Monday, October 3, 2016

Ransomware is NOT Your Friend!!

RANSOMWARE

What the heck is it?
ran·som·ware
ˈransəmˌwe(ə)r/
noun
  1. a type of malicious software designed to block access to a computer system until a sum of money is paid.
    "although ransomware is usually aimed at individuals, it's only a matter of time before business is targeted as well"
And the following information, per se is from: http://www.digitaltrends.com/computing/what-is-ransomware-and-should-you-be-worried-about-it/

You bring up your computer and "Expecting to see a Twitter feed or Facebook profile, instead you’re greeted with a big red image, demanding that if you don’t pay $200 to an unknown party in the next 24-hours, everything you know and love on your computer will be erased, and gone forever.

Welcome to the world of “ransomware,” the newest, hottest way that underground criminals are pulling cash from the pockets of innocent victims and using it to fund their clandestine operations. But what exactly is this ransomware stuff, and is there anything you can do to protect yourself against it?

Read more: http://www.digitaltrends.com/computing/what-is-ransomware-and-should-you-be-worried-about-it/#ixzz4M38AGQMi
Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook


We here at Tech in a Flash have been getting a myriad of calls from private computer users as well as, sadly, businesses who are not at a stand still until the ransomware has been dealt with. The hackers have hit these computers up for as little as $218 and as high as $1814 which will continue to DOUBLE for every day you don't respond to their demands and pay them. The response from these hackers has been "In three days if you do not pay, your data is GONE."

Where did this come from and when did it start?

The earliest known version of ransomware, called CryptoLocker, first debuted on the scene around the tail end of 2013, and hit so hard the Internet barely had enough time to figure out what it was dealing with in the first place.



Despite trying system resets, flashing the BIOS, or installing new hard drives altogether, the only screen they would be able to see was the hacker’s flyer which told them how much they needed to pay to regain access, and how long they had left before the format bomb would eventually go off.

Worse, users started reporting that the hackers were making good on their word, and would remove CryptoLocker if the terms had been met in the allotted 24-hour period. This only encouraged more desperate and confused victims to pay the fee instead of looking for an alternative option, which in turn, fueled the spread among criminal organizations who spied a new, quick way to make an easy buck.


Unlike classical malware that installs keyloggers, backdoors, or trojans on a computer in the hopes that a user would eventually type in the details of a credit card or other personal information that could later be used or sold, CryptoLocker and its many subsequent variants offered a simple, and reliable revenue stream that the underground market could capitalize on to fund other, less-profitable operations.
Amounts demanded for the ransom would vary wildly depending on the criminal ring behind it, anywhere from $25 to $600, almost always paid either in Bitcoin, or sent through MoneyGram onto untraceable prepaid cards in Eastern European nation

About the time that you think you are in no way in their sights, you will be hit and lose everything. THINK ABOUT THAT: all of your photos or your beloved grandkids, vacations, records of your contents for your insurance company. WHATEVER is on your computer will be encrypted so you can no longer access it and if you aren't able to cough up any sort of money to save your contents, it's all GONE

BACK. IT. ALL. UP

There are a couple good ways to do it.. 
1. Buy some thumb/flash drives.. start either saving your precious files and photos, etc on to drive after drive. NOTE: ONCE BACKED UP ONTO YOUR FLASH DRIVE..DON'T LEAVE IT IN YOUR COMPUTER. Otherwise, your thumb/flash drive will also become encrypted and worthless because it would be still attached to your computer, yes?.. many canny computer users get it off the property into a save deposit box or at least into a fire proof safe!!


I usually buy all of mine from Amazon, Staples, Office Depot, wherever you can grab some quickly and get crack-a-lackin on saving your life in files. Use as many as it takes. These are pretty safe and it takes a lot to destroy them, as long as you don't drop them out of your pocket and you run over them with your car. 

Don't wanna do that? too lazy? 'oh, it won't happen to me.' Best of luck. you only need it to happen once to you and you'll be singing a much different tune.

At its core, ransomware exploits people’s unwillingness to back up their most precious data and files onto a separate hard drive that is completely disconnected from their main PC or network. By not creating separate carbon copies of their photo albums, music, programs, or documents, this type of malware can hold these folders hostage, and expect you to pay because it’s the only version you have in existence.

By backing up your operating system and all its contents to an air-gapped external hard drive every single day, you completely mitigate the risk of ransomware by circumventing the tool it uses to get you to pay up in the first place.


Read more: http://www.digitaltrends.com/computing/what-is-ransomware-and-should-you-be-worried-about-it/#ixzz4M3D2aXMi
Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook

HOW TO BEGIN TO AVOID BEING HELD HOSTAGE ALONG WITH YOUR LIFE ON YOUR COMPUTER

WINDOWS 7:I listed the first responder step BEFORE you are hacked: BACK UP YOUR COMPUTER and create a 'RESTORE POINT". What is this? if you do it today, you or a tech can take your computer back, like a "time machine" and reset it to a time, in a galaxy farther away from the harm of the new hack. 

Here is how you do this: 
Create a restore point
  1. Right-click the Start button, then select Control Panel > System and Maintenance > System.
  2. In the left pane, select System protection.
  3. Select the System Protection tab, and then select Create.
  4. In the System Protection dialog box, type a description, and then select Create.

WINDOWS 8:
To create a restore point, follow these steps:
  1. Open the Start screen, type System Restore, and click the word Settings in the Search pane on the right. ...
  2. Click the Create a Restore Point, CLICK ok.

WINDOWS 10:
  1. Search for 'Create a restore point' from the taskbar and select it from the list of results.
  2. On the System Protection tab in System Properties, select Create.
  3. Enter a description for the restore point, and then select Create > OK.

The second is to purchase a safeguard that costs a LOT less than what the ransomware hackers are going to hit you up for; an ether-based constant backup system.

Here at Tech in a Flash, we have a bundled option.. I know, you're saying , "oh yeah,  here we go.." This is sort of a combination 'sales pitch' as well as a biased review of the fact that *I* will not be without any of these programs. We have a MANAGED anti-virus and also a MANAGED back up system where if ANYTHING tries to hop into your life and on your computer, we are warned instantly, no matter what time of day or night.. 

First, we install the anti-virus and the back up bundle  at $15.95 per month, or $180 a year, which is a BIG discount for having both, and instantly you are protected from SO many icky things!









Saturday, February 13, 2016

Sending emails with tons of addresses of others attached: really BAD Idea

When emails are sent with a ton of addresses VISIBLY attached, rather than located in the BCC (blind carbon copy) which only states, "undisclosed recipients" this is what happens to so many email addresses:
HOW YOUR IDENTITY IS SOLD
Hackers might steal your information, but very few of them actually steal your identity. Instead, they make money selling your personal information to actual identity thieves who then use it to steal and wreck your credit and perhaps your entire financial life.
This package of your identity information is called a "fullz." It includes information like name, date of birth, Social Security number, home address and anything else that hackers can find out about you.
Identity thieves will typically buy ten to a hundred fullz at a time for a set price, usually paid in untraceable bitcoins. Usually 10 fullz goes for $5 to $20 depending on how complete they are and where the information came from.
Once an ID thief has the fullz, they'll sort through them and start testing to see which ones are going to give them the best return on their investment. That's what you'll start seeing unusual activity in your accounts, your credit report and other places.
What can you do to protect yourself? always use the BCC feature on your email sends.. it's there.. you just have to actually scope it out..but it's THERE.
I was able to cabbage a ton of emails I needed to send a newsletter to ALL the recipients of the original send. Now I send to ME first and copy and paste everyone else in BCC which shows everyone that receives the email of the fact that everyone else I sent it to is 'undisclosed'
Protect yourself, protect your senders.. THINK of others and yourself.. yeah?



Know that I also teach classes on Beginning Computing for Seniors. I charge $10 per person for an hour's worth of education in Retirement Home Clubhouses. I suggest if you have a laptop or tablet, bring it so you can follow along with me!

Tuesday, December 29, 2015

Going Incognito.. a Good thing or Bad thing?

So many people don't have a clue about all the wonderful and yes, Odd, things your computer programs, especially your browsers (Chrome, Firefox, Internet Explorer, etc) can offer you.

What is Incognito/Private Mode?
Usually called "Porn Mode" for those who like to surf porn (and don't think it's all guys, about half of the viewers are now women, yes, that will surprise a lot of you!)

Incognito mode can help keep your browsing private.. like why would you need to do that? Let me count some ways ~ the shame free options:
1. Buying gifts you'd not like your mate to see for their surprise birthday party
2. Checking your medical history, searching for delicate research searches, like for HIV, etc.
3.Not showing your log in page with the password already saved
4. Logging into your banking or paying your bills, especially in public wifi facilities. 

Public libraries often are not well-maintained so even you can check the history of where previous users went. Seriously dangerous TO THEM if you find their log ins and saved passwords. There are So many who have NO clue as to how to work a computer, but use them all over the place.

To make sure no one stumbles onto your internet travels, click first into your incognito mode. Here is how with chrome: 
You can open an incognito window on your computer and mobile devices to prevent Chrome from saving your browsing history. You can switch between an incognito window and any regular windows you have open. You'll only be in incognito mode when you're using the incognito window.

  1. Open a Chrome window
  2. In the top-right corner of the browser window, click the Chrome menu Chrome menu.
  3. Select New Incognito Window.
  4. A new window will open with a gray figure in the top-right corner 
  5. To close incognito mode, go to the corner of each of your incognito windows and click the X.
Incognito mode isn't available if the account is a part of Windows 10's "Family Mode."
Tip: You can also use the keyboard shortcut and press Ctrl + Shift + N (Windows, Linux, and Chrome OS) and ⌘ + Shift + N (Mac) to open an incognito window.
https://support.google.com/chrome/answer/95464?hl=en

Firefox:
As you browse the web, Firefox remembers lots of information for you - like the sites you've visited. There may be times, however, when you don't want people with access to your computer to see this information, such as when shopping for a present. Private Browsing allows you to browse the Internet without saving any information about which sites and pages you’ve visited.

Open a new, blank Private Window

  • Click the menu button New Fx Menu and then click New Private Window.
    private browsing - fx29 - win8
    https://support.mozilla.org/en-US/kb/private-browsing-use-firefox-without-history?redirectlocale=en-US&redirectslug=private-browsing-browse-web-without-saving-info#w_how-do-i-open-a-new-private-window

    Interenet Explorer 9:

    InPrivate Browsing

    Picture of InPrivate
    Keep your information to yourself with InPrivate Browsing
    Sometimes you don’t want to leave a trace of your web browsing activity on your computer. Whether it’s shopping for a gift on a shared PC or checking an account at an Internet café, you don’t want to leave any evidence of your browsing or search history for others to see.
    InPrivate Browsing helps prevent your browsing history, temporary Internet files, form data, cookies, and user names and passwords from being retained by the browser. You can start InPrivate Browsing from the Safety menu, by pressing Ctrl+Shift+P, or from the New Tab page. Internet Explorer will launch a new browser session that won’t keep any information about webpages you visit or searches you perform. Closing the browser window will end your InPrivate Browsing session.
    http://windows.microsoft.com/en-us/internet-explorer/products/ie-9/features/in-private
    So, there are many reasons to use Incognito and Private Browsing and not just for porn and questionable viewing. 
    Another thing to know, once you shut down your browser and want to bring it back up and get back to where you were, it will be gone.
    Only know that it can't keep your browsing activities private from your ISP or online snoops, or even keyloggers if you've annoyed anyone who doesn't trust you. 
Anyway, for answers to more of your questions, please contact us, Tech in a Flash,  at 239.244.9600 


      
MATTHEW AND BEKKI, at your service!

Friday, December 25, 2015

Our Personal Energies Co-mingle with Our Computers

Just as we draw our tribe to use (birds of a feather, flock together, etc) also note, that if you are freaking out, your magnetism will also effect your computer.. which is why when you are stressing to get an assignment done, your computer locks up, loses your work, freaks out with you.

If you ARE working on a project you don't want to lose, save it as an attachment to your email, that is HOPEFULLY stored off your computer.. gmail, yahoo, hotmail.. not an email you download on your computer.. it will be lost if your computer fails.

Check it out below.. 


Monday, November 23, 2015

Be sure to back up your computer! And WHERE do you keep your computer programs?

Exactly how important IS the stuff on your hard drive to you?

We here at Tech In A Flash (www.techinaflash.net) keep getting in computers that won't power on, or are in some way not working the way they always have. 

After we do a diagnostic on them, we find that their hard drive is bad or going bad or about to crash totally ('she's dead, Jim')

To the dismay of some, we are not able to extract their information off of these files. We ask if they have been backing up their blessed photos, documents, etc. and on and on . Their answer 99.99% of the time is no.


Oh, Yeah! THE CLOUD!!!

Many save to "The Cloud". So, what is a cloud: The cloud is a network of servers, and each server has a different function. Some servers use computing power to run applications or "deliver a service." For example, Adobe recently moved its creative services to the cloud.

Here is an explanation, humorous, a little coarse, but still, and watch the Steve Jobs video, too for more information: 
http://gizmodo.com/what-is-the-cloud-and-where-is-it-1682276210?sidebar_promotions_icons=testingon&utm_expid=66866090-67.e9PWeE2DSnKObFD7vNEoqg.2&utm_referrer=https%3A%2F%2Fwww.google.com%2F

You can also pay for backing up on your computer. Plans like Carbonite, Barracuda, Peak 10, Idrive, SOS, on and on. Most of which you pay for them to back up daily or whenever you choose with whatever plan you go on. BUT!! Also know, that if you miss a payment, or two, your information will probably go away anyway. Usually, they will warn you of a payment upcoming or that you missed, but , if you don't pay, then you are playing with MORE fire and loss of everything.


So, what IS on your hard drive? 


Typically your music, some movies, films, data files, projects and photos. All stored on your hard drive. And the hard drives are getting bigger and bigger all the time.. did you read me when I said they COULD. But also know that ALL hard drives fill up or die at some point. 
this could also mean loss, theft, natural disaster, accidentally deleting all the stuff that you've worked so hard on collecting, could be gone in an instant, for any number of reasons.


Easy ways to back up your critical information:

When my daughter was in school and working on her important school project reports, thesis, etc. the first time she lost most of her work was a wake-up call for both of us. Since we use Gmail, which we can access from anywhere in the world, along with Yahoo, Hotmail, Outlook.com and for the ancients, the most computer invasive: AOL mail, etc., she would at the end of her research and compiling day, she would send that document as an attachment to her email address, thus backing it up nicely. After that, it became a regiment for her. 

My older friend, has a flash drive always attached to her computer, that way, as she's writing her book, she can always save to both the hard drive and flash drive.. problem solved! 


What Flash Drives Look Like.. All kinds!


    


    



Read/write Cds/DVDs can also be used And external hard drives hooked up to your computer.

Next, Prioritize Your Data


What is the most important to you? Photos? Documents? If you lose your Hard Drive, especialy with photos, you might be lucky enough to have family members who have duplicates of wedding, birthday, vacation, travel, etc. photos.. also check your 'send' files in your emails.. a lot of photos that you sent to others might be found there.

TECH TIP: Know that even when you delete emails, you can most probably go to your TRASH file. They are still there (Unless you set that file to delete forever, after 30 days. Til then, you're good.

Look around a bit to find all you want to back up BEFORE your hard drive crashes.
Set a date on your phone or calendar to remind you (phone is louder than written on a calendar, no matter what color or how big you write it. )

Then again, if you ask techs who see hard drive failures every day, we tend to forget to back up our stuff as well. Duh on us, yes?

Just In Case you DON"T Save stuff in time: 

There ARE forensic hard drive recovery specialists but also know that for being specialists, it's not only time-consuming but necessary for special equipment and programming that will have to be used, thus, your cost will become sort of great. Most start their time at nearly $100 per hour. They can be found on line in your city.


AND...DO YOU KNOW WHERE YOUR COMPUTER PROGRAMS ARE?

I hope so! I suggest a shoe box, small plastic bin, a notebook with CD sleeves. Which is what I do.. when I need a program, in case I replace my computer or it crashes, BINGO! I have all my current programs at my finger tips.

I can't tell you how many people we ask what programs they have that they want us to load on their new computer. The answer most everyone relates, is "UH.. .I'm not sure.They are sorta all over the place in a lot of drawers and stuff.."

Just remember, you probably paid a LOT for those programs. Keep them close and safe within your loving arms. Yes?

So, if you need to organize your back ups, Program Discs, Check out your hard drive BEFORE it passes away where we have to tell you, "It's Dead, Jim", please call us and keep in touch for our TUNE-UP TUESDAYS, when you can bring your computer to our shop, we'll run diagnosis, clean up for nasties you've picked up and updating! We'll keep it a couple of days and charge you $50 for our services. 

Treat your computers/laptops/ electronics like the precious friends they are. Yes?

Anyway, for answers to more of your questions, please contact us, Tech in a Flash,  at 239.244.9600 


      
MATTHEW AND BEKKI, at your service!


Tuesday, September 15, 2015

Help us help you diagnose your issue. Here's how you start! Learn about www.techinaflash.net

First of all, when you contact us, we will ask you many questions. But if you want to pare down those questions, here's what you need to know.

We get so many flat statements like, "my computer isn't working." "I can't get online." "something's wrong with my computer."

Let's start with the first question.
"my computer isn't working." Can you tell us exactly what's not working? Can you turn it on? (yes).. good. Does the icon page come up? (yes) What happens when you click on an icon (picture) of, say, Chrome? What is the Icon that takes you out to the internet? (you tell us) What happens when you click on it? (You tell us)

We need to absolutely know EXACTLY what happens. So, if you can re-create everything exactly, take notes on what and what doesn't happen, it's the first layer of the 'onion' that we MUST know to proceed.

We always hear that people are computer illiterate. We get that, that's why we are here! To bring you one step closer to not being intimidated by your computer, so you can relax in the knowledge that you are just an hour or two away from having your computer seem like it has a brand new life!

Whether you are a residential user just wanting to email or Skype with the grand-kids, or a business user with one or many computers running your business. Here's what we need from you!
Please tell us..
1. What are you trying to do? If something's different than the usual, we need as many details as you can possibly give us! The more we know, the faster we can get RIGHT to what you need without a lot of false dancing around and wandering in different wayward paths that lead us from the immediate problem you're having

2.What exactly are you expecting what you need your computer to do? When you click on something you always click on,  HOW is it different? Is there a pop up? freezing  up? What exactly? If you can make notes, please do that!

3. What are you doing that's the usual things you do and what's NOT happening or what IS happening that's really different?

On our website: HTTP://techinaflash.net/ you will see in the upper right hand corner where is says "REQUEST SUPPORT". this will bring you to a page where you enter all of YOUR pertinent information. This will bring you to another page where you write down ALL of whatever you see happening on your computer as well as what you are NO LONGER SEEING on your computer. Think about how you can make it as succinct yet explanatory as possible without making it 'war and peace' where we can't figure out what you're trying to say, yes?

This will IMMEDIATELY create an 'emergent' new ticket that is brought to our phones where we will see it, act on it and get help to you started as soon as we see it! If you just email it to one of us, we'll get to it when we see it. But, we want to do MUCH better than that! We want to see it FAST!

To learn so much more, please look over our site and click on different informational headers that will tell you a lot more about us. This will help you relax and understand that we are here totally for your satisfaction and to help you!

I'm Bekki and Matthew Rebstock is our Chief Tech and company owner. We are here to help YOU!

Welcome to Bek The Tech where I help you help us diagnose your computer issues!

Hi and welcome to Bek the Tech blogger


I am a computer tech working at www.techinaflash.net with Matthew Rebstock and we are techs on the go!
We feature in-home, at the workplace, and remote computer help.
 
With this blog, we'll help you help us diagnose your issues and get you the best service on the planet!
Come and join us for a wonderful way to learn!