Archive for Security

Search Google More Safely

Search Google more safely

We all use Google, quickly finding everything we need on the Internet. It’s replaced dictionaries, encyclopedias, instruction manuals, newspapers and in many cases, even doctors (not such a good thing!).

However, sometimes your search results aren’t the real thing and can be downright malicious. For example, we regularly find that customers search for, say, a printer driver software update and they type in something like “XP442 printer driver” . A close look at some of the results shows things like ‘ epsondrivers.org ‘ or ‘ printerdriversforyou.com ‘ – not the manufacturers official website – so you may get a driver but you are very likely to get something unwanted too!

Here’s how to search more safely: –

Pay attention to the URL in Google

Below every result title there’s a URL (website address) in green. No matter what the title says, this URL is where your mouse click will take you. Unfortunately, cyber-criminals will often list their site with a familiar and trusted title but link you to their scam/malware pages.

Another example can be the title of your bank name (eg, Example Bank), which seems legitimate, but the URL could be www.baabpjhg.com which is obviously not your bank. Sometimes they’ll attempt to trick you by putting the real site into the link too, eg www.baabpjhg.com/examplebank.com which makes it even more likely to catch you out when skimming through results quickly. When you visit the page, it might look exactly like your bank’s site and ask for your login details, which are then harvested for attack.

Whilst jibberish in the link is pretty easy to spot, sometimes they’ll take advantage of a small typo that you can easily miss. For example, www.exampebank.com (missing the letter L).

Notice Google search results v paid adverts

Google does a pretty good job at making sure the most relevant and legitimate sites are at the top of the list, however paid adverts will usually appear above them. Much of the time, these paid ads are also legitimate (and you can quickly check the URL to verify), but occasionally cybercriminals are able to promote their malicious site to the top and catch thousands of victims before being removed.

Similarly, well known businesses can pay for adverts, even though much of their software is classed as ‘Potentially Unwanted Programs’ and technicians remove them from computers every day.

Believe Google’s malicious site alerts

Sometimes Google knows when something is wrong with a website. It could be a legitimate site that was recently hacked, a security setting that’s malfunctioned, or the site was reported to them as compromised.

When this happens, Google stops you clicking through with a message saying “this website may be harmful” or “this site may harm your computer”. Stop immediately, and trust that Google has detected something you don’t want in your house.

Turn on Safe Search

You can filter out explicit search results by turning on Google Safe Search. Whilst not strictly a cyber-security issue, it can still provide a safer Google experience. Safe Search is normally suggested as a way to protect browsing children, but it also helps adults who aren’t interested in having their search results cluttered with inappropriate links, many of which lead to high-risk sites.

Switch Safe Search on/off by clicking Settings > Search Settings > Safe Search.

These are just a few tips to make your searching safer, but the most important is you – never take your internet security for granted and always be cautious when using any search engine, as they can only display what they find out there on the internet – good and bad.

Need some help securing your system? Give us a call on 01455 209505.

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone

How to tell if your Computer has a Virus

How to tell if your computer has a virus

Sometimes computers do strange things that ring alarm bells and the next thing is that you’re running virus scans and demanding everyone come clean about their browsing habits. Fortunately, not all weird occurrences are caused by viruses – sometimes your computer is simply overloaded, overheating or in desperate need of a reboot.

Here are some tell-tale signs of a malware attack:-

1. Bizarre error messages

Look for messages popping up from nowhere that make no sense, are poorly worded or plain gibberish – especially if they’re about a program you don’t even have. Take note of anti-virus warnings too, check the warning is from YOUR anti-virus software and also that it looks like it should.

If a message pops up that isn’t quite right, don’t click. Not even to clear or cancel the message. Close the browser or shut down the computer instead, then run a full scan.

2. Suddenly deactivated anti-virus/malware protection

Certain viruses are programmed to take out the antivirus/antimalware security systems first, leaving you open to infection (this is why we advise our customers to always have all the system tray icons visible on the taskbar, on the bottom right-hand side). If you reboot and your protections aren’t back doing their job, you may be under attack. Attempt to start the anti-virus manually.

3. Social media messages you didn’t send

Are your friends replying to messages you never wrote? Your login details might have been hacked and your friends are now being tricked into giving up personal information or worse. Change your password immediately, and advise your friends of the hack.

4. Web browser acting up

Perhaps you’ve noticed your homepage has changed, it’s using an odd search engine or opening/redirecting to unwanted sites. If your browser has gone rogue, it could be a virus or malware, usually one intended to steal your personal or financial details.

Skip the online banking and email until your scans come up clear and everything is working normally again.

5. Sluggish performance

If your computer speed has dropped, boot up takes longer and even moving the mouse has become a chore, it’s a sign that something is wrong – but not necessarily a virus. Run your anti-virus scan and if that resolves it, great. If not, your computer possibly needs a tune-up or quickie repair.

6. Constant computer activity

You’re off the computer but the hard drive is going, the fans are whirring, and the network lights are constantly flashing? Viruses and malware use your computer resources, sometimes even more than you do. Take note now of what’s normal, and what’s not.

Got a virus? Give us a call at 01455 209505.

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone

CCleaner program hacked

Popular Ccleaner program hacked

 

Many people use the free CCleaner program which is used for computer maintenance and file cleanup and it is so popular that millions of downloads take place very week.

Unfortunately Piriform, the company which makes the program, has announced that one of the program versions downloaded by millions of users over a four-week period, had been hacked and has been used to install what is called a ‘back-door Trojan’ virus on people’s systems.

The versions which are affected are CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows – which were downloadable between 15th August and 22nd September.

The hack allowed the program to cause the download of further unwanted software, possibly including keyloggers and ransomware and initial investigations show that that the program was hacked at the company, before being released to the public using their normal download servers.

Information relating to the infected computer may also have been sent to the hackers servers during this period.

CCleaner users with the above versions should immediately uninstall the program and download the latest version as soon as possible. Although the company states that only the above versions are affected, we recommend uninstalling any version downloaded between those dates before reinstalling, just in case investigations later show that more versions were affected.

We also recommend that if you have the one of the versions mentioned above, you should take the usual common sense precautions such as full scanning of your computer with a good security product, as well as keeping an eye on your bank statements, etc.

This incident is not only potentially serious for users it is also embarrassing for the parent company that now owns Piriform – the antivirus security company Avast. Although further investigations are taking place to find out how this happened, many people may now lose confidence in the CCleaner product.

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone

Equifax Data Breach and UK Customers

Equifax Data Breach and what it means for UK customers

Recently, Credit reporting company Equifax has revealed that its databases were hacked in a large-scale breach affecting millions of customers across the US, UK & Canada and personal information was leaked. While no hacking event is ever good news, some are easier to ignore than others – but unfortunately, this isn’t one of them. Major UK companies such as BT and British Gas use Equifax services as well, so there may be UK customers affected too.

Equifax is one of the three main organizations in the US that manages & calculates credit scores. To do that effectively, they have access to almost every piece of financial data for adults – social security, tax file numbers, drivers’ licence, credit card numbers…the big stuff. On July 29, Equifax disclosed the breach, stating that hackers had repeatedly gotten in through a vulnerability in their systems from mid-May to July of this year.

Equifax, cyber-security experts & law enforcement officials are on the case, working to minimize the long-term damage and it may be that the number of customers actually affected in the end may well be small. Also, the UK Regulator – the Information Commissioner – has asked Equifax to inform all UK customers that may be affected.

Whilst you do not need to panic, there is a risk of personal information being in the wrong hands. You should consider that risk, particularly as this type of personal information can circulate for a long time due to the fact that these hackers also sell the information on to others.

Here are a few ideas to protect yourself against possible future compromise: –

Keep a close eye on your finances and accounts.

Check for notifications of new credit applications, monitor your statements and bills, and immediately report any suspicious activity or sudden change in billing.

Change all your passwords to be strong, unique and long.

The stolen data may give hackers a free pass into bank accounts, email and personal information. Add two-factor authentication where possible – this is when an account demands a second layer of authentication before allowing access or changes – so just getting the password correct isn’t enough, the hacker would also need to get the special code sent by SMS text.

If you believe that you have been compromised, consider freezing your credit report.

This makes it harder for identity thieves to open accounts under your name, as access is completely restricted until you choose to un-freeze.

BT have provided the Equifax UK telephone number 0800 014 2955 for customers that have a query over their credit file and they can also be contacted via their website www.equifax.co.uk.

If you need help with your passwords, give us a call on 01455 209505.

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone

Too Many Passwords? Try a Password Manager

Keep your computer secure from scammers

One of the regular things we see is customers struggling with the number of passwords they need to remember – so many login details are needed these days. As we have advised previously, it is not a good idea to have just one password for everything so how can you keep track of all of them?

You can try using a Password Manager – this is a program or browser extension that allows you to store passwords in an encrypted form on your device, but also do much more. The bonus is that all you need is one Master password to manage it.

The passwords are saved in an encrypted password ‘vault’ and when you go to a specific website, the Password Manager inputs the password for you. Whilst many browsers already do this for you, a Password Manager does it in a more secure way.

Some Password Managers advise you as to how secure your passwords are – preferably using a mixture of letters, numbers, capitals and special characters. Some can automatically change passwords for you and as well as set up two-factor authentication – this is where you can open the password vault with your Master password, but you also use some form of verification (such as getting a code texted to your phone), which you type in to prove that you are authorised to access those important password details.

The main point is that you would not need to remember large numbers of passwords, which means that you can easily keep your online accounts as secure as possible.

There are a many Password Managers – here is a selection of the best known ones: –

LastPass

This is one of the original Password Managers and installs a browser extension or mobile app. With one master password you can access the password vault and manage passwords for all websites that you log into. It can even generate secure passwords for you.

At the moment the browser extension is free to use and more services are available in the premium version.

True Key

Intel has produced a Password Manager that is free to use for 15 passwords, which is enough for many people, and also a premium version which allows more and extra services. As well as the usual encrypted password facility, it allows multiple ways to access the password vault – master password, second device, email or even facial recognition.

Dashlane

As well as storing your passwords securely, this product helps you by providing a rating of your password security strength. The premium version also allows synching across multiple devices as well as two-factor authentication.

These are just three of the many Password Managers out there but whatever one you choose, do make sure that it is from a reputable company. If using a search engine, take particular care checking the website address the download is coming from as it needs to come from the company itself and not an address that is only similar.

Also you need to remember that whilst Password Managers help you keep track of your password security, you still need to maintain effective security software and keep a cautious eye on what you download from the internet.

If you would like help with password security, call us on 01455 209505.

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone

4 Simple Tips to Help Keep Your Internet Banking Safe

Online Banking precautions

Online banking has boomed in the past few years – branches are fewer and apps are in. Half the time when you visit a branch, you’re steered towards a computer for a DIY transaction – with optional assistance. But is internet banking really safe?

You’re always told to keep your financial details private, but the good news is you CAN bank more safely online with a few simple precautions.

Always type in the website address

Many attackers will attempt to trick you into clicking a fake link to your bank website. Usually sent as a ‘phishing email’, they’ll claim that there’s a problem and ask you to click through to your bank and correct it asap. The link points to a fake website that looks almost exactly like your real bank site and is recording your private account info.

You can avoid scams like this simply by accessing your bank by manually typing in the website or using a bookmark – never a link.

Avoid public computers and networks

Jumping onto a PC at the library or other public place might seem like a quick and easy way to check your account, but public computers are often targeted by scammers. In just a few moments, they can install keyloggers (programs that record usernames, passwords and other private data), then sit back as all future user details are emailed to them.

The same problem applies with free, unsecured Wi-Fi.

You’re better off using an ATM or a data-enabled smartphone, preferably one with a security app.

Use a strong password with 2-factor authentication

Create a unique password for your online banking, something you’ve never used anywhere else. Mix up words, numbers and symbols to create a complex password that can’t be guessed easily. Avoid giving attackers a head start with data they can find on Facebook, like childrens names, pet names, birthdates, etc and really think outside the box.

And of course, never write it down anywhere near your wallet, phone or computer.

If remembering is likely to be an issue, you might like to consider a secure password manager app. Many banks will also help boost your security with two-factor authentication, sending random codes to your phone (or a special LCD device that they provide) to verify any activity.

Check page security before entering data

Finally, take a second to spot the small padlock icon at the top before you enter any data. You’re looking for a padlock appearing as part of the browser itself, not just an image on the webpage. It will be either in the bottom corner or next to the URL. The address will also start with https:// instead of http://. If you don’t see these things, the page is NOT secure and you shouldn’t log in.

We have many customers that never use online banking, but for the majority of people who do, these simple steps will help keep your transactions a little bit safer.

Need some help securing your system against scammers? We can help. Call us on 01455 209505.

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone

Facebook privacy and how it could affect you

Check your Facebook privacy

Finding the balance between Facebook privacy and Facebook fun can be challenging – but it’s a double-edged sword. Facebook allows us to connect with friends no matter where they live, but it also publicly shares information that just a few years ago, we’d never dream of putting online.

You can search for people based on where they went to school, the town they live in, clubs they belong to, who they’re related to…but when is it too much information for our own good?

Your birthday is the first piece of information collected when you sign up, and it’s great getting birthday wishes from friends and family when it appears in their newsfeed. But while Facebook is sending you balloons and funny memes, your birthday is now public knowledge. It seems harmless, but when you call your bank or other institution, what’s the first question they ask to verify your identity? Your birthday!

Some password recovery/reset systems even ask questions like ‘which school did you go to?’, “name of your pet”,  name of your mother (or father)”, etc. assuming that this is knowledge that only you would know. Except…you may have publicly shared it on Facebook.

The fact is that unless you are careful, there is a large amount of information that can be gained from Facebook, by people that may misuse it.

Also, we’ve all heard stories of people who’ve lost their jobs after less-than-wholesome pictures or statements have gone public. If you have a reputation to keep, you definitely don’t want pictures from last weekend’s private party showing up, especially if you really let your hair down. While you can’t control what others do with photos they take of you, you can control whether or not you’re tagged in them.

Fortunately, there are settings in Facebook that allow you to control who sees what information and what happens when you’re tagged. Despite what you may have heard or seen floating around in a Facebook share hoax, you do have complete control over your Facebook privacy, and it’s easy to adjust.

How to Check and Adjust Your Facebook Privacy Settings

1. See what your account looks like to an outsider

From your Facebook homepage, click your name on the blue bar at the top of the page. Click the three dots next to ‘View Activity Log’ and then select ‘View as…’

2. Run a quick privacy checkup

Click the question mark in the top right corner and choose ‘privacy checkup’. Think about what you really need to share – do people need to know the YEAR of your birth or just your birthday? Your friends will still get the notification, and you’ll still get the balloons.

3. Edit advanced privacy

While the checkup covers the most obvious info, you can go much deeper. Click the V-shaped dropdown to the right of the question mark. Go to settings and choose privacy.

4. Adjust timeline and tagging

In the privacy settings, you can explicitly control who can tag you, who can see or share the tagged content, and what shows up on your newsfeed.

Just as you shouldn’t tell the world when you are going away on holiday (and your home is unattended), your personal information should be treated with the same care, but tightening your Facebook privacy only takes a few minutes and it can save you a whole lot of trouble in the future.

If you need help with this, just give us a call at 01455 209505.

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone

Voice Activated Products and Privacy

Microphones in Voice Activated Devices in the Home

For some time now we have had smartphones which you can talk to and get a response from, for example, Apple’s ‘Hey Siri’ and Android’s ‘OK Google’ – both very useful gadgets and which can greatly speed up the time it takes to get information.

Now, with the advent of in-home products such as Amazon’s ‘Echo’, the use of voice-activated devices in the Home is set to increase dramatically, so it’s fair to ask – are there any privacy concerns and do they outweigh the benefits of having such a useful device?

On the one hand, having a device that you can ask questions of as well as giving commands to, is clearly useful but the fact remains that to achieve this, the Echo contains an array of sensitive microphones that picks up audio from anywhere within range – certainly anywhere in an average sized room.

Unless you specifically mute the microphones, they are in ‘always listening’ mode.

The Echo doesn’t understand or process such audio itself – it sends it over the internet to Amazon’s data centres, which do the hard work in a fraction of a second and sends it back to the Echo device to respond back to you. However, and even though the Echo does not respond without hearing the trigger ‘Alexa’, the microphones are still functioning.

Similarly, the camera in the new ‘Echo Look’ – a camera-enabled device pitched for use in your bedroom or bathroom to help you with fashion choices – can also be switched off, but also has a default ‘always on’ mode.

The main privacy concerns relate to two main issues – security of the device and storage of voice data.

Security of the Device

Whilst Amazon has world-leading security at its data centres, we all know that if a device is connected to the internet then there is no such thing as 100% security – either there is a chance (however small) that the device can be compromised by hacking, or the data going to and from it can be intercepted.

It was revealed that Facebook’s Mark Zuckerberg covers the Webcam in his laptop with tape, as does a former FBI Director who calls it “sensible”, so how useful would audio information fetched directly from within your home, be to the wrong people?

Once your information is in the ‘Cloud’, then you have to accept that you no longer have 100% control of it.

Voice Data Storage

Like Apple’s Siri, previous Amazon Echo recordings are kept by Amazon in order to improve voice recognition accuracy, although you can delete them through your ‘Manage my Devices’ page (but this does mean that the Echo will not “learn” from your past interaction with it). If a device is storing at least some audio from within your home, you need to be aware that it is being stored somewhere else.

Also, bear in mind that you may accidentally use a similar word to one of the trigger words in general conversation, which means that it is possible that the device can actively detect what is being said without you even realising it.

What is clear is that the Echo is a useful device and will no doubt be the first of many interactive devices forming part of the ‘Internet of Things’, but also bear in mind that like much of the tech that we use on a daily basis, it is also a market profile data gathering device, in a similar way to smartphones. In fact, the company actually reserves the right to serve ads based on the data that the Echo receives from you, so don’t be surprised when one day you ask Alexa a question about something and you subsequently get ads related to what you have said to it.

The Echo and similar devices are now in the home, including in private areas, so we need to make an informed choice about what that tech can do for us, versus the possible issues and risks that such technology can bring with it. If you uneasy about ‘always on’ microphones then possibly such a device is not for you, but if you are aware of the risks, then you can make sure that you keep as much control as possible, e.g. use that mute button!

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone

NHS Cyber Attack – how to build up your protection

Malware terms

Here is some more information about the NHS cyber-attack that started on Friday.

The Ransomware variant is called WanCrypt0r and 81,000 infections were reported in the first 12 hours. It has not only targeted the NHS but has also gone for Banks, Telecoms and Utilities worldwide.

It has been established that the criminals are exploiting a known vulnerability in Windows (MS17-010)  which has already been patched, but those computers which do not have up to date Windows Updates are still vulnerable.

We have warned customers before about the Ransomware threat and the extent of this attack means that we should all consider increasing our defences, especially businesses but also homes, as Ransomware can be spread via emails.

As there is no way to guarantee 100% protection against threats, we have to make it as difficult as possible for the threat to take hold and how much you decide to do depends on the level of risk you wish to take.

1. Ensure that Windows Updates is kept up to date

Windows Updates contain security fixes (amongst other things) and computers that have not been kept up to date are vulnerable, as in the case in this attack. Admittedly Windows 10 gives you little choice when it comes to Updates (you have to have them) but if you are using any previous version of Windows – make sure that Updates are kept up to date.

If you are still using Windows XP or Vista, you shouldn’t be. These versions of Windows no longer get Windows Updates.

Update:
Microsoft have now issued a patch for XP and Vista. Go to this web page to download the patch if you are still using XP and Vista (demand is high so it may take more than one try). Please note – this patches this vulnerability only so you should still move away from these unsupported operating systems.

2. Make sure that you have a good antivirus product that is kept up to date

Good security products give a better degree of protection but they have to be kept up to date, with active subscriptions. Free antivirus is better than nothing but does not give protection that is as comprehensive as paid versions.

3.    Install extra protection.

Usually, you should not have more than one security product installed on your computer at any one time, but there is a product called Malwarebytes, which can be installed as well as your existing antivirus. This increases your protection especially from Ransomware, if you install the premium version.

4.    Consider your backup situation

If a computer is infected, the virus goes across a network and it is possible that any connected storage will also get infected – this includes cloud storage such as Dropbox. Having said that, Dropbox state that within 30 days of the event they can restore your files (here) and you can subscribe to extend the 30 days to 1 year if you choose. If you are using any other Cloud storage, check with them to see if they have a similar service.

It is vital that your important files are backed up and a copy kept separate from your computer. In the event of an infection, you can at least relax a little that your important data has not been encrypted.

5.    Consider downtime – system backups

When a computer has Ransomware, if you have backups of important files you will not need to pay the criminals. It is likely that the computer will need to be wiped clean and Windows reinstalled, which takes time.

There is software available that can take a copy of your whole computer, which could be used to reinstall the whole system in much less time than a full reinstall. A copy once every 2 or 3 months would allow you to get back up and running in much less time.

As mentioned earlier, many viruses are spread through emails, so never click on links in emails and do not open attachments unless you know that they are genuine emails – if in doubt call the sender.

If you would like help with any of the above, give us a call on 01455 209505.

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone

Mac Computers and Viruses – Truth versus Myth

Compromised app containing a virus

We have lost count of the number of times that we’ve heard the phrase “Macs don’t get viruses” or “I’ve never had protection on my Mac”. Whilst this may have been true in the past it isn’t as cut and dried today and the Mac OSX operating system actually can be vulnerable, so protection is worth seriously considering especially in a work or business situation.

More difficult to exploit

The Mac is based on the UNIX operating system (as is Linux) which is more difficult to exploit as it is built on a sandbox-type principle, where malicious code cannot usually get as far as it might get in a non-UNIX based system.  Also, Apple has built in a certain degree of malware prevention in the Mac, for example their ‘Gatekeeper’ software actually blocks apps that have been downloaded from the internet (i.e. anywhere other than the Apple Store) that do not have a Developer ID supplied by Apple certifying that they are safe to use.

Unfortunately, in spite of this robustness the Mac is now becoming a victim of its own success because its increasing popularity means that cybercriminals are paying more attention to it – and finding ways of making money from you even if you are a Mac user. It’s not just that popularity – Macs are usually much more expensive to buy, so the cybercriminals may believe that Mac users are attractive targets.

Not impossible to exploit

For example, a popular Mac DVD-ripping and Video Conversion app called ‘Handbrake’ was recently compromised, by criminals hacking the software company download server and inserting malicious code into the app download. When this download was installed on a Mac, it also installed a ‘backdoor’ (a means of bypassing security). The user then was asked for their administrator password, which was passed over the internet in plain text so that the criminals could access any part of the system from that point.

By successfully avoiding having to use the ‘direct attack’ approach, this allowed important information such as password keychains and browser data to be extracted and passed to the crooks.

This compromise has now been corrected and the infected code was from a download between 2nd and 6th May 2017. If you have installed Handbrake version 1.0.7, check the SHA1 checksum of the file by opening a Terminal, typing in shasum and dragging the installation file into the Terminal Window.

If the checksum is 0935a43ca90c6c419a49e4f8f1d75e68cd70b274 then the file is malicious.

To disinfect it remove the Launch Agent plist file fr.handbrake.activity_agent.plist, and the activity_agent.app file located in ~/Library/RenderFiles/. Reboot then change your passwords.

In the past year or so a Ransomware-type malware was discovered for the Mac, so this isn’t the first time that there has been a potential issue.

Even though the Mac is more robust and secure than its main competitor, it is by no means invulnerable to malicious code and it is a risk to think otherwise. You may feel that the risk is small enough to continue to use your Mac as you always have, but at least consider the pros and cons first – as well as being very careful about where you get your apps from.

If you would like help in securing your Mac, give us a call on 01455 209505.

Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone