PC Tech for Hire
  • Home
  • Services
    • ProActive Care >
      • Antivirus
      • Backup
    • Web Hosting >
      • Showcase
    • Virus/Spyware Removal
    • PC Refresh
    • PC Reimage
    • Data Recovery
    • Recycling
    • Training
  • Blog
  • Recommendations
  • Remote Support
  • Contact
    • Client Agreement Form

Be Careful – Fake Amazon Emails Could Hold Locky Ransomware

10/4/2017

0 Comments

 
Picture
For a time, it seemed we had reached the high-water mark where Locky Ransomware was concerned. After the big, global attack earlier this year, interest in that particular strain of ransomware seemed to wane as hackers went off in search of the “next new thing” to deploy against the unwitting public.

Unfortunately, rumors of Locky’s death may have been highly exaggerated. A massive new email campaign is underway, using Amazon as a cover, and the infected emails come bearing Locky as a “gift” to anyone who opens them and downloads the attachment.

While no one knows who is behind the Locky software itself, this new email campaign is being run through a large botnet-for-hire called Necurs, which is currently made up of more than five million devices from all over the world.
These devices have been sending out a million emails an hour that appear to come from Amazon and contain downloadable attachments with their malicious payload.

The hackers are being quite savvy about the operation too, timing the sending of their emails so that they arrive during normal working hours, which makes them seem more legitimate. As ever, anyone unfortunate enough to download the attachment contained in one of these emails will soon find all the files on their system encrypted, and get a notification that they must pay a ransom in BitCoin if they want the unlock code to get their files back.

It gets even worse, though. This latest attack does more than just install Locky. It also installs a program called “FakeGlobe,” which appears to be another variant of ransomware that’s designed to trigger after files are unlocked. So, even if you pay the ransom, you may find yourself immediately facing newly encrypted files and having to pay a second one.
​
As ever, the keys to avoiding scams like these are vigilance, employee/family education and a robust backup and file recovery plan, in the event that someone in your organization or household does open one of these emails.  And be sure to contact PC Tech for Hire for assistance in establishing your plan.

0 Comments

Montgomery County government ransomware attack...

9/19/2017

0 Comments

 
You've probably seen the news today about the Montgomery County government being hit with ransomware.  Local news has this article about it. 

But what is ransomware?
Ransomware is a form of malicious software that locks up the files on your computer, encrypts them, and demands that you pay to get your files back. Wanna Decryptor, or WannaCry, is a form of ransomware that affects Microsoft’s Windows operating system. The variant that hit Montgomery County is known as the SamSam ransomware.  When a system is infected, a pop up window appears, prompting you to pay to recover all your files within three to seven days, with a countdown timer on the left of the window. It adds that if you fail to pay within that time, the fee will be doubled, and if you don’t pay within seven days, you will lose the files forever. Payment is accepted only with Bitcoin.

How does it spread?
According to the US Computer Emergency Readiness Team (USCRT), under the Department of Homeland Security, ransomware spreads easily when it encounters unpatched or outdated software. Experts say that WannaCry is spread by an internet worm -- software that spreads copies of itself by hacking into other computers on a network, rather than the usual case of prompting unsuspecting users to open attachments. It is believe that the cyber attack was carried out with the help of tools stolen from the National Security Agency (NSA) of the United States.

Some forms of malware can lock the computer entirely, or set off a series of pop-ups that are nearly impossible to close, thereby hindering your work.

What can be done to prevent this?
The best way to protect your computer is to create regular backups of your files. The malware only affects files that exist in the computer. If you have created a thorough backup and your machine is infected with ransomware, you can reset your machine to begin on a clean slate, reinstall the software and restore your files from the backup. According to Microsoft’s Malware Protection Center, other precautions include regularly updating your anti-virus program; enabling pop-up blockers; updating all software periodically; ensure the smart screen (in Internet Explorer) is turned on, which helps identify reported phishing and malware websites; avoid opening attachments that may appear suspicious.

If you are not sure if you're protected, I offer services that can help you determine your risk.  My ProActive Care Services​ can help prevent ransomware from getting into your system.  Contact me to discuss your concerns and let me help you protect your files.
0 Comments

Loving your laptop

5/7/2016

0 Comments

 

Heat Is Your Enemy
The cooling system is very simple: an internal fan draws air in through inlets on the underside or rear, over the hot components and out through another vent in the side or rear. If these vents are blocked the laptop will overheat; sensors inside the computer will turn the fan speed up to compensate and eventually force the laptop to switch off. If the fan stops turning, the show’s over. When working, place your laptop on a clean, smooth surface. A dirty environment can cause a build up of dust and dirt around the vents and fan. Don’t place it on the bed or on carpet or other soft, uneven surfaces. An uneven surface can block the vents. 

Switch Off First
The primary storage in your laptop is the hard disk drive. It is a precision mechanical device. It looks a little like a cd player or a record player. The read/write head hovers over the magnetic surface of the disk at about 5-10 nanometers. If the computer is knocked, the head can hit the surface and damage it causing permanent data loss and making the computer unreliable. To avoid this you should always make sure the laptop is fully powered down before you transport it or put it in your carry bag or backpack. When the computer is powered down the read/write head of the drive is parked away from the disk surface and locked down so a knock is less likely to cause any damage.

Regular Maintenance
Give your laptop a regular clean out using low pressure compressed air around the keyboard and vents. Once a year a clean out inside the case is also a good idea. My ProActive Care - PC Refresh service includes this, if you would like it done professionally. This will keep the temperature down and improve reliability.

Have You Tried Turning It Off and On Again?
Many normal Windows maintenance tasks and updates require a restart. Sometimes Windows or your applications get stuck in a way that makes them seem broken or the computer is getting sluggish and unresponsive. Sometimes, the way to fix these little annoyances is to perform a full shutdown and restart of Windows. This is not the same as putting the laptop to sleep by closing the lid. I’ve often fixed seemingly broken printers, wifi, networks etc simply by doing a Windows restart.

Backup Often
If you have stuff on your laptop you simply can’t afford to lose then you should be backing up every day. Depending on the level of stress you experience thinking about total data loss, it may be advisable to set up a multi-level backup plan that involves daily and weekly backups, onsite backup, offsite backup and cloud backup. Nothing is guaranteed and the more backups you have the better your chances of recovering in the event of disaster.  I recommend Backblaze as a good online backup solution.  If you need managed backup, I also offer my ProActive Care - Backup service.  With my ProActive Care service, I will monitor the system to ensure that backups are being performed on a regular basis, and can alert you to any issues.

0 Comments

How to choose a strong password

4/23/2016

0 Comments

 

Welcome to PC Tech for Hire, Montgomery Alabama's dependable residential and small business computer repair and service provider.

A good password is the cornerstone of your security in any computer profile or online account. If your password fails you, it could mean a loss of important information, a violation of your privacy, or even a significant loss of money. With this in mind, PC Tech for Hire would like to offer the following tips to help assure that your accounts are protected by a password that is capable of foiling unscrupulous users.
Avoid Lazy Passwords
A good password should be at least eight characters, preferably with a mix of letters and numbers. Far too many people end up using the same passwords, which makes them very easy targets for hackers. Look at some of the most common passwords to make sure you’re not using one of them:
  1. 123456
  2. password
  3. 12345678
  4. qwerty
  5. abc123
  6. 123456789
  7. 111111
  8. 1234567
  9. iloveyou
  10. adobe123
  11. 123123
  12. admin
  13. 1234567890
  14. letmein
  15. photoshop
  16. 1234
  17. monkey
  18. shadow
  19. sunshine
  20. 12345
  21. password1
  22. princess
  23. azerty
  24. trustno1
  25. 000000
Ideally, the password should be something that cannot be found in any dictionary. Try to come up with something that only has meaning to you. Names of loved ones, your company name, your SSN, or a variation on your username are a big no-no, but nonsense words are a plus. Consider creating a word from a favorite adage of yours, like making “2eih2fid” out of “To err is human, to forgive is divine”; such a password is easy to remember but difficult to crack.
Change Your Password Frequently
It is recommended that you change the passwords protecting your sensitive information every thirty to ninety days. This helps to assure that, even if somebody has gained access to your account without you knowing, he or she will not be able to retain access for too long.
Safeguard Your Password
It seems like common sense, but some people still can’t keep their passwords to themselves. This means more than just not telling other people what your password is; it also means not writing it under your laptop, or on a post-it note attached to your screen.
Password Managers
The absolute best option for choosing the best passwords is to use a password manger that has a password generator built in.  With a password generator, you can have longer more cryptic passwords.  And, because it is a password manager, it will also store the password information for each site you have an account on.  My recommended password manager continues to be LastPass.

As always, if you need any assistance with choosing passwords or if you have become infected with a virus or have any computer question, don't hesitate to contact me.
0 Comments

PUPs - Cute name, disastrous results

2/20/2016

0 Comments

 

Welcome to PC Tech for Hire, Montgomery Alabama's affordable residential and small business computer repair and service provider.

Picture
I've talked about PUPs before, but if you missed the series of articles and have ever wondered what a PUP is, here it is: PUP stands for Potentially Unwanted Program, and is considered to be a form of malware. While they are not quite the same thing as standard viruses, they’re still not a good thing. PUPs are those programs that scoot in almost completely unannounced through downloads, usually as software bundles. Once installed, they will usually start harassing users pretty aggressively about one thing or another: your memory is low, you have outdated drivers that need to be fixed immediately, your system is insecure, etc. etc. (and as you might have guessed, these are all false and they want money to “fix” said problems). They may also start hijacking your browser to give you funny search engines, ads galore, and redirect you to websites you didn’t ask for. Sadly, even Macs are no longer immune from this problem. PUPs can be hard to catch before the fact, and even harder to remove after the fact, so I have a couple of recommendations to keep these things off your system. My number one recommendation is to use Chrome with Adblock exclusively. This particular combination will fend off a lot of unwanted drive-by installs. After that, I recommend fine-tuning your antivirus to actively look for PUPs in its sensitivity settings. Finally, I highly recommend installing a little program called Unchecky. This small program runs in the background, making sure that nothing tries to slip in when you’re installing something downloaded from the internet. It does a great job, and it’s free!

​If you think you might have a few PUPs on your system, and aren't sure how to get rid of them, give me a call!  My standard virus removal service will eradicate those pesky PUPs, and any other viruses or malware you may have.  And if you contact me and mention this blog entry, I'll perform the virus removal service for FREE, with the purchase of a year of my ProActive Care - Antivirus service.  The antivirus service I use includes PUP detection right out of the box.  And, you'll have peace of mind knowing that your PC Tech is constantly monitoring the system and making sure it's eliminating threats to your computer.  CLICK HERE to take advantage of this offer!  I look forward to hearing from you!

0 Comments

Windows 10 – Ten Things to Consider

2/6/2016

0 Comments

 

Welcome to PC Tech for Hire, Montgomery Alabama's dedicated residential and small business computer repair and service provider.

Picture
As you’ve probably heard, the big news in the tech world is the release of Windows 10. You may have seen the little icon in your system tray about it, and clicking on it brings up a box with more information. If you have done this, you may have noticed the part where Microsoft says ”free.” While this is definitely a welcome change, Microsoft has put out a lot of mixed messages about what that means and how the upgrade to Windows 10 will actually work. The best suggestion I can make is to wait for now. Here’s why:
  1. Windows 10 is bound to be a tremendous improvement over Windows 8. So much so that they decided to skip the “9” in the series! But it is so new, techs have not really had a chance to test it much and discover all its idiosyncrasies. (Although there is one big one we know about that I will talk about in #7).
  2. Backups are going to be very important. If there is any kind of problem with the upgrade, you’re going to need them. All your backups need to be checked and if you don’t have any at all yet, this is the perfect time to have me help you get those up and running.
  3. I do not recommend upgrading to 10 the “easy” way. As a fellow tech said recently, “Windows is only as stable as the foundation it is built on. If your current Windows is not 100% clean and robust, the upgrade won’t be either.” The best bet is to have me install from scratch—that way you’re not bringing old problems with you.
  4. If you still want to do the upgrade yourself, backups are going to be very, very important. In fact, I would advise a clone (image) of your hard drive be done first. That way you can revert to your old system if something goes wrong.
  5. Microsoft says that once the upgrade is complete, you'll have 30 days to revert back to your previous operating system.  This is assuming you have plenty of hard drive space.  And if you're running out of space, the backup may be deleted before the 30 days is up.
  6. If you don’t have any recovery discs made, now is the time! These should be done whether you upgrade or not, because well, disasters happen. I will include this service free with any Windows 10 installation.
  7. It has a few bugs and some minor things that need tweaking. One of those things is a new feature Microsoft has included called “Wifi Sense.” Meant to be a convenience, it unfortunately shares your wifi password with all of your contacts by default unless you turn it off. (It is switched ON by default!). So, one of the first tweaks I would make is turning that little security hazard off.
  8. Some features will be gone and/or different. A few things disappearing: Windows Media Center, desktop gadgets, and all floppy drive support. Solitaire will be gone as well but can be added back with the MS App store. New additions include the new web browser called Edge (Internet Explorer is still there, just not as the default browser), a new Start Menu, and Cortana—a digital assistant much like Apple’s Siri.
  9. If you’re on the fence: if you have had any serious viruses or rootkit infections recently, and your system can handle the upgrade, I would recommend moving to Windows 10 with a reformat at some point (my preferred method, stated in #3). Not only will your system get a new lease on life with a new OS, but any hidden malware will go poof. It’s good for peace of mind.
  10. Microsoft’s pricing scheme for Windows 10 is that the upgrade is available for free until July 28th of this year (one year after it's public release). The license cannot be transferred to another machine, as it is tied to the hardware in your computer.  Otherwise, the prices will likely be about what they have been for Windows 8 ($120 for the Home version). 
If you are interested in having your PC upgraded to Windows 10, contact me for scheduling.  I'll make sure everything (that can run on Windows 10) is moved over.  I can provide training, as well, for those who are still unsure about how to use Windows 10.  

0 Comments

Beware of fake Flash and Video Player update scams

1/30/2016

0 Comments

 

Welcome to PC Tech for Hire, Montgomery Alabama's premier residential and small business computer repair and service provider.

Picture
There is an increasing number of threats from infected web sites that show a pop up asking you to install a fake ‘Flash player’, ‘Video player’, or ‘Java update’ containing a Trojan downloader with actual malware viruses. My advice: “never click on a download offer, unless you went looking for it.”  That includes sites that you may trust, like Facebook.  If you get a pop up asking you to update, close the window and go to the actual website to download the (allegedly) out of date software.

I think my computer might be infected
If your computer is infected, turn it off and seek professional service. Don’t try to fix it your self because many viruses try to hide and also multiply. Virus removal is not an easy task. Also don’t put it off and keep using it, a compromised computer puts you and others online at risk.  My virus removal service is available, as well as my ProActive Care service that allows for ongoing monitoring and protection.

February Special
Starting today and lasting throughout February, sign up for ProActive Care - Antivirus service and get any viruses removed for free.

0 Comments

Hard drives (HDD) vs Solid state drives (SSD): Which one is right for you?

11/20/2015

0 Comments

 

Welcome to PC Tech for Hire, Montgomery Alabama's dependable residential and small business computer repair and service provider.

Both hard drives and solid state drives are devices used for storing your data; such as photos, music and software. While they do the same thing, there are pros and cons for each one due to the nature in which they store data.

Hard Drives

The main advantage of a hard drive is storage capacity, you can often find a hard drive with a storage capacity of several terabytes (you can store roughly 200 movies on a terabyte hard drive). Inside each hard drive, is lots of spinning parts and it is the speed of these spinning parts that determine how quick your computer can open your files such as pictures, word documents and music.
However, as a hard drive fills up with data, files can become scattered across the hard drive. This can result in a sluggish feel to the device you are using.

Solid State Drives

Solid state drives are built for speed. They do this by storing the data on them using a motionless technology, meaning there are no moving parts. This means the data can be accessed almost instantly. They are also ideal for laptop users as HDDs can be easily damaged if you move your laptop while still powered on. They also use less power than traditional hard drives meaning your battery lasts a lot longer.
The downside to SSDs is the cost. They are a little more expensive compared to traditional hard drives. If you are not using all of your existing drive space, then seriously consider swapping it for an SSD. It is much faster compared to traditional drives, and you can use your existing hard drive, as a external drive, for backups, so it does not go to waste.

So which one should I choose?

The bottleneck on most computers comes from the hard drive, so if you are looking at speeding up and improving the performance of your computer, and have less than 200GB of data you want to keep, it’s worth upgrading to an SSD. However, if you have a lot of data and want to keep costs down, an HDD is perfectly fine.

Thinking about upgrading to an SSD drive?  Give me a call if you need assistance.  Of if there is anything I can do for you, just click on my contact page to contact me.

Have you liked my Facebook page yet?  For a limited time, get 10% off your next service call by liking my page.


0 Comments

Is Paid Anti Virus Protection Worth the Money?

11/14/2015

0 Comments

 

Welcome to PC Tech for Hire, Montgomery Alabama's affordable residential and small business computer repair and service provider.

When it comes to anti virus & spyware programs, just how much difference is there between the paid for versions and the free ones?
In the “olden days” when computer viruses were just beginning to hit their heyday, you had to pay for all virus protection software. Nowadays, there are plenty of free virus protection programs available for users to download from the Internet. There are also many paid programs available, so you may be wondering whether you need to pay for virus protection software or if the free programs are adequate.

To answer that question, you need to determine what your virus protection needs are and in what capacity you will be using your virus protection program. For example, the majority of free programs are designed for personal home use only, not for business use. So if you’re looking for virus software for your business, you’ll have to purchase a licensed version. There are several other differences between the paid and free versions as well. 

Performance
The main reason you install virus protection software is to protect your computer against viruses, which can harm your computer. Tests have shown that both the free and the paid virus protection programs perform comparably in terms of detecting viruses on a computer. While this is incredibly important, there are other types of malicious programs and components that can infect your computer and cause irreparable damage or steal personal information. Detection and removal of spyware, malware and other nasty items is where the paid programs shine.

Most of the free programs also detect malware, but the paid programs do a better job and detect more of the little nuisances, which means your computer is cleaner and your information is safer if you’re using a paid program.

Additional Features 
Another way paid virus protection wins over users is by offering additional features. When comparing virus protection programs, you should take a look at these added features and see if any of them appeal to you. Examples of added features include parental controls, enhanced spam filters and identity theft protection. Avast’s paid program, Internet Security 6 Package, even opens up a new desktop for sensitive information, such as online banking, so other programs cannot steal account numbers or passwords.

Support 
One of the major differences between free and paid virus programs is the customer support. Support is typically lacking or nonexistent with free programs because there is no money being exchanged. You may find a FAQ section on the company’s Web site or a limited help section built into the program, but the companies offering free software typically do not invest much money in support for these free programs.

Paid programs, on the other hand, typically offer online and phone support for users. While you may not consider support to be a big deal, keep in mind that the free programs are often a bit more difficult to operate and navigate. If you decide on a free program, but are unable to set it up properly, it is useless.


If you’re still unsure of whether to go with free or paid virus protection, think about how you use the Internet. For users who are frequently downloading files and surfing a wide range of sites, a higher level of protection is warranted. For people who do minimal surfing, do not download many files and do not use credit cards online or engage in online banking, a free version is most likely fine. You could always see if the paid program you like has a free trial and compare it to a free program for yourself. That way you’ll know if it’s worth spending the money each year for the paid version.

With my antivirus protection service, ProActive Care - Antivirus, I also include the benefit of monitoring the system.  This is something that medium to large businesses are able to do, but is rarely available for home users.  On a daily basis, I personally check the antivirus system to make sure my clients are virus free.  If I notice an issue, a quick call to my client will usually resolves the issue.  My service also includes free virus removals, if something happens to get past the system.  My service is business class protection at residential pricing.  Contact me for a free trial of the service!

Good luck, and stay clean from those malicious viruses!
0 Comments

Here’s What Happens When You Install the Top 20 Download.com Apps.  Unchecky to the rescue!

8/29/2015

0 Comments

 

Welcome to PC Tech for Hire, Montgomery Alabama's dedicated residential and small business computer repair and service provider.

Picture
Unfortunately, my source for this series of blog posts went belly up before I was able to complete the series.  I was hopeful that I would be able to get the final posts from them directly, but no response in weeks.  So...  Let me finish the series but simply saying: Be careful what you install.  And when you do install a program, read everything.  Make sure it is not trying to install something you really do not want.

One program I highly recommend is called Unchecky.  This program will run in the background and when you are installing a program, it will uncheck the boxes for the extra software you do not want.  This also works for updating software.  Java is really bad about wanting to install additional software even for updates.  Unchecky will uncheck the boxes for the unwanted software automatically.  

Be sure to check out my ProActive Care Managed Services. Unchecky is included in the basic ProActive Care service.

Stay tuned!  I have a surprise for next month!
0 Comments
<<Previous

    Ronnie Morgan

    Hi!  I'm Ronnie, your PC Tech for Hire for the Montgomery, AL area!  Let me know if you need my 25+ years of experience to help you with your computer needs.

    Archives

    January 2018
    November 2017
    October 2017
    September 2017
    May 2016
    April 2016
    February 2016
    January 2016
    November 2015
    September 2015
    August 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014

    Categories

    All
    Antivirus
    Backup
    Computer Repair
    Computer Services
    Hacking
    Malware
    Montgomery
    Network
    Phishing
    ProActive Care
    Ransomware

    RSS Feed

Terms and Conditions                                                                                                                       Site Map                                                                                                       ©2016 PC Tech for Hire, LLC
  • Home
  • Services
    • ProActive Care >
      • Antivirus
      • Backup
    • Web Hosting >
      • Showcase
    • Virus/Spyware Removal
    • PC Refresh
    • PC Reimage
    • Data Recovery
    • Recycling
    • Training
  • Blog
  • Recommendations
  • Remote Support
  • Contact
    • Client Agreement Form