Friday, June 5, 2015

How can I keep my computer from getting infected? Pacific NW Computers' PC Security Tips


1. Make sure you regularly run MANUAL scans with your installed security software!
Security Programs We Recommend (Or Have Installed):
  • Avast Antivirus, BitDefender Free, Microsoft Security Essentials
  • MalwareBytes Anti-Malware
  • Spybot Search & Destroy
  • CCleaner
*For direct download links to the software listed above, visit "Pacific NorthWest Computers' Links and Recommended Software" page on our Blog Link below!
http://pnwcomputers.blogspot.com/2013/06/pnw-computers-links-and-recommended.html

Basic/General Scanning Procedure:

  • Before running any scans with any of the installed security software, be sure to FULLY update the software FIRST.
  • After updating the security software, perform the deepest and most thorough scan that the software is capable of. This is usually labeled as a FULL or COMPLETE scan.
  • DELETE or QUARANTINE any and all of the security software’s findings.
  • Make sure you DON’T download and install any scanner/security software that solicits you to download and install its software. These scanners are blacklisted because of their questionable reputation.

2. Make sure your Windows is ALWAYS up to date!

  • An unpatched Windows is vulnerable and even with the “best” Antivirus installed; malware will find its way through.
    So visit http://windowsupdate.microsoft.com/ to download and install the latest updates.
  • Be sure to download and install all CRITICAL and SOFTWARE updates! You also may have to do several “passes” of Windows updates before all the available updates/patches are actually installed.
  • Verify that your version of Windows Vista, Windows 7 or Windows 8 has the most recent service pack installed. If this is not currently installed on your system, the Windows Update website will recognize this vulnerability and request you to download and install any available Service Packs and other needed updats.

3. Stay away from questionable sites.

  • This is one of the main causes why a computer gets infected. Visiting cracksites/warezsites – and other questionable/illegal sites is ALWAYS a risk. Even a single click on the site can be responsible for installing a huge amount of malware. Don’t think: “I have a good Antivirus and Firewall installed, they will protect me” – because that’s not true… there is no “Magic Bullet”. Before you know it, your Antivirus and Firewall may already be disabled because malware already found its way on your system.


4. Be careful with email attachments!

  • Malware spreads via email as well, especially email attachments. The most common ones are emails telling you that your computer is infected and that you can find the removal tool in the attachment, emails telling you that your password has changed and can find it in the attachment, emails with product codes in the attachment from software that you purchased (which you didn’t), emails with attachments that are so called “Security Updates”, etc. etc.
  • Don’t trust any emails like the ones listed above. Don’t even attempt to preview/open them and delete them immediately instead! It may also happen you receive an email from someone you know, but with a questionable attachment present and strange content in the e-mail’s message. In this case, this person – or someone else who has your address book in his/her address book – is infected with malware (worm/spambot) and sends these emails without being aware of it.
  • Don’t click links in emails from someone you don’t know, because these links can redirect you to sites where malware gets downloaded and installed.

5. When surfing the internet…

  • Use Google Chrome or the FireFox web browser as your MAIN internet browser. These browsers does not use ActiveX controllers or BHO’s (these are programs that are a standard feature’s of Microsoft’s Internet Explorer and are “exploited” vulnerabilities that hackers use to infect computers). If a specific website (such as a financial institution website) may require Internet Explorer to be used in order for you to view their site, then use Internet Explorer. But for that specific website ONLY!
  • Don’t click on links inside pop-ups. ALWAYS close the windows via the "X" for the window vs. clicking "Cancel" or any other 'escapes' in the pop-up.
  • Download software off of the internet from websites you know and trust. A lot of free software comes bundled with other software, including malware.
  • Be careful when you are viewing videos online. Especially when you get a pop-up asking you to download a “Codec” to be able to watch the video. By default, your media player should already have the necessary codec installed to watch online videos. In the case that you’re prompted to install an additional codec while trying to watch a move online (or downloaded), it is most likely a false alert and this so-called codec may install malware.
  • Don’t install plug-ins (ActiveX) if you’re not certain what it is or why it is you need it. (Unless you are attempting to perform Windows/Microsoft Updates).
  • Glubble is a great FireFox add-on if you want to manage the sites your kids are allowed to see.

6. Watch what you download!

  • If you want to install certain software, always go to the developer’s site to download the software. Then you can be sure you’re downloading and installing the right software. Be aware of the fact that certain software (especially freeware) may contain/come bundled with extra software including spyware and/or adware. So only install when you’re sure they are OK.
  • The use of Torrent sites, Game Patches and Mods, Emulators; really anything "Free" is always a risk. Unless the download/host site is a reputable site, you can never be sure what you are exactly downloading. A file you are looking to download or have downloaded isn’t always what it’s made out to be.

If you have any questions or comments please don't hesitate to get in touch!

Jon Pienkowski
Pacific NorthWest Computers
www.pnwcomputers.com
360-624-7379

Tuesday, April 21, 2015

PNW Computers' Favorite Mac Apps

PNW Computers' Favorite FREE Mac Apps


VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.

Titanium Software ~ OnyX
OnyX is a multifunction utility for OS X which you can use to verify the start up disk and the structure of its system files, to run miscellaneous tasks of cleaning and system maintenance, to configure some hidden parameters of many of Apple’s applications, and more.

Titanium Software ~ Maintenance
Maintenance is a system maintenance and cleaning utility for OS X which you can use to run miscellaneous tasks of system maintenance: repair permissions, run periodic scripts, rebuild the databases, delete Application, Font and System cache, and more.

Derlien Software ~ Disk Inventory X
Disk Inventory X is a disk usage utility for Mac OS X 10.3 (and later). It shows the sizes of files and folders in a special graphical way called "treemaps".
If you've ever wondered where all your disk space has gone, Disk Inventory X will help you to answer this question.

smcFanControl
smcFanControl is MUST HAVE for keeping your Mac running cool. smcFanControl lets the user set the minimum speed of the built in fans; so you can increase your minimum fan speed to make your Intel Mac run cooler. However in order not to damage your machines smcFanControl doesn't let you set a minimum speed to a value below Apple's defaults.

ClamXav
ClamXav is a free malware scanner for Mac OS X. It uses the very popular ClamAV open source antivirus engine as a back end and has the ability to detect both Windows and Mac threats.
ClamXav can be setup up as passive or active: scan only the files you tell it to or your entire hard drive, whichever you prefer; you can also choose to activate Sentry to monitor your hard drive and scan new files as they arrive.

CCleaner is the number-one tool for cleaning your Mac. It protects your privacy online and makes your computer faster and more secure. Easy to use and a small fast download.

FreeMacSoft ~ AppCleaner
AppCleaner is a small application which allows you to thoroughly uninstall unwanted apps.
Installing an application distributes many files throughout your System using space of your Hard Drive unnecessarily.
AppCleaner finds all these small files and safely deletes them.
Simply drop an application onto the AppCleaner window. It will find for the related files and you can delete them by clicking the delete button.

With coconutBattery you are always aware of your current battery health. It shows you live information about the battery in your Mac and iOS device (iPhone, iPad, iPod touch) including:
  • Age of your Mac, iOS device and battery
  • How often the battery was charged
  • Your battery health (capacity in relation to the original capacity your battery had when it left the factory) and much more...
gfxCardStatus
gfxCardStatus is an unobtrusive menu bar app for OS X that allows MacBook Pro users to see which apps are affecting their battery life by using the more power-hungry graphics.

The Unarchiver is a much more capable replacement for "Archive Utility.app", the built-in archive unpacker program on Mac OS X. The Unarchiver is designed to handle many more formats than Archive Utility, and to better fit in with the design of the Finder. It can also handle file names in foreign character sets, created with non-English versions of other operating systems. I personally find it useful for opening Japanese archives, but it should handle many other languages just as well.

Monolingual is a program for removing unnecessary language resources from OS X, in order to reclaim several hundred megabytes of disk space. It requires a 64-bit capable Intel-based Mac and at least OS X 10.10 (Yosemite).

Hanynet ~ NoobProof (or WaterRoof) Firewall Software
NoobProof is a very easy tool. When you start it the first time you have a service list and you can choose to "allow" or "deny" connections to those services. So you have only to decide which service to allow, and then check "Activate NoobProof". You can also add selective "allow" and "deny", and you can delete or add new custom services in service list.
WaterRoof is a very complex and powerful tool, which allows you to configure almost every aspect and option of "ipfw". And more, you can list/manage active connections or network files, do graphics log analysis, configure your mac as a router with bandwidth management with tasteful rules and tons of other options. You need a good knowledge of "what a firewall is", and you should also have at least a basic ipfw knowledge.

TeamViewer - QuickSupport Remote Access Software
*What PNW Computers uses for remote support!
TeamViewer is the All-In-One Software for Remote Support and Online Meetings.
Remote control any computer or Mac over the Internet within seconds or use TeamViewer for online meetings. 

If you have any questions or comments please don't hesitate to get in touch!

Jon Pienkowski
Pacific NorthWest Computers
www.pnwcomputers.com
360-624-7379

Wednesday, April 30, 2014

Microsoft Internet Explorer Vulnerability ~ Fact and Opinion


As you have most likely heard, Microsoft is scrambling to fix a major bug which allows hackers to exploit flaws in Internet Explorer 6, 7, 8, 9, 10 and 11. The company has also confirmed it will not issue a fix for web browsers running on Windows XP after it formally ended support for the 13 year old operating system back on April 8th.

The vulnerability was discovered by cyber security software maker FireEye Inc. which stated the flaw is a ‘zero-day’ threat. This means the first attacks were made on the vulnerability before Microsoft was aware of it. FireEye also revealed a sophisticated hacker group has already been exploiting the flaw in a campaign dubbed ‘Operation Clandestine Fox’, which targets US military and financial institutions.

FireEye spokesman Vitor De Souza declined to name the hackers or potential victims as the investigation is ongoing, only telling Reuters: “It’s unclear what the motives of this attack group are at this point. It appears to be broad-spectrum intel gathering.”

For its part Microsoft has confirmed the existence of the flaw in an official post: https://technet.microsoft.com/library/security/2963983

Now, Internet Explorer has always been a vulnerable browser and has exploits created/identified against it everyday. This is why for YEARS I have pushed my customers to use an alternative Web Browser such as Mozilla Firefox or Google Chrome. As previously mentioned, both of those web browsers are safer to use than Internet Explorer and are both immune from the recently identified exploit!

What makes this recent vulnerability stand out from the others, and why this particular vulnerability is making all the headlines, is that the problem is pretty widespread; affecting 1 in 4 Windows based computers and ALL Windows XP systems.

A Temporary Fix
While Microsoft rushes to fix the bug, FireEye gave concerned users two workarounds .
  1. Use another web browser other than Internet Explorer
  2. Disable Adobe Flash. “The attack will not work without Adobe Flash,” it said. “Disabling the Flash plugin within IE will prevent the exploit from functioning.”
*Adobe has released a new patch/update for their Flash Player! Allow the Flash Player to update or manually download and install the latest version here: http://www.adobe.com/support/flashplayer/downloads.html

No Hope For Windows XP
Microsoft has confirmed that no fix will be rolled out for Windows XP because support has officially ended and there are no plans to make an exception. It states:

“An unsupported version of Windows will no longer receive software updates from Windows Update. These include security updates that can help protect your PC from harmful viruses, spyware, and other malicious software, which can steal your personal information.”

The company’s advice to Windows XP users has remained the same for some time: upgrade to Windows 7 or 8 or buy a new PC. It has also repeatedly sent a pop-up dialog box to reachable Windows XP machines with the following end of support notification.

For users unsure whether their existing XP PCs can support Windows 8, Microsoft offers a software tool called ‘Windows Upgrade Assistant’ which can be downloaded here: http://go.microsoft.com/fwlink/p/?LinkId=321548

If you have any questions or concerns please don't hesitate to get in touch!

Jon Pienkowski
Pacific NorthWest Computers
www.pnwcomputers.com
360-624-7379

Thursday, November 7, 2013

Online Data Backup Solutions


Pacific NorthWest Computers is a reseller for several different online backup providers and recently partnered with BackSync. BackSync Backup is a secure online backup and recovery solution with unlimited retention, centralized management and industry leading features. Small to Medium Business who are looking for Enterprise class backup at a fraction of the price. We don’t waste your time by offering consumer grade products re-branded with a “Pro” label.

BackSync Backup Features:
  • Exchange 2000 thru 2010 - Database, Mailbox and Mail item level restore 
  • Synthetic Full Backup - Exchange Database and regular file backups 
  • VMware ESX/ESXi – Guest level backup of licensed servers 
  • Microsoft SQL 2000 thru 2008 
  • SharePoint - 2003 thru 2010 and WSS 
  • MySQL Server 
  • Oracle Databases 
  • Active Directory and System State 
  • Open File Backup 
  • Normal Flat File Backup- Select disks, folders and files 
  • Network Drive Backup – Agent-less backups of other computers 
  • NAS (Network Attached Storage) Backup 
  • Outlook PST files 
  • Windows Registry 
  • Native Clients for Windows, OS X and Linux 
  • Backup to Local Disk, NAS, File Share or Online 
  • Unlimited file retention 

BackSync Backup Security
  • Encryption – Up to 448 bit strong encryption. 
  • Transmission – Backups are transmitted via a secured encrypted (SSL) link to the backup server. 
  • High Availability – All data is stored on high availability RAID storage networks with the ability to replicate around the world. 
  • Data Center- Backup servers are located in secured SAS70 Type-II data centers that are staffed and monitor 24x7x365. These facilities have redundant cooling, power and Internet. 

BackSync Backup is Simple!
  • Automated – Backup jobs can be scheduled from every minute to once a year or continuous as the files change. 
  • Continuous Data Protection (CDP) – Live monitoring and backup of files and folders for continuous data protection. (Great for laptops and mobile workers). 
  • Retention - Retain data on a per backup job basis up to 10 years for both live and deleted files. 
  • Consolidation – Backup as many computers as you want under a single account for easy management. 
  • Rapid Restore – Restores are performed quickly from the client. Larger restores can be done in in the data center and delivered or shipped directly to you. 
  • Easy to Manage – All backup clients and servers can be managed from a web browser. 
  • Seeding – Large initial backups can be quickly seeded with a USB drive into the data center. 
  • Reporting – Each client maintains detailed reports on every backup with the option to send notifications. 


If you are looking for a standard/non-commercial data backup services, here are some of our top picks!

  • Backblaze.com provides unlimited and inexpensive data storage solutions; starting at $5 a month.
  • If you went with a business package, from Carbonite you would have the easiest access to your data as well; you could access data from any type of device. You could also use it like an online file storage/access portal as well! Unlike some of the other online data backup providers, Carbonite does provide backup services for iphones and ipads!
    play.google.com/store/apps/details
    www.carbonite.com/online-backup/pricing-plans
  • SOS's Online Backup plans aren't the cheapest but it's hard to compare apples to apples in this industry. For example, SOS's continuous data backup feature, which backs up a new version of a file the instant it's changed, is a killer feature that I haven't seen elsewhere!

There are other "alternative" solutions such as NAS Drives (Network Accessible Storage Drive) and other alternative services like Google Drive, DropBox, SkyDrive, Etc. But we will get into those later :)

Let us know if you have any questions or comments!

Jon Pienkowski
Pacific NorthWest Computers
www.pnwcomputers.com
360-624-7379

New Virus Alert: CryptoLocker!


A New Virus Has Surfaced ~ CryptoLocker

CryptoLocker is a new, nasty piece of malicious software that is infecting computers around the world; encrypting important files and demanding a ransom to unlock them. If you get hit with this virus you risk having your personal data encrypted and lost for good!

This sophisticated malware is delivered the old-fashioned way – an executable file hidden inside an attachment that looks like an ordinary ZIP file or PDF. One small business reports being compromised after clicking on an email attachment that was designed to look like a shipping invoice from the U.S. Postal Service.

The CryptoLocker virus can be removed from an infected system, but unfortunately at this time there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom. Brute forcing the decryption key is not realistic due to the length of time required to break the key. Also any decryption tools that have been released by various companies will not work with this infection. The only method you have of restoring your files is from a backup or Shadow Volume Copies if you have System Restore enabled. Newer variants of CryptoLocker attempt to delete the Shadow Copies, but it is not always successful.

Preventive Measures:
  1. BACKUP ALL OF YOUR DATA ASAP! That’s the only way to reduce the risk of losing your files forever. Also, to avoid getting your backup's encrypted your backup device should be disconnected from your computer until the next time you need to access it or run a backup. 
  2. Download and install a free utility called 'Crypto Prevent'. Crypto Prevent is a small utility that changes a few settings in your computer to help prevent the CryptoLocker infection from happening in the first place! Its not a golden bullet however, so having current data backups is your ulitimate defense. You can downloading the Crypto Prevent utility directly from the link below!
http://www.foolishit.com/vb6-projects/cryptoprevent/

If you need any assistance we can setup a visit to help secure and backup your computer for you!

Let us know if you have any questions or issues!

Jon Pienkowski
Pacific NorthWest Computers
www.pnwcomputers.com
360-624-7379

Thursday, October 31, 2013

Browser Redirect Virus Fix! Search Conduit, DefaultTab, MyWay Web Search, Etc.



The majority of computers coming in with virus infections all have browser hi-jacks and other browser-related malware infections. A browser hijacker is something installed onto a computer system and attaches to an internet browser to change internet browser settings; such as the home page and default search engine. This causes the now infected internet browsers to start up using their search bar or their search engine OR even just redirect you to where they want you to go. This type of infection can generate browser pop-ups while you’re surfing the internet, slow the computer's overall performance as well as lead to further and more severe virus and infection issues!

As with a vast MAJORITY of BHO's (browser helper objects such as toolbars), most use unethical practices and are utilized by ethical and unethical third parties, including cybercriminals and scam artists, to generate revenue through sites tied they are working for/partnered with as well as other third-party domains and advertising based search services.

Products and software associated with the browser redirection infections:
  • Activeris AntiMalware
  • Ado System Protect
  • AnyProtect
  • Any Send
  • AssetsManager
  • Babylon Toolbar
  • BFlix Toolbar and TheBFlix
  • BlockandSurf
  • Boost Shopping
  • Browser Guard
  • Browser Protector
  • BrowserRedirector
  • Bubble Sound
  • Chromium (Dregal)
  • CinemaPlus vX.X
  • Conduit
  • Consumer Input Firefox Extension
  • Coupoon (two 'oo')
  • CrossBrowse
  • DefaultTab
  • Delta Toolbar
  • Dregal (Chromium)
  • Driver Pro
  • Driver Restore
  • Driver Updater (No Publisher/Specifics)
  • File Type Assistant
  • FLV Runner Toolbar
  • Free Ride Games Player
  • Games Desktop vX.X
  • GeniusBox
  • HashBrat
  • IdleCrawler
  • IE Web Protect
  • IE Web Protect Plus
  • Linkey
  • Linksicle
  • MapsGalaxy Toolbar (and other random/various related 'MapGalaxy' products)
  • MediaPlayerEnhance
  • MixiDJ  
  • Mobogenie
  • MyPC Backup
  • MyWayWeb Search Toolbar
  • NewPlayer
  • Optimizer Pro vx.x
  • OneSoftPerDay
  • Pasta Leads
  • PC Fix Speed vx.x.x
  • Plus-HD-x.x
  • PC Optimizer Pro
  • PC Pro Cleaner
  • Powerful Browse
  • QuickRef
  • Remote Desktop Access (No Publisher/Specifics)
  • Search Conduit
  • Search Protect
  • Search Results LLC
  • Shop To win
  • Shopper Pro
  • Shoperz
  • SmartWeb
  • Software Updater (No Publisher/Specifics)
  • Software Version Updater (No Publisher/Specifics)
  • Special Savings
  • Unico Browser
  • Wajam
  • Web Companion
  • WebProtector
  • Web Protect for Windows
  • WiseCare 365
  • Yontoo
  • Yontoo Layers
  • YTDownloader

Removal Process:
1st Step
Uninstall all programs listed (and any others "odd" programs that have a similar install date) through "Programs and Features" aka "Add/Remove Programs" found through your computer's control panel.

2nd Step
Download and install MalwareByte’s Antimalware and Spybot Search and Destroy (1.6.2) to use in conjunction with your antivirus to run full virus scans on your computer! Remove (or at least quarantine) anything that the programs identify!
*If you don't have a current anti-virus we recommend one of the following AntiVirus titles; Microsoft Security EssentialsAvast! Antivirus or Bitdefender Free.

3rd Step
In all of your web browsers (Internet Explorer, Firefox, Chrome, etc) you want to examine all installed add-ons and extensions. Remove anything that is related to the software programs listed above. Additionally, you can use ADWCleaner and JRT to get even further "under the hood" to make sure all of your web browsers are clean from Adware and Browser Hi-Jack software.

4th Step (EXTRA)
Download and run TDSKiller from Kaspersky Labs to check your systems for any types of rootkit infections.

For direct download links to the software listed above, visit "Pacific NorthWest Computers' Links and Recommended Software" blog post:
http://pnwcomputers.blogspot.com/2013/06/pnw-computers-links-and-recommended.html

Further Reading/Related Articles:

How you can get infected & what you can do to try to prevent it:

Tuesday, July 16, 2013

How to Clean up a Slow Performing Computer ~PLUS~ a few Mac tips too ;)


Many think that when a computer starts performing poorly it's time to buy a new computer. Does your desktop or laptop often hang on the hourglass or swirling circle for several minutes at a time? Does "Not Responding" sound familiar to you? Is it slow to load files or applications, and does it take a long time to boot? Even if you're extremely careful about how you use your computer and never download questionable material, over time it is inevitable that your system will accumulate unwanted registry entries, errors, clutter, and debris. Here's how to clean your computer up and get it running faster again!

Things YOU can DO:

  1. Update and Scan with your Security Software:
    (Link to more in-depth PC/computer clean-up guide)
    Antivirus software helps protect you from viruses and other malicious files that can spread through emails or downloads. It performs regular system checks and detects when foreign files are trying to infiltrate your computer.
    We recommend using Malwarebytes Anti-Malware for comprehensive protection.
    Click the link below for a list of the security software that we recommend and use:
  2. Do not use Registry Optimizers or so-called Clean Reg Tools.
    Most of these cause more harm than good in the long run.
  3. Clear up space on the hard drive.
    Deleting unnecessary files is an easy way to free up memory and improve performance. Use BleachBit for a thorough cleanup of your PC, and Onyx for your Mac.

    • For Windows 10 and 11: Open Settings, go to System, then Storage, and use the built-in Disk Cleanup tool.
    • For macOS: Go to the Apple menu, select About This Mac, then Storage, and use the Manage button to find options for optimizing storage.
  4. Uninstall useless programs or programs you rarely use. These can include games, media files, or redundant software.

    • For Windows: Go to Settings, then Apps, and uninstall programs that are no longer needed.
    • For macOS: Drag unwanted applications from the Applications folder to the Trash, then empty the Trash.
    • When uninstalling programs be sure you don't need them! Some programs are needed for the operation of the computer. So if you are unsure about a program then leave it alone or do a quick search on Google to see if you can find out whether it's good or bad.

  5. Clean Up Junk Files.
    BleachBit is a powerful, open-source tool that helps you clean up unnecessary files and free up disk space on your computer. Follow these steps to use BleachBit to clean your system:
    • Download and Install "BleachBit," and then find and click on the application to open it.
    • Choose What to Clean:
      1. In BleachBit, you will see a list of cleaners on the left-hand side. 
      2. These cleaners correspond to different types of junk files and applications.
      3. Check the boxes next to the items you want to clean. 
      4. Common selections include:
        • System: Temporary files, logs, memory dumps
        • Web browsers: Cache, history, etc
        • Careful deleting cookies as they store your saved login data.
        • Applications: Temporary files from installed applications
        • Deep Scan:
          • For a more thorough clean, you can enable "Deep Scan" under the System section. 
          • This option will scan for and delete more obscure temporary files and caches.
          • Be cautious with deep scanning, as it may delete files you were not expecting.
      5. Preview (Optional but Recommended):
        • Click the "Preview" button to see a list of files that will be deleted and the amount of space that will be freed.
        • Review the list to ensure no important files will be deleted.
      6. Clean:
        • If you're satisfied with the preview, click the "Clean" button to delete the selected files.
        • BleachBit will begin cleaning the files, which may take a few minutes depending on the amount of data.

  6. Defragment your hard drive if you are using a traditional HDD. 
    *SSDs do not need defragmentation.
    1. For Windows: Open the Start Menu, search for Defragment and Optimize Drives, and run the tool.
    2. MacOS: Mac operating systems manage disk fragmentation automatically, so manual defragmentation is not needed.

  7. Check your RAM.
    If your computer is running slowly, you might need more RAM.
    1. For Windows: Right-click on This PC, select Properties and check the installed RAM. Consider upgrading if you have less than 8GB for modern systems.
    2. For macOS: Click the Apple menu, select About This Mac, and check the Memory tab. Aim for at least 8GB for general use.

  8. Optimize startup programs.
    Reducing the number of programs that run at startup can improve boot times.
    1. For Windows: Open Task Manager (Ctrl+Shift+Esc), go to the Startup tab and disable unnecessary programs.
    2. For macOS: Go to System Preferences, then Users & Groups, and select your user. Click the Login Items tab and remove unnecessary items.

    Other Tips:

    • Only install software that you intend to use regularly.
    • Be cautious with free downloads; they can come with spyware, malware, or viruses.
    • Regularly clean up your computer using tools like BleachBit.
    • Ensure safe internet browsing by using a firewall and a secure browser.
    • Schedule regular scans with your antivirus and anti-malware software.
    • Always back up your important data before running any cleanup tool.
    • If you're unsure about specific options, stick to the default settings.

      Warnings:

      • When uninstalling programs, ensure they are not essential for your system's operation. If unsure, do a quick search to verify.
      • Use anti-malware programs carefully and follow instructions thoroughly. Incorrect changes to the registry can worsen performance. If you're unsure, clean only detected items marked in red, or consult a knowledgeable friend or professional.

    Further Reading/Related Articles:

    How you can get infected & what you can do to try to prevent it:

    Tuesday, July 2, 2013

    If you're trying to keep cool, your computer probably is too!!

    If you're trying to keep cool this summer, your computer probably is too!! 

    Simply put, if your computer becomes too hot, it is possible to destroy and shorten the lifespan of the hardware inside your computer, leading to irreparable damage and potential data loss. Besides losing your data, heat pecks away at your computer's internal organs (the motherboard, CPU, and more) significantly shortening its lifespan.

    If it's hot in the room where your computer is, get a little fan pointed toward the system to help circulate the air around it. Or, if you are VERY careful (and want to try), turn the computer off, take the side cover off and blow the fans out with canned air and/or very carefully vacuum the inside of the computer out. That can sometimes give you a computer a night and day difference in temperature as well as keeps your computer fans from sounding like jet turbines!

    *Here's a word of caution: If your computer is overheating, resist the urge to take the side of the case off the computer. Most computers are very carefully designed to ensure that cool air is delivered to critical components. Removing the side of the case disrupts the circulation or air for the system.

    If cleaning and what not does not help you with to get your computer running cooler, you probably want to start planning some system-cooling upgrades; which we can help with!!

    Any questions or ANYTHING, drop us a line or give us a call!!
    jon@pnwcomputers.com
    360-624-7379

    Wednesday, June 26, 2013

    PNW Computers' Links And Recommended Software

    PNW Computers' Links And Recommended Software

    A basic list of software, tools, and utilities that we use and recommend!
    We will update this list as much as possible! 

    Tools and Utilities:

    • Hirens All-In-On Boot CD - Great utility CD with TONS of diagnostic software; HD manufacturers included!
      http://www.hirensbootcd.org/download/
    • BleachBit - When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there!
      https://www.bleachbit.org/
    • GParted - GParted is a free partition manager that enables you to resize, copy, and move partitions without data loss. Some repair capabilities as well.
      http://gparted.sourceforge.net/download.php
    • Memtest86 - MemTest86 is a free, thorough, stand-alone memory test for x86 architecture computers.
      http://www.memtest86.com/
    • Offline NT Password & Registry Editor - This is a utility to reset the password of any user that has a valid local account on your Windows System.
      http://pogostick.net/~pnh/ntpasswd/
    • HFSExplorer - HFSExplorer is an application that can read Mac-formatted hard disks and disk images. It can read the file systems HFS (Mac OS Standard), HFS+ (Mac OS Extended), and HFSX (Mac OS Extended with case-sensitive file names), including most .dmg disk images created on a Mac, including zlib / bzip2 compressed images and AES-128 encrypted images
      http://www.catacombae.org/hfsx.html 
    • IsoBuster - IsoBuster is actually a CD/DVD and BD/HD DVD data recovery software that can interpret, open, and extract various CD/DVD/Blu-ray disk image files, including DMG.
      http://www.isobuster.com/download.php
    • Revo Uninstaller Free - Revo Uninstaller lists the installed programs and components for all current users. With a choice of views, as well as a context menu, information on program components is available: program properties, their registry entries, and links to the manufacturer's website, for a start. The "Search" option finds installed applications just by typing the first few letters of their name. Revo Uninstaller Free scans for "leftovers" with advanced algorithms that are precise, fast, and very effective in searching for leftover Windows Services, Drivers, File associations, Shell Extensions, COM components, Windows Installer components, program settings, and more!
      http://www.revouninstaller.com/revo_uninstaller_free_download.html
    • MyDefrag - MyDefrag (formerly JKDefrag) is a disk defragmenter and optimizer for Windows 2000/2003/XP/Vista/2008/X64. Completely automatic and very easy to use, fast, low overhead, with several optimization strategies, and can handle floppies, USB disks, memory sticks, and anything else that looks like a disk to Windows.
      http://www.mydefrag.com/Manual-DownloadAndInstall.html
    • CUTEpdf Writer - Create PDF documents on the fly for Free! Portable Document Format (PDF) is the de facto standard for the secure and reliable distribution and exchange of electronic documents and forms around the world. CutePDF Writer (formerly CutePDF Printer) is the free version of commercial PDF creation software. CutePDF Writer installs itself as a "printer subsystem". This enables virtually any Windows applications (must be able to print) to create professional quality PDF documents - with just a push of a button! ALL FOR FREE!
      http://www.cutepdf.com/products/cutepdf/writer.asp
    • VideoLAN VLC Media Player - VLC media player is a highly portable multimedia player for various audio and video formats as well as DVDs, VCDs, and various streaming protocols without external codecs or programs. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
      http://www.videolan.org/vlc/
    • Sumatra PDF Viewer - Sumatra PDF is a slim, free, open-source PDF reader for Windows. Sumatra has a very minimalistic design and is nowhere NEAR the security risk that Adobe Reader can be. Simplicity has a higher priority than a lot of features with Sumatra. It's small, secure, and starts up very fast.
      http://blog.kowalczyk.info/software/sumatrapdf/download-free-pdf-viewer.html
    • Piriform Recuva - Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!
      http://www.piriform.com/recuva

    Security Software:

    What is a rootkit!? A rootkit is a program or a program kit that hides the presence of malware (or itself) in a system. A rootkit for a Windows systems is a program that penetrates into the system and intercepts the system functions; Windows API. It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install their own drivers and services in the system and they also remain “invisible".  

    Software Sites:

    • Filehippo.com - Great site that hosts TONS of updates and software titles; anything you can think of really.
    • Ninite.com - Great "update-all-at-once" site that lets you install/update multiple programs without dealing with individual installers, prompts, etc. One download, one install; as many programs as you like!


    Let us know of any issues with inks!

    Updated 11/1/2013
    pnwcomputers@gmail.com

    Friday, April 26, 2013

    DC Jack ~ Laptop Repair

    Is your laptop 'jacked' up? ;)
    We know what to do! 

    If you give Pacific NorthWest Computers a call today!!
    We can get your 'jacked' up laptop FIXED for CHEAPER than the competition!

    360-624-7379