Monday, December 23, 2024

Improvised Diagnostics using the "OODA Loop"

Improvised Diagnostics: The "OODA Loop"

The OODA loop is a decision-making model that helps people respond to crises and make better decisions

Thursday, December 19, 2024

Lenovo M720Q Slim PC: Testing the Limits of a Mini Gaming PC

Lenovo M720Q Slim PC: Testing the Limits of a Mini Gaming PC

Mini PCs have become increasingly popular for their compact design and versatility, but how well can they perform when pushed to the edge? I recently set out to test the Lenovo M720Q Slim PC—an affordable and compact system rumored to be a surprisingly capable mini gaming PC. Here’s the journey of my testing, modifications, and results.

Thursday, December 12, 2024

Power Draw Tester & Injector - GPUs & Electronics; Diagnostics & Testing, etc.

"Homebrew" Power Tester/Injector - Electronics Diagnostic Tool!!


I built this device to allow me to measure the power being drawn by a device (meter on the right). If a device is working, it'll pull a certain amperage and voltage when power is applied.
But it can also inject power (meter/device on the left) to force very low amperage into a device, so I can check that device's board with a thermal camera for shorts.

Monday, October 14, 2024

Your Online Account(s) Got Hacked & You Are Locked Out: What Do You Do!?


Online security is becoming increasingly critical as more of our daily lives move onto the internet. If you believe one or more of your online accounts have been hacked or compromised, it’s essential to act swiftly. If you are locked out of an account, the situation becomes even more urgent. Below are detailed steps you can take to mitigate damage, regain control, and enhance the security of your other online accounts.

Sunday, September 15, 2024

Mac Self-Service System Configuration: How-To

Apple Self-Service
System Configuration: How-To

System Configuration may be required at the end of your repair. System Configuration is a postrepair software tool that completes the repair for genuine Apple parts. System Configuration has a number of purposes that vary based on the part replaced. Refer to the Introduction section of the model you’re repairing for a complete list of details.

Before initiating System Configuration, ensure that the Mac is running the latest version of macOS. You’ll have one attempt to complete System Configuration. If the attempt is interrupted, canceled, or encounters an error, the Mac will display a message instructing you to contact the Self-Service Repair Store team for assistance.

Monday, August 26, 2024

Understanding Phishing and Social Engineering Attacks: A Deep Dive Into Modern Scams

Understanding Phishing and Social Engineering Attacks: A Deep Dive Into Modern Scams

Phishing and social engineering attacks have become increasingly sophisticated, targeting individuals and organizations intending to deceive and exploit. One of the most prevalent forms of social engineering is the fake tech support scam, where attackers pose as legitimate technical support representatives to gain access to personal information, financial details, or direct control of the victim’s computer. However, there are many other ways a scammer can convince someone into believing and going along with a targeted Scam. In this article, we’ll explore how these scams operate, their common tactics, and how you can protect yourself and others from falling victim.

Friday, August 9, 2024

Set your Windows PC Network Profile to Private and Make Sure File and Print Sharing is On

Ensure Your Windows PC's Network is Set to Private and File & Printer Sharing Settings Are Correct!

1. Check and Set Your Network Profile to Private

  • Open Settings:

    • Press Windows + I to open the Settings app.
  • Go to Network & Internet:
    • In the left-hand menu, click on "Network & Internet."
  • Choose Your Network:
    • Click on "Properties" next to your current network connection (e.g., Wi-Fi or Ethernet).
  • Set Network Profile to Private:
    • Under "Network profile type," select "Private."
    • This setting makes your PC discoverable on the network, which is necessary for File and Printer Sharing.

Thursday, July 25, 2024

I think someone is accessing my accounts and/or devices! What do I do!?

If you suspect someone is accessing your accounts and/or devices, quickly securing them is crucial. Here are steps to check if your devices or accounts are being monitored or accessed by a 3rd party; and how to secure them!!

Saturday, July 13, 2024

How to do a Tune-up/Clean-up with Virus Scans for your PC!

General PC Tune-up/Virus Scan Procedures:

Uninstall/Install Software:

  1. Uninstall Obvious Bloatware:
    • “Free Trial” software
    • Obvious junk programs & toolbars (One Search, Driver Support, One Bar, etc)
      1. Use the PNW Computers “Browser Hi-jack” blog article as a reference to find and remove software malicious Adware Programs.
      2. Computers that are heavily infected should be checked with ‘TDSKiller’ to rule out the presence of a Rootkit BEFORE any cleaning procedures begin. Unless cleaning is needed to run the utility.
  2. Install/Update Essential Programs:
    1. Security Clean-up Software List (Ninite.com can be used for installing most apps):
      1. Chrome, Firefox, Edge - Update
      2. Java, .Net & Silverlight Runtimes - Update/Install
      3. Malwarebytes Antimalware
      4. Malwarebytes ADWCleaner
      5. BleachBit

Wednesday, July 10, 2024

Fake Tech Support Scam: What You Should Do!


A fake tech support scam is a type of fraud where scammers pose as legitimate technical support personnel from well-known companies to trick victims into giving them access to their computers, personal information, or money. Here’s how these scams typically operate and how to clean up your system if you did/do fall victim to this type of scam!

Monday, July 8, 2024

How Did I Get Infected!?!


For those of you who think, "Well, if I don't install random new programs from the internet or download random EXE files, I won't get infected" that's not really the case today. Most people are not infected because they browse the internet and accidentally click on an EXE file. That was more common several years ago.

Nowadays, most people get infected because the malware comes to them. 

You don't have to go out on the internet and have to "find" viruses or malware to get infected.

The malware arrives in your inbox, in your private messages, from a trusted source, a hacked website, or inside a program you use, whose company got hacked, like in the case of 3CX.
  • The 3CX hack, which came to light in late March 2023, was a sophisticated supply chain attack. The incident involved the compromise of 3CX’s Windows and macOS build environments, allowing hackers to push trojanized software to 3CX customers.
  • The breach began when an employee at 3CX downloaded a trojanized installer for the X_Trader trading software, which had been compromised by North Korean threat actors. This malicious installer gave the attackers access to the employee's device and corporate credentials, enabling them to infiltrate 3CX’s network and insert malware into the 3CXDesktopApp. The attack was likely carried out by a North Korean hacking group tracked as UNC4736, linked to the financially motivated operation dubbed AppleJeus​ (Security Week)​​ (Security Week)​​ (CISA)​.
This doesn't mean there aren't still things like malware advertising (malvertising), where you see ads on Google to entice you to click on or download something malicious. Another major source of malware now is also social media platforms! YouTube videos as well!! 

For instance, if you look for any kind of cheat, crack, or mod for a popular video game, you will often find videos with external links. Many of these links, especially if they're password protected, contain malware.

Sometimes, it's literally the first search result when looking up something as harmless as "sewing patterns and templates"!!

Here are further examples of common ways people can get infected:

  • Phishing Emails:
    One of the most prevalent methods. Attackers send emails that appear to be from trusted sources, tricking recipients into clicking malicious links or downloading infected attachments. These emails often mimic legitimate communications from banks, social media platforms, or even colleagues.
  • Compromised Websites:
    Legitimate websites can be hacked to serve malware to visitors. This method doesn't require any action from the user other than visiting the site. Drive-by downloads exploit vulnerabilities in browsers or plugins to install malware without the user’s knowledge.
  • Software Supply Chain Attacks:
    These involve compromising a trusted software vendor to distribute malware to end users. The 3CX hack is a prime example, where attackers infiltrated the development pipeline of 3CX, a business communication software, and inserted malware into the software updates, affecting thousands of users.
  • Malvertising:
    Malicious advertisements, or malvertising, are another common method. These ads can appear on legitimate websites and redirect users to malicious sites or directly download malware. Even major advertising networks have been exploited to serve malvertising.
  • Social Media Platforms:
    Attackers exploit the popularity of social media to spread malware. They create posts or messages with enticing links that lead to malicious sites. YouTube videos offering cheats, cracks, or mods often include external links that direct users to malware. These links can appear highly ranked in search results, making them seem legitimate.
  • Messaging Apps:
    Private messages on platforms like WhatsApp, Facebook Messenger, and others can carry malicious links or attachments. Since these messages often come from known contacts, users are more likely to trust and click on them.
  • Trusted Sources:
    Sometimes, malware is spread through channels that users inherently trust. This could be through an email from a known contact whose account has been compromised or through a popular website that has been hacked.

We always recommend installing and using good, trusted, and reliable antivirus and antimalware software for your system. While they are not a silver bullet, these tools provide essential layers of defense against various cyber threats. Antivirus software is designed to detect and remove viruses, while antimalware software targets a broader range of threats, including spyware, adware, and ransomware. 


In addition to antivirus and antimalware software, browser add-ons can enhance your online security by providing additional protection against malicious websites and phishing attacks. One such recommended add-on is Malwarebytes's Browser Guard


Benefits of Using a Browser Guard: 
  • Blocking Malicious Websites:
    Browser Guard blocks websites that are known to host malware, preventing you from inadvertently visiting harmful sites.
  • Protection Against Phishing:
    It helps identify and block phishing attempts, protecting your personal information from being stolen.
  • Ad Blocking:
    The add-on can block unwanted ads, which can be a source of malware through malvertising.
  • Improved Browser Performance:
    By blocking malicious content and unwanted ads, Browser Guard can enhance your browsing experience and speed.

Pacific Northwest Computers Practices Combined Protection; What is That?!

No single solution can offer complete protection against all cyber threats. Using a combination of antivirus, antimalware software, and browser add-ons provides multiple layers of defense, significantly reducing the risk of infection and data breaches. 
Here’s why combined protection is essential:
  • Layered Defense: Different tools specialize in different areas of protection. Antivirus software focuses on traditional viruses, while antimalware software targets newer, more sophisticated threats. Browser add-ons provide real-time protection while you browse the web.
  • Reduced Risk of Zero-Day Attacks:
    Zero-day attacks exploit unknown vulnerabilities. Having multiple layers of protection increases the chances of detecting and stopping these attacks.
  • Comprehensive Coverage:
    Combined tools cover a wider range of potential threats, from viruses and worms to phishing attempts and malicious websites. 
  • We recommend using an Antivirus, 1-2 "stand-alone" scanning tools for general malware and adware scanning, as well as a maintenance/clean-up utility for removing junk/temp/cache/cookie data. 


In today's cybersecurity landscape, simply avoiding the download of random programs or EXE files is not enough to protect against infections. Malware delivery methods have become more sophisticated, targeting users through phishing emails, compromised websites, and even trusted sources like popular software vendors, as seen in the 3CX hack.


Malicious advertisements and social media platforms have also become significant vectors for malware distribution. Given this complexity, it's essential to use a multi-layered defense strategy. This includes installing and regularly updating trusted antivirus and antimalware software to provide essential protection against various threats.


Additionally, browser add-ons such as Malwarebytes Browser Guard offer critical extra layers of security by blocking malicious websites, protecting against phishing attempts, and enhancing overall browsing performance by removing unwanted ads.


Combining these tools creates a robust defense system, significantly reducing the risk of infection and providing comprehensive coverage against a wide range of cyber threats. By staying informed and proactive, users can better safeguard their systems and personal information from evolving cyber threats.

Monday, July 1, 2024

While we understand that prices on Amazon can be very competitive, there are several reasons why our prices might be slightly higher...


1. Quality Assurance: 

We source our parts from reputable suppliers who meet our strict quality standards. This helps us ensure that you receive reliable, durable, and high-quality parts. Amazon sellers can sometimes be not very well established 3rd sellers. There is also the risk of receiving "counterfeit" products from online sellers such as Amazon as well: https://www.aboutamazon.com/news/policy-news-views/amazon-counterfeit-crimes-unit-latest-updates-2024

2. Expertise and Support: 

Our team offers personalized service and expert advice that you won't get from an online marketplace. We can help you choose the right parts for your specific needs.

3. Warranty and Returns: 

We stand behind the products we sell. If you encounter any issues with a product or part, we make the process of replacement or return smooth and hassle-free by taking care of it for you.

4. Supporting Local Business: 

By purchasing from us, you are supporting a local business that contributes to the community. Your support helps us continue providing high-quality service in our area.

5. Value-Added Services: 

In addition to selling parts, we offer a range of value-added services such as maintenance, repair, and installation, which can save you time and ensure the job is done right.

We believe that these benefits provide significant value that justifies the price difference. We are committed to offering you the best possible service and ensuring your satisfaction with every purchase.



Wednesday, May 22, 2024

Easily Zero Fill a Hard Drive for FREE through Windows!




How To Zero-Fill A Hard Drive
via the Windows Command Prompt

Windows 7,8,10 and 11 actually can zero-fill a hard drive through the built-in Command Prompt utility. The Command Prompt adopts a special 'format' command to achieve writing zeros to the hard disk/partitions.

Friday, May 17, 2024

LoRA / Meshtastic & Unlicensed ISM

What is LoRA?

LoRA (which stands for Long Range) is a wireless communication technology designed for long-range, low-power communication in the Internet of Things (IoT) applications. It operates on unlicensed radio bands and is known for its ability to transmit data over long distances while consuming minimal power. LoRA technology is often used for connecting devices that need to communicate over long distances, such as in smart city applications, industrial automation, agricultural monitoring, and much, much more.

Monday, April 29, 2024

Microsoft Battery & AC Adapter Driver Issue(s)

Laptop Battery/Charging Issue(s):
Microsoft AC Adapter & Microsoft ACPI-Compliant Control Method Battery Drivers

I have run into a few laptops lately that have been exhibiting some issues with charging their batteries and the issues have actually been related to Microsoft's Battery and AC adapter drivers! 

It's an easy to fix, and you just have to do the following:

  • You can open the "Device Manager" by searching for it through Windows search or by right-clicking the "Start" menu button and selecting "Device Manager."
  • Click on "Batteries" in the device list to expand it, and you will see two items: 
    • Microsoft AC Adapter
    • Microsoft ACPI-Compliant Control Method Battery.
  • Right-click ON EACH ITEM (BOTH) and choose "Uninstall Device". 
    • Yes, you are uninstalling your laptop's battery drivers. But don't worry, they will automatically be reinstalled when you restart your laptop.
  • Shut down your laptop.
  • Unplug the power cable from your laptop.
  • If your laptop has a removable battery, remove it. If it does not, you will need to remove the bottom panel and then disconnect the battery from the motherboard.
  • If you removed the battery, put it back in, or reconnect it if you had to physically disconnect it.
  • Plug your laptop back into power.
  • Power on your laptop.
  • Once you have booted back up and logged in, click the battery icon in the system tray, and you should see that your laptop is plugged in and charging!

Source:


Monday, April 22, 2024

SDR Radios - Hardware & Software Links

A Software-Defined Radio (SDR) is a wireless radio system that uses software to process radio signals instead of using hardware components. SDRs use software-based algorithms to configure radio parameters like frequency, modulation, and operating modes. This eliminates the need for hardware components like mixers, modulators, and demodulators. 

Tuesday, April 16, 2024

Cyberdeck: "System In A Box" Build

Cyberdeck v1 Build

The goal of building this "system in a box" was to put something together that was a full-fledged portable network, had a mini-server, SDR/radio capabilities, GPS, and Bluetooth, all on the go! But it needed to be powered by a portable battery (such as a Jackery) or via a power inverter from a car. 
This is what I came up with and is my first attempt at this "system in a box" Cyberdeck! This build has been working MUCH better than I expected and has come together very well, but I am still tweaking and modifying stuff over time and am open to suggestions :)

Flipper Zero: Tips & Tricks To Help Get You Started!

Flipper Zero: Tips & Tricks

So what is a Flipper Zero anyway?
The Flipper Zero website describes the device as "a portable multi-tool for pen-testers and geeks in a toy-like body. It loves hacking digital stuff, such as radio protocols, access control systems, hardware, and more. It's fully open-source and customizable, so you can extend it in whatever way you like."

Monday, April 1, 2024

What Specs Do You Need In A New Computer!?

CPUs:

Both Intel and AMD employ a numbering system to classify their CPU models based on their respective performance.

Wednesday, March 27, 2024

Upgrade To Windows 11 ~ With Your Apps and Data Intact!

 Can You Install Windows 11,
Without Losing Apps or Data In The Process? 

Why yes you can! 

Thanks to the Windows Installation Assistant!



I found an article (linked below) while looking into a "surefire" way to upgrade a Windows 10 system to Windows 11, without having to run the risk of needing to reinstall software and applications, or even potentially loose data. Currently, the only guaranteed method to install Windows 11 on your computer without performing a fresh install is by using the Installation Assistant. This tool from Microsoft acts as an update, transforming your existing Windows installation to the newer version without affecting any of the files or applications:

 https://helpdeskgeek.com/windows-11/how-to-upgrade-to-windows-11-without-losing-any-data/



Wednesday, March 13, 2024

What 3D Printer to Get?!


Want to get into 3D printing?!


If money isn't a limiter:

The Bambu Lab x1 Carbon is hands down the best thing on the market for consumer-level printers as well as multi-material printers, IMO:
https://us.store.bambulab.com/products/x1-carbon-combo...

If you're on a budget:

Just want to get rocking as easily as possible? 
Elegoo all day long... 
Test the waters and see if you enjoy 3D printing; without a huge investment.
ELEGOO Neptune 4 Pro 3D Printer: https://a.co/d/eTdGxML

Most reliable:

Want an open source, heavily modifiable, as well as a production reliable machine?
Prusa all day long! 
My Prusa MK3S has been by far, my most reliable printer:
https://www.prusa3d.com/product/original-prusa-mk4-2/...


Tuesday, March 12, 2024

VHD & RMD IODD Drive Setup

IODD Encrypted External Drive; 

VHD/RMD Creation

  1. Use the VHD_Tool+ that you can download from the IODD website:
    http://iodd.kr/wordpress

  2. Open and run the VHD Tool+, and click on the "Create" tab. That will switch the program to its VHD "Create" function, where you will be able to create a blank/empty VHD on your IODD drive that you will later apply/"burn" a disk image to.
    • When you click on the folder icon to "browse for a VHD" you actually just need to type in the name of the VHD that you would like to create, and then continue like you are going to "open" that new VHD; even though it is not actually there. Trust me, it will work.

  3. Next, you want to make sure the VHD file that you are creating is larger than the ISO that you will be applying to that VHD. The ISO has to be able to fit fully decompressed. So if your ISO is still in a ZIP file, decompress it and go 1GB above its folder properties listed size.

  4. Once the VHD is created on your IODD drive, you need to actually mount that blank VHD to your computer. 

  5. With the IODD drive connected to your computer, navigate to where the VHD is stored using the screen/menus on the IODD itself, and mount the empty/new VHD file through the drive, and your computer will detect and pop-up that it has found a drive that needs to be formatted.
     
  6. Don't format the drive! Just close out the notification and close any explorer windows that may have opened.

  7. Now, using a program such as Rufus, you can "burn" or apply an ISO disk image to the new/empty VHD that you just mounted to your system!

  8. Burn the disk image just like you are creating a bootable USB or DVD; nothing special needs to be done to make things work.

  9. Lastly, to create an RMD of the VHD you just created, simply make a copy of the VHD file (so you have two) and simply change the copy's file extension from *.vhd to *.rmd

    That's it!


IODD Help Site:

https://help.iodd.kr/bootable-virtual-drive/drive-setup

IODD Help Page for VHD Creation:

https://help.iodd.kr/bootable-virtual-drive/virtual-drive-vhd/convert-iso-file-to-uefi-bootable-drive

IODD User Manual:

http://dir.iodd.kr/vhd_tools/iodd_virtual_USB_drive_guide_0425.pdf


Computer Custom Water Cooling Loop Tips

 Custom Computer Watercooling Tips

  • Radiator(s):

    • If you are NOT going to overclock your system, I like to use a general rule of 120mm of radiator real estate for every part that is going to be cooled.
    • If you ARE going to overclock the system, I like to use a general rule of 240mm of radiator real estate for every part that is going to be cooled.
    • You can never have too big of a radiator for cooling using the rules above. You can however VERY easily have a system with too small of a radiator for its needed cooling. You can't have too much radiator surface area, so don't worry about having MORE than you "need".
    • If you are mounting a radiator vertically for your water cooling loop, make sure that the fittings for the radiator's input/output are at the BOTTOM; closest to the bottom of the computer case!! This will allow better fluid circulation and prevent poor circulation that commonly occurs when you have the inlet/output of the radiator oriented at the top.

  • Fittings:

    • Soft tubing fittings use barbs to grab onto and connect with the appropriate tubing.
    • Hard tubing uses a compression fitting to connect to its tubing.
    • The collar of a hardline fitting is not what's responsible for sealing the connection with the tubing that it's being connected to.
    • As long as the compression of the fittings and the tubing both match each other (ie: 10x13mm for the fitting AND for the hose/tubing being used), then you know the two will be compatible to create a water-tight seal between the fitting and the tubing.

  • Fans:

    • For airflow, some fans will have an arrow somewhere on the fan itself to indicate the direction in which air will flow when the fan is turned on.
    • If there isn't a directional arrow/indicator, the rule of thumb that I like to use is that a fan's airflow is 99% of the time going to be moving from the "caged" side of the fain (where the fan is connected to and supported by the fan's frame), to the "non-caged" side. I know, super technical jargon is being used here... But it's a simple way to easily remember which direction a fan's air will flow!
    • You can also buy/3D print a fan spacer to install between the fan and the radiator to help prevent naturally occurring turbulence due to the fan's proximity to the radiator.

  • Tubing/Hoses:

    • Hard tubing is the least porous and the least prone to water loss/seepage. But hard tubing is also the most difficult to work with due to the fact it needs to be heated and bent into needed shapes; which requires its own special tools and processes to complete.
    • Soft tubing is not as "nice" as hard tubing as far as looks and performance are concerned, but it is MUCH easier to install, work with, and cheaper to buy/replace vs. hard tubing.
    • Try to use low-porosity tubing to prevent liquid absorption/seepage/loss and leaking.

  • Fluid/Liquids:

    • Configure your loop with a drain port; preferably at the bottommost position of your loop.
    • Try to install your pump directly under your reservoir, or use a reservoir/pump combo.
    • Use DISTILLED WATER if you are not going to use any fancy-colored/specialized liquid.
    • Add a little bit of a Biocide, like Iodine, to your liquid medium to help prevent bacteria or other organic growth
    • DO NOT USE FOOD COLORING TO COLOR YOUR COOLING LIQUID!
    • BEFORE you fill your loop with ANY liquid whatsoever, use a simple hand air pump to do a basic pressure test and make sure none of your tube connections or fittings blow out or come loose.
    • DO NOT FULLY POWER ON YOUR SYSTEM TO FILL YOUR LOOP!
      • Most loop kits come with (or you can purchase) a basic PC power supply "jumper" plug that will allow you to power the system at a very low lever, without actually fully powering the computer on.
      • That way you can add fluid to your loop's reservoir, use the PSU jumper to power on the PSU and pump the fluid through the loop, and then just rinse/repeat until the loop is fully filled!

  • Flow Order:

    • Flow Order is the order in which you are going to cool the devices in your custom loop. 
    • It doesn't really matter about what order you go in, and you DO NOT need a totally separate loop for each device being cooled. There might be a 2-3C temperature difference when daisy chaining devices together in a custom loop; nothing CRAZY. So it IS ok to go from a GPU to a CPU directly in a custom loop.
    • An optimal Flow Order looks something like this when cooling a GPU & CPU:
Reservoir/Pump > 360mm Rad > GPU > CPU > 360mm Rad #2 > Back to Reservoir


Tuesday, March 5, 2024

Scan/Repair Corrupted Windows 10 & Windows 11 System Files

1) Open an elevated Command Prompt:

2) In the command prompt, enter the following commands one at a time. Let each procedure fully complete its process before moving on to the next command/repair.

  1. SFC /SCANNOW
  2. DISM /Online /Cleanup-Image /StartComponentCleanup
  3. DISM /Online /Cleanup-Image /RestoreHealth

3) Restart the system and verify repairs were completed successfully.

4) If issues persist after running these repairs, running a repair installation of the Windows Operating System (being sure to retain user data) would be the next step in hopes of repairing the system:

https://support.microsoft.com/en-us/windows/reinstall-windows-d8369486-3e33-7d9c-dccc-859e2b022fc7#bkmk_reset_windows_10

Monday, January 15, 2024

Lenovo Legion Y740 Series Keyboard Issues

Lenovo Legion Y740 Series Keyboard Issues

Links to the needed firmware update(s) to fix  Lenovo Legion Y740 series RGB keyboard functionality/stops working issues.

Firmware Software Needed: kyb17fw03u

Lenovo Legion Y740 Series 15" Model:

https://download.lenovo.com/consumer/mobiles/kyb15fw02u/kyb15fw02u.exe


Lenovo Legion Y740 Series 17" Model:

https://download.lenovo.com/consumer/mobiles/kyb17fw02u/kyb17fw02u.exe