Welcome to the Coast Computing Blog – donations accepted

July 18th, 2017

I want to thank all of you for your comments.

I started this blog as an extension of the following:

www.facebook.com/coastcomputing

www.coastcomputing.biz

http://www.support.coastcomputing.biz/

This blog is intended for those who want to know more about proper maintenance of their PC’s, Home Networking and Virus troubleshooting. Included are tips to help your machines and mind stay healthy. Enjoy!

Our main business and remote assistance portal is located at  Coast Computing Website

Facebook Page:  Coast Computing on Facebook  (We appreciate the likes, thanks)

 

My name is Paul and have been working with computers since 1986. I manage Coast Computing located within Palm Beach County, Florida.

It was suggested I put a donate button on the site. I decided to do this, it’s a paypal button, and it helps defray server coasts. Many of you have donated $1 to $5 and I thank you from the bottom of my heart. I write these articles to help people. Some of the biggest corporations will try to trick you into paying for computer software you can legally use for free. There are also many individuals that will try to hijack your computer and ransom your property for money. I am simply attempting to show you it is not difficult to lock down your computer(s) and keep your data safe. However, if the day comes and you need some additional support you can call 561.452.6132. I can remote in to your computer and help. I charge very little for this service compared to most. But remember – You have the ability to keep your computers safe from outside attacks.

PF

 

Blue Screen of Death (BSOD) fake virus

July 18th, 2017

I have mentioned online frauds like this several times in other posts.

Never, I mean NEVER fall victim to scammers that call you on the phone and say your computer is infected, or your Microsoft license needs to be renewed. If your screen gets a bogus pop up saying you are infected, simply reboot your computer to eliminate the warning. And never let anyone remote into your computer saying they will do a scan to fix your computer. Except, of course, a professional like myself. I can remove viruses and tune up your computer from a remote location. I have provided this service over 10 years and will repair your computer for a fraction of the cost of these  fraudulent support scammers.

This post is about one of the latest scams to take your money. It is called the fake BSOD or Blue Screen of Death virus.

BSOD is a term from the early days of MS Windows. The BSOD was a system crash that led to a blue error screen telling you to shut down. However, this new support fraud instructs you to not shut down, else your data will be compromised, deleted or otherwise ruined.

Out of desperation, many people panic and forget to call me. They dial the displayed toll-free number (toll free telephone? in 2017! Ridiculous) A “technician” answers and instructs you your computer has been infected with malware. They tell you to shut the computer off and contact a certified Microsoft technician for repair. It is explained it would take a week to fix and cost roughly $350. Of course this inconvenience is a lot to ask so, of course, the fake technician states “No problem, we can repair your machine remotely for $250. After the fee is paid ( which compromises your credit or bank card) time passes while it appears the computer is being fixed. In addition to taking money from you, the computer was never infected and the “technician” most likely installed a subpar antivirus program that will allow them to charge you a yearly fee. I had one customer tell me she asked the alleged technician if she was being scammed. The technician replied “No, but you are asking all the right questions” What an honest sounding company, they even said it was not a scam. If it was a scam they would tell you, right? Phony psychological comfort like this puts someone at ease and logic and sensibility get buried.

Remember: No one that ever contacts you via phone or email and says your infected can ever know if you are indeed infected. They are simply gambling with cold calling until they find an uneducated and trusting person. In addition, if you ever get a call saying your MS Windows license is up and you need to renew – this is never true. If they say they are from Microsoft and will clean your computer -this is never true. Microsoft is a software company and they do not clean infected computers. Only third party technicians like myself are qualified to do this work.

If something like this happens to you, call me and I will show you how to eliminate this fake virus. I will charge $25, much less than the hundreds these fraudulent companies charge. Even if you do have an infected computer our charge is $45 to $65 for a remote cleaning. Charging over $200 for a virus removal is ridiculous.

REMEMBER:

Never allow ANYONE to remote into your computer unless you ABSOLUTELY know they are an honest company. Read their website information, Facebook page, and talk to people who have used their service. Online scammers are getting VERY sneaky in their approach to finding was of separating you from your hard earned money.

Also REMEMBER

  • Never call the toll free number
  • Do not click anywhere within the popup window
  • Close the browser from Task Manager
  • Reboot your computer
  • If all fails call me!

Paul – Coast Computing 561.452.6132

7.18.2017

 

Fake Work at Home Internet Jobs

July 17th, 2017

I’m always getting questions from people concerning online businesses. Fromm time to time we will review some of these and let you know the REAL story. This week’s entry is about Feeder Focus. Thanks to John from https://aworkathomejobs.com/ for some good writing.

FEEDER FOCUS

You can’t help but wonder if sites like this is a scam or if you can actually make a solid, honest income, which is why I have put together this Feeder Focus review.

Feeder Focus, which can be found at feederfocus.com is a site created by Mutinda Kisio from Kenya.

Using the same methods as any other cash gifting program, Feeder Focus “focuses” on the recruitment of others in order to make money.

There are no tangible products that come from here and the site is also not complete, which of course raised a lot of red flags.

Their FAQ’s page is not even populated and the only testimonial is coming from the actual owner, which makes no sense.

Not the best start, but there’s always a target market for things and you might just be the perfect candidate.

Who This Is For

Not the best start, but there’s always a target market for things and you might just be the perfect candidate.

This is where Feeder Focus comes in and becomes the “solution” to their problems.

I mean, who doesn’t want or needs to make more money?

Probably every single person you know.

So those that are completely desperate to make money will of course give into this type of stuff, which will not be their solution to their financial problems.

Allow me to explain.

How Feeder Focus Works

The concept behind this program is very simple and brings nothing new to the table.

They do try to mock the business model of revenue sharing by using advertising as its product, but there really is no actual product attached to this site.

All this really is, is nothing but a front to have some type of product to offer when everything is done for the sole purpose of promoting your links and getting others to join so that YOU can make money.

You don’t recruit anyone, you don’t make any money, and yes, it is really that simple.

Will Feeder Focus Make You Any Money?

I’m sure we all want to make a one time $5 investment and turn it into $166,800 or even just $10,000 but I can promise you that that will not happen.

Just like Wealth Rising, which really thought they’d accomplish the same feat and didn’t even come close to making anyone rich.

Besides the owner, of course.

Then there are the Bitcoin MLM type sites that operate the same exact way, but focus on digital currency and still are kept afloat by new people joining.

Are you seeing the pattern of these types of sites?

Try to see the bigger picture or you will just be another contributor to another owner whose site will probably last no longer than 3 months like the rest.

Final Verdict: DO Not Join

It really doesn’t matter if this is a scam or not as it is only a matter of time before everything slows down and everyone jumps ship looking for the next best thing.

Feeder Focus might not be a scam but I can promise you that it will not make you the type of money you’re thinking.

This site offers nothing but hype and I will rather have you do an actual MLM with real products  and a better business model with something like Melaleuca.

This site is not even close to being a solid opportunity, so don’t waste your time here.

Conclusion

There are literally thousands of sites like this that come and go on a daily basis and not a single one of them will last.

Without a solid product or service, this type of stuff is designed for the owner to make what they can and most likely try to come up with something else to lure people into their new “opportunity”.

If you want to make money, it requires some learning, some hard work, and some dedication.

 

Net Neutrality and Privacy

July 5th, 2017

Last year Obama created new rules that regulated the way consumer data could be exploited by your ISP. They were scheduled to go into effect this December. President Trump scuttled this. The future of your broadband privacy is at risk more than ever.

Please contact your congressman/woman to protect the internet and don’t let our President allow companies like ATT and Comcast to control what we do on the internet. This is called net neutrality and is most likely the next thing president Trump and Congress will try to destroy. This is voted on each year, and this year could be the end of the open internet. Whether you like this Administration or not, set aside your political ideals and protest the end of net neutrality. This will only end up costing us little guys more cash to use the internet. You have let the administration take away our privacy, don’t let them allow us to be charged more for it’s use.

 

Windows 10 Shortcuts *

June 30th, 2017
Shortcut Description
Windows key Open and close the Start menu.
+1, +2, etc. Switch to the desktop and launch the nth application in the taskbar. For example, +1 launches whichever application is first in the list, numbered from left to right.
+A Open the action center.
+B Highlight the notification area.
+C Launch Cortana into listening mode.[1] Users can begin to speak to Cortana immediately.
+D Switch between Show Desktop (hides/shows any applications and other windows) and the previous state.
+E Switch to the desktop and launch File Explorer with the Quick Access tab displayed.
+H Open the Share charm.
+I Open the Settings app.
+K Open the Connect pane to connect to wireless displays and audio devices.
+L Lock the device and go to the Lock screen.
+M Switch to the desktop and minimize all open windows.
+O Lock device orientation.
+P Open the Project pane to search and connect to external displays and projectors.
+R Display the Run dialog box.
+S Launch Cortana.[2] Users can begin to type a query immediately.
+T Cycle through the apps on the taskbar.
+U Launch the Ease of Access Center.
+V Cycle through notifications.
+X Open the advanced menu in the lower-left corner of the screen.
+Z Open the app-specific command bar.
+ENTER Launch Narrator.
+SPACEBAR Switch input language and keyboard layout.
+TAB Open Task view.
+, Peek at the desktop.
+Plus Sign Zoom in.
+Minus Sign Zoom out.
+ESCAPE Close Magnifier.
+LEFT ARROW Dock the active window to the left half of the monitor.
+RIGHT ARROW Dock the active window to the right half of the monitor.
+UP ARROW Maximize the active window vertically and horizontally.
+DOWN ARROW Restore or minimize the active window.
+SHIFT+UP ARROW Maximize the active window vertically, maintaining the current width.
+SHIFT+ DOWN ARROW Restore or minimize the active window vertically, maintaining the current width.
+SHIFT+LEFT ARROW With multiple monitors, move the active window to the monitor on the left.
+SHIFT+RIGHT ARROW With multiple monitors, move the active window to the monitor on the right.
+HOME Minimize all nonactive windows; restore on second keystroke.
+PRNT SCRN Take a picture of the screen and place it in the Computer>Pictures>Screenshots folder.
+CTRL+LEFT/RIGHT arrow Switch to the next or previous virtual desktop.
+CTRL+D Create a new virtual desktop.
+CTRL+F4 Close the current virtual desktop.
+? Launch the Windows Feedback App.

[1] If Cortana is unavailable or disabled, this shortcut has no function.

[2] Cortana is only available in certain countries/regions, and some Cortana features might not be available everywhere. If Cortana is unavailable or disabled, this command opens Search.

* THESE TIPS IF VIEWED ON A SMARTPHONE ARE BEST VIWED IN LANDSCAPE MODE.

 

Ways to Keep Your PC Secure

June 29th, 2017

Use the latest operating system from Microsoft available when at all possible. When Windows XP was released, it was the greatest thing since sliced bread – but it was also full of security issues, which got much, much worse as time went on. Windows XP is now ranked one of the most unsecure and dangerous operating systems in the world. In other words, don’t use Windows XP; instead, use Windows 7, 8, or 10 – preferably Windows 10 – because each edition of Windows contains more security features to protect you from today’s threats.

Never, ever call a 1-800 number to “fix” a “computer problem” that spontaneously appears out of nowhere – especially while you’re browsing the Internet. These are scams. Examples include: you visit a website and all the sudden, your computer starts talking to you and says you’re infected; it then conveniently provides a 1-800 number to “fix” the problem. Another example: you visit a website and you experience a (fake) “blue screen of death” or a fake “firewall warning” message, along with a 1-800 number to “fix” the problem. Another example: you visit a webpage and all the sudden it lists your IP address, your country, location, and even your Internet Service Provider, then tells you to call a 1-800 number because you’re “infected”. These are scams for fake tech support with the average cost of $300 or more, plus the risk of identify theft. Once these scammers get your credit card, they will hound you repeatedly for more “fixes” to up the ante.

If “Microsoft” calls you on the phone and says your computer is “infected”, tell them to pound sand and immediately hang up the phone. I have another post that goes in depth about this. This is a scam for fake tech support, similar to the above example, with the average cost of $300 or more, plus the risk of identify theft. These bastards won’t give up easily and will likely call you repeatedly – you need to be resilient and simply hang up. Note that the real Microsoft Corporation does not solicit tech support over the phone. In fact, if any “technician” solicits you on the phone out of the blue and claims you have a virus, or that they want to get into your computer for this, that, or anything else – it’s probably a scam! Take note – if they usually solicit you – not you soliciting them – it’s probably a scam!

Backup your system regularly using disk images. Do the backups locally – not on the cloud – preferably on an external hard drive. Disk images are the best backup choice because they can restore both operating system and user files, whereas simple backup programs can only restore user files. Cloud backups are not ideal for disk images because it requires backing up the entire hard drive, which would take days, if not weeks to backup (and restore) over the Internet due to inadequate connection speeds. Cloud backups for the most part are simply a bad decision, cost money, and are not necessary – this is especially true when free cloud backups exist – but only for a small subset of data. Besides that, cloud backups cannot restore your operating system especially if the operating system is unbootable; disk image backups always have a bootable recovery environment (usually on CD or USB) in such cases.

Download Windows Updates and install them whenever they become available. Most operating system security issues are related to loopholes in the graphical user interface (GUI) of Windows. Therefore, you need to patch your system regularly, and as soon as the patches become available. If you are worried that a patch may install improperly and cause problems on your machine, you can use a disk image backup to rollback if necessary. There is no reason to delay patching your system.

Always keep your antivirus up to date and do a full system scan once in a while (example: every 30 days). Most antivirus programs will patch themselves automatically, but it’s important to check the interface to ensure the antivirus is running and that your system is protected. Also, be aware of fake antivirus and fake antimalware programs online – these are scams. Stick to brand names like Avast, Avira, Norton, Mcafee, and the like.

Don’t go overboard on “protection” with third-party utilities that claim to “protect” your system “more” than the operating system already does, as this will only serve to slow your computer down to a crawl. This is especially true if you are running Windows 10, which offers the most protection for PCs. The only protection you need is a properly configured firewall (the Windows Firewall works fine as it is), and real-time antivirus file scanning.

Don’t click on email attachments even if they come from “friends”. The rule here is: if you didn’t ask for it, don’t click it and certainly don’t install it, no matter how convincing the source may be. If your friend gets infected with malware, the malware will propagate itself by emailing everyone on his contact list with a convincing “personalized” message, usually asking to open some sort of email attachment (which then infects you) or click on a link (with the potential to infect you). Only open an email attachment if and only if you’ve expressly asked for the attachment ahead of time.

Never, ever download or install a program from a source you don’t otherwise have a trust relationship with. For example: if you click on a friend’s email link that contains a “funny video” and it takes you to a website you’ve never been to before, which then promises to ‘fix’ a problem for your computer, or provides you with something that seems too good to be true, don’t click it and don’t install it. Remember: if you didn’t ask for it, don’t click it and certainly don’t install it, no matter how convincing the source may be.

Should you download a program from a reputable website and install the program to your machine, always be careful to read through the EULA (end user license agreement) to make sure the program you’re installing isn’t going to spy on you or install third-party programs. Also, whenever possible, don’t install any “third party offers” that prompt you during a program installation (otherwise known as “bundled goodies”), as they are usually scams. Remember: if you didn’t ask for it, don’t click it and certainly don’t install it, no matter how convincing the source may be.

Always keep banking and other financial information secure, encrypted, and password protected. Should your system become compromised, you don’t want hackers accessing your financial data in a plain text file. Instead, use a password-protected and encrypted file to store such information.

Don’t use the same password on every website – this is one of the best things you can do online to help keep online data breaches under control. Use unique, strong passwords for every website you visit. This will lessen the chance of a hacker gaining access to one account, and then accessing all your accounts online. If possible, use a password manager like Roboform (That is what I have used over 10 years) that can encryp,t and keep track of all your passwords, and automatically fill forms for you.

When in doubt: hire a good tech that knows what he’s doing, is trustworthy and has your best interest at heart, and will always steer you in the right direction. I provide such a service. If you need to get in touch, all you need to do is contact me at:

Coast Computing

561.452.6132.

 

Legal Stuff

June 29th, 2017

______________________________________________________________

NOTICE.
PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY. BY ACCESSING THIS SITE AND ANY PAGES ON THIS SITE, YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS BELOW, DO NOT ACCESS THIS SITE, OR ANY PAGES ON THIS SITE.
COPYRIGHT ©2014 COAST COMPUTING. ALL RIGHTS RESERVED.
Copyright in the pages and in the screens displaying the pages, and in the information and material therein and in their arrangement, is owned by Coast Computing unless otherwise indicated.

TRADEMARKS
Coast Computing and the Coast Computing logo are trademarks and service marks of Coast Computing. Coast Computing may also claim trademark and service mark rights in other marks contained in the pages.

Conditions of Use
By accessing the Coast Computing bog you are indicating your acceptance of these Conditions of Use.

The Web Site may be used only for your personal, lawful research. You may not modify, adapt, sub license, translate, sell, reverse engineer, recompile or disassemble any portion of this Site.

Coast Computing is not responsible for:
the integrity, accuracy, completeness, timeliness, reliability, content or availability of any information or service (including, but not limited to, transmission, transmission methods, or manipulation of the information), either in its form initially provided or due to any documentation manipulation or reformatting of data that may occur, accessed or received by you as a result of your use of the Web Site; loss or damage to your records or data; or your use of, or results achieved from any information or service received by you as a result of your use of the Site.

NO WARRANTY.
ALL DATA AND SERVICES THAT ARE AVAILABLE TO YOU ON OR THROUGH THE WEB SITE ARE PROVIDED “AS IS””, “AS AVAILABLE”. COAST COMPUTING DOES NOT WARRANT THE ACCURACY, ADEQUACY OR COMPLETENESS OF THIS INFORMATION AND MATERIAL AND EXPRESSLY DISCLAIMS LIABILITY FOR ERRORS OR OMISSIONS IN THIS INFORMATION AND MATERIAL. NO WARRANTY OF ANY KIND, IMPLIED, EXPRESS OR STATUTORY, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF NON-INFRINGEMENT OF THIRD PARTY RIGHTS, TITLE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM COMPUTER VIRUS, IS GIVEN IN CONJUNCTION WITH THE INFORMATION AND MATERIALS.

LIMITATION OF LIABILITY.
IN NO EVENT WILL COAST COMPUTING BE LIABLE FOR ANY DAMAGES, INCLUDING WITHOUT LIMITATION DIRECT OR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, LOSSES OR EXPENSES ARISING IN CONNECTION WITH THIS SITE OR USE THEREOF OR INABILITY TO USE BY ANY PARTY, OR IN CONNECTION WITH ANY FAILURE OF PERFORMANCE, ERROR, OMISSION, INTERRUPTION, DEFECT, DELAY IN OPERATION OR TRANSMISSION, COMPUTER VIRUS OR LINE OR SYSTEM FAILURE, EVEN IF COAST COMPUTING OR REPRESENTATIVES THEREOF, ARE ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, LOSSES OR EXPENSES. HYPERLINKS TO OTHER INTERNET RESOURCES ARE AT YOUR OWN RISK; THE CONTENT, ACCURACY, OPINIONS EXPRESSED, AND OTHER LINKS PROVIDED BY THESE RESOURCES ARE NOT INVESTIGATED, VERIFIED, MONITORED, OR ENDORSED BY COAST COMPUTING.

The information herein is provided for informational purposes only. No guarantee of any kind is implied.

These Conditions of Use are governed by the laws of the State of Florida.

 

Fixing a Non-Responding Windows 10 Start Menu

April 4th, 2017

One of the most anoying bugs in Windows 10 is a non-responding start menu. If you click the start menu and it does not open, here are a few solutions that have worked for me.

Solution 1

  • Launch Task manager

Press the [Ctrl] + [Alt] + [Del] keys on the keyboard at the same time, or right click the Taskbar, and select Task manager.

 

  1. Run a new Windows task

When the Task manager window opens, click the More details option to expand it, then select Run new task from the File menu.

 

  1. Run Windows PowerShell

When the Run new task dialog box opens, type powershell, tick the box for Create this task with administrative privileges and click OK.

 

  1. Run the System File Checker

Type sfc /scannow into the window and press the [Return] key. The scan may take some time and will end with one of three results. Windows did not find any integrity violations and Windows Resource Protection found corrupt files and repaired them mean there are now no corrupt files, but Windows Resource Protection found corrupt files but was unable to fix some (or all) of them indicates a problem.

In this latter case, type (or copy and paste) DISM /Online /Cleanup-Image /RestoreHealth into the PowerShell window and press the [Return] key. This will download files from Windows Update to replace the corrupt ones and, again, this may take some time.

 

Solution 2:

Reinstall all Windows apps

Downloading and reinstalling all Windows 10 apps reportedly fixes a stuck Start menu. This isn’t as drastic as it sounds — ‘Windows apps’ are the ones built into Windows 10 and available from the Windows Store. They used to be called ‘Modern’ apps and, before that, ‘Metro’ — Microsoft just changed the name with Windows 10.

Better still, the reinstallation is automatic and should only take a few minutes. The process might delete any data you have saved in these Windows apps, though, so backup anything important before you begin.

Apps that store data online, in Microsoft OneDrive or as files in a separate folder (such as the Photos app) should be unaffected.

Warning: Recent reports indicate that this process may cause some Windows Store apps to stop working, so be mindful of this before continuing.

  1. Reinstall Windows apps

Launch the Task manager and open a new PowerShell window with administrative privileges, as explained above.

When the Windows PowerShell window opens copy the line below and paste it into the PowerShell window by simply right-clicking at the blinking PS C:\WINDOWS\system32> prompt, or by pressing [Ctrl] + [V] on the keyboard:

Get-AppXPackage -AllUsers | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register “$($_.InstallLocation)\AppXManifest.xml”}

Wait until the app download and installation process completes — ignore any red text that appears — and restart Windows.

 

Solution 3:

Create a new user account

If reinstalling Windows apps doesn’t work, creating a new user account usually will. If you’re currently using a Microsoft account, your settings will also transfer to the new account once you upgrade it from the default local account. You’ll need to transfer your local files from one account to the other in all cases, though. Your installed software won’t be affected.

  1. Launch Task manager

Open Task manager (see above) and select Run new task from its File menu.

Tick the box for Create this task with administrative privileges and type net user NewUsername NewPassword /add in the box.

You’ll need to replace NewUsername and NewPassword with the username and password you want to use — neither can contain spaces and the password is case sensitive (i.e. capital letters matter).

 

  1. Log into the new account

Restart Windows and log into the new user account. The Start menu should now work, so you can change the new local account to a Microsoft account, and transfer your files and settings.

 

Solution 4:

Refresh your PC

As a last resort, you can ‘refresh’ your Windows 10 installation, which is much the same as reinstalling the operating system. Your documents won’t be affected, but you’ll need to reinstall any applications that aren’t part of Windows.

 

  1. Restart Windows in Troubleshooting mode

Close any open applications and press the [Windows] + [L] keys to log out of your Windows account — or just restart Windows. On the login screen, click the Power icon at the bottom right, hold down the [Shift] key and select the Restart option.

 

  1. Reset your PC

When the blue Choose an option screen appears, click Troubleshoot, followed by Reset this PC. finally, click the Keep my files option and follow the on-screen instructions.

Run the Anniversary Update

Microsoft rolled out its second major update to Windows 10 in August 2016, known as the Anniversary Update.

The company hasn’t stated whether it would fix any of the Start Menu issues specifically, but a few visual tweaks were made which could iron out the problems.

The Anniversary Update should be rolled out to your machine automatically, but if it hasn’t landed yet you can force it to come through now.

Simply go to Settings and select Update & security.

Then click on the Check for updates button and the Anniversary Update should come through.

Another major update, dubbed the Creators Update, is also due to roll out on April 11. This may also include some fixes for the Start Menu.

 

PF

Malvertisements

December 12th, 2016

Advertisements that not only look legitimate but also contain malicious code in an effort to infect systems are known as a Malvertisements. Cyber-criminals use Malvertisements to try to spread their malware to a greater audience of users by submitting malicious ads to online advertisement networks.  The ad networks are usually not aware of the cyber criminal’s intent and approve non-malicious ads, initially submitted by the criminals.  Once the ad is approved the cyber criminals switch out the legitimate ad for the malicious one, right under the noses of the ad networks.

The networks fail to check modifications made to the advertisements and therefore allow the Malvertisments to be shown on their customers’ webpages. The ad networks also quickly cycle through different advertisements with each view of the customer web-page. The dynamic scrolling of ads makes it difficult not only to flag the existence of a Malvertisement circulating on a network but also identifying which advertisement is the culprit!

Examples

Here are a few examples of Malvertisements in action:

July 2010: TweetMeme.com

  • Malicious Advertisements targeted site visitors after a rogue advertiser spread a malicious advert through y5-media.com.  The result was users redirected to drive-by attack sites that installed fake antivirus malware

April 2010: Facebook Farm Town Game

  • An advertisement served on a popular Facebook game was delivering Rogue AV software, claiming that the user’s system had been infected with malware and their product could help them

May 2012: Malvertisements found on Blogger Website

  • Adverting network, Clicksor, was found serving malicious advertisements to users of a Blogger website leading to the BlackHole Exploit Kit

As you can see, Malvertising happens all the time; and while the effort from the community to fight these attacks has advanced greatly over the last few years, the threat is far from gone.

 

Using a product like Malwarebytes Anti-Malware can help with these type of infections.

Koobface Virus and other Popup threats

September 26th, 2016

What is Koobface?

Koobface is a computer worm which spreads via social networking sites. Koobface is being “invited” onto many computers through infected links in Facebook.

Most social networking scams spread on social networks because users inadvertently recommend them to their friends and within their circles. Koobface actively infects your PC and then it deliberately spreads itself via social networking sites.

Koobface knows how to create its own social networking accounts so that it can aggressively post links helping it to spread even further.

The most common infection method is through a fake video player. If you click on one of the links which Koobface has posted, you’ll end up on a fake web page – typically a fake YouTube, Facebook Video or a fake Adobe Flash download page. They might offer a clip to watch. However, they claim first you need a Flash update. The video player popup update notice is fake, it’s actually just an installer for the Koobface virus. The only real Adobe Flash download page is found at “http://get.adobe.com/flashplayer/”  If you will notice the link presented to you as the download address, it is different.

 

Important Side Note:

As a side note anytime you go to a website that asks you to update your Flash Player, it most likely is a false infected link you are being given. If you do, however, get to a site that inundates you with a pop up that doesn’t seem to close immediately do the following:

-Do not touch any browser window to close it or try to browse further.

-Immediately press Ctrl-Alt-Del (Ctrl-Shift-Esc in Vista or Win 7) and bring up Task Manager and forcibly end all instances of iexplore.exe, if using Internet Explorer, or, the executable for the browser you are using. –or– -Go to Start/Shut Down and restart the PC without touching any browser windows.

-If you have used task manager to close browser instances, reboot the machine.

-Then go to Control Panel/Internet Options and delete all temporary Internet Files and cookies. If you are using an alternate web browser, open the browser settings to do the same – delete the local cached files and cookies.

-Perform a full scan with your virus program or a third party malware scanner like Malwarebytes anti-malware.

The above steps should prevent the infection from taking hold if you suddenly receive random pop ups from Koobface or any other program trying to infect your computer by posting false advertisements. Remember: No one knows if your computer is infected and if a popup says you are infected, it is almost always a lie.

 

Back to Koobface:

Koobface is part of a zombie network that allows cyber crooks to be able to instruct your PC to download and run any other software they choose. The Koobface worm allows cyber-criminals to track and record sensitive data about you, for example, it can see what logins and passwords you enter on particular websites, and it can discover credit card information and other banking information. In addition, this malicious worm can display vague ads convincing you to install fake anti-virus programs and other malicious software.

 

How to avoid getting infected in future:

– Keep your patches and your anti-virus up-to-date. This won’t stop all threats, but it will stop most of them, including Koobface.

– Don’t be tempted by links on social networking sites just because they look cool. A little caution goes a long way.

– Never download video player software just because a site offers you an update. Reputable sites will explain what you need so you can seek it yourself, rather than trying to trick you into downloading what they want.

 

After removing any malware, especially zombie malware, it’s a good idea to change passwords on all your on-line accounts. And keep an eye on your bank statements, just in case.

 

Also view our article dated 11-18-2014 called “Your computer is infected”

 

If you are unsure or need assistance, please call Coast Computing 561.452.6132. We can help you remotely while you watch.

 

 

 

 

Latest Virus News

September 7th, 2016

People have asked where can they find the latest information about recent viral attacks. The following site has an updated page that will inform the reader to the latest attacks, and allows you search for specific attacts by name. Of course if you have a nasty infection that you cannot seem to eliminate, you can call us at 561.452.6132 and we can remote into your computer. Beware of boiler room calls when a person proclaims to know you have a virus, will connect to you, and when they (mostly falsely) say they can repair your computer for $250. When you decline because of this outrageous price, they will then proceed to infect your computer further so that you will panic and pay them what they want. We perform this service for under $80.00. Sometimes less than $65.00. Don’t be scammed by people claiming to be from Microsoft, or a Microsoft partner. Microsoft has never performed virus removals. If you ever do fall prey to one of these services, be away they typically install a time-delayed virus that will re-infect your computer at a later time so they can again rob you of your hard earned money.

 

Site: Updated Virus Information Site

 

Paul

 

Beware of Microsoft Phone Scam

February 1st, 2016
  • Microsoft will never call you to let you know your computer is having problems. These scammers are saying “we are from the Windows team” or “We are Windows calling” or something like that, to scare you into letting them into your computer. These “fake technicians” AKA “Computer Terrorists” as I like to call them, always usually have a foreign accent.
  • Be careful when you Google for help, be sure the companies are reputable and be sure you are calling the right companies. Nowadays, you can Google “Microsoft support” and get a fake company! This is VERY common.
  • Do not call the  numbers on pop up ads when you are browsing the internet, these are fake alerts that you have a virus.
  • Never let anyone remote in your computer that called YOU. If you called me for an appointment, this is ok or calling a local computer repair store, but just someone calling you out of the blue is NOT OK.
  • If you called them and are not sure, just hang up and call ME and I will let you know if it’s a scam or real. 561.452.6132.
  • If your guts says no or you feel weird, hang up or turn off your computer immediately. Even if you allowed them in your computer, they will say things to scare you into paying. Turning off the computer and calling a professional IT company or me immediately is what I recommend. Remember, if they are in the computer and you don’t pay, this is when this happens…

Destruction and deletion of data, Computer inoperable

  • Do they steal your data? This is not common but a maybe. They mostly they want to get your credit card and charge you for fake services. If you did this, you can call your credit card company and they should charge back that service. Remember if they are remoted in and you don’t pay, it is TOO LATE. They will destruct data or lock you out of your computer!
  • Do they destroy your data? YES!! Usually this happens if you ask for your money back and they are remoted in. This just happened to one of my clients. He said he wanted his money back and i went to see what happened, all data gone.
  • Do they lock you out of your computer? Yes, and sometimes they put a virus on your computer if you don’t pay or say you want your money back

Thanks to Lisa of “Call That Girl”

How Cyber Criminals Use Social Media

January 23rd, 2016

All Facebook users should read the following link:

https://www.malwarebytes.org/articles/hacking-your-head-how-cyber-criminals-use-social-engineering/?utm_source=double-opt-in&utm_medium=email-internal-b2c&utm_campaign=EM-Jan2016newsletter&utm_content=main-article

 

 

 

Evernote

January 20th, 2016

During the past month many have asked what is happening to Evernote. Instead of explaing this, a blogger named Thorin Klosowski has an excellent article in the following link:

How to jump-ship from Evernote-And Keep Your Data

 

Check it out.

 

Are Your Devices Worth Repairing?

March 8th, 2015

This is a question I am often asked concerning mobile device repair.

With the help of a few questions you can determine whether or not your mobile device it is worth repairing. Just remember three factors: value, age, and cost of parts and labor. If the device is out of warranty or an insurance policy, take a look at this article.

1. Cost of the Mobile Device
What was initially paid for the device, if it is only a couple months old? If it is a couple years old, how much is a used device of the same model number on EBay? Is the device in good condition, or is the screen scratched or the case damaged (liquid or otherwise)? If it’s already in rough shape, determine that into the value variable you’ve gotten from researching online retailers or auction websites.
If it is an older device and in rough physical shape, it may not be worth repairing. Other factors include age and cost of repair.

2. Age of the Device
As mobile technology evolves, the content that is served to the device evolves as well. One example is how older websites usually appear very small on modern display resolutions, and they often look extremely plain and basic.
Another example is many Android devices with versions below International Classification for Standards (ICS) are still in the hands of consumers. Newer apps being developed may not be compatible with anything below ICS, which means the consumer will eventually have to unlock their device to be able to flash a newer Android version into ROM for use with newer apps. (For the average consumer this means purchasing a new device).
While the operating system version of the device is important, the initial cost of the device is also important. For instance, if the initial retail price of the device is quite low compared to other devices in the same size range, age is more important because a lower retail price typically indicates lower quality, and lower quality means it won’t last as long or run some newer apps.

3. Cost of Parts and Labor
Next you’ll need to consider the parts that need replacement. How much will you need to pay, (including tax and shipping)? For an older device sometimes replacement parts will be more expensive. Not always, but sometimes.
How long will it take you to repair the device? If you’re not familiar with the model, have you researched disassembly and repair, and then reassembly? This is the biggest factor in mobile device repair. Taking apart and reassembly typically takes considerable time.
Factoring Everything
Now that you have considered the above what is the estimated value of the device given the initial price, the current price for a used device in similar condition, and it’s age? Next, what is the cost of parts and labor? How much does the cost of repair compare to the value of the device?
Here is where the decision becomes more complex because we’ve only factored in the static value of the device. What we haven’t factored in is the value of the device to you. Was it a gift? Does it have data stored that wasn’t backed up? Are you willing to pay an extra fee to recover your lost data?
With an older device, not only could it suffer damage while repairing it,
(e.g. components or case have become brittle), but it could be at the end of its lifespan. If so, you might be spending money on a repair that might only last a few months to a year. On an older device you will also have an older operating system that might be less compatible with newer apps.
In conclusion, when trying to decide whether to repair or purchase, consider the following:
1. the initial cost of the device versus a new device
2. The age of the device
3. The cost of parts and labor, including data restoration.

I can always help you make these decisions. Give us a call for help.

PF

 

New Computer? Start off with PC Decrapifier

February 21st, 2015

When you purchase a new desktop or laptop, they usually come preloaded with a bunch of unwanted software. Speed up your new investment by running PC Decrapifier. It automatically finds most of the bloatware that comes with the box. It then allows you to uninstall it with a few clicks.

www.pcdecrapifier.com

“Your computer is infected” fake anti-virus pop-up alert scams

November 18th, 2014

“Warning—your computer is infected! System detected virus activities. They may cause critical system failure. Click here to get available software.”
You may be one of the numerous people who have received similar pop-up alerts. They commonly appear after you open an email attachment, download files, visit websites programmed to download malicious software or click on a pop-up advertisement.
Consumers be wary of fake anti-virus alerts. NEVER click on pop-up anti-virus alerts.
Scammers often use the names of well-known companies that specialize in computer software to gain your trust. The pop-up advertisements aim to mimic genuine warning alerts generated by computer security software.
The software or “free scan” offered in pop-up alerts often doesn’t work or actually infects your computer with the dangerous programs it is supposed to protect against.
This scam aims to either charge you for bogus software and/or obtain your personal information. Once your computer is infected, the scammer commonly gathers personal information to steal your identity or to sell it to other criminals.
Although the majority of anti-virus pop-up alerts are fake, there is an off-chance that you have received a legitimate virus warning. If you are unsure whether it is a genuine warning, check the official virus page of your anti-virus vendor or give us a call at 561.452.6132.

Warning signs
• Fake anti-virus spyware programs often generate more “alerts” than the software made by reputable companies.
• You may be bombarded with pop-up alerts, even when you’re not online.
• Scammers commonly use high pressure sales tactics to convince you to buy NOW!
• The alert may request you to pass on the “warning” to “others in your address book” or “everyone you know”.
• Broken or oddly phrased English.
• The message is not addressed to a specified recipient, instead it is addressed to the ‘account holder’ or uses another generic title.
• If your computer has been infected, it may dramatically slow down. Other signs that your computer has been infected include new desktop icons, new wallpaper or your default homepage is redirected to another site.
Protect yourself
• NEVER click on pop-up alerts! Don’t even click on the cross to delete the pop-up alert as this may result in getting more pop-ups. Instead, hit control + alt + delete to view a list of programs currently running and delete the pop-up alert from the list of running programs.
• Use reputable pop-up blocker software to avoid pop-ups on your computer.
• Keep your computer updated with the latest anti-virus and anti-spy ware software. Also use a good firewall.
• NEVER open email attachments unless you can verify the sender and you trust them.
• NEVER click on the links in spam email.
• NEVER rely on the contact details provided in a pop-up message. Instead, find your anti-virus vendor’s contact details through an internet search.
• Avoid questionable websites. Some sites may automatically download malicious software on to your computer.

UNCHECKY

October 24th, 2014

In following our “Installing programs without installing unwanted malware” posts I have found a program that can help you while installing freeware. Unchecky (www.unchecky.com) is a free app that automatically unchecks every adware checkbox in most installation dialogue boxes. This program will help prevent the unintended installation of adware.

 

Windows 8.x Graphics

August 21st, 2014

Out of some 400+ Windows 8.x installs, the main complaint other than a lack of the start menu is complaints about the video. In Windows Vista and Windows 7, Microsoft had the Aero graphics interface. Windows Aero featured a translucent glass design with subtle window animations and new window colors. Aero was discontinued with Windows 8.x. Because of this, graphics display for some users result in a sometimes blurry graphics and a somewhat unappealing text rendering.
The top complaint is text. In windows 7, under the Personalize | Color setting, there was an advanced tab that allowed you to change font and window appearance. Along with Aero, this setting has been removed. Until Microsoft re-codes these settings, about the only thing that can be done is to turn to a third party application. A company called Stardock (www.stardock.com) has a product for $10 called Stardock WindowBlinds that might help some of you dissatisfied with Windows 8.x graphical interface. Stardock is the company that produced one of the best third party appscalled Start 8,that brings back the lost start menu in Windows 8.x. They also make a program called Launch 8that adds a stationary dock to the Windows 8 start screen much like a Mac.
Stardock WindowBlinds so far appears to be the best third party app for customizing the graphics and text on the Windows 8.x desktop. There are four main aspects of your windows that you can modify: style, color, texture, and background. Styles are preset schemes to make your windows look new. Each style contains a sub style that will modify a graphic or tailor your windows and taskbars to be more in line with your current version of Windows 7, Vista, or XP. You can also add or change a texture overlay complete with various color hues. WindowBlinds enables users to customize the Windows desktop interface with skins. Skinnable elements include the start panel, taskbar, window frames and control buttons. Personalize any of the default Windows themes or any skins downloaded from WinCustomize.com or create your own skins. WindowBlinds also includes SkinStudio, a powerful skin editor application that enables you to design your own skins. Customize only the parts of the Windows interface you want to change and SkinStudio will do the rest. This makes it easy for inexperienced users to create a great skin quickly, while advanced users can still enjoy designing every aspect of the windows interface.
If you are having trouble with graphic engine in Windows 8.1, miss your Xp, Vista, or Windows 7 graphical experience, try Stardock WIndowBlinds. It has a free trial, after that it is less than $10 to purchase. Trial download at http://www.stardock.com/products/windowblinds/download.asp.

Facebook Security

July 13th, 2014

In this note I am going to explain Facebook’s latest security features. The first thing is your privacy settings. To see them, click the padlock icon at the top right-hand corner and a drop-down list containing the most popular privacy settings is displayed. At the bottom of this drop-down box is a “See more settings” link for more privacy tools.
Before you start changing your privacy settings, you should check how much information and with whom, you are sharing. Click the arrows next to “who can see my stuff?” and “What do other people see on my timeline?” then click “View as”. At first, you’ll see what your profile looks like to people you don’ t know. Make note of any information you do not want to share with others.
Now that you know what you are sharing, you can do something with that information. First, limit who sees what you post. Status updates can include what you are doing, who you are with, and where you are. It’s a good idea to limit that to people you know. Click the privacy icon and click the arrow by “Who can see my stuff?” and under “Who can see my future posts?” select Friends.
You want to be careful about what you post about yourself, however, what about friends who tag you in their posts? You can set Facebook to alert you when that happens, and if you are happy with what the have posted, you can allow it on your timeline. If, not, you can choose to un-tag yourself. To get started, click “See more settings,” then “Timeline and tagging.”
There is an option on this screen called “Review posts friends tag you in before they appear on your timeline?” click “Edit” and select “Friends”. For more security select “Only me.” Next, by “Review tags people add to your own posts before they appear on Facebook?” click “Edit”, then “Enabled.”
From now on, when someone tags you, you will be asked to review the tag. This appears as a notification or you can check manually by clicking the “Privacy Icon, expanding “Who can see my stuff?” and selecting “Use activity log.” Click “Tag review” to see things you have been tagged in, then “Add tag” to be associated with it (which other people can see), or “Ignore” to keep it off your timeline.

Choose who can friend you and find you in a search:
It can be dangerous to let everyone see all your information. From the privacy menu expand “Who can contact me?” then under “Who can send me friend requests” you can choose only “Friends of friends” that is,people your friends know, to be able to send a friend request.
If you want to make sure your account is only accessible to people you know you can limit who can search and find your account. From the privacy menu click “More settings.” Next to “Who can look you up using the email address you provided” and “Who can look you up using the phone number you provided,” click “Edit” and select “Friends” or “Friends of Friends.” If you do not want to be found in a Google search, From the same screen as before where it says “Do you want other search engines to link to your timeline” click “Edit” and make sure the box next to “Let other search engines link to your timeline” is unchecked.

Additional Security Measures
You may want to make sure your online activity is secret. This is where secure browsing happens. When on Facebook, make sure the address bar begins with https:// and not http://.
Enable “Login notifications” from the Security Settings menu to notify you if someone tries to log in to your account. This will email or text you if your account is accessed from a device you have not used before. There is also a list of all the devices you have allowed access under “Recognized Devices.”
Of course the best security measure is to have a strong password.
For more security enable “Login Approvals.” Whenever you log in from a new device, a message is sent to your phone allowing you to approve the login. Make sure you pay attention to any notices you receive telling you someone has logged into your account. If you do not recognize the device then change your password. To do this go to “More Settings”, “General” and click “Edit” next to “password.

This note has explained some of the new security feature implemented by Facebook and how to use these features for a more secure Facebook experience.

Googling for software can bring you junkware

June 27th, 2014

A call comes in, the client says they downloaded Adobe Reader and now they have Junkware all over their computer. Their search engine is messed up and they have pornographic ads on their Google page.  Just downloading an easy program like Adobe can do this to your computer, but come on….Adobe Reader is from Adobe, right? Of course it is, but its not at the top of your Google search. It’s about 4 places down. See the picture below?

One

It shows you a basic search in Google for Adobe Reader. The real one is the 4th one down, under the “Ads”. This is sometimes hard to notice. I know this because the website is actually an Adobe website, not Adobereader.com or some other fake site. Sometimes it is very tough to tell these days!

However, Adobe did download and works, so what happened?

You did get Adobe Reader, but it was bundled in a “download manager” filled with adware, spyware and sometimes Trojans! Sometimes you can download up to 20 programs! I have spent over an hour  uninstalling this Junkwareware.

So please be mindful when Googling and if you are not sure, don’t do anything and call us to install the program(s) properly. This will end up being cheaper than a virus removal.

Windows 7 vs Windows 8.1

April 25th, 2014

Many of our customers have made the move to Windows 8. Now that Windows XP will no longer have security patches created, one of the biggest concerns is do I move from Windows XP to Windows 8.1 or should I use Windows 7? Windows 7 was such a good operating system that Hewlett Packard brought back a line of Windows 7 machines during 2014. The demand for Windows 7 over Windows 8 was so great, they again began making Windows 7 computers!

Since Windows 8.1 release, if you wanted Windows 7 it would have to be a custom build or you could “downgrade from Win 8.1 to Win 7 at an additional cost. We at Coast Computing have built many Windows 7 boxes for customers not wanting to go through a Windows 8 transition. So, what is the answer, Windows 7 or Windows 8? (now Windows 8.1) What is the difference between Microsoft’s operating systems?  Below are a few key differences.

 

Boot time: Windows 8.1 boots significantly faster than Windows 7. Windows 7 can take 2 to 3 minutes to boot when started, however, Windows 8.1, when configured with the hardware, can boot up as fast as 8 to 10 seconds. WOW!

 

Performance: Windows 8.1 is redesigned and uses simple colors and fewer visual effects, drawing fewer resources than Windows 7’s Aero Glass effect.

Windows 8.1 performs better than 7 in everyday use and benchmarks. Extensive testing has revealed improvements in tests like PCMark Vantage and Sunspider.

 

Features and Interface: The interface for Windows 8 has a steeper learning curve compared to Windows 7. However, using system tweaks Coast Computing can configure your Windows 8.1 computer to be a more friendly experience. Connecting to a home network is easier in Windows 8.1, and mobile device management is improved. Backing up your data in Windows 8.1 is improved along with security enhancements (see below). Also, if you have a touch screen on your laptop, the Windows 8.1 experience is surprising.

Other features of Windows 8.1 include: OneDrive is free online storage that’s built into Windows 8.1. Save documents, photos and other files to OneDrive automatically, similar to Google Drive. Internet Explorer 11 is built for touch—now with larger tabs, simpler controls, and fluid response to gestures. If you use Internet Explorer, you should always use the most current version. Skype is now owned by Microsoft, so it is now integrated within the operating system. In addition, Windows store is the place to pick up both free and paid apps. Although much smaller than the Apple store, you can still find decent apps to run under Windows 8.

 

Security:  Windows 7 and 8.1 share security features. Both use BitLocker Drive encryption, but 8.1 enables it automatically. You can download Microsoft Security Essentials free for Windows 7, Windows 8.1 has this protection built into the operating system. Windows 8.1 also includes support for secure booting on UEFI systems, making it harder for rogue malware to infect the boot loader.  PCs running 8.1 can also automatically connect to Virtual Private Networks

 

In summary, Windows 7 has a shorter learning curve to those who have been using Windows XP, however, The improvements to Windows 8.1 make the operating system an excellent candidate for laptops and computers with touch screen capabilities. It is also a more secure desktop system

XP End of Life

April 24th, 2014

As you are all aware, Microsoft has discontinued support for MICROSOFT XP. What does this mean for you millions of users happy with MICROSOFT XP, and those who do not plan to purchase a new computer at this time?

Microsoft has released bulletins scaring you into thinking your data is now compromised, and the only fix is to spend money to upgrade to Windows 8. THIS IS NOT NECESSARILY TRUE!

Although upgrading from MICROSOFT XP is inevitable, there are steps to take that can secure your computer and allow you to continue using MICROSOFT XP until hardware component(s) break down.

The first step in securing MICROSOFT XP is to stop using Microsoft’s Internet Explorer browser. Without monthly Microsoft patches, this browser has become unsafe. Switch to Google Chrome or Firefox.

Next, you need to uninstall  (if used) Microsoft Security Essentials and Outlook Express. These programs will either not work correctly, or have security issues that relied on updates. Install a third party anti-virus such as Avast or AVG.

If you are using Microsoft Office 2003, beware this program is also now open to hacking vulnerabilities. You can switch to Open Office, and still have the ability to modify your MS office 2003 documents. Uninstall MS Office 2003.

 

Unless there’s a massive vulnerability that security software can’t protect against, Windows MICROSOFT XP should still have a long life in front of it. As long as security software, drivers and other applications have Windows XP updates for them, the operating system can continue to be used securely and reliably. At some point you’ll find that new hardware and software won’t support the OS, and updates stop coming from manufacturers, but until that day you don’t need to upgrade.

Installing programs without installing unwanted malware – Part 2

February 4th, 2014

Potentially unwanted programs are often proposed during the installation of software. They may be present in the form of toolbars that can change the home page of your browser, which can slow internet searching.

To avoid the installation of these programs polluting your computer, it is essential you follow these tips:

  • Always download a program from the official link, or a trusted site
  • When installing a program, do not click too fast [Next] without paying attention to Terms of Use and third-party programs available
  • If third-party programs are available (toolbars, etc.) uncheck all checkboxes about them
  • Enable detection of PUP’s (Potentially Unwanted Programs) in your antivirus

Installing programs without installing unwanted malware – Part 1

February 4th, 2014

In a previous paper we explained companies will try and install unneeded programs within legitimate downloads. This is a classic problem when you install a  program from an internet site.  To generate commerce, other programs are included, by default, unless you specifically act to not install these additional programs. Most of these are rogue programs with hidden  spyware and adware code, others are toolbars from Google or Yahoo.

I have included a typical download from CNET download.com. for an example. This is a popular site for downloading programs to for your PC. In this example we want to download a program called Revo Uninstaller. This is a program for uninstalling programs from your computer, and is a more thorough program than the one included with Windows.

We start with the download link: http://download.cnet.com/3028-2096_4-10687648.html?c=SEMYAHOO&s=fivemill&pid=dlcom_sem&aid=Revo%20Uninstaller%20Free-b&dlc=n&part=fivemill

This brings up the following dialog:

1

Clicking the run control button takes you:

2

We then click next and we go here:

3

If you were to select Recommended Express Installation you will wind up installing numerous unwanted programs. Click the Advanced Installation to view these programs. Always select advanced Installation to monitor and select what you want to install. When we select Advanced Installation we get these entries:

4

Notice there are FOUR additional programs that would have been installed by default!

Uncheck these boxes so it looks like this and select Next Step.

5

Now, this box appears, and it is misleading. It appears you are accepting the Terms of Service for Revo Uninstaller, when you are really accepting to install a program called Wajam. This is nothing more than a social search engine that will spy on your computer use. Select Decline, and the next box pops up with a similar advertisement.

6

7

Again, select Decline or you will install RealPlayer, a program not used since the 1990’s. Your computer already has a media player so you do not need another.

8

Decline this box also. MyPCBackup is a program you do not need.

9

 

FINALLY. The one program you wanted is finally downloading. The next screen that appears, allows you to install the one program you were after.

10

Remember, whenever you install a program from the Internet, always decline unneeded programs and select Advanced Install, if available, so that you do not clutter your hard drive and memory with unneeded programs.

Something new: A new CNET download had the same boxes as listed above, however, the decline button appears grayed out giving the impression it is not available. This is false. You can still click the decline button. It is functional, it just looks like it is not in focus. TRICKY

PF – 6.5.13

Email Phishing for IRS and Paypal

August 23rd, 2013

During the month of August, 2013, we have noticed two phishing attempts from people trying to get personal information through emails appearing to come from the IRS and PayPal. Remember, neither company will ever send a personal email to you asking to update your account. If you do receive such an email, forward the entire mail to the appropriate address listed below:

phishing@irs.gov    or    spoof@paypal.com

I contacted each and got the following:

From the Internal Revenue Service:

Please note that the IRS does not contact individuals by email.

Therefore, if you received an email claiming to be from the IRS it is a phishing attempt and should be reported to us.

 

From Paypal:

  • to stay safe from PayPal fraud or scams:
  • Log in safely: To log in to your PayPal account or access the PayPal website, open a new web browser (e.g., Internet Explorer or Firefox or Chrome) and type in the following: https://www.paypal.com/
  • Check the email greeting: Emails from PayPal will always address you by your first and last name or the business name associated with your PayPal account. A PayPal scam email may include the salutation “Dear PayPal User” or “Dear PayPal Member”
  • Look out for attachments: PayPal emails will never ask you to download an attachment or a software program. An attachment found in a PayPal scam email will often contain a virus that can harm your computer or compromise your PayPal account
  • Never give out personal information: If we require information from you, we will notify you in an email and request that you enter the information only after you have safely and securely logged in to your PayPal account.

PF 8.23.13

Windows Home Server for business

June 14th, 2013

This article is targeted to those clients requiring a modest network server environment of 10 or less clients.

In over 24 years of supporting network platforms many clients have requested an affordable total cost of ownership (TCO) server setup. This is subjective to the size of the organization and needed infrastructure, however, I am specifically writing to businesses of fewer than 10 employees.

I will typically talk to these small business owners (this process is referred to as a network discovery) before creating an Request for Proposal (RFP) outlining cost. Creating an RFP for a server environment utilizing typical server software would  involve costs of thousands of dollars for the hardware and software plus the charge for setting up, installing, configuring the system, and training employees how to  access programs and files.

Even with the most modest server implementation, a complete system can cost over $6,000. This price point often shocks many micro business clients. Often these are 3-10 users in a small startup service or retail industry. They need to share an accounting system, payroll and database system,  plus use internet and maybe a proprietary software program. These clients typically have tight budgetary requirements because of startup or upgrade budgets.

Microsoft Windows Home Server (WHS). When I first discovered that WHS Server was intended for the home user, but was, however, built on the Microsoft NT line of server software that  utilizes the same security features  the US Department of Defense uses, I knew there was plenty of power on this seemingly modest offering.

By comparison, Microsoft Small Business Server is a package suite of server products that many small businesses use. This software package averages $2500 depending on the number of users. WHS software retails for $100 but can be purchased with discounts online for about $58 including shipping. It allows up to 10 simultaneous users and it is designed to be installed on workstation hardware that can easily be hundreds, if not thousands of dollars under a typical server install. No need for expensive server grade hardware. Even though Microsoft has discontinued development of this product, the availability and price make it an excellent value. The current version for purchase is a fantastic value, even when future upgrades will no longer be available. If the system configured for your environment works correctly, who needs to or why would you want to upgrade the operating system(OS)?The WHS OS can continue with your company for many years. When, or if you expand, you can easily migrate to a more powerful server configuration.

Windows Home Server installs in under an hour. It is a simple, straight forward installation. I typically use the default setup. Once installed WHS guides you through setting up all the server functionality. An install takes about 10 minutes for each of your client computers,  you run the connection software from the install CD, log onto the server, and then setup nightly automated backups to the server. The setup automatically  downloads  Windows updates not only for the server but for each client.

WHS backs up the operating systems of each computer, the drivers and the data. It has an intelligence that only backups up each file only once, even if that file shows up on many separate computers. This feature saves space on the server hard drive because typically many files are common to more than one system and/or user.

You then add users, which takes literally less than 1 minute per user. I then make a private folder for each user similar to what happens with individual profiles in a Windows Desktop OS. The server has by default a public folder, music folder, videos folder, pictures folder and software folders, automatically setup. I then set up a data file sub-folder in the public folder so all users can easily share files in one location.

Next you go through the 3 or 4 wizards that finalizes the server configuration.

The user settings offer to:

  • Turn on automatic updates
  • Push those updates to the client computers on the network so you only need download each update once and then share the update across your network
  • Configure your router to allow port forwarding to the WHS which will then offer additional services from outside your network
  • Provide a yourname.homeserver.com domain name for the server
  • Provide remote access files on the server
  • Allow me to remote tunnel into my own computer on the inside of the network

You can allow WHS to modify the port forward settings in your router. This is faster and easier using the WHS wizard than if you log into to the router and configure the port forwarding separately. You do not need to know the ports or services because the configuration is automatic.

With router ports forwarded, you now press one button to turn on remote access. You then run through another wizard that sets up the dynamic DNS required for the local hosting of your own yourname.homeserver.com site. All that was needed is a Hotmail or Live mail account. With this turned on I can now test to see if there is access from outside the network to both the files on the server and the files/programs on each of the computers in the network. It works great.

After it was completely set up, I plugged in a second hard drive. WHS instantly recognized the drive and asked if that drive was for duplication or to extend the size of the data drive. Wow, how intuitive could that be? I then simply setup a RAID mirror. During installation, if using one hard drive, WHS takes about 100 Gb of your drive for the C:/ partition and puts the operating system on that partition. The remainder of of the drive becomes D:/ for the data drive. If you add a second drive for expansion, it can run both drives as a “just a bunch of drives” (JBOD), unless you configure the two drives with a RAID configuration. Configured as JBOD, and if there were a drive failure, you would be unable to access your data. You would need to restore your data after replacing the failed drive. However, you can better protect your data by using 2 hard drives configures in a RAID 1 mirror configuration. If one drives fails, your data is protected until you replace the drive.  The system can protect your data (this is called fault tolerance) even better if you use 3 or more drives. If you have 3 or more hard drives, you can use a RAID 5 configuration, which is has better redundancy that RAID 1. RAID 5 with three or more dives is typically utilized in server configuration requiring a high level of fault tolerance. This type of fault tolerance is included with WHS!

In less than 2  hours of installation, what do you have accomplished?

  • a secure file server with Users and Shares
  • A personal webpage hosted with dynamic DNS service setup and running
  • A remote access point to all files on the network and to all the files authorized on the server
  • Access to remote desktop on any computer on the network
  • an automated backup setup for every computer system
  • shared printer(s) to all network computers
  • a  JBOD or RAID disk drive configuration on the server

In my experience, setting up a traditional Microsoft Windows server can take anywhere from 6-10 hrs. So this is an amazing financial savings for a small, or micro business.

Once setup is complete you unplug the keyboard, mouse and monitor and WHS sits by itself. The server is managed with the remote desktop service. In other words, you manage server functions from one of the client workstations instead of needing a dedicated monitor, mouse, and keyboard for the server.

In conclusion, WHS is a cost effective solution for a small business with budget concerns. Please contact Cost Computing, 561.452.6132 for further information.

Preventing a virus attack

June 14th, 2013

One of the most complicated tasks we perform is virus removal. Also known as malware, trojans, back door threats, and adware.
A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk. During the past few months we have seen a proliferation of  a nasty virus and variants of what is called the FBI moneypack virus.  FBI Moneypak ransom ware is a virus  that displays a fraudulent FBI warning as part of its attempt to steal money from the victim via Moneypak (that is typically purchased from local convenient stores). It is a close relative of the Gema ‘Access to your computer was denied’ Virus, Police Central e-crime Unit (PCEU) ransomware, and Buma Stemra Virus.

How do I know if my computer has been infected?

After you open and run an infected program or attachment on your computer, you might not realize that you’ve introduced a virus until you notice your system is somehow not acting as it usually does.

A few indicators that your computer might be infected:

  • Your computer runs more slowly than normal
  • Your computer stops responding or freezes often
  • Your computer crashes and restarts every few minutes
  • Your computer restarts on its own and then fails to run normally
  • Applications on your computer don’t work correctly
  • Disks or disk drives are inaccessible
  • You can’t print correctly
  • You see unusual error messages
  • You see distorted menus and dialog boxes
  • upon starting, you get an error message stating “operating system not found”

Thorough removal of these can take upwards to four hours and includes detecting the virus, deleting the signatures, and subsequent scans to be sure nothing is hidden and waiting to come back to life at a later date. If you pay what the virus programmers want, typically between $200 to $400, the virus will appear to be eliminated, when actually it is only disarmed so that it can, and will, again infect your system.

These viruses are typically the result of a visit to an adult site, coupon sites, an intentional dirty site, or through email. However, Beware of messages warning you that you’ve sent email that contained a virus. This can indicate that the virus has listed your email address as the sender of tainted email. This does not necessarily mean you have a virus. Some viruses have the ability to forge email addresses. In addition, there is a category of malware called rogue security software that works by causing fake virus alerts to pop up on your computer.

How do I prevent these programs from gaining control of your system?

Although a good virus program is your best first line of defense, these advanced, nasty viruses are known to disable your virus scanner as the first measure of gaining control of your device. You must be proactive whenever you go online. If you frequent adult and coupon sites, make sure your virus definitions are up to date, and do a full computer scan after leaving a suspect site. Download Malwarebyte’s  anti-malware program and run once a month to remove rogue programs. Be sure to just run this program as a standalone process, and do not run on an a consistent basis if you use Norton Internet Security as your virus program because of incompatibilities (this is as of May, 2013). Make sure the icon for your virus program is visible in the taskbar, so you will notice if it needs attention. Other things to consider include:

ü  Keep all software up to date. Regularly install updates for all your software and subscribe to automatic updates wherever possible.

ü  Use strong passwords and keep them secret. You can check the strength of your password by visiting https://www.microsoft.com/security/pc-security/password-checker.aspx. This page from Microsoft has a small program to test the strength of your passwords

ü  Never turn off your firewall. A firewall puts a protective barrier between your computer and the Internet. Turning it off for even a minute increases the risk that your PC will be infected with malware.

ü  Use flash drives cautiously. Putting your flash drive (sometimes called a thumb drive) in a computer that is infected could corrupt the drive, and ultimately your computer.

Do not be tricked into downloading malware

  • Delivering malware in downloads that you think are pictures or movies, or through links that you click in email or instant messages (IM), or on a social network.
  • Scaring you into clicking a button or link they supply with fake warnings that your computer has a virus.
  • When downloading Adobe or Java updates, be sure to uncheck the box asking you to install Google or Ask toolbars. TOOLBARS are notorious for containing adware. Try to stay away from toolbar extensions.

Virus and spyware can cause many computing headaches. You must utilize a proactive approach to when online to mitigate your chances of infection.

Open DNS

June 10th, 2013

Understanding Open DNS

 

First, let’s explain what is DNS. DNS means Domain Name System – the protocol that provides the framework for web browsing. It is  a system of computers located throughout the world that provides the infrastructure allowing browsing of the World Wide Web. When you enter, for instance, wikipedia.org, DNS converts that easily recognizable domain name (called an ip namespace) to a numerical address that has been assigned to that particular domain name.
The problem with how DNS is configured is that it is typically set up by the respective ISP for a customer.

DNS, as configured by default, can have a negative impact on web browsing. These problems are a result from one or a combination of two issues:

Geographic location of DNS servers: This is becoming less of a issue today, but poses a problem when end users are making DNS requests over slower speed links. Not all DNS servers are in prime locations; this is a bigger issue for customers who are in rural areas and being served by smaller, regional, ISPs.

Over-burdened DNS servers: Again, this is more likely to happen with DNS servers hosted by smaller ISPs, but I’ve seen it within Southern Florida Comcast and ATT systems. If an end user’s router or home PC is pointing to DNS servers that can’t handle their request load effectively, overall response performance suffers and web browsing slows.

Changing DNS server settings is fairly easy for any home user or a computer technician from Coast Computing can help.

DNS adjustments should be made at the router. There are benefits to making DNS changes at the router level because:

  • Everyone will not have to adjust their systems; only the common router will need the adjustment.
  • It will speed up (and clean up) web browsing for all users on a given connection.
  • You can even offer further browsing redundancy by choosing primary and secondary DNS servers that span different providers (say, Google DNS and OpenDNS).

Some techs claim that ISP provided DNS settings work fine. Everyone’s needs from DNS and relative performance on a given pair of DNS servers will be different. Much of this stems from what was mentioned earlier regarding location, burden, and other factors. But it’s what you don’t know about alternative DNS solutions that get interesting.

While Google DNS provides a speedy alternative to what ISPs offer, OpenDNS takes this concept one step further. The company employs specialized technology that actually spans DNS requests to datacenters that are closest to your location geographically without any intervention. In addition, because they handle so many requests from different parts of the world, they have the most up-to-date single repository for where everything is on the web. This significantly reduces the need for them to “ask” other DNS servers where a website or file may be located.

Another key benefit is how OpenDNS provides malware blocking at the network level. This is accomplished by sifting out known-infected websites and files before you can get to them. This is beneficial because, by default, ISP provided DNS servers typically do not filter out the responses they provide. Even if you mistakenly type in the address of a completely known and virulent malware site, chances are your ISP will take you there.

One of the biggest contributors to the spread of malware today is that end users can’t always recognize bad links in search results, and are visiting pages on the web where they typically should not visit. OpenDNS takes the guesswork out of this process because it maintains a centralized blacklist of bad sites that is in effect for all users of the service. For customers of mine that have bad histories with such links, OpenDNS is always a good recommendation for a defense against sites containing malware.

In addition, OpenDNS offers paid levels of service for home and business customers. Home users can benefit from the parental control functionality via custom block lists and category-powered filtering of their home internet connection.

There’s no client software to install, no signature updates to worry about, and it affects EVERY device that wants to use internet in a home – which means any young visitors won’t be able to bypass filters merely by bringing their own computers.

The business level subscription to OpenDNS provides advanced logs, web access control for workers, strict malware and botnet prevention options, and website blocking.

If you want to switch to OpenDNS on your own, here are the two DNS servers that they publish Follow their instructions page for generic guidance; consult Coast Computing for in-depth configuration:

  • PRIMARY:             208.67.222.222
  • SECONDARY:       208.67.220.220

I try to take a balanced approach in customers setup using a hybrid combination of OpenDNS as the primary server, and Google DNS as the secondary server. You don’t have to do this, but I feel that if for some reason OpenDNS has outages across both of their systems, at least your router can then tunnel DNS requests to a complete third party. For redundancy, this is a great approach. My preferred router configuration happens to look like this:

  • PRIMARY (OpenDNS):             208.67.222.222    or 208.67.220.220
  • SECONDARY (Google DNS):    8.8.8.8                  or 8.8.4.4

Give the above combination a try to see if your website browsing speed is improved. You will also gain the transparent malware blocking and phishing protection that OpenDNS utilizes.

Internet Security 2013 Virus

June 6th, 2013

Amsecure.exe is the main process of Internet Security 2013 virus. When Internet Security 2013  gets installed onto your computer it will  report various sorts of security problems.

It will report of many viruses allegedly attacking your computer, such as the W32/Blaster.worm. The viruses  reported are real signatures, however, they have not infected your system. The only real virus you have is The Internet Security 2013 virus.

The software bearing the name of Internet Security 2013 is not capable of identifying real security threats and thus cannot remove them. The reason why this rogue security program was developed was to trick users into paying for the licensed version of this malware program.

So, when you see Internet Security 2013 fake anti-spyware in front of you remember what we’ve told you – this is a rogue security tool and not any legitimate program. Do not let this malware sample scare you. The reports it gives are not based on the true facts. You must ignore them all and get rid of the hoax without hesitation. Needless to mention, do not pay for this program. You will waste your money and will not receive any decent protection of security for your computer.

In fact, by disclosing your personal bank details or the information about your credit card you are making your finances vulnerable to further attacks and attempts of the frauds to rob you.

If you get infected, call us to guide you in removal of this virus. This virus started affecting computers in southern Florida around May 5, 2013.

Please call us for help if you get this infection. It will normally disable the virus program ypu are using.