A laptop recently landed on my desk full of some lovely viruses. I won’t say who it was, but really, you shouldn’t be too embarrassed. These virus writers are good at what they do and it’s easy to be tricked. As I fixed up the laptop, I thought about a short series of blog posts that might be of interest to many of you readers, not just the household that got hacked. I’ll cover how virus writers try to get you through your browser, how they attack via email, and then what to do after you suspect you’ve been hacked.
The most common viruses get onto your machine because you clicked something. It’s pretty difficult to have a computer sitting idle with no human in front of it and get a virus. We are the weakest link. So when hackers try to attack you via websites, they’re going to present you with something that is out of the ordinary, but just plausible enough that you’ll click on it. These popups might seem fairly legit. Here’s an example:

A geek will look at this and know it’s fake, but to the general populace, this seems like something serious that should be fixed by clicking Accept and Install. How can you tell it’s fake? That’s tricky but some basic ways are that this installation box is inside of a browser window. That’s your first red flag. What video player is it trying to update? If it’s going to install something, it should be pretty specific. If you have questions you could take that product name and search for it.
But really the best way to defend against this type of thing is to know the legitimate ways you’ll be warned about this type of thing and then be incredibly suspicious of anything that tells you to install something or “click here to fix your computer.” These days, nearly everything that is needed to fix your computer happens automatically in the background via Windows Update. You might see some notifications from Microsoft Security Essentials when you haven’t run a scan in a while but that’s about it.
You should also have Windows User Account Control enabled. Whenever a program tries to install on your machine or access protected areas of the operating system, it will pop up a warning dialog that asks if you’re sure you know what’s going on. Unfortunately if you believed something like the image above then this probably won’t stop you, but it’s a good backstop to really think about what you’re doing.
So if you get a popup that says you have a virus or that is asking you to install something unexpected, just stop. It’s probably a lie, but just in case it’s legitimate and Microsoft Security Essentials is trying to save you, snap a photo with your phone and email it to your favorite geek. Ask them if it’s legit and what you should click. You might save yourself a lot of trouble.
My project at work is called Power Query for Excel. We released our first version last summer and now our second version is available as part of a larger offering called “Power BI for Office 365.” BI stands for Business Intelligence. The offering includes a bunch of tools that help you make sense of your data, create nice reports and then share them out with your colleagues. This marks the first time that something I’ve worked on at Microsoft is available for purchase!
I don’t know about you, but I’m an email packrat. Steve Gibson, the security genius behind 




It had been a while since I rebuilt my computer so I decided to do it over Thanksgiving break. I was amazed at how quickly it went! Windows 8.1 installed off a USB key in the blink of an eye. I probably could have used the reset functionality built into Windows 8 but I really wanted to do a bare bones completely clean install. Windows 8.1 remembers pretty much every customization I did to the machine and even all of the apps that I had downloaded from the Windows Store. Office and a few other desktop apps required manual install, but Office 2013 is takes literally a couple minutes to install.
I have about a dozen Windows Phone and Windows 8 Store apps. They’re all paid apps, mostly because I’m too lazy to mess around with advertising and it’s nice to get a little money, even if it’s just a few bucks, for my hobby.
So you’re getting rid of some old hard drives, but you’re nervous about just throwing them in the trash. If the idea of creating a USB boot key doesn’t frighten you, then you should know about
I’ve been using GMail for about 10 years. Yes, it looks like you send mail to @studio711.com and receive a reply from there, but in the background, it’s getting sent to GMail. That’s not a huge deal but I’ve always felt a little guilty for not using my own company’s offerings. Plus, with the updates over the last few years, Outlook.com is at least on par with GMail, if not a little ahead.