Tuesday, July 16, 2013

How to Clean up a Slow Performing Computer ~PLUS~ a few Mac tips too ;)


Many think that when a computer starts performing poorly it's time to buy a new computer. Does your desktop or laptop often hang on the hourglass or swirling circle for several minutes at a time? Does "Not Responding" sound familiar to you? Is it slow to load files or applications, and does it take a long time to boot? Even if you're extremely careful about how you use your computer and never download questionable material, over time it is inevitable that your system will accumulate unwanted registry entries, errors, clutter, and debris. Here's how to clean your computer up and get it running faster again!

Things YOU can DO:

  1. Update and Scan with your Security Software:
    (Link to more in-depth PC/computer clean-up guide)
    Antivirus software helps protect you from viruses and other malicious files that can spread through emails or downloads. It performs regular system checks and detects when foreign files are trying to infiltrate your computer.
    We recommend using Malwarebytes Anti-Malware for comprehensive protection.
    Click the link below for a list of the security software that we recommend and use:
  2. Do not use Registry Optimizers or so-called Clean Reg Tools.
    Most of these cause more harm than good in the long run.
  3. Clear up space on the hard drive.
    Deleting unnecessary files is an easy way to free up memory and improve performance. Use BleachBit for a thorough cleanup of your PC, and Onyx for your Mac.

    • For Windows 10 and 11: Open Settings, go to System, then Storage, and use the built-in Disk Cleanup tool.
    • For macOS: Go to the Apple menu, select About This Mac, then Storage, and use the Manage button to find options for optimizing storage.
  4. Uninstall useless programs or programs you rarely use. These can include games, media files, or redundant software.

    • For Windows: Go to Settings, then Apps, and uninstall programs that are no longer needed.
    • For macOS: Drag unwanted applications from the Applications folder to the Trash, then empty the Trash.
    • When uninstalling programs be sure you don't need them! Some programs are needed for the operation of the computer. So if you are unsure about a program then leave it alone or do a quick search on Google to see if you can find out whether it's good or bad.

  5. Clean Up Junk Files.
    BleachBit is a powerful, open-source tool that helps you clean up unnecessary files and free up disk space on your computer. Follow these steps to use BleachBit to clean your system:
    • Download and Install "BleachBit," and then find and click on the application to open it.
    • Choose What to Clean:
      1. In BleachBit, you will see a list of cleaners on the left-hand side. 
      2. These cleaners correspond to different types of junk files and applications.
      3. Check the boxes next to the items you want to clean. 
      4. Common selections include:
        • System: Temporary files, logs, memory dumps
        • Web browsers: Cache, history, etc
        • Careful deleting cookies as they store your saved login data.
        • Applications: Temporary files from installed applications
        • Deep Scan:
          • For a more thorough clean, you can enable "Deep Scan" under the System section. 
          • This option will scan for and delete more obscure temporary files and caches.
          • Be cautious with deep scanning, as it may delete files you were not expecting.
      5. Preview (Optional but Recommended):
        • Click the "Preview" button to see a list of files that will be deleted and the amount of space that will be freed.
        • Review the list to ensure no important files will be deleted.
      6. Clean:
        • If you're satisfied with the preview, click the "Clean" button to delete the selected files.
        • BleachBit will begin cleaning the files, which may take a few minutes depending on the amount of data.

  6. Defragment your hard drive if you are using a traditional HDD. 
    *SSDs do not need defragmentation.
    1. For Windows: Open the Start Menu, search for Defragment and Optimize Drives, and run the tool.
    2. MacOS: Mac operating systems manage disk fragmentation automatically, so manual defragmentation is not needed.

  7. Check your RAM.
    If your computer is running slowly, you might need more RAM.
    1. For Windows: Right-click on This PC, select Properties and check the installed RAM. Consider upgrading if you have less than 8GB for modern systems.
    2. For macOS: Click the Apple menu, select About This Mac, and check the Memory tab. Aim for at least 8GB for general use.

  8. Optimize startup programs.
    Reducing the number of programs that run at startup can improve boot times.
    1. For Windows: Open Task Manager (Ctrl+Shift+Esc), go to the Startup tab and disable unnecessary programs.
    2. For macOS: Go to System Preferences, then Users & Groups, and select your user. Click the Login Items tab and remove unnecessary items.

    Other Tips:

    • Only install software that you intend to use regularly.
    • Be cautious with free downloads; they can come with spyware, malware, or viruses.
    • Regularly clean up your computer using tools like BleachBit.
    • Ensure safe internet browsing by using a firewall and a secure browser.
    • Schedule regular scans with your antivirus and anti-malware software.
    • Always back up your important data before running any cleanup tool.
    • If you're unsure about specific options, stick to the default settings.

      Warnings:

      • When uninstalling programs, ensure they are not essential for your system's operation. If unsure, do a quick search to verify.
      • Use anti-malware programs carefully and follow instructions thoroughly. Incorrect changes to the registry can worsen performance. If you're unsure, clean only detected items marked in red, or consult a knowledgeable friend or professional.

    Further Reading/Related Articles:

    How you can get infected & what you can do to try to prevent it:

    Tuesday, July 2, 2013

    If you're trying to keep cool, your computer probably is too!!

    If you're trying to keep cool this summer, your computer probably is too!! 

    Simply put, if your computer becomes too hot, it is possible to destroy and shorten the lifespan of the hardware inside your computer, leading to irreparable damage and potential data loss. Besides losing your data, heat pecks away at your computer's internal organs (the motherboard, CPU, and more) significantly shortening its lifespan.

    If it's hot in the room where your computer is, get a little fan pointed toward the system to help circulate the air around it. Or, if you are VERY careful (and want to try), turn the computer off, take the side cover off and blow the fans out with canned air and/or very carefully vacuum the inside of the computer out. That can sometimes give you a computer a night and day difference in temperature as well as keeps your computer fans from sounding like jet turbines!

    *Here's a word of caution: If your computer is overheating, resist the urge to take the side of the case off the computer. Most computers are very carefully designed to ensure that cool air is delivered to critical components. Removing the side of the case disrupts the circulation or air for the system.

    If cleaning and what not does not help you with to get your computer running cooler, you probably want to start planning some system-cooling upgrades; which we can help with!!

    Any questions or ANYTHING, drop us a line or give us a call!!
    jon@pnwcomputers.com
    360-624-7379

    Wednesday, June 26, 2013

    PNW Computers' Links And Recommended Software

    PNW Computers' Links And Recommended Software

    A basic list of software, tools, and utilities that we use and recommend!
    We will update this list as much as possible! 

    Tools and Utilities:

    • Hirens All-In-On Boot CD - Great utility CD with TONS of diagnostic software; HD manufacturers included!
      http://www.hirensbootcd.org/download/
    • BleachBit - When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there!
      https://www.bleachbit.org/
    • GParted - GParted is a free partition manager that enables you to resize, copy, and move partitions without data loss. Some repair capabilities as well.
      http://gparted.sourceforge.net/download.php
    • Memtest86 - MemTest86 is a free, thorough, stand-alone memory test for x86 architecture computers.
      http://www.memtest86.com/
    • Offline NT Password & Registry Editor - This is a utility to reset the password of any user that has a valid local account on your Windows System.
      http://pogostick.net/~pnh/ntpasswd/
    • HFSExplorer - HFSExplorer is an application that can read Mac-formatted hard disks and disk images. It can read the file systems HFS (Mac OS Standard), HFS+ (Mac OS Extended), and HFSX (Mac OS Extended with case-sensitive file names), including most .dmg disk images created on a Mac, including zlib / bzip2 compressed images and AES-128 encrypted images
      http://www.catacombae.org/hfsx.html 
    • IsoBuster - IsoBuster is actually a CD/DVD and BD/HD DVD data recovery software that can interpret, open, and extract various CD/DVD/Blu-ray disk image files, including DMG.
      http://www.isobuster.com/download.php
    • Revo Uninstaller Free - Revo Uninstaller lists the installed programs and components for all current users. With a choice of views, as well as a context menu, information on program components is available: program properties, their registry entries, and links to the manufacturer's website, for a start. The "Search" option finds installed applications just by typing the first few letters of their name. Revo Uninstaller Free scans for "leftovers" with advanced algorithms that are precise, fast, and very effective in searching for leftover Windows Services, Drivers, File associations, Shell Extensions, COM components, Windows Installer components, program settings, and more!
      http://www.revouninstaller.com/revo_uninstaller_free_download.html
    • MyDefrag - MyDefrag (formerly JKDefrag) is a disk defragmenter and optimizer for Windows 2000/2003/XP/Vista/2008/X64. Completely automatic and very easy to use, fast, low overhead, with several optimization strategies, and can handle floppies, USB disks, memory sticks, and anything else that looks like a disk to Windows.
      http://www.mydefrag.com/Manual-DownloadAndInstall.html
    • CUTEpdf Writer - Create PDF documents on the fly for Free! Portable Document Format (PDF) is the de facto standard for the secure and reliable distribution and exchange of electronic documents and forms around the world. CutePDF Writer (formerly CutePDF Printer) is the free version of commercial PDF creation software. CutePDF Writer installs itself as a "printer subsystem". This enables virtually any Windows applications (must be able to print) to create professional quality PDF documents - with just a push of a button! ALL FOR FREE!
      http://www.cutepdf.com/products/cutepdf/writer.asp
    • VideoLAN VLC Media Player - VLC media player is a highly portable multimedia player for various audio and video formats as well as DVDs, VCDs, and various streaming protocols without external codecs or programs. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
      http://www.videolan.org/vlc/
    • Sumatra PDF Viewer - Sumatra PDF is a slim, free, open-source PDF reader for Windows. Sumatra has a very minimalistic design and is nowhere NEAR the security risk that Adobe Reader can be. Simplicity has a higher priority than a lot of features with Sumatra. It's small, secure, and starts up very fast.
      http://blog.kowalczyk.info/software/sumatrapdf/download-free-pdf-viewer.html
    • Piriform Recuva - Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!
      http://www.piriform.com/recuva

    Security Software:

    What is a rootkit!? A rootkit is a program or a program kit that hides the presence of malware (or itself) in a system. A rootkit for a Windows systems is a program that penetrates into the system and intercepts the system functions; Windows API. It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install their own drivers and services in the system and they also remain “invisible".  

    Software Sites:

    • Filehippo.com - Great site that hosts TONS of updates and software titles; anything you can think of really.
    • Ninite.com - Great "update-all-at-once" site that lets you install/update multiple programs without dealing with individual installers, prompts, etc. One download, one install; as many programs as you like!


    Let us know of any issues with inks!

    Updated 11/1/2013
    pnwcomputers@gmail.com

    Friday, April 26, 2013

    DC Jack ~ Laptop Repair

    Is your laptop 'jacked' up? ;)
    We know what to do! 

    If you give Pacific NorthWest Computers a call today!!
    We can get your 'jacked' up laptop FIXED for CHEAPER than the competition!

    360-624-7379

    Wednesday, April 10, 2013

    Data Backup - Whats Out There Other Than Online?


    Question...

    Other than an online backup solution, what is a basic setup that you recommend for keeping your computer data backed up?

    Answer: Pacific NorthWest Computers recommends getting a small portable hard drive for each individual computer you may have at your home/office. We have seen clients use one hard drive for multiple computers but that usually ends up being more of a hassle rather than a convenience. Plus if that one drive was to fail, everyone's data could be lost! So with an individual drive for each computer, backups can be scheduled and completely automated.  Additionally, in the case of hard drive failure, you only have to worry about the data for that one user versus potentially losing all of the data for multiple users!
    If you want to make sure you data is REALLY secure, A Network Accessible Storage drive (also known as a NAS drive) is another option to take a look at. A NAS is like an external hard drive that is setup over your network. Besides creating easy access to data from any computer connected to that network, it also uses multiple hard drives to protect your data in the event that one of the drives was to fail. With a NAS, all your data and information is mirrored to additional drives so in the event a hard drive fails you don't lose any data OR have any down time! For businesses, no down time is VERY important!

    So there are some other options as well, but this is a good starting point :)

    If you have any general data backup questions or questions about your data backup system, give us a call or shoot us an email today!! 
    360-624-7379
    Jon@pnwcomputers.com
    www.pnwcomputers.com


    Wednesday, October 17, 2012

    ZeroVulnerabilityLabs' ExploitShield Browser Edition


    ExploitShield is a new tool that promises to keep the Windows computer protected from by protecting it from exploit attacks against vulnerabilities. It will also block malicious drive-by download infections from exploit kits (Blackhole Exploit Kit, Phoenix, Incognito, Eleonore, Sakura, etc.). These type of exploit kits incorporate a variety of exploits for different vulnerable applications such as the browsers themselves, Java, Acrobat Reader, etc.

    ExploitShield is said to be the first ever install and forget vulnerability-agnostic anti-exploit solution and you can download it from the link below. It works just fine on Windows 8 too!


    Wednesday, July 18, 2012

    How did I get infected? Take these steps so it does not happen again!


    One of the most common questions found when cleaning malware is "how did my machine get infected?". There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.
    Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.


    Do not use P2P programs

    Peer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file you’re downloading through P2P programs is safe.

    It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

    In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.

    Practice Safe Internet

    Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.

    Below are a list of simple precautions to take to keep your computer clean and running securely:

    1) If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.

    2)  If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.

    3) If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know who is themselves infected with malware which is trying to infect everyone in their address book. A key thing to look out for here is: does the email sound as though it’s from the person you know? Often, the email may simply have a web link or a “Run this file to make your PC run fast” message in it.

    4) If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of pop-ups, or Foistware, you should read this article: Foistware, And how to avoid it.

    5) There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. Removal instructions for a lot of these "rogues" can be found here.

    6) Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you, or will download a file to your PC without your knowledge. You can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake. DO NOT click on these windows, instead close them by finding the open window on your Taskbar, right click and chose close.

    7) Do not visit pornographic websites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do, as this can often form part of their funding.

    8) When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link you should message back to the person asking if it is legit.

    9) Stay away from Warez and Crack sites! As with Peer-2-Peer programs, in addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.

    10) Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download files from a site, and are not sure if they are legitimate, you can use tools such as BitDefender Traffic Light, Norton Safe Web, or McAfee SiteAdvisor to look up info on the site and stay protected against malicious sites. Please be sure to only choose and install one of those tool bars.

    11) DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software. Sometimes even legitimate programs will try to bundle extra, unwanted, software with the program you want - this is done to raise money for the program. Be sure to untick any boxes which may indicate that other programs will be downloaded.

    Keep Windows up-to-date

    Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.

    Windows XP users You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.

    Windows Vista users You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.

    Windows 7 users You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here

    Keep your browser secure

    Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.

    The latest versions of the three common browsers can be found below:
    Microsoft Internet Explorer
    Mozilla Firefox
    Google Chrome

    Use an AntiVirus Software

    It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.

    It is imperative that you update your Antivirus software at least once a week (even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

    Use a Firewall

    I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.

    All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).

    In addition, if you connect to the internet via a router, this will normally have a firewall in-built.

    Some people will recommend installing a different firewall (instead of the Windows’ built one), this is personal choice, but the message is to definitely have one! For a tutorial on Firewalls and a listing of some available ones see this link: Understanding and Using Firewalls

    Install an Anti-Malware program

    Recommended, and free, Anti-Malware programs are Microsoft Security Essentials, Malwarebytes Anti-Malware, Spybot Search & Destroy and SuperAntiSpyware. You can find these programs and more on our other blog article; PNW Computer's Recommended Software Programs & Downloads!

    You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.

    Make sure your applications have all of their updates

    It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is very important to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities (such as Adobe Reader and Java). You can check these by visiting Secunia Software Inspector.

    Follow this list and your potential for being infected again will reduce dramatically!

    Grinler. "How Did I Get Infected?" Bleeping Computer - Computer Help and Discussion. Bleepingcomputer.com, 24 Jan. 2004. Web. 22 Dec. 2011.

    Friday, May 4, 2012

    Fake Hard Drive Diagnostic Virus; Browser Pop-up/Redirection Fix


    Pacific NorthWest Computers KNOWS rogue security and fake software applications very well. Fake software virus applications make up for 85% of the infections that we see on a day-to-day, week-to-week, month by month basis here in the shop. At first it was just fake security software programs. But the newest "trend" in the fake malicious software world is fake hard drive diagnostic software.

    This fake diagnostic software virus pretends to have found issues with your hard drive, proceeds to hide your data (to seem more legitimate) and then tries to sell it self as a fix for all "problems" it has identified with your hard drive. When first released, it was not to difficult to remove. But the issue we are running into now however is that when a customer brings a system in that has this virus on it, we aren't just worrying about just getting the virus removed. But more importantly, reversing the changes the virus has made to an affected system. The big challenge has been with Browser hooks.


    Most of the time when we encounter this virus it will actually "hook" into (or simply put; infect) the executable "IExplorer.exe", which is Internet Explorer. Once "hooked" the virus can change, modify how Internet Explorer functions and can generate pop-ups and redirect searches and navigation in the browser. All after the virus cleaning is completed on the affected computer. Now, most of the time programs like Spybot Search & Destroy are very effective at reversing system modifications created by viruses. But so far, this browser hook issue is not "automatically" fixed by virus scanners and utilities and since hooks can sometimes be impossible to remove. This type of an issue can prevent us from declaring a system clean and can sometimes require us to reinstall the computer's operating system. Well, we think we figured out a fix!

    After working on a computer from a local insurance agency, I did some extensive poking around an infected computer's file system and registry and was able to locate a registry location for something called “DOMStorage” under Internet Explorer’s HKEY_ CURRENT_USER registry key (HKCU\Software\Microsoft\Internet Explorer\DOMStorage). In this registry entry, I found folders matching the names for some of the websites that were being generated in the random IE pop-ups's. I knew I was onto something but did not know what "DOMStorage" even was nor did I know why or how Internet Explorer even used it.

    After doing some research on DOMStorage (http://en.wikipedia.org/wiki/Web_storage) it looks like DOMStorage, or Document Object Model Storage, is a web application software method and protocol used for storing data in a web browser. So I thought to myself, “Well if they can store data there, they could very well plant a program in those locations to hide and allow themselves to generate those pop-ups!”. So I went ahead and deleted all of the folders in the DOMStorage registry location (and there were A LOT of sites listed in there) and it’s safe to now say after removing those folders there have not been ANY Internet Explorer pop-ups since! After pop-ups coming up several times a minute, the system is running great and is running flawlessly for several days; with web surfing and all! No browser re-directions or anything!
    So I would say this is another problem solved and another win against viruses for Pacific NorthWest Computers!

    Jon Pienkowski
    Owner/Operator
    Pacific NorthWest Computers

    Wednesday, April 4, 2012

    Top 5 Myths Computer Repair Customers Believe About “Going Apple”

    There seems to be a perceived consensus among a segment of my customer base that believes going Mac would solve all their ills, save them money, and provide numerous other benefits. While there are situations where Macs are justified, the steamrolling in the media by the Apple-centric movement to iEverything helps fuel a majority of this misconception surrounding the Apple brand...

    Monday, August 22, 2011

    Force Checking for Updates on Android Devices



    Normally your phone has a process which checks for pending updates every "X" amount of hours. But what if you want to force the device to check for updates immediately? This is a trick I found a while back and continue to use time and time again.
    • Open the standard Android Phone (Dialer) application
    • Enter *#*#checkin#*#* on the dialer keypad ( *#*#2432546#*#*)
    • On the last entry of the *, your phone will pause while it is checking for updates.
    • Once it has completed, you will see a yellow exclamation icon in the notification (or different icon depending on your installed theme) bar letting you know that checkin has been completed and if an update exists you should be notified.
    • It also appears that Market updates are also rechecked as part of this process, so any new updated applications will also notify you to upgrade your applications
    That's it! Go into your phone's settings through you home menu and check for system updates. If anything the update should already be downloading!

    This has been shown to work on 2.1 (Eclair), 2.2 (FroYo), and 2.3 (Gingerbread). However, not all custom phone dialers support the codes, so try to use the stock Android dialer if you have multiple installed. The stock dialer is the one that ships on Google experience devices like the Nexus One, Nexus S, or Droid1.