With more than 20 years of experience, Pacific NorthWest Computers provides affordable on-site and in-shop computer repair services in Washington and Oregon State! We provide services ranging from onsite and remote support, malware removal, data recovery, laptop hardware repairs, custom-built computers, networking, security services, consulting/training, and many other computer/tech-related support and services! www.linktr.ee/pnwcomputers
Monday, September 22, 2025
OPNsense Installation Guide
Monday, September 8, 2025
Complete Spam Filtering Guide
Complete Spam Filtering Guide for
Common & Local Email Services
In our interconnected digital world, email remains an essential communication tool for both personal and professional use. However, spam and phishing attempts continue to plague inboxes across all email platforms. While major email providers offer built-in spam protection, understanding how to optimize these settings and create additional safeguards is crucial for maintaining a clean, secure inbox.
Ensure Spam Filtering Is Active & Set-Up: Microsoft Outlook
Ensure Spam Filtering Is Active & Set-Up Correctly in Microsoft Outlook
In today’s digital workplace, email remains a critical communication tool, but it’s also a prime target for spam and phishing attacks. While Microsoft Outlook offers robust built-in spam filtering, no system is perfect. Some unwanted messages inevitably slip through the cracks, cluttering your inbox and potentially posing security risks.
This guide walks you through two essential strategies to keep your inbox clean and secure:Ensuring Outlook’s spam filtering is active and properly configured.
Creating custom rules to catch and remove spam that evades automatic detection.
Tuesday, September 2, 2025
How Supply Chain Attacks Can Bypass Your Best Security Measures

The Hidden Threat:How Supply Chain Attacks Can Bypass Your Best Security Measures
In the world of cybersecurity, organizations invest millions in firewalls, endpoint protection, network monitoring, and employee training. Yet some of the most devastating breaches in recent history have occurred not through brute force attacks on these defenses, but by targeting something far more insidious: the supply chain itself. Supply chain attacks represent a fundamental shift in the threat landscape, demonstrating how attackers can completely circumvent even the most robust security measures by compromising the very tools and systems we trust to keep us safe.
Windows PC Clean-up and Tune-up Guide - 2025 Update

Full & Complete Windows PC Clean-up Guide
Overview
This guide provides a systematic approach to cleaning, securing, and optimizing a Windows PC using both built-in tools and trusted third-party utilities. Follow these steps in order for best results.
Prerequisites
- Administrator access to the Windows PC
- Stable internet connection for downloads and updates
- Create System Restore Point before beginning
Wednesday, August 20, 2025
Apple Phasing Out Network-Based Time Capsule, Time Machine Backups
The End of an Era:
Apple is Phasing Out Network-Based Time Capsule, Time Machine Backups
Apple is making a decisive shift in how macOS handles backups, and it’s a move that’s leaving many longtime users of Time Capsule and AirPort hardware with tough decisions. With the introduction of macOS 27, Apple will officially drop support for Time Machine backups over network-connected Time Capsule disks.Apple is Phasing Out Network-Based Time Capsule, Time Machine Backups
https://9to5mac.com/2025/06/10/time-machine-backup-macos/
Wednesday, August 6, 2025
Maximize Your Digital Privacy
How to Maximize Your Digital Privacy in Today's Connected World
In recent months, I've noticed a surge in customer inquiries about online privacy and data security. Questions like "How can I keep my online accounts more secure?" and "I want to browse the internet as anonymously as possible; how do I do that?" have become increasingly common. The growing concern about personal data removal from the internet reflects our collective awakening to digital privacy risks.
This comprehensive guide covers the fundamentals of online privacy, practical steps to enhance your digital security, and methods for removing personal information from the internet.
Monday, June 23, 2025
Automated System-Wide Debloating & Basic Software Installation for Windows 10/11
Introducing "DeployWorkstation"
A System-Wide/All-Users Debloating & Basic Application Installation
PowerShell Script For Windows 10 & Windows 11 Systems
Tuesday, April 16, 2024
Flipper Zero: Tips & Tricks To Help Get You Started!
Flipper Zero: Tips & Tricks
So what is a Flipper Zero anyway?The Flipper Zero website describes the device as "a portable multi-tool for pen-testers and geeks in a toy-like body. It loves hacking digital stuff, such as radio protocols, access control systems, hardware, and more. It's fully open-source and customizable, so you can extend it in whatever way you like."
Tuesday, December 27, 2022
Data Privacy & Data Security In Today's Digital Age
How to Become as "Invisible" as Possible In Today's Cyberage
I have been getting a lot more questions from customers lately with regard to online data privacy and data security."How can I keep my online accounts more secure?"
"I would like to surf the internet as anonymously and as privately as possible. How can I do that?
"I found some personal information online, and would like it removed! How do I do that?"
So I decided to write a post covering the basics of online privacy, how to improve your safety and security when online, and how to get personal data removed from the internet (if at all possible).
Friday, October 14, 2022
Recommended PC Apps, Programs, Tools & Utilities! *UPDATED*
A basic list of software tools, and utilities that we use and recommend!We will update this list as much as possible!
Monday, May 30, 2022
Windows Security Center Stops Working - Windows 11
I have run into a problem repeatedly recently. On a client computer running Windows 11, if I go to open the Windows Security Center, it won't open and I will get the following message/error:
Some websites will recommend the following:
"Go to the Settings. Select App > Apps & features and type in ‘security’ in search menu box. An icon for Windows Security will pop open. From there, click on the options (three dots) and select Advanced options. Now scroll down to Reset section and click on Reset.
You’ll get a confirmation asking if you really want to reset the app, along with your whole app data. Click on Reset to go with it."
However, so far what I have found is that "Windows Security" is not in the application list at all!
So how can I reset the app?
Well, what I have found was a simple command you can run from the Windows PowerShell (with administrative privileges) that ultimately solved the problem for me, as well as for some of my clients who have run into this same issue as well.
- Using Windows' search, just type in "PowerShell"

- Right-click on its icon, and select "Run as Administrator"
- Next, copy and paste (or type in) the following script:
Get-AppxPackage Microsoft.SecHealthUI -AllUsers | Reset-AppxPackage
- Hit Enter, and you should get a screen like this:
That should do the trick!
Your Windows Security Center should now be working again!
Pacific NW Computers
www.pnwcomputers.com
360.624.7379
Monday, March 7, 2022
Ransomware Infection? This could help!!
Ransomware infections are a very real and very serious problem that general computer users, and businesses alike, should be prepared for!
- First off, the best prevention to start with is to have good security software installed that can protect you from Ransomware infections (such as Malwarebytes Anti-malware, Kaspersky Antivirus, etc).
- Secondly, have a good data backup system in place that follows the 3-2-1 backup rule to keep your data safe!
- The 3-2-1 backup rule simply states that you should have:
- 3 copies of your data (your main data and 2 backup copies)
- On two different media types (NAS drive and a thumb drive)
- With one copy off-site for disaster recovery (cloud backup, etc).
If you do get hit with a ransomware infection, the website below can help you identify which ransomware you were infected with and if there is a de-encryption tool available to help get your data/files back: https://id-ransomware.malwarehunterteam.com/
Monday, October 19, 2020
Protect Yourself From Cyber Attacks & Digital Fraud!
PROTECT YOUR INFORMATION
Make sure you know who you're communicating with.
- Fraudsters pose as credible organizations, such as banks and the IRS, "phishing" for your information.
- Be aware of COVID-related scams.
- Criminals are taking advantage of the pandemic. Learn more about the top scams criminals are using during these difficult times.
Report suspicious texts and emails.
- Fraudsters impersonate companies to get consumers to click links and provide personal information. These deceptive emails, phone calls, and text messages appear to come from a legitimate source.
- Don't let online shopping scams trick you.
- Before providing your billing information online, make sure you are working with a credible site.
- Don't download any software or click unknown links.
SECURITY BEST PRACTICES
Layer your protection.
- A strong password is the first line of defense against cybercriminals. We recommend using multifactor authentication for an added layer of protection for all your accounts.
Be alert.
- Monitor your accounts regularly, respond to fraud alerts, and report unauthorized transactions promptly.
- Watch out for phishing attempts.
- There are some easy ways to ensure an email is from "who you think" sent it. There are some simple methods to spot Email Spoofing, which you can find here.
Set your preference for digital documents.
- Mailbox fraud has been an ongoing strategy for criminals.
- Safeguard your correspondence by signing up to receive digital information for your products and services instead of by Mail/USPS.
- Use a shredder to destroy paper documents when you are done with them.
Stay alert about industry trends on cybersecurity threats!
Monday, May 15, 2017
WannaCry Ransomware Virus
The now infamous "WannaCry" ransom-ware virus has been making headlines and scaring a lot of computer users around the world. It is one of the quickest spreading Ransom-ware bugs that has been released to date, but Ransom-ware viruses are not anything new.
Ransom-ware viruses are a type of virus that infect computers, and then prevent the user from accessing the operating system, or encrypting all the data stored on the computer. Then the user is asked to pay a fixed amount of money as ransom to unlock their files, allowing them to regain access to the operating system and their data again. What sets this virus apart is how quickly and widely it has spread.
As of yesterday a Security Professional, Marcus Hutchins, has been credited with stopping the WannaCry ransomware attack from spreading across the globe, by accidentally triggering a "kill switch" found in reverse engineering the virus. So for now, further infection has been stopped. But to prevent any infections from previous distributions of the bug you can do the following:
"WannaCry" Ransomware Guidelines to Stay Safe:
- Be careful to NOT click on harmful links in your emails!
- Even with security software installed, if you open/download an attachment from a malicious email it can and will infect a computer and network!
- If you get an email from someone, look at the email address/email header and make sure it's from who it says it is.
- Be aware of fraudulent e-mail messages that use names similar to popular services such as PayPal instead of PayPal or use popular service names without commas or excessive characters.
- Be wary of visiting unsafe or unreliable sites
- Never click on a link that you do not trust on a web page or access to Facebook or messaging applications such as WatSab and other applications.
- If you receive a message from your friend with a link, ask him before opening the link to confirm, (infected machines send random messages with links).
- Always make have the latest update for your Antivirus; Let me know if there are any update issues!
- Make sure your windows have the latest updates to close the gap!
- If windows has reported that updates are pending/available; download and install immediately!!
- Make a recovery disk! The WannaCry ransomware asks for $300 or more if you a modified version if you do not pay the creators (in Bitcoin to its untraceable and not refundable) encrypt all of your files on the computer.
- If your computer gets infected take it off of your network immediately! The ransomware will spread to other computers on the network! You can restore from a backup.
- If you would like our assistance with ANY of the procedures above or would like us to secure your computer and/or network to the best of it's ability, let us know and we can schedule an onsite or remote session for you!!
More from Microsoft on the bug and associated patches to help prevent infections from WannaCry:
https://technet.microsoft.com/…/libr…/security/ms17-010.aspx
Friday, June 5, 2015
How can I keep my computer from getting infected? Pacific NW Computers' PC Security Tips
- Avast Antivirus, BitDefender Free, Microsoft Security Essentials
- MalwareBytes Anti-Malware
- Spybot Search & Destroy
- CCleaner
http://pnwcomputers.blogspot.com/2013/06/pnw-computers-links-and-recommended.html
- Before running
any scans with any of the installed security software, be sure to FULLY
update the software FIRST.
- After updating
the security software, perform the deepest and most thorough scan that the
software is capable of. This is usually labeled as a FULL or COMPLETE scan.
- DELETE or
QUARANTINE any and all of the security software’s findings.
- Make sure you
DON’T download and install any scanner/security software that solicits you
to download and install its software. These scanners are blacklisted
because of their questionable reputation.
- An unpatched
Windows is vulnerable and even with the “best” Antivirus installed;
malware will find its way through.
So visit http://windowsupdate.microsoft.com/ to download and install the latest updates. - Be sure to download and install all CRITICAL and SOFTWARE updates! You also may have to do several “passes” of Windows updates before all the available updates/patches are actually installed.
- Verify that your
version of Windows Vista, Windows 7 or Windows 8 has the most recent service pack installed. If this is not currently installed on your system, the Windows Update
website will recognize this vulnerability and request you to download and
install any available Service Packs and other needed updats.
- This is one of
the main causes why a computer gets infected. Visiting
cracksites/warezsites – and other questionable/illegal sites is ALWAYS a
risk. Even a single click on the site can be responsible for installing a
huge amount of malware. Don’t think: “I have a good Antivirus and Firewall
installed, they will protect me” – because that’s not true… there is no
“Magic Bullet”. Before you know it, your Antivirus and Firewall may
already be disabled because malware already found its way on your system.
- Malware spreads
via email as well, especially email attachments. The most common ones are emails
telling you that your computer is infected and that you can find the
removal tool in the attachment, emails telling you that your password has
changed and can find it in the attachment, emails with product codes in
the attachment from software that you purchased (which you didn’t), emails
with attachments that are so called “Security Updates”, etc. etc.
- Don’t trust any
emails like the ones listed above. Don’t even attempt to preview/open them
and delete them immediately instead! It may also happen you receive an
email from someone you know, but with a questionable attachment present
and strange content in the e-mail’s message. In this case, this person –
or someone else who has your address book in his/her address book – is
infected with malware (worm/spambot) and sends these emails without being
aware of it.
- Don’t click
links in emails from someone you don’t know, because these links can
redirect you to sites where malware gets downloaded and installed.
- Use Google Chrome or the FireFox
web browser as your MAIN internet browser. These browsers does not use
ActiveX controllers or BHO’s (these are programs that are a standard
feature’s of Microsoft’s Internet Explorer and are “exploited”
vulnerabilities that hackers use to infect computers). If a specific
website (such as a financial institution website) may require Internet
Explorer to be used in order for you to view their site, then use Internet
Explorer. But for that specific website ONLY!
- Don’t click on
links inside pop-ups. ALWAYS close the windows via the "X" for the window vs. clicking "Cancel" or any other 'escapes' in the pop-up.
- Download
software off of the internet from websites you know and trust. A lot of
free software comes bundled with other software, including malware.
- Be careful when
you are viewing videos online. Especially when you get a pop-up asking you
to download a “Codec” to be able to watch the video. By default, your
media player should already have the necessary codec installed to watch
online videos. In the case that you’re prompted to install an additional
codec while trying to watch a move online (or downloaded), it is most
likely a false alert and this so-called codec may install malware.
- Don’t install
plug-ins (ActiveX) if you’re not certain what it is or why it is you need
it. (Unless you are attempting to perform Windows/Microsoft Updates).
- Glubble is a
great FireFox add-on if you want to manage the sites your kids are allowed
to see.
- If you want to
install certain software, always go to the developer’s site to download the
software. Then you can be sure you’re downloading and installing the right
software. Be aware of the fact that certain software (especially freeware)
may contain/come bundled with extra software including spyware and/or
adware. So only install when you’re sure they are OK.
- The use of Torrent sites, Game Patches and Mods, Emulators; really anything "Free" is always a risk. Unless the download/host site is a reputable site, you can never be sure what you are exactly downloading. A file you are looking to download or have downloaded isn’t always what it’s made out to be.
Jon Pienkowski
Pacific NorthWest Computers
www.pnwcomputers.com
360-624-7379
Wednesday, April 30, 2014
Microsoft Internet Explorer Vulnerability ~ Fact and Opinion
As you have most likely heard, Microsoft is scrambling to fix a major bug which allows hackers to exploit flaws in Internet Explorer 6, 7, 8, 9, 10 and 11. The company has also confirmed it will not issue a fix for web browsers running on Windows XP after it formally ended support for the 13 year old operating system back on April 8th.
The vulnerability was discovered by cyber security software maker FireEye Inc. which stated the flaw is a ‘zero-day’ threat. This means the first attacks were made on the vulnerability before Microsoft was aware of it. FireEye also revealed a sophisticated hacker group has already been exploiting the flaw in a campaign dubbed ‘Operation Clandestine Fox’, which targets US military and financial institutions.
FireEye spokesman Vitor De Souza declined to name the hackers or potential victims as the investigation is ongoing, only telling Reuters: “It’s unclear what the motives of this attack group are at this point. It appears to be broad-spectrum intel gathering.”
For its part Microsoft has confirmed the existence of the flaw in an official post: https://technet.microsoft.com/library/security/2963983
Now, Internet Explorer has always been a vulnerable browser and has exploits created/identified against it everyday. This is why for YEARS I have pushed my customers to use an alternative Web Browser such as Mozilla Firefox or Google Chrome. As previously mentioned, both of those web browsers are safer to use than Internet Explorer and are both immune from the recently identified exploit!
What makes this recent vulnerability stand out from the others, and why this particular vulnerability is making all the headlines, is that the problem is pretty widespread; affecting 1 in 4 Windows based computers and ALL Windows XP systems.
A Temporary Fix
While Microsoft rushes to fix the bug, FireEye gave concerned users two workarounds .
- Use another web browser other than Internet Explorer
- Disable Adobe Flash. “The attack will not work without Adobe Flash,” it said. “Disabling the Flash plugin within IE will prevent the exploit from functioning.”
No Hope For Windows XP
Microsoft has confirmed that no fix will be rolled out for Windows XP because support has officially ended and there are no plans to make an exception. It states:
“An unsupported version of Windows will no longer receive software updates from Windows Update. These include security updates that can help protect your PC from harmful viruses, spyware, and other malicious software, which can steal your personal information.”
The company’s advice to Windows XP users has remained the same for some time: upgrade to Windows 7 or 8 or buy a new PC. It has also repeatedly sent a pop-up dialog box to reachable Windows XP machines with the following end of support notification.
For users unsure whether their existing XP PCs can support Windows 8, Microsoft offers a software tool called ‘Windows Upgrade Assistant’ which can be downloaded here: http://go.microsoft.com/fwlink/p/?LinkId=321548
If you have any questions or concerns please don't hesitate to get in touch!
Jon Pienkowski
Pacific NorthWest Computers
www.pnwcomputers.com
360-624-7379
Wednesday, July 18, 2012
How did I get infected? Take these steps so it does not happen again!
One of the most common questions found when cleaning malware is "how did my machine get infected?". There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.
Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.
Do not use P2P programs
Peer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file you’re downloading through P2P programs is safe.It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."
In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.
Practice Safe Internet
Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.Below are a list of simple precautions to take to keep your computer clean and running securely:
1) If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.Keep Windows up-to-date
Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.Windows XP users You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.
Windows Vista users You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.
Windows 7 users You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here
Keep your browser secure
Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.The latest versions of the three common browsers can be found below:
Microsoft Internet Explorer
Mozilla Firefox
Google Chrome
Use an AntiVirus Software
It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.
It is imperative that you update your Antivirus software at least once a week (even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.
Use a Firewall
I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).
In addition, if you connect to the internet via a router, this will normally have a firewall in-built.
Some people will recommend installing a different firewall (instead of the Windows’ built one), this is personal choice, but the message is to definitely have one! For a tutorial on Firewalls and a listing of some available ones see this link: Understanding and Using Firewalls
Install an Anti-Malware program
Recommended, and free, Anti-Malware programs are Microsoft Security Essentials, Malwarebytes Anti-Malware, Spybot Search & Destroy and SuperAntiSpyware. You can find these programs and more on our other blog article; PNW Computer's Recommended Software Programs & Downloads!You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.
Make sure your applications have all of their updates
It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is very important to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities (such as Adobe Reader and Java). You can check these by visiting Secunia Software Inspector.Follow this list and your potential for being infected again will reduce dramatically!
Grinler. "How Did I Get Infected?" Bleeping Computer - Computer Help and Discussion. Bleepingcomputer.com, 24 Jan. 2004. Web. 22 Dec. 2011.Friday, May 4, 2012
Fake Hard Drive Diagnostic Virus; Browser Pop-up/Redirection Fix
Pacific NorthWest Computers KNOWS rogue security and fake software applications very well. Fake software virus applications make up for 85% of the infections that we see on a day-to-day, week-to-week, month by month basis here in the shop. At first it was just fake security software programs. But the newest "trend" in the fake malicious software world is fake hard drive diagnostic software.
This fake diagnostic software virus pretends to have found issues with your hard drive, proceeds to hide your data (to seem more legitimate) and then tries to sell it self as a fix for all "problems" it has identified with your hard drive. When first released, it was not to difficult to remove. But the issue we are running into now however is that when a customer brings a system in that has this virus on it, we aren't just worrying about just getting the virus removed. But more importantly, reversing the changes the virus has made to an affected system. The big challenge has been with Browser hooks.
Most of the time when we encounter this virus it will actually "hook" into (or simply put; infect) the executable "IExplorer.exe", which is Internet Explorer. Once "hooked" the virus can change, modify how Internet Explorer functions and can generate pop-ups and redirect searches and navigation in the browser. All after the virus cleaning is completed on the affected computer. Now, most of the time programs like Spybot Search & Destroy are very effective at reversing system modifications created by viruses. But so far, this browser hook issue is not "automatically" fixed by virus scanners and utilities and since hooks can sometimes be impossible to remove. This type of an issue can prevent us from declaring a system clean and can sometimes require us to reinstall the computer's operating system. Well, we think we figured out a fix!
After working on a computer from a local insurance agency, I did some extensive poking around an infected computer's file system and registry and was able to locate a registry location for something called “DOMStorage” under Internet Explorer’s HKEY_ CURRENT_USER registry key (HKCU\Software\Microsoft\Internet Explorer\DOMStorage). In this registry entry, I found folders matching the names for some of the websites that were being generated in the random IE pop-ups's. I knew I was onto something but did not know what "DOMStorage" even was nor did I know why or how Internet Explorer even used it.
Jon Pienkowski
Owner/Operator
Pacific NorthWest Computers