
With more than 20 years of experience, Pacific NorthWest Computers provides affordable on-site and in-shop computer repair services in Washington and Oregon State! We provide services ranging from onsite and remote support, malware removal, data recovery, laptop hardware repairs, custom-built computers, networking, security services, consulting/training, and many other computer/tech-related support and services! www.linktr.ee/pnwcomputers
Thursday, July 25, 2024
Saturday, July 13, 2024
How to do a Tune-up/Clean-up with Virus Scans for your PC!
General PC Tune-up/Virus Scan Procedures:
Uninstall/Install Software:
- Uninstall Obvious Bloatware:
- “Free Trial” software
- Obvious junk programs & toolbars (One Search, Driver Support, One Bar, etc)
- Use the PNW Computers “Browser Hi-jack” blog article as a reference to find and remove software malicious Adware Programs.
- Computers that are heavily infected should be checked with ‘TDSKiller’ to rule out the presence of a Rootkit BEFORE any cleaning procedures begin. Unless cleaning is needed to run the utility.
- Install/Update Essential Programs:
- Security Clean-up Software List (Ninite.com can be used for installing most apps):
- Chrome, Firefox, Edge - Update
- Java, .Net & Silverlight Runtimes - Update/Install
- Malwarebytes Antimalware
- Malwarebytes ADWCleaner
- BleachBit
Wednesday, July 10, 2024
Fake Tech Support Scam: What You Should Do!
A fake tech support scam is a type of fraud where scammers pose as legitimate technical support personnel from well-known companies to trick victims into giving them access to their computers, personal information, or money. Here’s how these scams typically operate and how to clean up your system if you did/do fall victim to this type of scam!
Monday, July 8, 2024
How Did I Get Infected!?!
Nowadays, most people get infected because the malware comes to them.
The malware arrives in your inbox, in your private messages, from a trusted source, a hacked website, or inside a program you use, whose company got hacked, like in the case of 3CX.
- The 3CX hack, which came to light in late March 2023, was a sophisticated supply chain attack. The incident involved the compromise of 3CX’s Windows and macOS build environments, allowing hackers to push trojanized software to 3CX customers.
- The breach began when an employee at 3CX downloaded a trojanized installer for the X_Trader trading software, which had been compromised by North Korean threat actors. This malicious installer gave the attackers access to the employee's device and corporate credentials, enabling them to infiltrate 3CX’s network and insert malware into the 3CXDesktopApp. The attack was likely carried out by a North Korean hacking group tracked as UNC4736, linked to the financially motivated operation dubbed AppleJeus (Security Week) (Security Week) (CISA).
Sometimes, it's literally the first search result when looking up something as harmless as "sewing patterns and templates"!!
Here are further examples of common ways people can get infected:
- Phishing Emails:
One of the most prevalent methods. Attackers send emails that appear to be from trusted sources, tricking recipients into clicking malicious links or downloading infected attachments. These emails often mimic legitimate communications from banks, social media platforms, or even colleagues. - Compromised Websites:
Legitimate websites can be hacked to serve malware to visitors. This method doesn't require any action from the user other than visiting the site. Drive-by downloads exploit vulnerabilities in browsers or plugins to install malware without the user’s knowledge. - Software Supply Chain Attacks:
These involve compromising a trusted software vendor to distribute malware to end users. The 3CX hack is a prime example, where attackers infiltrated the development pipeline of 3CX, a business communication software, and inserted malware into the software updates, affecting thousands of users. - Malvertising:
Malicious advertisements, or malvertising, are another common method. These ads can appear on legitimate websites and redirect users to malicious sites or directly download malware. Even major advertising networks have been exploited to serve malvertising. - Social Media Platforms:
Attackers exploit the popularity of social media to spread malware. They create posts or messages with enticing links that lead to malicious sites. YouTube videos offering cheats, cracks, or mods often include external links that direct users to malware. These links can appear highly ranked in search results, making them seem legitimate. - Messaging Apps:
Private messages on platforms like WhatsApp, Facebook Messenger, and others can carry malicious links or attachments. Since these messages often come from known contacts, users are more likely to trust and click on them. - Trusted Sources:
Sometimes, malware is spread through channels that users inherently trust. This could be through an email from a known contact whose account has been compromised or through a popular website that has been hacked.
We always recommend installing and using good, trusted, and reliable antivirus and antimalware software for your system. While they are not a silver bullet, these tools provide essential layers of defense against various cyber threats. Antivirus software is designed to detect and remove viruses, while antimalware software targets a broader range of threats, including spyware, adware, and ransomware.
In addition to antivirus and antimalware software, browser add-ons can enhance your online security by providing additional protection against malicious websites and phishing attacks. One such recommended add-on is Malwarebytes's Browser Guard.
- Blocking Malicious Websites:
Browser Guard blocks websites that are known to host malware, preventing you from inadvertently visiting harmful sites. - Protection Against Phishing:
It helps identify and block phishing attempts, protecting your personal information from being stolen. - Ad Blocking:
The add-on can block unwanted ads, which can be a source of malware through malvertising. - Improved Browser Performance:
By blocking malicious content and unwanted ads, Browser Guard can enhance your browsing experience and speed.
Pacific Northwest Computers Practices Combined Protection; What is That?!
No single solution can offer complete protection against all cyber threats. Using a combination of antivirus, antimalware software, and browser add-ons provides multiple layers of defense, significantly reducing the risk of infection and data breaches.- Layered Defense: Different tools specialize in different areas of protection. Antivirus software focuses on traditional viruses, while antimalware software targets newer, more sophisticated threats. Browser add-ons provide real-time protection while you browse the web.
- Reduced Risk of Zero-Day Attacks:
Zero-day attacks exploit unknown vulnerabilities. Having multiple layers of protection increases the chances of detecting and stopping these attacks. - Comprehensive Coverage:
Combined tools cover a wider range of potential threats, from viruses and worms to phishing attempts and malicious websites. - We recommend using an Antivirus, 1-2 "stand-alone" scanning tools for general malware and adware scanning, as well as a maintenance/clean-up utility for removing junk/temp/cache/cookie data.
In today's cybersecurity landscape, simply avoiding the download of random programs or EXE files is not enough to protect against infections. Malware delivery methods have become more sophisticated, targeting users through phishing emails, compromised websites, and even trusted sources like popular software vendors, as seen in the 3CX hack.
Malicious advertisements and social media platforms have also become significant vectors for malware distribution. Given this complexity, it's essential to use a multi-layered defense strategy. This includes installing and regularly updating trusted antivirus and antimalware software to provide essential protection against various threats.
Additionally, browser add-ons such as Malwarebytes Browser Guard offer critical extra layers of security by blocking malicious websites, protecting against phishing attempts, and enhancing overall browsing performance by removing unwanted ads.
Combining these tools creates a robust defense system, significantly reducing the risk of infection and providing comprehensive coverage against a wide range of cyber threats. By staying informed and proactive, users can better safeguard their systems and personal information from evolving cyber threats.
Pacific NW Computers
Monday, July 1, 2024
While we understand that prices on Amazon can be very competitive, there are several reasons why our prices might be slightly higher...
1. Quality Assurance:
2. Expertise and Support:
3. Warranty and Returns:
4. Supporting Local Business:
5. Value-Added Services:
We believe that these benefits provide significant value that justifies the price difference. We are committed to offering you the best possible service and ensuring your satisfaction with every purchase.
Wednesday, May 22, 2024
Easily Zero Fill a Hard Drive for FREE through Windows!
How To Zero-Fill A Hard Drivevia the Windows Command Prompt
Windows 7,8,10 and 11 actually can zero-fill a hard drive through the built-in Command Prompt utility. The Command Prompt adopts a special 'format' command to achieve writing zeros to the hard disk/partitions.
Friday, May 17, 2024
LoRA / Meshtastic & Unlicensed ISM
What is LoRA?
LoRA (which stands for Long Range) is a wireless communication technology designed for long-range, low-power communication in the Internet of Things (IoT) applications. It operates on unlicensed radio bands and is known for its ability to transmit data over long distances while consuming minimal power. LoRA technology is often used for connecting devices that need to communicate over long distances, such as in smart city applications, industrial automation, agricultural monitoring, and much, much more.Monday, April 29, 2024
Microsoft Battery & AC Adapter Driver Issue(s)
Laptop Battery/Charging Issue(s):
Microsoft AC Adapter & Microsoft ACPI-Compliant Control Method Battery Drivers
I have run into a few laptops lately that have been exhibiting some issues with charging their batteries and the issues have actually been related to Microsoft's Battery and AC adapter drivers!
It's an easy to fix, and you just have to do the following:
- You can open the "Device Manager" by searching for it through Windows search or by right-clicking the "Start" menu button and selecting "Device Manager."
- Click on "Batteries" in the device list to expand it, and you will see two items:
- Microsoft AC Adapter
- Microsoft ACPI-Compliant Control Method Battery.
- Right-click ON EACH ITEM (BOTH) and choose "Uninstall Device".
- Yes, you are uninstalling your laptop's battery drivers. But don't worry, they will automatically be reinstalled when you restart your laptop.
- Shut down your laptop.
- Unplug the power cable from your laptop.
- If your laptop has a removable battery, remove it. If it does not, you will need to remove the bottom panel and then disconnect the battery from the motherboard.
- If you removed the battery, put it back in, or reconnect it if you had to physically disconnect it.
- Plug your laptop back into power.
- Power on your laptop.
- Once you have booted back up and logged in, click the battery icon in the system tray, and you should see that your laptop is plugged in and charging!
Source:
Pacific NW Computers
Monday, April 22, 2024
SDR Radios - Hardware & Software Links
A Software-Defined Radio (SDR) is a wireless radio system that uses software to process radio signals instead of using hardware components. SDRs use software-based algorithms to configure radio parameters like frequency, modulation, and operating modes. This eliminates the need for hardware components like mixers, modulators, and demodulators.