address as well, but that’s time-consuming, and you want inexpensive, right? :-))

All the above can be done in a day for most small-to-medium sized businesses. By one guy. Stick a fork in it. It’s done.


(Of course, for a little more time for one guy, as long as your essential, unreplaceable Windows programs can be run under WINE, you can save a bunch by installing a Linux distro… and doing the same thing as above with it.)

For Those Who Slept Through the “News”

The 0! has joined Dhimmi Kahtah, Yasser Arafat and Algore as a recipient of the Nobel Peace Prize. (*cue laugh track*)

Nobel-announcement

[Note: I’ve not yet found an embeddable version of this video, so just click on over to RCP to view it]

A helpful commenter at Real Clear Politics seems to be fluent in Norwegian:

Ok for those who do not speak Norwegian let me translate: “[A]s a country filled with weaklings and men with no balls, we are delighted to award the Nobel peace price to a man who has does nothing other than offer lofty words and hollow rhetoric. We are actually going to present the award to someone who is destroying a once great country, because that is actually a good thing in our mind as we want everyone weak and meek, just like us. So the award goes to BO!!!!”

*heh*

UPDATE: The Random Yak (very kindly and gently) blows a big fat raspberry at the Nobel committee. Mark Steyn could not have done it so well. The new Jonathan Swift.

UPDATE#2: The Obama Piece, urm, Peace Prize Theme Song:

I Started A Joke – Barry Gibb


(OK, I may catch a bit of flack from all my relatives of Norwegian ancestry–including my Wonder Woman–but it’ll all be worth it. ;-))

About Computer Security

At least weekly I check for sites with tips on computer security for the average user (translation: Windows user :-)) or thump myself on the head and ask, “What have I been doing that would be useful to others but that I’ve not gotten around to sharing?” *heh* Here’s a site that popped up on my radar not long back:

http://www.eset.com/threat-center/security_help.php

ESET’s security tips page is unusual for a security software vendor in that it does not directly tout its own wares and still gives good advice. The email and financial security tips are especially notable. ESET’s NOD32 Antivirus has a very strong reputation in computing circles, though, so if you’re in the market to buy security software, its internet security suite would be one place to look. For Windows users, ESET also offers free online scanning that is very thorough and doesn’t have the stumbling blocks some online scanning tools place in the way of less technically adept users. It is slow, though, precisely because it is very thorough, I imagine. Use it or another online scanner like Trend Micro’s once in a while as a “second opinion” to whatever anti-malware product(s) you already use.

http://www.eset.com/onlinescan/

http://housecall.trendmicro.com/

Another site offers a highly welcome freebie from Microsoft: Microsoft Security Essentials I have been using/testing out this product on a Windows box for a short while now, and it performs remarkably well. While I don’t normally recommend running two anti-malware programs loaded at the same time, Microsoft Security Essentials doesn’t even seem to cause any conflicts with my primary anti-malware software. I know of some folks who’ve been testing it since it was in early release (beta) who are technically competent enough to listen to and who also profess to use it as their primary anti-malware defense, now. Free from Microsoft. Be sure, if you decide to use it, to download the correct version for your machine. Microsoft will scan to determine your Windows validation.

And another freebie from Microsoft that I highly recommend: the Microsoft Password Checker. Use it to test the strength of your passwords. My suggestion for memorable, moderately strong, passwords is that you have passwords that are eight characters or more in length composed of mixed upper and lower case letters and some numerals that do not correctly spell any word. To make them memorable, use place names, geographic features from places you’ve visited but not lived, or corruptions of old addresses or telephone numbers (more than 20 years out of date, if possible). Make sure each of these is misspelled or otherwise NOT possibly “cracked” with a “dictionary attack”. I think if you follow such a procedure, you’ll find some moderately strong passwords that are also memorable. Change passwords for online sites, routers exposed to the internet and computers that are open to visitors or the public regularly.

Computer security expert Rick Hellewell has this to offer:

[You] may want to ensure that all of their application software is current. One tool to do this, which has been discussed before, is the free Personal Software Inspector program from the anti-virus company Secunia, available here. This is a program that you will download and install, and it will scan the programs on your computer for current versions. Links in the program will help you install the updates, sometimes with minimal interaction. Secunia also has an on-line scanner here, which does require Java to be installed. I have used the PSI program, and the on-line scanner, and can recommend either.

Application updates are an important layer in malware protection. As is recognizing “social engineering” attacks (‘Your computer has a virus” popups, for example), operating system updates, and other safe computing practices.

I didn’t include the links Hellewell had in his text, because both are accessible here. I have used the PSI program and have found it to be useful, as well. A recent scan reported the usual suspects *sigh*

Internet Exploder-heh

Yep. Internet Exploder. Still the world’s “least good” major browser, although it does suck less than previous versions. Oh, what wasn’t reported as “insecure”? The other two browsers I use regularly: Opera and Firefox. Heck, even Safari passed.

And this, from a lesson learned the hard way by Jerry Pournelle,

…Roberta’s XP system was infected, probably through a forwarded link to a New York Times story; the Times article contained a popup advertisement that said it had detected a virus, and offered a program to remove the virus. Roberta knew better than to click on the “download” button, but she did click on the little red x up in the right hand corner of the message. That, of course, invited the virus to download, since the entire message was one big button. I’ve said this before, but it bears repeating: if you get any such message, don’t try to close the message window. Use Task Manager to close the whole browser.

Yes, such popups can be a real pain in the neck (although most folks seem to feel the pain in an anatomically lower place), and even dangerous. Task Manager is accessed in Windows by the CTRL+ALT+DEL key combo. In Vista and Windows 7, you’ll be offered a page with options to choose from that includes “Start Task Manager” as an option. This article, from Microsoft, explains how to use this great tool that’s included with all current Windows installations. (Note: if you are on a business network, your IT department may have disabled access to Task Manager.) Better? Avoid all such popups by using Firefox or Opera as your primary browser, either of which can be more easily configured to kill most, though not all, such popups. Vista and Windows 7 have an added layer of protection from such “drive by” installations, though, in User Access Control prompts that nag users about software installation. In such cases, the nagging can save you quite a bit of hassle, though, so appreciate it. 🙂

Government Services

Things are getting bad when it seems that contracting with the mob to perform legitimate government services would cost us less and restrict our freedom less than continuing to have the “feddle gummint” steal our money, waste it and at the same time turn us all into criminals they can slap upside the head any time they want with complete immunity from any correction.

What the “Feddle Gummint” Does…

…and ought/ought not to do.

I think one can fairly infer Jerry Pournelle’s view of the place of the “feddle gummint” (my term, not his) in our lives by this reference to the FDA,

“My own view is that government should enforce truth in advertising, and if someone says his product is snake oil and most people think it’s worthless, but there are some who believe it can revive the dead, the FDA should insist that the stuff is actually made with oil squeezed out of snakes and otherwise get out of the way. I understand that mine is not the most popular view and is unlikely to be adopted.”

I could live with such a fedgov…

Apple/Mac “Loyalty”? Notsomuch

Apple computers are reputed to inspire fierce loyalty among users, but that may be due more to a highly vocal, rabid fringe of fanboiz than anything else.

More than 12 per cent of US homes have at least one Mac, according to NPD’s latest Household Penetration study – a rise from nine per cent the research company polled in 2008. But of those Mac owners, nearly 85 per cent have at least one Windows-based PC.

So the die hard Mac loyalists are… about 15% of Mac users. Since Mac comprised well less than 10% of PC sales, that yields a core of Mac loyalists that is a minuscule and very nearly irrelevant class of computer users. Just sayin’.

*heh*

(Just think, though: with high-end Intel-compatible hardware and PC-BSD, current Mac users could have their [possibly] preferred GUI, or something very like it–and the security of the base Unix OS they want and lower cost, too. Of course, they could always install a VM in the PC-BSD machine and plop Windows in there, too.. :-))

The Dimming of America

Even though the amazingly insensitive-to-meaning vocalizations of the narrator grate on my ears, this short, fluffy 2-minute piece still manages to retain the power of a truth: the price of the Anthropogenic Global Warming Myth is too high.

Take Back Your Government

What would you pay to get the tools to take back our government and save our country?

From the author’s preface to Take Back Your Government:

HOW TO SAVE YOUR COUNTRY

This is intended to be a practical manual of instruction for the American layman who has taken no regular part in politics, has no personal political ambitions, and no desire to make money out of politics, but who, nevertheless, would like to do something to make his or her chosen form of government work better. If you have a gnawing, uneasy feeling that you should be doing something to preserve our freedoms and to protect and improve our way of life but have been held back by lack of time, lack of money, or the helpless feeling that you individually could not do enough to make the effort worthwhile, then this book was written for you.

Take Back Your Government (Click for larger image)

The book is currently being sold by Baen Books in a bundle with Taxpayer’s Tea Party by Sharon Cooper and Chuck Asay. The cost for both books bundled together in any of a wide range of eBook formats is just $8. I’m currently reading my copy of Take Back Your Government in my web browser in the html version.

Taxpayer's Tea Party Manual