Date: Tuesday, August 5th, 7 p.m.
Location: Danbury Hospital Auditorium
By Bruce Preston
It used to be so simple. In the ‘early days’ of DOS you booted from a floppy diskette in the A: drive. You then ran programs either from that diskette or replaced the media in the A: drive with a program diskette. Your data were typically on the B: drive.
Then someone discovered that they could modify the boot tracks on the system drive and install a virus. The virus would load into the system memory and then ‘infect’ any other bootable media put into the A: drive. At first the ‘payload’ of the virus was somewhat innocuous: self-replication to other media. And so began the antivirus industry and the cat-and-mouse battle between the virus authors and the antivirus software publishers.
Originally the only way to get a virus was to introduce it via removable media and replicate. But eventually it went to ‘the dark side’ with payloads that could alter or destroy data. Malware could be injected in ways other than via the boot sector – for example there was a macro virus that appeared in Microsoft Word. It changed the operation of Word such that files could only be saved as templates (.DOT) rather than regular documents (.DOC). Now, with the ubiquitous availability of broadband access to the internet, web pages and/or e-mail with active content, it wasn’t long before Microsoft Outlook (and Outlook Express) got the nickname of “Microsoft Petri Dish” as they never met a virus they wouldn’t nourish. Other avenues of introduction included opening up machines for peer-to-peer file sharing, especially music sharing – remember Napster, etc.? There are now many paths to getting unwanted and malevolent Read more...
DACS Gear! Mugs and more, visit CafePress to order
By Andrew Woodruff
Kevin Rabito presented a review of camera types, features, and purchasing criteria. Kevin does professional photography on a part-time basis, and he is a former President of Candlewood Camera Club.
The presentation continued beyond our usual ending time, mostly due to an abundance of questions from the audience.
Kevin Read more...
I am writing this column while enjoying the beautiful summer weather outside on my deck and looking forward to my upcoming vacation. I am reminded of how tethered we are to our computers and the internet, even on vacations. Smartphones are ubiquitous and tablets are catching up. They are powerful Read more..
Q – A friend has a Windows 8 machine where they are using an administrator account rather than a user account. When they clicked on a PDF they received the message, “The app cannot be launched, UAC is disabled.” [UAC is User Account Control, the feature in Windows that asks your permission when something is about to modify the system Read more..
APCUG’s FREE 2014 Summer Virtual Technology Conference (VTC) will be held on Saturday, August 16, from 1:00 pm – 5:00 pm Eastern Daylight time. The sessions are 50 minutes in length and offer attendees the opportunity to ask questions Read more...
Free and open to the public, DACS general meetings are held the first Tuesday of the month. For directions and parking information, click here. Our meetings have two parts: Ask DACS - a moderated question and answer session taking questions, and a featured presentation from industry professionals, DACS members and/or software vendors, Topics cover the broad spectrum of technology in homes, industry and even city government.