Showing posts with label Repair. Show all posts
Showing posts with label Repair. Show all posts

Thursday, September 8, 2016

Winning Against Windows 10: Fight Microsoft and Win!


Ever since the release of Microsoft’s “Free Upgrade” to WIndows 10 (which came to and end August 1st 2016), I have fixed dozens of computers for people which had system damage or issues stemming from an unwarranted upgrade of their computer to Windows 10. The upgrade to Windows 10 was free for Windows Vista and Windows 7 users for almost a year, but was supposed to be an optional decision. The end user was supposed to decide on whether or not, or when, to install Microsoft’s “latest and greatest operating system”.

As well all know from either the news, friends, family, or even personal experience, Windows was tricky with this OS upgrade and many people were automatically upgraded without direct and clear consent or without any knowledge until it was too late. If they did agree, some users had major issues with system stability, hardware, and software following the upgrade to Windows 10. Not the smooth process Microsoft said it to was to be... This means repair costs for folks as well as the inconvenience of downtown, as well as lost work and income for business.

Well recently I had a customer whose business computer went down due to a non-user initiated Windows 10 upgrade. The upgrade actually didn't complete correctly, killing the Windows OS upgrade installation (mid-install) requiring the system to be brought into the shop, have Windows 7 re-installed and onsite service to get everything set back up again. Well my client did some research and found a ebook on Amazon called "Winning against Windows 10".

"Winning against Windows 10" is the story of a woman named Teri Goldstein and specifically lays out how Teri fought back against Microsoft (due to a Windows 10 upgrade that messed up her system) and she actually was able to win; forcing Microsoft to reimburse her $10,000!!

Using the book (which gives you the specifics on her court case), my client was able to fight back against Microsoft themselves and was able to get Microsoft to reimburse them for all of the repair costs; onsites and all!

So if you have had any issues with Windows 10 "damaging" your computer and you had to get it fixed and/or can prove lost income from downtime, etc you could get Microsoft to pay you back!!










Any questions or comments?? Feel free to get in touch!
www.pnwcomputers.com

Thursday, July 7, 2016

Build Versus Buy a Computer??





Build Versus Buy....

The old debate over whether you should build your own system or buy a pre-built one is an old, long-standing argument that will never be easily washed away. However, there are some benefits to building your own system that can't be weighed in terms of dollars and cents. You may be happier with your own hand-built system, or you may be able to score bargains and rebates that lead to a more powerful computer stuffed with higher quality components than a manufacturer would use.

Building your own PC also gives you complete and full control over that system's components and extendability. Unlike buying an OEM PC, assembling your own gives you the ability to make decisions about when and how you'll upgrade that system in the long run as opposed to simply taking what the manufacturer sells you. For example, you can buy into a new motherboard chipset early and wait to spend money on the next generation of graphics card later, giving yourself a timely upgrade when the moment-or your budget-is right.

Ultimately, while it may be easier to just pull out a credit card and buy whatever's on sale from your preferred OEM, there's something about assembling the components of a system that you've selected for your needs, powering it up, installing your favorite OS, and using it every day that's' incredibly rewarding.

Exerpt from:Henry, Alan. "The Best PCs You Can Build for $600 and $1200." Lifehacker, Tips and Downloads for Getting Things Done. Lifehacker.com, 16 Sept. 2011.http://lifehacker.com/5840963/the-best-pcs-you-can-build-for-600-and-1200?popular=true

Pacific Northwest Computers 
360-624-7379

OSX Finder Crash Loop - FIX

PROBLEM: Your Mac’s finder is stuck in a crash loop Other apps work but your finder crashes and re-crashes indefinitely; even when the system is restarted. Other user accounts may work just fine and even a newly created account will work just fine. Permissions repair through the OSX DiskUtility doesn’t help either.
  1. Start with another user account or create a temporary administrator account. 
  2. Download and install PathFinder (search via Google) for all users. 
  3. Pin the PathFinder icon to your dock. 
  4. Log on with with your usual name and, with Pathfinder, move files that are in your Desktop folder, over to another directory. 
  5. No more Finder crash! 
Pacific Northwest Computers 
360-624-7379

Thursday, November 7, 2013

New Virus Alert: CryptoLocker!


A New Virus Has Surfaced ~ CryptoLocker

CryptoLocker is a new, nasty piece of malicious software that is infecting computers around the world; encrypting important files and demanding a ransom to unlock them. If you get hit with this virus you risk having your personal data encrypted and lost for good!

This sophisticated malware is delivered the old-fashioned way – an executable file hidden inside an attachment that looks like an ordinary ZIP file or PDF. One small business reports being compromised after clicking on an email attachment that was designed to look like a shipping invoice from the U.S. Postal Service.

The CryptoLocker virus can be removed from an infected system, but unfortunately at this time there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom. Brute forcing the decryption key is not realistic due to the length of time required to break the key. Also any decryption tools that have been released by various companies will not work with this infection. The only method you have of restoring your files is from a backup or Shadow Volume Copies if you have System Restore enabled. Newer variants of CryptoLocker attempt to delete the Shadow Copies, but it is not always successful.

Preventive Measures:
  1. BACKUP ALL OF YOUR DATA ASAP! That’s the only way to reduce the risk of losing your files forever. Also, to avoid getting your backup's encrypted your backup device should be disconnected from your computer until the next time you need to access it or run a backup. 
  2. Download and install a free utility called 'Crypto Prevent'. Crypto Prevent is a small utility that changes a few settings in your computer to help prevent the CryptoLocker infection from happening in the first place! Its not a golden bullet however, so having current data backups is your ulitimate defense. You can downloading the Crypto Prevent utility directly from the link below!
http://www.foolishit.com/vb6-projects/cryptoprevent/

If you need any assistance we can setup a visit to help secure and backup your computer for you!

Let us know if you have any questions or issues!

Jon Pienkowski
Pacific NorthWest Computers
www.pnwcomputers.com
360-624-7379

Thursday, October 31, 2013

Browser Redirect Virus Fix! Search Conduit, DefaultTab, MyWay Web Search, Etc.





The majority of computers coming in with virus infections all have the browser hi-jacks, and other browser related malware infections. A browser hijacker is something installs onto a computer system and attaches to an internet browser in order to change internet browser settings; such as the home page and default search engine. This causes the now infected internet browsers to start up using their search bar or their search engine OR even just redirect you to where they want you to go. This type of infection can generate browser pop-up’s while you’re surfing the internet, slow the computer's overall performance as well as lead to further and more severe virus and infection issues!

As with a vast MAJORITY of BHO's (browser helper objects such as tool bars) most use unethical practices and are utilized by ethical and unethical third-parties, including cyber criminals and scam artists, in an effort to generate revenue through sites tied they are working for/partnered with as well as other third-party domains and advertising based search services.

Products and software associated with the browser redirection infections:
  • Activeris AntiMalware
  • Ado System Protect
  • AnyProtect
  • Any Send
  • AssetsManager
  • Babylon Toolbar
  • BFlix Toolbar and TheBFlix
  • BlockandSurf
  • Boost Shopping
  • Browser Guard
  • Browser Protector
  • BrowserRedirector
  • Bubble Sound
  • Chromium (Dregal)
  • CinemaPlus vX.X
  • Conduit
  • Consumer Input Firefox Extension
  • Coupoon (two 'oo')
  • CrossBrowse
  • DefaultTab
  • Delta Toolbar
  • Dregal (Chromium)
  • Driver Pro
  • Driver Restore
  • Driver Updater (No Publisher/Specifics)
  • File Type Assistant
  • FLV Runner Toolbar
  • Free Ride Games Player
  • Games Desktop vX.X
  • GeniusBox
  • HashBrat
  • IdleCrawler
  • IE Web Protect
  • IE Web Protect Plus
  • Linkey
  • Linksicle
  • MapsGalaxy Toolbar (and other random/various related 'MapGalaxy' products)
  • MediaPlayerEnhance
  • MixiDJ  
  • Mobogenie
  • MyPC Backup
  • MyWayWeb Search Toolbar
  • NewPlayer
  • Optimizer Pro vx.x
  • OneSoftPerDay
  • Pasta Leads
  • PC Fix Speed vx.x.x
  • Plus-HD-x.x
  • PC Optimizer Pro
  • PC Pro Cleaner
  • Powerful Browse
  • QuickRef
  • Remote Desktop Access (No Publisher/Specifics)
  • Search Conduit
  • Search Protect
  • Search Results LLC
  • Shop To win
  • Shopper Pro
  • Shoperz
  • SmartWeb
  • Software Updater (No Publisher/Specifics)
  • Software Version Updater (No Publisher/Specifics)
  • Special Savings
  • Unico Browser
  • Wajam
  • Web Companion
  • WebProtector
  • Web Protect for Windows
  • WiseCare 365
  • Yontoo
  • Yontoo Layers
  • YTDownloader

Removal Process:
1st Step
Uninstall all programs listed (and any others "odd" programs that have a similar install date) through "Programs and Features" aka "Add/Remove Programs" found through your computer's control panel.

2nd Step
Download and install MalwareByte’s Antimalware and Spybot Search and Destroy (1.6.2) to use in conjunction with your antivirus to run full virus scans on your computer! Remove (or at lease quarantine) anything that the programs identify!
*If you don't have a current anti-virus we recommend one of the following AntiVirus titles; Microsoft Security EssentialsAvast! Antivirus or Bitdefender Free.

3rd Step
In all of your web browsers (Internet Explorer, Firefox, Chrome, etc) you want to examine all installed add-on's and extensions. Remove anything that is related to the software programs listed above. Additionally you can use ADWCleaner and JRT to get even further "under the hood" to make sure all of your web browsers are clean from Adware and Browser Hi-Jack software.

4th Step (EXTRA)
Download and run TDSKiller from Kaspersky Labs to check your systems for any types of rootkit infections.


For direct download links to the software listed above, visit "Pacific NorthWest Computers' Links and Recommended Software" page on our Blog Link below!
http://pnwcomputers.blogspot.com/2013/06/pnw-computers-links-and-recommended.html

Wednesday, June 26, 2013

PNW Computers' Links And Recommended Software

PNW Computers' Links And Recommended Software

A basic list of software, tools and utilities that we use and recommend!
We will update this list as much as possible! 

Tools and Utilities:

  • Hirens All-In-On Boot CD - Great utility CD with TONS of diagnostic software; HD manufacturers included!
    http://www.hirensbootcd.org/download/
  • BleachBit - When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there!
    https://www.bleachbit.org/
  • GParted - GParted is a free partition manager that enables you tor resize, copy, and move partitions without data loss. Some repair capabilities as well.
    http://gparted.sourceforge.net/download.php
  • Memtest86 - MemTest86 is a free, thorough, stand alone memory test for x86 architecture computers.
    http://www.memtest86.com/
  • Offline NT Password & Registry Editor - This is a utility to reset the password of any user that has a valid lcoal account on your Windows System.
    http://pogostick.net/~pnh/ntpasswd/
  • HFSExplorer - HFSExplorer is an application that can read Mac-formatted hard disks and disk images. It can read the file systems HFS (Mac OS Standard), HFS+ (Mac OS Extended) and HFSX (Mac OS Extended with case sensitive file names), including most .dmg disk images created on a Mac, including zlib / bzip2 compressed images and AES-128 encrypted images
    http://www.catacombae.org/hfsx.html 
  • IsoBuster - IsoBuster is actually a CD/DVD and BD/HD DVD data recovery software that can interpret, open and extract various CD/DVD/Blu-ray disk image files, including DMG.
    http://www.isobuster.com/download.php
  • Revo Uninstaller Free - Revo Uninstaller lists the installed programs and components for all and current user. With a choice of views, as well as a context menu, information on program components is available: program properties, their registry entries and links to manufacturer's web site, for a start. The "Search" option finds installed applications just by typing the first few letters of their name. Revo Uninstaller Free scans for "leftovers" with advanced algorithms that are precise, fast and very effective in searching for leftover Windows Services, Drivers, File associations, Shell Extensions, COM components, Windows Installer components, program settings and more!
    http://www.revouninstaller.com/revo_uninstaller_free_download.html
  • MyDefrag - MyDefrag (formerly JKDefrag) is a disk defragmenter and optimizer for Windows 2000/2003/XP/Vista/2008/X64. Completely automatic and very easy to use, fast, low overhead, with several optimization strategies, and can handle floppies, USB disks, memory sticks, and anything else that looks like a disk to Windows.
    http://www.mydefrag.com/Manual-DownloadAndInstall.html
  • CUTEpdf Writer - Create PDF documents on the fly for Free! Portable Document Format (PDF) is the de facto standard for the secure and reliable distribution and exchange of electronic documents and forms around the world. CutePDF Writer (formerly CutePDF Printer) is the free version of commercial PDF creation software. CutePDF Writer installs itself as a "printer subsystem". This enables virtually any Windows applications (must be able to print) to create professional quality PDF documents - with just a push of a button! ALL FOR FREE!
    http://www.cutepdf.com/products/cutepdf/writer.asp
  • VideoLAN VLC Media Player - VLC media player is a highly portable multimedia player for various audio and video formats as well as DVDs, VCDs, and various streaming protocols without external codec or program. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
    http://www.videolan.org/vlc/
  • Sumatra PDF Viewer - Sumatra PDF is a slim, free, open-source PDF reader for Windows. Sumatra has a very minimalistic design and is no where NEAR the security risk that Adobe Reader can be. Simplicity has a higher priority than a lot of features with Sumatra. It's small, secure and starts up very fast.
    http://blog.kowalczyk.info/software/sumatrapdf/download-free-pdf-viewer.html
  • Piriform Recuva - Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!
    http://www.piriform.com/recuva

Security Software:

What is a rootkit!? A rootkit is a program or a program kit that hides the presence of malware (or itself) in a system. A rootkit for a Windows systems is a program that penetrates into the system and intercepts the system functions; Windows API. It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install their own drivers and services in the system and they also remain “invisible".  

Software Sites:

  • Filehippo.com - Great site that hosts TONS of updates and software titles; anything you can think of really.
  • Ninite.com - Great "update-all-at-once" site that lets you install/update multiple programs without dealing with individual installers, prompts, etc. One download, one install; as many programs as you like!


Let us know of any issues with inks!

Updated 11/1/2013
pnwcomputers@gmail.com

Friday, April 26, 2013

DC Jack ~ Laptop Repair

Is your laptop 'jacked' up? ;)
We know what to do! 

If you give Pacific NorthWest Computers a call today!!
We can get your 'jacked' up laptop FIXED for CHEAPER than the competition!

360-624-7379

Friday, May 4, 2012

Fake Hard Drive Diagnostic Virus; Browser Pop-up/Redirection Fix


Pacific NorthWest Computers KNOWS rogue security and fake software applications very well. Fake software virus applications make up for 85% of the infections that we see on a day-to-day, week-to-week, month by month basis here in the shop. At first it was just fake security software programs. But the newest "trend" in the fake malicious software world is fake hard drive diagnostic software.

This fake diagnostic software virus pretends to have found issues with your hard drive, proceeds to hide your data (to seem more legitimate) and then tries to sell it self as a fix for all "problems" it has identified with your hard drive. When first released, it was not to difficult to remove. But the issue we are running into now however is that when a customer brings a system in that has this virus on it, we aren't just worrying about just getting the virus removed. But more importantly, reversing the changes the virus has made to an affected system. The big challenge has been with Browser hooks.


Most of the time when we encounter this virus it will actually "hook" into (or simply put; infect) the executable "IExplorer.exe", which is Internet Explorer. Once "hooked" the virus can change, modify how Internet Explorer functions and can generate pop-ups and redirect searches and navigation in the browser. All after the virus cleaning is completed on the affected computer. Now, most of the time programs like Spybot Search & Destroy are very effective at reversing system modifications created by viruses. But so far, this browser hook issue is not "automatically" fixed by virus scanners and utilities and since hooks can sometimes be impossible to remove. This type of an issue can prevent us from declaring a system clean and can sometimes require us to reinstall the computer's operating system. Well, we think we figured out a fix!

After working on a computer from a local insurance agency, I did some extensive poking around an infected computer's file system and registry and was able to locate a registry location for something called “DOMStorage” under Internet Explorer’s HKEY_ CURRENT_USER registry key (HKCU\Software\Microsoft\Internet Explorer\DOMStorage). In this registry entry, I found folders matching the names for some of the websites that were being generated in the random IE pop-ups's. I knew I was onto something but did not know what "DOMStorage" even was nor did I know why or how Internet Explorer even used it.

After doing some research on DOMStorage (http://en.wikipedia.org/wiki/Web_storage) it looks like DOMStorage, or Document Object Model Storage, is a web application software method and protocol used for storing data in a web browser. So I thought to myself, “Well if they can store data there, they could very well plant a program in those locations to hide and allow themselves to generate those pop-ups!”. So I went ahead and deleted all of the folders in the DOMStorage registry location (and there were A LOT of sites listed in there) and it’s safe to now say after removing those folders there have not been ANY Internet Explorer pop-ups since! After pop-ups coming up several times a minute, the system is running great and is running flawlessly for several days; with web surfing and all! No browser re-directions or anything!
So I would say this is another problem solved and another win against viruses for Pacific NorthWest Computers!

Jon Pienkowski
Owner/Operator
Pacific NorthWest Computers

Thursday, April 14, 2011

Rogue Hard Drive Error Repair Software

A new fake HD repair/error finding virus software is going around, and it hides all of your personal data so it  looks like all of your data has been lost or deleted; RUN FULL, MANUAL, VIRUS SCANS ASAP IF IT HAS BEEN A WHILE and MORE OFTEN THAN USUAL!

Friday, February 18, 2011

New Computer Software To Have & Use: 101 *INCLUDING VIRUS CLEAN-UP HOW-TO!!


With all the software that is out there for surfing the web and for security, it can be kind of confusing which programs you should or should NOT use. Maybe you have a brand new computer that you need to setup. Or you are looking to get your current system spruced and/or re-secured. Or maybe you are looking to overhaul your system's software completely! Here are some of my recommended software programs that I personally like, use and recommend. As well as a basic "How-To" to help get you going on running virus scans and to assist with tuning up your computer!


Google’s Chrome Web Browser
The Web is all about innovation, and Chrome sets the pace with dozens of new features to deliver a faster, more secure and customizable Web browsing experience for all! Google Chrome raises the bar for security. The new malware and phishing protection helps protect from viruses, worms, trojans and spyware to keep people safe while surfing on the Web.


Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. Microsoft Security Essentials is a free and effective antivirus that is easy to use, and is always kept up to date. So you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple. Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.


Malwarebytes' Anti-Malware (MBAM):
Malwarebytes' Anti-Malware is a high performance anti-malware application that thoroughly removes even the most advanced malware and spyware. With one of the fastest, most effective quick scans and malware removal capabilities on the market, this program is the perfect addition to your PC's defenses. The full version of the product includes a number of key features, including the ability to schedule updates and scans and most importantly, a real-time malware protection module that blocks malicious processes before they even start.


Safer Networking’s Spybot Search & Destroy:
Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behavior to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is also absolutely free.
**NOTE! During the installation of this program, a feature called "Tea-Timer" will attempt to install and run. DO NOT INSTALL or ARM THIS FEATURE! It can be very intrusive and create conflicts with other security software you may have installed.


Trend Micro's HijackThis:
HijackThis inspects your computers browser and operating system settings to generate a log file of the current state of your computer. Using HijackThis you can selectively remove unwanted settings and files from your computer. Because the settings identified in a HijackThis log file can belong to both legitimate software and unwanted malware, it is important to use extreme caution when choosing to removing anything using HijackThis.


Piriform's CCleaner:
CCleaner is a free PC optimization tool. It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner! CCleaner allows Windows to run faster, more efficiently and gives you more hard disk space. The best part is that it's Small, Fast and Free!


VSRevo Group's Revo Uninstaller Free:
Revo Uninstaller free lists the installed programs and components for all and current user. With a choice of views, as well as a context menu, information on program components is available: program properties, their registry entries and links to manufacturer's web site, for a start. The "Search" option finds installed applications just by typing the first few letters of their name. Revo Uninstaller Free scans for "leftovers" with advanced algorithms that are precise, fast and very effective in searching for leftover Windows Services, Drivers, File associations, Shell Extensions, COM components, Windows Installer components, program settings and more!


MyDefrag (formerly JKDefrag) is a disk defragmenter and optimizer for Windows 2000/2003/XP/Vista/2008/X64. Completely automatic and very easy to use, fast, low overhead, with several optimization strategies, and can handle floppies, USB disks, memory sticks, and anything else that looks like a disk to Windows. Why use this defragger instead of the standard Windows defragger? 
  • Much faster. 
  • Totally automatic, extremely easy to use.
  • Optimized for daily use.
  • Disk optimization, several strategies.
  • Directories are moved to the beginning of the disk.
  • Reclaims MFT reserved space after disk-full.
  • Maintains free spaces for temporary files.
  • Can defragment very full harddisks.
  • Can defragment very large files.
  • Can defragment individual directories and files.
  • Can be run automatically with the Windows Scheduler.
  • Can be used from the commandline.
  • Can be used as a screen saver.
  • Can be run from cdrom or memory stick.
  • Sources available, can be customized.


    Piriform Recuva:
    Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!


    CUTEpdf Writer:
    Create PDF documents on the fly — for Free! Portable Document Format (PDF) is the de facto standard for the secure and reliable distribution and exchange of electronic documents and forms around the world. CutePDF Writer (formerly CutePDF Printer) is the free version of commercial PDF creation software. CutePDF Writer installs itself as a "printer subsystem". This enables virtually any Windows applications (must be able to print) to create professional quality PDF documents - with just a push of a button! ALL FOR FREE! 


    VideoLAN VLC Media Player:
    VLC media player is a highly portable multimedia player for various audio and video formats as well as DVDs, VCDs, and various streaming protocols without external codec or program. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
    VLC Media Player can play:
    • MPEG-1, MPEG-2 and MPEG-4 / DivX files from a hard disk, a CD-ROM drive, and so on
    • DVDs, VCDs, and Audio CDs.
    • From satellite cards (DVB-S).
    • Network streams: UDP/RTP Unicast, UDP/RTP Multicast, HTTP, RTSP, MMS, etc.
    • From acquisition or encoding cards (on GNU/Linux and Windows only).


      Sumatra PDF Viewer:
      Sumatra PDF is a slim, free, open-source PDF reader for Windows. Sumatra has a very minimalistic design and is no where NEAR the security risk that Adobe Reader can be. Simplicity has a higher priority than a lot of features with Sumatra. It's small, secure and starts up very fast.


      Google's Picasa Picture Manager & Editor:
      Picasa is software that helps you instantly find, edit and share all the pictures on your PC. Every time you open Picasa, it automatically locates all your pictures (even ones you forgot you had) and sorts them into visual albums organized by date with folder names you will recognize. You can drag and drop to arrange your albums and make labels to create new groups. Picasa makes sure your pictures are always organized. Picasa also makes advanced editing simple by putting one-click fixes and powerful effects at your fingertips. And Picasa makes it a snap to share your pictures, you can email, print photos home, make gift CDs, instantly share your images and albums, and even post pictures on your own blog.




       Now here are some basic instructions on how to use the security programs we recommended above!
      1. Double click on a security program’s icon; MS Security Essentials, Spybot, MBAM, etc...
      2. Locates the program’s “Update” button and update the software;
      3. You may need to click ok a few times but this process takes only a minute to download and install updates on a high-speed internet connection.
      4. Once the program has been updated, select “Scan Now” or “Check for Problems” and run a system scan.
      5. If you are given the option to run Quick or Full scan; always run the Full scan. This process can take an hour to a couple of hours to complete and will slow down the computer if you decide to use the computer as it scans.
      6. Once the program says it’s completed its scan, delete or quarantine any and all findings; if the malware can’t be removed, contact Pacific NorthWest Computers ASAP!
      • Run full scans with theyour security software every 2 weeks if you can; at-least once a month. All the security software is 100% free but can also bee purchased. During updates, these programs may pop up an ad for a purchasable version of themselves. But don’t be alarmed! Just simply click an available “later” or “ok” button or just close the box with its upper right "X" button.
      • Use CCleaner to help with the “junk file cleanup” that needs to be routinely cleared for security and performance purposes. To do this, just find and double click the CCleaner icon and then simply click “Run Cleaner”. When it says it’s completed, you’re all done!
      • Use MyDefrag to help keep the files on your hard drive organized as well as help to keep your computer and hard drive running the best that it can! At least once a month run a "System Disk Monthly" de-fragmentation on your "C:\" drive. If you have external hard drives, you can run a "Data Disk Monthly" de-fragmentation on those drives as well to help maintain optimal read/write performance. Also, there area Daily and Weekly defragmentions you can run for both types of hard drives as well.

      Wednesday, January 6, 2010

      Rogue Security Program Infections; At a Glance!

      More and more everyday I am see and hear about people becoming infected with Rogue security Software virus. 
      Rogue security software is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware. Rogue security software, in recent years, has become a growing and serious security threat in desktop computing. – Wiki

      Right now the most common form of infection they are using is web page hi-jacking and “trap” websites that are created to “host” the virus (why using Firefox is so important).

      So what people end up encountering is a web page that has been hacked, hi-jacked, infected or exploited that is unknowingly “hosting” this virus and ends up spreading the infection to whom ever visits the website. In doing this, their trap has been set and the infections begin! This form of infection is commonly refered to as a “Drive-by Download“.

      After the computer becomes infected, users start to see and encounter “security warning” icons in their task bar (lower right of the desktop), pop-ups warning of an infection and fake animated virus scans indicating your computer is infected as the virus itself tries to build its credibility. In  most cases the virus can even infect the Windows Security Center making it even harder for users to identify whether the software is real or not. However the goal being achieved out all of this is for the virus creators to make money. So they are hoping that the users of the computers that become infected, and fooled by the “song and dance” the virus puts on, and buy their infectious and fake security software.

      So I wanted this to be a little heads up and explanation for everybody about this subject since it is the most common repair I encounter to date.

      Be Aware, Stay Informed and Scan Often!
       
      ~Jon Pienkowski, Pacific NorthWest Computers

      Tuesday, July 7, 2009

      Lexmark Printer Service/Print Spooler Bug: XP Systems

      Because of a flaw in Lexmark's printer driver and software removal and uninstall utility. After removing a Lexmark printer driver and software from an XP system, may create "Printer Installation Failed: RPC Server Unavailable" and/or "Print Spooler Service Is Not Running" error messages.

      The first thing you always need try if you are having any kind of basic software problems, is to try uninstalling and reinstalling the appropriate drivers and software, and/or visit the manufacturer's website and download and install the latest drivers and software for your device. If this does not fix your printing issues, the problem probably lies within Windows itself. (Unless of course, your device is physically broken or you have a broken cable). But what I have seen over the years is that customers with these specific "Printer Spooler Service" or "RPC Server Unavailable" errors happen to to use or have had used a Lexmark printer.

      So really quick, here is the definition of what a Windows Service, like the Print Spooler Service, basically is: (Taken from Wikipedia.org Link)
      "A Windows service is an application that starts when the Microsoft Windows operating system is booted and runs in the background as long as Windows is running."
      *Quick explanation of What Is RPC and How Does it Work.

      The Print Spooler Service itself basically is a Windows service that starts when your computer starts, and is constantly running in the background of your operating system to load files to memory for printing. What I would find is that there would be a service installed in the computer from Lexmark called the "LexBce Server". The LexBce Server Service is installed by the Lexmark printer's software to configure the onboard network print server.
      *The print server
      accepts jobs from computers and send the jobs to the appropriate printers.

      When the service installs itself however, it installs itself so the Windows Print Spooler Service becomes dependent upon it. So disabling the LexBce Server Service will make it so that your Print Spooler Service can no longer run. Which in effect disables all printing on your computer. Also, without the Print Spooler running, an installation of a printer is not going to be possible and you are going to most likely get the "RPC" error that was mentioned at the begining.
      *The LexBce Server Service can also come pre-installed on some Dell computers that are packaged with "Dell" printers; that's because they are made by Lexmark.
      **The LexBce.dll, a file related with the LexBce Server, is also related to
      the software "MarkVision for Windows" also a product of Lexmark.

      So, do all Lexmark printers install this service? I can't say for sure. What I do know is that if you are using a Lexmark printer or have had a Lexmark printer, you could have the LexBce Server Service installed on your computer and may eventually experience the discussed issues. Same scenario for previous owners of Lexmark printers. The un-installation of Lexmark printer drivers/software might have left this service behind. The bottom line is that if LexBce Server Service was, or is, on your computer and happens to fail or is disabled instead of removed during software/driver removal, say hello to the Lexmark Print Spooler bug!


      *I originally wrote this blog working at Battle Ground Computers, back when I was a manager at their store; it was a great find of mine so I wanted to re-post it on my new blog with some updated and edits. My original blog posting; http://tinyurl.com

      Get the most out of your internet!

      Getting the Most Out of Your Internet

      Probably one of the number one issues that is brought up to me is "Why is my internet so slow! It use to be so much faster!". Well dial-up or high-speed, everyone can be affected by internet "chug". So here are some quick recommendations and thoughts on how to keep your internet AND your computer running quickly and smoothly!

      1) Confirm that the computer itself is operating at maximum efficiency. It is very common for computers, mainly those using the Microsoft Windows Operating Systems, do become sluggish after as little as a few weeks of operation. This can make users think that their dial-up connection is extremely slow and can become an incentive to convert to a more expensive broadband connection. Sluggish computers are, of course, less noticeable with broadband.

      2) Empty browser's caches and cookies, which are directories that the browser uses to retain copies of previously visited web pages. When these caches become very large, they can consume considerable space on a Hard Drive and thus slowing down your computer's operation, including its ability to displaying web pages.
      **CCleaner is a free PC optimization tool. It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner! CCleaner allows Windows to run faster, more efficiently and gives you more hard disk space. The best part is that it's Small, Fast and Free!
      *Here is a direct ink to it's download page: http://preview.tinyurl.com/bvtbj
      *
      Here is a link to instructions on how to install and use CCleaner: http://preview.tinyurl.com/ngh4pc

      3) Use a fast web browser. There are large differences in the speeds at which browsers render web pages; a browser is rendering when it's interpreting the web site's "geek" code and converting to a form which we see as a beautiful web page. The fastest is said to be closely between FireFox 3.5 and Google's Chrome web browser. Also, the newer the version of these browsers, generally the faster you'll go. Reason for this include improvements in coding and in how previously visited pages are stored in the browser cache. Internet Explorer should be avoided because it is the slowest of the major browsers, because it has inferior security and because it lacks other advanced features. FireFox and Chrome can be downloaded from the Internet at no cost and are available for use with most major operating systems.
      *
      Here is a link to download FireFox: http://preview.tinyurl.com/y3prgo
      *
      Here is a link to instructions on how to install FireFox: http://preview.tinyurl.com/5keeym

      4) Use tabbed browsing. Tabbed browsing is an innovation built into advanced browsers such as FireFox and Chrome that allows multiple pages to be opened at a time in which appear as different pages in a single web browser window. Each of these pages is easily accessible by clicking the appropriate tab along the top of the window. This can be much more convenient than having to open each page in a separate browser window when it is desired to have a number of pages open simultaneously. Furthermost, it can also speed up the web surfing by making it more convenient to be downloading other web pages while another page is being read.

      5) Avoid unnecessary browser plug-ins, which are downloadable software that is designed to "add functionality" to your web browser. Plug-ins can substantially decrease web page rendering time because they allow additional data to be downloaded for many pages or is trying to consistently update "sibling" applications. Perhaps the most notorious example is Adobe Flash, which is used for moving images.

      6) Turn off pop-up windows. These unrequested windows, which are usually used for advertisements, consumes bandwidth and can slow down the rendering of web pages. They are also a nuisance because the user has to click them to close them. The ability to turn off pop-up windows is a major feature of advanced browsers such as FireFox, Chrome and Safari; it was not available on Internet Explorer as of early 2006.

      7) Turn off web page images. This is probably not desirable for most people, but for those who are interested solely in text, it can speed up the loading of web pages considerably, particularly those which contain numerous advertisements or other images. With the FireFox browser, for example, this is accomplished by clicking on the Edit menu to open the Preferences panel, clicking on the Web Features icon and then removing the check mark from the Load Images check box. Finally, click the OK button at the bottom of the panel.

      8) The last and best solution is to optimize the performance of the computer itself. Several causes of sluggish performance are most notably caused by:
      - A full, or nearly full, hard disk drive (HDD) & a lack of defragmentation.
      - An older computer with a slow microprocessor with limited memory
      - The presence of viruses or other malware in the system.
      **Typically, the first of these is the easiest to correct; this can be accomplished by removing little-used files and programs. However,
      malware can be "in-the-wild" per-say for up two weeks or more before being identifiable by your Anti-virus software. So there is small possibility that there might be something in there that just can't be seen for found yet; worse case scenario of course.


      Additional Software Recomendations:
      Applocations were picked for the effeciency, effectivness and low impact on the user's system performance.

      Avira’s AntiVir Personal Anti-Virus:

      Avira AntiVir Personal - FREE Antivirus is a reliable free antivirus solution
      , that constantly and rapidly scans your computer for malicious programs (such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc.), monitoring every action executed by the user or by the operating system and being able to react promptly when a malicious program is detected. Avira AntiVir Personal is a comprehensive, easy to use antivirus program, designed to offer reliable free of charge virus protection.

      Malwarebyte's Anti-Malware:
      Detects and removes Trojans, Worms, Spyware, and other malicious programs.

      • Repairs damage left by malware

      • Internet surfing tracks erased with TrackSweep

      • Incremental updates for faster downloads

      • Efficient computer resource footprint

      • Free software updates throughout license duration

      • Free support from worldwide security volunteer network


      Safer Networking’s Spybot Search & Destroy:

      Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behavior to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is also absolutely free.

      JKDefrag:
      Why use this defragger instead of the standard Windows defragger?

      • Much faster.

      • Extremely easy to use.

      • Optimized for daily use.

      • Several strategies of disk optimization.

      • Directories are moved to the beginning of the disk.

      • Reclaims MFT reserved space after disk is full.

      • Maintains free spaces for temporary files.

      • Can defragment very full hard drives.

      • Can defragment very large files.

      • Can defragment individual directories and files.

      • Can be run automatically with the Windows Scheduler.

      • Can be used from the commandline (DOS).

      • Can be used as a screen saver.