SECHOTECH, LLC - Computer & Laser Printer Services

  • CLOSED
  • Newsletter

BEWARE or new "Crypto Locker" virus

10/27/2013

0 Comments

 
Picture
The Crypto Locker virus is considered to be a historically devastating virus because it holds your computer hostage until you pay a ransom. The Crypto Locker virus is easy to get and almost impossible to get rid of, unless you pay a ransom of up to $700. “The CryptoLocker Virus - which not only has the potential to destroy a computer hard drive, but holds the computer owners data ransom -infects computers through a legitimate-looking email, usually from a reputable company like FedEx or UPS,” reported University Herald on Oct. 26, 2013.

More specifically, the Crypto Locker virus is typically spread through emails that pretend to be customer support related issues from Fedex, UPS, DHS, etc. These emails contain a zip attachment that when opened will infect the computer. These zip files contain executables that are disguised as PDF files as they have a PDF icon and are typically named something like FORM_101513.exe or FORM_101513.pdf.exe. Since Microsoft does not show extensions by default, they look like normal PDF files and people open them.

The Crypto Locker virus, also written as CryptoLocker virus, is a ransomware computer program which holds your computer hostage until you pay a ransom. Holding your computer hostage, in this case, means that you will not be able to use any information on your computer unless you pay a ransom.

The Crypto Locker virus was released around the beginning of September of 2013 and shows up on your computer with a display which shows a Crypto Locker payment program that asks you to send a ransom, usually either $100 or $300 in order to decrypt the files.

The Crypto Locker virus screen might be asking for even more money, but it will display a timer stating that you have 96 hours, or 4 days, to pay the ransom, or it will delete your encryption key and you will not have any way to decrypt your files. This ransom must be paid using MoneyPak vouchers or Bitcoins.

Once you send the payment and it is verified, the program promises that it will decrypt the files that it encrypted, at least that is what the Crypto Locker virus screen promises. However, even when paying the ransom demanded by the Crypto Locker virus screen, one might not get all of the encrypted files back.

Before deciding to pay a ransom to get rid of the Crypto Locker virus, it is a good idea to visit CryptoLocker Ransomware Information Guide and FAQ, a website which discusses the Crypto Locker virus in detail and which continually updates its information.

While the website’s information about the Crypto Locker virus might sound too technical for some, it does provide helpful information on whether or not to pay a ransom, how to delay paying ransom, and what other options might be available. If the website is too difficult to understand, consulting a computer techie might be the best first step to deal with the Crypto Locker virus.

For computer techies, following some of the instructions on the website provides useful information on how to block the Crypto Locker virus, how to generate a list of files that have been encrypted by the Crypto Locker virus, and how to potentially restore files that were affected by the Crypto Locker virus.

Unfortunately, the Crypto Locker virus is not the first nor will it be the last virus that is attacking computer users. As such, the Crypto Locker virus is an important reminder to follow three major rules:

  1. Always back up any information from your computer that you do not want to lose (files, documents, pictures).
  2. Opening any files or links in your e-mail could be a virus, no matter how trustworthy the sender might sound. (A most recent method of spreading a virus is sending it under a friend’s name.)
  3. Computer problems are going to happen; it is just a matter of time. Whether it is through a Crypto Locker virus, technical failure, or other incident, nothing on a computer is forever.

0 Comments

Windows XP and Office 2003 end-of-life support

5/4/2013

1 Comment

 
Many companies and businesses around the world, have not yet upgraded from Windows XP and Office 2003. Businesses did not feel the need to upgrade their systems because they have put tremendous pressure on Microsoft to continue supporting an already aged operating system.

However, within the next year, Microsoft will cease to support its longest ever supported operating system (over 12 years). Microsoft has recently released a statement inviting companies to take a leap towards Windows 8 and Office 2013.

As such, it is important for companies to begin the process of transitioning into a more secure operating system as quickly and smoothly as possible. Newer operating systems offer a much more efficient alternative for businesses. Over the past decade, these operating systems have considerably improved the ease of use by employees and IT managers, increasing companies’ productivity. They also have the important advantage of being supported by Microsoft, such as the one Windows 7 or 8 has over Windows XP.

But what do we really mean by saying that an operating system is supported by Microsoft? Well, it basically means that your business will miss out on important updates to its security systems leaving your company unprotected against new threats and threatening its productivity and the company's and employees' sensitive information.

In addition, Windows 8 has an easy-to-use “User Access Control” feature that allows you to control user access and to determine who gets to be a system administrator. In the short term, you will still be able to run Microsoft XP applications as Windows 8 tricks your system into believing that the operating system is still Microsoft XP. However, any newly designed Windows 8 application and will require the newer operating system to be installed.    

Some of the benefits that Windows 8 offer include a much faster system than Windows XP which can in turn maximize productivity and allow for more high-end programs to run smoothly, if we consider that these programs are problematic when they run on older operating systems. Windows 8 has a much quicker power-off speed than any Windows XP machine.

By upgrading to the newer operating systems you will not only protect your company and your employees, but you will also boost productivity. Microsoft’s early announcement of such a decision is actually meant to assist companies begin and successfully complete the transition process with minimal interruption to businesses.

1 Comment

Anti-virus and malware programs - Differences between them.

2/6/2013

1 Comment

 
When it comes to computer jargon, there are tons of different terms that many use interchangeably and improperly. One common misconception is the idea that a virus and a malware are the same thing and that an antivirus program will rid a computer of both. Unfortunately that’s not true.

What is malware?
Malware is a broad term that encompasses a vast amount of malicious programs designed to infect or harm a computer. Such malware includes viruses, adware, spyware, worms, and more. They all have different methods but each one has a specific target: to infect your computer.

What is a virus?

As mentioned earlier a virus is actually a type of malware, but it’s quite different than the rest of the malwares. A virus’s intent is to infect your computer and cause problems (ie crashing it, preventing programs from opening, and more), but where it differs is that a virus can spread and replicate itself. Much like viruses that infect humans, the longer a virus is on a computer infecting it, the more replicas it will make of itself and the harder it will be to kill.

How to get rid of malware and viruses

An antivirus program targets viruses completely while a malware program searches for a broad spectrum of malicious programs. Fortunately for you there are tons of free programs available that should effectively clear up your computer from any type of malware! Check below for the top free antivirus programs and free malware programs.

Antivirus Programs:

AVG Free
Avast!
Comodo

Malware Programs:

Malwarebytes
Spybot Search & Destory
Combofix

1 Comment

Home Computing Tip-of-the-Month: "Best Online Downloads for Games"

3/24/2012

0 Comments

 
Picture
The Windows Operating System offers multiple ways to find and play games online, which makes it easier to enjoy social games, PC game downloads, and many more. Windows is the best bet when attempting to access the top computer games of today including casual games, independent games, and free-to-play games.

Casual Games

If you are looking for fun, intuitive outings that speak to kids and adults alike then casual games are for you. Causal games are appropriate for shot or long-term play. Generally, they are free to play for less than sixty minutes. Many of these casual games can be found on the following sites:

  1. MSN Games
  2. PopCap Games
  3. iWin
  4. Big Fish Games

Independent Games

The independent games are developed and created by small teams of coders, which bring more artistic ideas into the gaming world in the fields of tackle topics, play style, and themes. The top examples of independent games include the following:
  • Minecraft
  • Braid
  • Recettear
  • World of Goo
  • Gemini Rue
Free-to-Play Games

If you are just looking for some games to play on the computer that are completely free then the following game sites might be just what you're looking for:
  • Play Your Game
  • Club Bing
  • Newgrounds
  • Shockwave
  • Kongregate
Have Fun!

0 Comments

Business Computing Tip-of-the-Month: Creating Better Documents

3/24/2012

0 Comments

 
"5 Fantastic Tips for Developing and Creating Better Documents"

It is common to want great-looking documents that leave an impact on the viewer, but often there is just not enough time in the day to put the attention to detail that would bring about such an outcome. In order to more easily reach this final goal, Microsoft Office is one of the best tools to create impressive documents.
Document
Choosing Content Carefully

If you attempt to say everything, then your most important items will go unnoticed. Therefore, it is critical that you make choices and leave the most important information some room to stand out. By being critically selective about which content to include in your document, you will most likely grab your audience's attention and get your main point across.

Create Your Own Style Set

A style is a particular set of formatting that you give to your document such as headers, bullet points, numbered lists, footers, table of contents, footnotes, columns, etc. By developing a style, the format of the document is more consistent. This will guide your reader through the document in a concise manner.

Use Tables for Page Layouts

One type of organizer in a document is a table, which are easy to use and look fantastic. Text, graphics, or even other tables can be held within larger tables. They are most helpful in simplifying the most complex of layouts.

Use Footnotes for Supporting Details

A footnote or endnote is an option when you are looking to reference any sources used or to provide an important point to the reader. They are easy to insert and keep the main information clutter free, but are still accessible by the reader.

Adopt the MLA Format

MLA (Modern Language Association) style is most commonly used to write papers and cite sources within the liberal arts and humanities. It has become a standard format in many colleges and universities and lays the foundation for beautifully organized documents that communicate in a concise, clear manner.

If you've ever wondered how to properly cite a movie or book title, create end notes (as mentioned in #4 above), cite your sources, format in-text quotations, and much more, MLA is the perfect source for answers. Click Here to Visit MLA Online.

0 Comments

Home Computing Tip-of-the-Month: "Sharing With Friends & Family In Real Time"

1/21/2012

0 Comments

 
Picture
_ "Sharing Your Vacation With Friends & Family In Real Time"

Due to the growing number of free blog, photo-sharing, and social networking websites, such as Twitter, Facebook, Delicious, YouTube, and Where are You Now? (WAYN), loved ones do not have to wait to hear about your trip.


Choosing a Social Network or Photo-sharing Site

There are multiple websites that allow users to share photos or to publish a more in-depth blog, including the following:
  • Flickr
    - Online photo management and sharing application
    - You can control permissions
  • Picasa
    - Software download that helps you organize, edit, and share your photos
    - You can control permissions
  • Traveljournals.net
    - Online travel journal, allows you to share pictures and stories
  • Facebook & Twitter
    - Keep up with friends and upload photos
Once you choose the site you would like to use, you'll have to create a user account for that site before you can begin sharing your vacation.

What Technology to Pack

Before leaving for your adventure, be sure to bring the following items:
  • A digital camera or camera phone
  • A computer (either your own laptop, or a computer located in a hotel, library, cyber café, cruise ship—the options are increasing, daily)
  • A media card reader, if your laptop doesn't have one
  • For travel outside of North America, a power adapter for recharging your mobile phone or laptop

0 Comments

Business Computing Tip-of-the-Month: "Improve Working on a Virtual Team"

1/21/2012

0 Comments

 
Picture
_
"3 Ways to Improve Working on a Virtual Team"

Working on a virtual team can be a challenge. Here are some suggestions to help with virtual team management and to help your team work more effectively.

Use Instant Messaging for Unscheduled Meetings

Use instant messaging to get quick answers or opinions from your teammates. IM programs are free. At a glance, you can check your coworkers' status to see whether they're available to chat online. The following are different ways to use IM.

- Use a webcam to connect visually.
- Use multi-person chat to conduct a spontaneous online meeting.
- IM your teammates' cell phones when they're away from their computers.

  1. Use a Virtual Conference Room

    Web-based conferencing, or web conferencing, makes it possible to brainstorm, create a slide presentation, have a staff meeting, or conduct training sessions with a group of people—even if they are thousands of miles apart.

    The following is needed to begin:

    Using either Lync or Live Meeting requires coordination with your IT department to create a subscription account or to install a server.

  2. Share Meeting Information

    When organizing meetings, the simplest way to keep your team members on the same page is to create a web-based, shared calendar that everyone can edit. Then you'll know that everyone is looking at exactly the same schedule and can see any changes instantly. You can create a shared calendar in a variety of programs, including Windows Live Hotmail and Outlook.

    The following is needed to begin:

    In Windows 7, the calendar is part of Hotmail. Sign up for a free Hotmail account by getting a Windows Live ID.

0 Comments

Business Computing Tip-of-the-Month: "7 Tips to Protect You From Laptop Theft"

1/5/2012

0 Comments

 
Picture
_
As more people begin using laptops, the number of laptop thefts are increasing.

If your laptop computer is stolen, or if someone gains access to your files, your company, personal and financial data can be exposed.


See the following tips on how to stay protected.


  1. Don't use computer bags.
    Computer bags only make it more obvious that you're carrying a laptop. The use of padded briefcases or suitcases is recommended.
  2. Use passwords that are strong, and not kept in the computer bag.
    Strong passwords make it more difficult to break into your computer deterring individuals from trying to access your files.
  3. Encrypt data.
    With the Windows Operating System, you can choose to encrypt files and folders. Which causes individuals to not be able to read data and see your information.
  4. Keep an eye on your laptop.
    Don't lose sight of your bag, such as when going through airport security.
  5. Buy a laptop security device.
    If you need to leave your laptop in a room or at your desk, use a laptop security cable to securely attach it to a heavy chair, table, or desk. The cable makes it more difficult for someone to take your laptop. There are also programs and devices that will report the location of a stolen laptop.
  6. Do not leave your laptop in a hotel room.
    If you must leave your laptop in the hotel room, place the do not disturb sign on the door.
  7. Put your name and contact info on the laptop.
    In addition to putting your name on the laptop, it is also recommended that you include a, "Reward with no questions asked if returned." tag line as well. Both of these increase the chance of your laptop being returned, no matter what the circumstance.

0 Comments

Home Computing Tip-of-the-Month "How to Add More Memory to Your Computer"

1/5/2012

0 Comments

 
Picture
_When your RAM is unable to store all of your work easily, your computer slows down and becomes more difficult to run. One of the solutions is to expand the space—or install more RAM.

Before purchasing anything, it is necessary to know how much memory is currently in your computer and what type of memory to buy.

How to Find Out How Much RAM Your Computer Has

There are two different ways to find out how much RAM your computer has including the following:

  1. You can open the System Information dialog box to see the installed physical memory
  2. You can go to Control Panel

To open System Information perform the following steps:
  1. click Start, click All Programs
  2. click Accessories
  3. click System Tools
  4. click System Information
  5. In the left pane, select System Summary. The Installed Physical Memory (RAM) entry in the list tells you how much RAM your computer has.

Picture
_The Installed Physical Memory (RAM) entry in the System Information list tells you how much RAM your computer has.

How to Find Out How Much RAM is Needed

The operating system determines the amount of RAM that's needed. Systems running Windows 7, Windows Vista, or Windows XP, should have the minimum recommended amount, however more may be better. If the PC is solely used for surfing the Internet and writing letters, it may only require the minimum amount of RAM required to run the version of Windows you have installed on your computer. In order to allow for the best performance possible —consider increasing the RAM on your computer to at least 2 gigabytes (GB). 4 GB is ideal.

How to Figure Out What Type of RAM is Needed

Contact the manufacturer or use an online memory advisor, such as those from Crucial Technology or Kingston Technology. These memory advisors use information that you enter about your computer model and do a memory check for your specific PC that tells you which products work with your system.

Installing the New RAM

It is recommended that you consult a professional if you have not installed RAM before. We offer affordable installation services and can assist you with increasing your RAM. Call our office for more details and to setup an appointment.

0 Comments

Business Tip-of-the-Month "Managing Computer Files and Folders"

11/30/2011

0 Comments

 
Picture
_Learning better file management can improve time management skills and increase productivity at work.  The following tips are just a few ideas to improve file management skills.

Ideas for Managing Your Files and Folders

  1. Use a Consistent File and Folder Naming System.  It is imperative that you develop a naming system for the kinds of files you create most often and then continue to use that system - allowing for more organized, easier to navigate folders.
     
  2. Keep File and Folder Names Short.  Do not use long names for folders or files, as this can cause a cluttered look, which may make it more difficult to find a particular file.
     
  3. Separate Ongoing and Completed Work. To keep the Documents folder from becoming too cluttered, use it for only active files, which will allow easier access to the active items.  Completed files should be moved to a different folder or location, such as the following:
  • Desktop folder
  • Special archive folder
  • Flash drive
  • External hard drive
  • CD
  1. Similar Items Should be Stored Together.  Restricting folders to a single document type makes it easier for you to find files. For example, putting all of your graphics in a single folder allows for easy access to the slide show feature in Windows Explorer.
     
  2. Storing Documents Online. Microsoft SharePoint 2010, Windows Live SkyDrive, and DropBox allow you to save documents safely online.  As a result, it is easy to access them from outside the office, share them, and edit them online by using Office Web Apps.

0 Comments
<<Previous
    Picture

    Tips and Newsletter

    "Advice for using technology better, faster, and smarter"

    Keep up to date in the latest security information and other tips that will help improve your computing.

    join our mailing list
    * indicates required
    Close

    Archives

    October 2013
    May 2013
    February 2013
    March 2012
    January 2012
    November 2011
    September 2011
    August 2011
    July 2011
    June 2011
    May 2011
    April 2011

    Categories

    All
    Air Flow
    Battery
    Calendar
    Data Breach
    Display
    Documents
    Fake
    Files
    Folders
    Games
    Identity Theft
    Law
    Mac
    Maintenance
    Malware
    Managing
    Meeting
    Office 2010
    Overheating
    Photo
    Photo Sharing
    Play
    Playstation Network
    Power Settings
    Printing
    Promotion
    Ram
    Recover
    Restore
    Rogue
    Security
    Sharing
    Social Network
    Software
    Sony
    Tips
    Troubleshooting
    Upgrade
    Weather
    Windows
    Windows 7

    RSS Feed


    Follow @SechoDB

    SechoTech LLC

    Promote Your Page Too

© Copyright 2011 - SechoTech, LLC