Showing posts with label Consulting. Show all posts
Showing posts with label Consulting. Show all posts

Thursday, July 7, 2016

OSX Finder Crash Loop - FIX

PROBLEM: Your Mac’s finder is stuck in a crash loop Other apps work but your finder crashes and re-crashes indefinitely; even when the system is restarted. Other user accounts may work just fine and even a newly created account will work just fine. Permissions repair through the OSX DiskUtility doesn’t help either.
  1. Start with another user account or create a temporary administrator account. 
  2. Download and install PathFinder (search via Google) for all users. 
  3. Pin the PathFinder icon to your dock. 
  4. Log on with with your usual name and, with Pathfinder, move files that are in your Desktop folder, over to another directory. 
  5. No more Finder crash! 
Pacific Northwest Computers 
360-624-7379

Wednesday, July 18, 2012

How did I get infected? Take these steps so it does not happen again!


One of the most common questions found when cleaning malware is "how did my machine get infected?". There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.
Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.


Do not use P2P programs

Peer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file you’re downloading through P2P programs is safe.

It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.

Practice Safe Internet

Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.

Below are a list of simple precautions to take to keep your computer clean and running securely:

1) If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.

2)  If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.

3) If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know who is themselves infected with malware which is trying to infect everyone in their address book. A key thing to look out for here is: does the email sound as though it’s from the person you know? Often, the email may simply have a web link or a “Run this file to make your PC run fast” message in it.

4) If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of pop-ups, or Foistware, you should read this article: Foistware, And how to avoid it.

5) There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. Removal instructions for a lot of these "rogues" can be found here.

6) Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you, or will download a file to your PC without your knowledge. You can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake. DO NOT click on these windows, instead close them by finding the open window on your Taskbar, right click and chose close.

7) Do not visit pornographic websites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do, as this can often form part of their funding.

8) When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link you should message back to the person asking if it is legit.

9) Stay away from Warez and Crack sites! As with Peer-2-Peer programs, in addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.

10) Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download files from a site, and are not sure if they are legitimate, you can use tools such as BitDefender Traffic Light, Norton Safe Web, or McAfee SiteAdvisor to look up info on the site and stay protected against malicious sites. Please be sure to only choose and install one of those tool bars.

11) DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software. Sometimes even legitimate programs will try to bundle extra, unwanted, software with the program you want - this is done to raise money for the program. Be sure to untick any boxes which may indicate that other programs will be downloaded.

Keep Windows up-to-date

Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.

Windows XP users You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.

Windows Vista users You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.

Windows 7 users You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here

Keep your browser secure

Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.

The latest versions of the three common browsers can be found below:
Microsoft Internet Explorer
Mozilla Firefox
Google Chrome

Use an AntiVirus Software

It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.

See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.

It is imperative that you update your Antivirus software at least once a week (even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

Use a Firewall

I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.

All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).

In addition, if you connect to the internet via a router, this will normally have a firewall in-built.

Some people will recommend installing a different firewall (instead of the Windows’ built one), this is personal choice, but the message is to definitely have one! For a tutorial on Firewalls and a listing of some available ones see this link: Understanding and Using Firewalls

Install an Anti-Malware program

Recommended, and free, Anti-Malware programs are Microsoft Security Essentials, Malwarebytes Anti-Malware, Spybot Search & Destroy and SuperAntiSpyware. You can find these programs and more on our other blog article; PNW Computer's Recommended Software Programs & Downloads!

You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.

Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is very important to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities (such as Adobe Reader and Java). You can check these by visiting Secunia Software Inspector.

Follow this list and your potential for being infected again will reduce dramatically!

Grinler. "How Did I Get Infected?" Bleeping Computer - Computer Help and Discussion. Bleepingcomputer.com, 24 Jan. 2004. Web. 22 Dec. 2011.

Tuesday, July 7, 2009

Lexmark Printer Service/Print Spooler Bug: XP Systems

Because of a flaw in Lexmark's printer driver and software removal and uninstall utility. After removing a Lexmark printer driver and software from an XP system, may create "Printer Installation Failed: RPC Server Unavailable" and/or "Print Spooler Service Is Not Running" error messages.

The first thing you always need try if you are having any kind of basic software problems, is to try uninstalling and reinstalling the appropriate drivers and software, and/or visit the manufacturer's website and download and install the latest drivers and software for your device. If this does not fix your printing issues, the problem probably lies within Windows itself. (Unless of course, your device is physically broken or you have a broken cable). But what I have seen over the years is that customers with these specific "Printer Spooler Service" or "RPC Server Unavailable" errors happen to to use or have had used a Lexmark printer.

So really quick, here is the definition of what a Windows Service, like the Print Spooler Service, basically is: (Taken from Wikipedia.org Link)
"A Windows service is an application that starts when the Microsoft Windows operating system is booted and runs in the background as long as Windows is running."
*Quick explanation of What Is RPC and How Does it Work.

The Print Spooler Service itself basically is a Windows service that starts when your computer starts, and is constantly running in the background of your operating system to load files to memory for printing. What I would find is that there would be a service installed in the computer from Lexmark called the "LexBce Server". The LexBce Server Service is installed by the Lexmark printer's software to configure the onboard network print server.
*The print server
accepts jobs from computers and send the jobs to the appropriate printers.

When the service installs itself however, it installs itself so the Windows Print Spooler Service becomes dependent upon it. So disabling the LexBce Server Service will make it so that your Print Spooler Service can no longer run. Which in effect disables all printing on your computer. Also, without the Print Spooler running, an installation of a printer is not going to be possible and you are going to most likely get the "RPC" error that was mentioned at the begining.
*The LexBce Server Service can also come pre-installed on some Dell computers that are packaged with "Dell" printers; that's because they are made by Lexmark.
**The LexBce.dll, a file related with the LexBce Server, is also related to
the software "MarkVision for Windows" also a product of Lexmark.

So, do all Lexmark printers install this service? I can't say for sure. What I do know is that if you are using a Lexmark printer or have had a Lexmark printer, you could have the LexBce Server Service installed on your computer and may eventually experience the discussed issues. Same scenario for previous owners of Lexmark printers. The un-installation of Lexmark printer drivers/software might have left this service behind. The bottom line is that if LexBce Server Service was, or is, on your computer and happens to fail or is disabled instead of removed during software/driver removal, say hello to the Lexmark Print Spooler bug!


*I originally wrote this blog working at Battle Ground Computers, back when I was a manager at their store; it was a great find of mine so I wanted to re-post it on my new blog with some updated and edits. My original blog posting; http://tinyurl.com

Get the most out of your internet!

Getting the Most Out of Your Internet

Probably one of the number one issues that is brought up to me is "Why is my internet so slow! It use to be so much faster!". Well dial-up or high-speed, everyone can be affected by internet "chug". So here are some quick recommendations and thoughts on how to keep your internet AND your computer running quickly and smoothly!

1) Confirm that the computer itself is operating at maximum efficiency. It is very common for computers, mainly those using the Microsoft Windows Operating Systems, do become sluggish after as little as a few weeks of operation. This can make users think that their dial-up connection is extremely slow and can become an incentive to convert to a more expensive broadband connection. Sluggish computers are, of course, less noticeable with broadband.

2) Empty browser's caches and cookies, which are directories that the browser uses to retain copies of previously visited web pages. When these caches become very large, they can consume considerable space on a Hard Drive and thus slowing down your computer's operation, including its ability to displaying web pages.
**CCleaner is a free PC optimization tool. It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner! CCleaner allows Windows to run faster, more efficiently and gives you more hard disk space. The best part is that it's Small, Fast and Free!
*Here is a direct ink to it's download page: http://preview.tinyurl.com/bvtbj
*
Here is a link to instructions on how to install and use CCleaner: http://preview.tinyurl.com/ngh4pc

3) Use a fast web browser. There are large differences in the speeds at which browsers render web pages; a browser is rendering when it's interpreting the web site's "geek" code and converting to a form which we see as a beautiful web page. The fastest is said to be closely between FireFox 3.5 and Google's Chrome web browser. Also, the newer the version of these browsers, generally the faster you'll go. Reason for this include improvements in coding and in how previously visited pages are stored in the browser cache. Internet Explorer should be avoided because it is the slowest of the major browsers, because it has inferior security and because it lacks other advanced features. FireFox and Chrome can be downloaded from the Internet at no cost and are available for use with most major operating systems.
*
Here is a link to download FireFox: http://preview.tinyurl.com/y3prgo
*
Here is a link to instructions on how to install FireFox: http://preview.tinyurl.com/5keeym

4) Use tabbed browsing. Tabbed browsing is an innovation built into advanced browsers such as FireFox and Chrome that allows multiple pages to be opened at a time in which appear as different pages in a single web browser window. Each of these pages is easily accessible by clicking the appropriate tab along the top of the window. This can be much more convenient than having to open each page in a separate browser window when it is desired to have a number of pages open simultaneously. Furthermost, it can also speed up the web surfing by making it more convenient to be downloading other web pages while another page is being read.

5) Avoid unnecessary browser plug-ins, which are downloadable software that is designed to "add functionality" to your web browser. Plug-ins can substantially decrease web page rendering time because they allow additional data to be downloaded for many pages or is trying to consistently update "sibling" applications. Perhaps the most notorious example is Adobe Flash, which is used for moving images.

6) Turn off pop-up windows. These unrequested windows, which are usually used for advertisements, consumes bandwidth and can slow down the rendering of web pages. They are also a nuisance because the user has to click them to close them. The ability to turn off pop-up windows is a major feature of advanced browsers such as FireFox, Chrome and Safari; it was not available on Internet Explorer as of early 2006.

7) Turn off web page images. This is probably not desirable for most people, but for those who are interested solely in text, it can speed up the loading of web pages considerably, particularly those which contain numerous advertisements or other images. With the FireFox browser, for example, this is accomplished by clicking on the Edit menu to open the Preferences panel, clicking on the Web Features icon and then removing the check mark from the Load Images check box. Finally, click the OK button at the bottom of the panel.

8) The last and best solution is to optimize the performance of the computer itself. Several causes of sluggish performance are most notably caused by:
- A full, or nearly full, hard disk drive (HDD) & a lack of defragmentation.
- An older computer with a slow microprocessor with limited memory
- The presence of viruses or other malware in the system.
**Typically, the first of these is the easiest to correct; this can be accomplished by removing little-used files and programs. However,
malware can be "in-the-wild" per-say for up two weeks or more before being identifiable by your Anti-virus software. So there is small possibility that there might be something in there that just can't be seen for found yet; worse case scenario of course.


Additional Software Recomendations:
Applocations were picked for the effeciency, effectivness and low impact on the user's system performance.

Avira’s AntiVir Personal Anti-Virus:

Avira AntiVir Personal - FREE Antivirus is a reliable free antivirus solution
, that constantly and rapidly scans your computer for malicious programs (such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc.), monitoring every action executed by the user or by the operating system and being able to react promptly when a malicious program is detected. Avira AntiVir Personal is a comprehensive, easy to use antivirus program, designed to offer reliable free of charge virus protection.

Malwarebyte's Anti-Malware:
Detects and removes Trojans, Worms, Spyware, and other malicious programs.

  • Repairs damage left by malware

  • Internet surfing tracks erased with TrackSweep

  • Incremental updates for faster downloads

  • Efficient computer resource footprint

  • Free software updates throughout license duration

  • Free support from worldwide security volunteer network


Safer Networking’s Spybot Search & Destroy:

Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behavior to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is also absolutely free.

JKDefrag:
Why use this defragger instead of the standard Windows defragger?

  • Much faster.

  • Extremely easy to use.

  • Optimized for daily use.

  • Several strategies of disk optimization.

  • Directories are moved to the beginning of the disk.

  • Reclaims MFT reserved space after disk is full.

  • Maintains free spaces for temporary files.

  • Can defragment very full hard drives.

  • Can defragment very large files.

  • Can defragment individual directories and files.

  • Can be run automatically with the Windows Scheduler.

  • Can be used from the commandline (DOS).

  • Can be used as a screen saver.