Monday 18 November 2013

The Scam From India Continues Come On Microsoft Do Something



SOLUTION: “This is Microsoft Support” telephone scam – Computer ransom lockout


A trend of the past couple of years has been for scammers to contact computer owners directly via telephone in the United States in an effort to convince them that there is a problem with their PC and they’ll need to pay to have it fixed.  In general, these people cannot fix anything, and instead they merely charge exorbitant fees for absolutely nothing. In other words, they scam you.
The call generally goes something like this:
  1. A foreigner with a thick Indian accent identifies himself as a member of Microsoft Support or similar.
  2. He informs you that you have a number of critical problems with your PC and that you will need to have it fixed.
  3. To convince you, he offers to connect remotely and pulls up your Event Log (eventvwr.msc).  He then filters for Warnings, Errors, and Critical events and uses that as evidence that your PC will soon fail to work correctly if you do not pay him to correct it.
The astute among you have probably already sensed that something here is seriously wrong, and it’s not your PC. It’s the fact that someone is calling you to tell you there is a problem with your computer. No one will ever do that. The only way they could possibly know there is a problem is by hacking or guessing.
In this case, it’s mere guesswork, and it’s not even correct most of the time. The Event Log issupposed to log warnings and errors, and even on the healthiest of PCs there are plenty of Error Events that can be safely ignored, as they often don’t amount to anything. The important thing to remember is to never trust someone who calls you about a problem with your PC, and never, EVER let them connect remotely to your PC.
If you do make the mistake of letting them connect, but then you happen to get cold feet and refuse to pay the $180+ they request via credit card, the next thing that happens isn’t pretty. This scammer proceeded to actually follow through on his promise of the PC “not working” if they don’t agree to have him fix it, and so in a few quick steps, behind the user’s back, he enacted what is known as SysKey encryption on the SAM registry hive.
SysKey encryption is a little-known feature of Windows which allows administrators to lock out access to the Security Accounts Manager (SAM) registry hive so that login specifics cannot be stolen and the PC cannot be accessed without knowing the proper credentials. The problem is, unlike other scams, there is no way around the problem; you can’t simply remove the password, as the actual SAM hive has been encrypted entirely by the process. If your Windows installation has had SysKey activated, you’ll see the following message:
Startup Password
This computer is configured to require a password in order to start up. Please enter the Startup Password below.
The window which appears looks like this:
This computer is configured to require a password in order to start up. Please enter the Startup Password below.
The ONLY solution is to find a clean copy of the registry hives from before this occurred. This scammer knew this, however, and as such, he took an extra step to block any repair or recovery attempts: he deleted all System Restore points on the machine, which normally house backup copies of the registry hives.
Unfortunately for him, I’m a much better technician. When the customer suspected foul play and decided to call me instead of proceeding, I immediately instructed them to power off the PC. Here’s how I fixed the problem without having to reinstall Windows.
FIRST, ensure you don’t have any Restore Points to work with:
  1. Check to ensure that the folder %SYSTEMROOT%\system32\config\RegBack exists.  If so, continue.  If not, stop and immediately contact a technician.
  2. Reboot the PC and repeatedly press F8 to reach the Advanced Startup Options menu.
  3. Choose Repair your Computer from the menu.
  4. Cancel the automatic repair attempt and instead instruct the system to perform a System Restore to a date prior to the incident occurring.
If no Restore Points exist, your scammer intentionally removed them to prevent this from occurring.  If this happens to you, follow these additional steps to resolve the problem:
  1. POWER OFF your PC immediately.
  2. Boot to external media of some sort (NOT your Windows installation) and navigate to the %SYSTEMROOT%\system32\config folder.
  3. Backup the registry hives in this folder to a temporary location. The files are:
    1. SOFTWARE
    2. SYSTEM
    3. SAM
    4. SECURITY
    5. DEFAULT
  4. Navigate to %SYSTEMROOT%\system32\config\RegBack as mentioned earlier.
  5. Copy all registry hives from this folder (the same files as listed above) into the %SYSTEMROOT%\system32\config folder.
  6. Reboot the PC.
This solution only works if you have not already tried to reboot the PC subsequently.  If you have, it may still work, but that is entirely dependent upon whether or not Windows created a new RegBack copy following a successful boot.
In the case of my customer, it worked, and they were back in Windows, just like it never happened.  Nice try, scammer.  You’ll have to try harder to beat me though. :-)

Saturday 16 November 2013

E-Safety

Nine Steps to E-Safety


As you well know, e-safety is more than a tick-box exercise. Sustained action is essential to embed e-safety into the culture and values of a school. But a checklist is a good place to start, so here’s our Nine Steps to E-Safety Checklist. How will you score?
  1. Clear e-safety policies in place
  2. A plan for becoming Ofsted compliant
  3. CPD and training for teachers, including accredited EPICT certification
  4. Clear guidelines for pupils around the consequences of online bullying and inappropriate use of technology
  5. Clear and open lines of communication for pupils to report incidents
  6. Procedures for recording, acting upon and preventing e-safety incidents in the future
  7. Sessions to inform and educate pupils on becoming digitally responsible and staying safe online
  8. Monitoring and filtering solutions to help keep pupils on task and protect them from bullying and harmful material
  9. A way of engaging with parents to help them put in place e-safety measures at home

Did You Know?

  • 92% of secondary school children have had experience of being cyber-bullied (NFER E-safety report, 2012)
  • 77% of 12 to 13 year olds have a Facebook or another social networking page (The Cybersurvey, 2012)
  • 40% of Key Stage 3 and 4 students have witnessed a 'sexting' incident and, in the same group, 40% didn't consider topless images inappropriate
With regular headlines in the press about cyber-bullying, the dangers of inappropriate content and the questionable safety of social media; combined with an increasing number of students wanting to bring in their own internet-enabled devices and mobile phones; it's little wonder that E-safety is quite rightly becoming a growing priority.
In fact, E-safety has become so important that OFSTED now includes it as part of their inspections. So how do you enable pupils to take full advantage of the technology to support learning and prepare them for the real world whilst providing a safe environment?

Don't panic. Call in the experts.

we have a specific focus on E-safety in education and we can help you develop your E-safety strategy and put in place provisions that will drive down the risk of e-incidents and help you get that all important "Outstanding" Ofsted rating. We can put you in touch with:

  • An EPICT accredited CPD training course.
  • E-safety workshops for senior managers, teachers, governors, parents and pupils.
  • E-safety advice and consultancy.
More can be found here for a self assesment :- 360 Safe E-Safety Review Tool
Engage the school governors Ofsted guidance on e-safety