Skip to main content


Showing posts from August, 2012

Gmail 2Step Verification

I wrote an article last October 2011  on how you can activate your Gmail two factor authentication or two step verification for added security to access your Google Email or Gmail. I am writing an updated article to provide the step by step procedures. For this article, I am using my own gmail account (practice @ Let's go ahead. Login to website, using your email address and password. If you haven't change your password in a while, let's go ahead update your password. In the upper right corner of your Gmail web screen, click your photo (if you haven't update your photo, you will see a default photo image). Click Account . The web page will redirect to your Google account page. In your Google Accounts page, click Security . In password management, click change password . You will need your old password, type-in your new password, and confirm new password . Click Save to update. Logout and re-login to check your new password. Now, we'

Postini transition to Google Apps: Postini has been deactivated

Google acquired Postini email security services years ago, and now it is integrated with Google Apps service. If you configured your domain name using Google Apps services in the past using Postini, you need to update your domain name MX records. Using Postini service, you configured your domain name MX record something like this. I'm using KING.NET domain name as an example. @ (none)         KING.NET.S9A1.PSMTP.COM. 10 @  (other) KING.NET.S9B1.PSMTP.COM. 10 @  (other) KING.NET.S9B2.PSMTP.COM. 10 @  (other) KING.NET.S9A2.PSMTP.COM.   20 The new MX records listed below. Blank or @ 300 MX 1 ASPMX.L.GOOGLE.COM Blank or @ 300 MX 5 ALT1.ASPMX.L.GOOGLE.COM Blank or @ 300 MX 5 ALT2.ASPMX.L.GOOGLE.COM Blank or @ 300 MX 10 ASPMX2.GOOGLEMAIL.COM Blank or @ 300 MX 10 ASPMX3.GOOGLEMAIL.COM Excerpt from Google email "Your email continues to flow through Postini systems until you change the MX records to point directly to Google for all of the domain

Web Attack Blackhole ToolKit Website

I received an email with the following message: "Dear Bank Account Operator, WIRE TRANSFER: WRE-7258418863703165 CURRENT STATUS: PENDING Please REVIEW YOUR TRANSACTION as soon as possible. " Note: I already removed the linked in review your transaction for this post. See the captured screen after clicking the malicious code. DO NOT visit the URL Address if you don't have a protection on your computer. And here's the noticed from Symantec Anti-Virus. "Web Attack Blackhole Toolkit Website (random number) detected. I'm not expecting any wire transfer transaction, so I know this is one of the malicious code out there trying to take control of your computer. I'm surprise that Google Apps anti-virus tool did not detect this type email . I already reported (tagged) this as spam in my Google email. How do you protect your computer against this type of viruses. Here's my suggestions. Install anti-virus software to your computer. Here's s