Subject - Latest Pishing Scam

10-1-2019 4:51:35 PM

Got email today.  Email address was spoofed as PayPal <service@paypal.com>  Subject is For payment you have a little more than two days (exactly 50 hours).  This email appears real but fake.  Nobody uses Internet Explorer on this computer and nobody views porn on it.  If you get the email below, just delete it.

BITCOIN Wallet  17miid2m38nshNEV7xhhgrXbuPzuz9p2rc 
 
I have very bad news for you
22 / 05 / 2019 - on this day I hacked your operating system and got full access to your account .
 
It is useless to change the password, my malware intercepts it every time.
 
How it was:
In the software of the router to which you were connected that day, there was a vulnerability.
I first hacked this router and placed my malicious code on it.
When you entered in the Internet, my trojan was injected into explorer.exe on the operating system of your device.
 
After that, I made a full dump of your disk (I have all your address book, history of viewing sites, all files, phone numbers and addresses of all your contacts).
A month ago, I wanted to lock your device and ask for a small amount of money to unlock.
But I looked at the sites that you regularly visit, and came to the big delight of your favorite resources.
I'm talking about sites for adults.
 
I want to say - you are a big, big pervert. You have unbridled fantasy!!!
 
After that, an idea came to my mind.
I made a screenshot of the intimate website where you have fun (you know what it is about, right?).
After that, I made a screenshot of your joys (using the camera of your device) and joined all together.
It turned out beautifully, do not doubt.
 
I am strongly belive that you would not like to show these pictures to your relatives, friends or colleagues.
I think $ 718 is a very small amount for my silence.
Besides, I spent a lot of time on you!
 
I accept money only in Bitcoins.
My BTC wallet: 17miid2m38nshNEV7xhhgrXbuPzuz9p2rc  
 
You do not know how to replenish a Bitcoin wallet?
In any search engine write "how to send money to btc wallet".
It's easier than send money to a credit card!
 

For payment you have a little more than two days (exactly 50 hours).
Do not worry, the timer will start at the moment when you open this letter. Yes, yes .. it has already started!
 

After payment, my virus and dirty photos with you self-destruct automatically.
Narrative, if I do not receive the specified amount from you, then your device will be blocked, and all your contacts will receive a photos with your "joys".
I want you to be prudent.
- Do not try to find and destroy my virus! (All your data is already uploaded to a remote server)
- Do not try to contact me (this is not feasible, I sent you an email from your account)
- Various security services will not help you; formatting a disk or destroying a device will not help either, since your data is already on a remote server.
P.S. I guarantee you that I will not disturb you again after payment, as you are not my single victim.
This is a hacker code of honor.

 

From now on, I advise you to use good antiviruses and update them regularly (several times a day)!
 

Don't be mad at me, everyone has their own work.
Edward Lemmers
 

MySQL error occurs after upgrading PHP/MySQL web app

8-8-2019 5:47:53 PM

Problem:

You upgrade a PHP/MySQL web app and you get the following error:

We are sorry, we not able to connect right now. Please try again later: SQLSTATE[HY000] [2000] mysqlnd cannot connect to MySQL 4.1+ using the old insecure authentication. Please use an administration tool to reset your password with the command SET PASSWORD = PASSWORD('your_existing_password'). This will store a new, and more secure, hash value in mysql.user. If this user is used in other scripts executed by PHP 5.2 or earlier you might need to remove the old-passwords flag from your my.cnf file

Analysis:

If the web app was installed when the server was running PHP 5.2 or earlier, or the web app was transferred from one CPanel/WHM server to another using the automatic transfer tool, the database user credintials were applied using the old 4.1 format.

Solution:

You can use SSH, then log into the MySQL console run the password update as described in the error message.  As an alternative, you may also use the CPanel interface to delete, rescreate and re-apply the user to the database.

Ed Lemmers
 

Purchasing a Laptop - What Processor is Best?

8-8-2019 5:26:14 PM

As many savvy computers have become aware of, Intel markets their laptop processors under three different labels: Core i3, Core i5 and Core i7 which relate to different price range levers: economy, standard and premium.  In Intel's desktop line, these model series relate directly to performance in terms of computing power.  This is not necessarily true with laptops.  Another consideration for laptop performance is battery life.  As it turns out, there are Core i5 and Core i7 processors that currently being manufactured that have similar performance (or the Core i5 may actually run at a higher clock speed), but the Core i7 consumes half of the power of the Core i5.  If you are planning on using your laptop mostly in situations where your are running it on battery power, then paying the premium for the Core i7 is well worth it.  If on the other hand, you will not be traveling that often or you will generally have power available, you may prefer to have a slightly faster processor and to save a little money on the purchase as well.

Another aspect that is associated with the different levels of the Intel Core i series is the number of cores and threads each level has.  For desktop processors, the Core i3 series has 2 physical cores and 4 threads, the Core i5 series has 4 physical cores and 4 threads (mostly), and the Core i7 series has 4 physical cores and 8 threads.  This is not the case for Intel's mobile processors.  In fact, most mobile Core i5 and Core i7 processors have only 2 physical cores and 4 threads for both series.  But what does this mean in performance?  The number of cores and threads becomes important as your computer is required to multitask.  This can be extremely important for a programmer or developer who needs to run several operating systems in virtual machines simultaneously.  But for the typical user, processor clock speed will have a greater impact on user experience.

It is typically easier to get higher clock speeds with Intel processors than AMD processors.  Also, motherboards built with Intel chipsets seem to be better supported that other chipsets.  But quad-core laptops running Intel processors tend to be high-end products and are harder to find.  If you are on a budget and you want to run multiple OSes, and you need to use multi-threaded programs, than an AMD processor may be of better value to you.  The AMD mobile processors are divide into different A series: A4, A6, A8, A10.  The A4 series have 2 physical cores, the A6 series come with 2, 3 or 4 physical cores, and the A8 and A10 series all have 4 physical cores.  The next 4 digits, i.e.. A8-5600K have a relationship to clock speed, but this relationship is not one-to-one.  In fact sometimes higher numbers are used for slower clock speeds.  Therefore, you will need to lookup the specifications of the CPU by the CPU model number in order to compare the performance between any to laptop computers.  You can go to http://www.cpu-world.com for specific information about any CPU.

Ed Lemmers