Wednesday, March 27, 2024

Upgrade To Windows 11 ~ With Your Apps and Data Intact!

 Can You Install Windows 11,
Without Losing Apps or Data In The Process? 

Why yes you can! 

Thanks to the Windows Installation Assistant!



I found an article (linked below) while looking into a "surefire" way to upgrade a Windows 10 system to Windows 11, without having to run the risk of needing to reinstall software and applications, or even potentially loose data. Currently, the only guaranteed method to install Windows 11 on your computer without performing a fresh install is by using the Installation Assistant. This tool from Microsoft acts as an update, transforming your existing Windows installation to the newer version without affecting any of the files or applications:

 https://helpdeskgeek.com/windows-11/how-to-upgrade-to-windows-11-without-losing-any-data/


Pacific NW Computers

Wednesday, March 13, 2024

What 3D Printer to Get?!


Want to get into 3D printing?!


If money isn't a limiter:

The Bambu Lab x1 Carbon is hands down the best thing on the market for consumer-level printers as well as multi-material printers, IMO:
https://us.store.bambulab.com/products/x1-carbon-combo...

If you're on a budget:

Just want to get rocking as easily as possible? 
Elegoo all day long... 
Test the waters and see if you enjoy 3D printing; without a huge investment.
ELEGOO Neptune 4 Pro 3D Printer: https://a.co/d/eTdGxML

Most reliable:

Want an open source, heavily modifiable, as well as a production reliable machine?
Prusa all day long! 
My Prusa MK3S has been by far, my most reliable printer:
https://www.prusa3d.com/product/original-prusa-mk4-2/...


Tuesday, March 12, 2024

VHD & RMD IODD Drive Setup

IODD Encrypted External Drive; 

VHD/RMD Creation

  1. Use the VHD_Tool+ that you can download from the IODD website:
    http://iodd.kr/wordpress

  2. Open and run the VHD Tool+, and click on the "Create" tab. That will switch the program to its VHD "Create" function, where you will be able to create a blank/empty VHD on your IODD drive that you will later apply/"burn" a disk image to.
    • When you click on the folder icon to "browse for a VHD" you actually just need to type in the name of the VHD that you would like to create, and then continue like you are going to "open" that new VHD; even though it is not actually there. Trust me, it will work.

  3. Next, you want to make sure the VHD file that you are creating is larger than the ISO that you will be applying to that VHD. The ISO has to be able to fit fully decompressed. So if your ISO is still in a ZIP file, decompress it and go 1GB above its folder properties listed size.

  4. Once the VHD is created on your IODD drive, you need to actually mount that blank VHD to your computer. 

  5. With the IODD drive connected to your computer, navigate to where the VHD is stored using the screen/menus on the IODD itself, and mount the empty/new VHD file through the drive, and your computer will detect and pop-up that it has found a drive that needs to be formatted.
     
  6. Don't format the drive! Just close out the notification and close any explorer windows that may have opened.

  7. Now, using a program such as Rufus, you can "burn" or apply an ISO disk image to the new/empty VHD that you just mounted to your system!

  8. Burn the disk image just like you are creating a bootable USB or DVD; nothing special needs to be done to make things work.

  9. Lastly, to create an RMD of the VHD you just created, simply make a copy of the VHD file (so you have two) and simply change the copy's file extension from *.vhd to *.rmd

    That's it!


IODD Help Site:

https://help.iodd.kr/bootable-virtual-drive/drive-setup

IODD Help Page for VHD Creation:

https://help.iodd.kr/bootable-virtual-drive/virtual-drive-vhd/convert-iso-file-to-uefi-bootable-drive

IODD User Manual:

http://dir.iodd.kr/vhd_tools/iodd_virtual_USB_drive_guide_0425.pdf


Computer Custom Water Cooling Loop Tips

 Custom Computer Watercooling Tips

  • Radiator(s):

    • If you are NOT going to overclock your system, I like to use a general rule of 120mm of radiator real estate for every part that is going to be cooled.
    • If you ARE going to overclock the system, I like to use a general rule of 240mm of radiator real estate for every part that is going to be cooled.
    • You can never have too big of a radiator for cooling using the rules above. You can however VERY easily have a system with too small of a radiator for its needed cooling. You can't have too much radiator surface area, so don't worry about having MORE than you "need".
    • If you are mounting a radiator vertically for your water cooling loop, make sure that the fittings for the radiator's input/output are at the BOTTOM; closest to the bottom of the computer case!! This will allow better fluid circulation and prevent poor circulation that commonly occurs when you have the inlet/output of the radiator oriented at the top.

  • Fittings:

    • Soft tubing fittings use barbs to grab onto and connect with the appropriate tubing.
    • Hard tubing uses a compression fitting to connect to its tubing.
    • The collar of a hardline fitting is not what's responsible for sealing the connection with the tubing that it's being connected to.
    • As long as the compression of the fittings and the tubing both match each other (ie: 10x13mm for the fitting AND for the hose/tubing being used), then you know the two will be compatible to create a water-tight seal between the fitting and the tubing.

  • Fans:

    • For airflow, some fans will have an arrow somewhere on the fan itself to indicate the direction in which air will flow when the fan is turned on.
    • If there isn't a directional arrow/indicator, the rule of thumb that I like to use is that a fan's airflow is 99% of the time going to be moving from the "caged" side of the fain (where the fan is connected to and supported by the fan's frame), to the "non-caged" side. I know, super technical jargon is being used here... But it's a simple way to easily remember which direction a fan's air will flow!
    • You can also buy/3D print a fan spacer to install between the fan and the radiator to help prevent naturally occurring turbulence due to the fan's proximity to the radiator.

  • Tubing/Hoses:

    • Hard tubing is the least porous and the least prone to water loss/seepage. But hard tubing is also the most difficult to work with due to the fact it needs to be heated and bent into needed shapes; which requires its own special tools and processes to complete.
    • Soft tubing is not as "nice" as hard tubing as far as looks and performance are concerned, but it is MUCH easier to install, work with, and cheaper to buy/replace vs. hard tubing.
    • Try to use low-porosity tubing to prevent liquid absorption/seepage/loss and leaking.

  • Fluid/Liquids:

    • Configure your loop with a drain port; preferably at the bottommost position of your loop.
    • Try to install your pump directly under your reservoir, or use a reservoir/pump combo.
    • Use DISTILLED WATER if you are not going to use any fancy-colored/specialized liquid.
    • Add a little bit of a Biocide, like Iodine, to your liquid medium to help prevent bacteria or other organic growth
    • DO NOT USE FOOD COLORING TO COLOR YOUR COOLING LIQUID!
    • BEFORE you fill your loop with ANY liquid whatsoever, use a simple hand air pump to do a basic pressure test and make sure none of your tube connections or fittings blow out or come loose.
    • DO NOT FULLY POWER ON YOUR SYSTEM TO FILL YOUR LOOP!
      • Most loop kits come with (or you can purchase) a basic PC power supply "jumper" plug that will allow you to power the system at a very low lever, without actually fully powering the computer on.
      • That way you can add fluid to your loop's reservoir, use the PSU jumper to power on the PSU and pump the fluid through the loop, and then just rinse/repeat until the loop is fully filled!

  • Flow Order:

    • Flow Order is the order in which you are going to cool the devices in your custom loop. 
    • It doesn't really matter about what order you go in, and you DO NOT need a totally separate loop for each device being cooled. There might be a 2-3C temperature difference when daisy chaining devices together in a custom loop; nothing CRAZY. So it IS ok to go from a GPU to a CPU directly in a custom loop.
    • An optimal Flow Order looks something like this when cooling a GPU & CPU:
Reservoir/Pump > 360mm Rad > GPU > CPU > 360mm Rad #2 > Back to Reservoir


Tuesday, March 5, 2024

Scan/Repair Corrupted Windows 10 & Windows 11 System Files

1) Open an elevated Command Prompt:

2) In the command prompt, enter the following commands one at a time. Let each procedure fully complete its process before moving on to the next command/repair.

  1. SFC /SCANNOW
  2. DISM /Online /Cleanup-Image /StartComponentCleanup
  3. DISM /Online /Cleanup-Image /RestoreHealth

3) Restart the system and verify repairs were completed successfully.

4) If issues persist after running these repairs, running a repair installation of the Windows Operating System (being sure to retain user data) would be the next step in hopes of repairing the system:

https://support.microsoft.com/en-us/windows/reinstall-windows-d8369486-3e33-7d9c-dccc-859e2b022fc7#bkmk_reset_windows_10

Pacific NW Computers

Monday, January 15, 2024

Lenovo Legion Y740 Series Keyboard Issues

Lenovo Legion Y740 Series Keyboard Issues

Links to the needed firmware update(s) to fix  Lenovo Legion Y740 series RGB keyboard functionality/stops working issues.

Firmware Software Needed: kyb17fw03u

Lenovo Legion Y740 Series 15" Model:

https://download.lenovo.com/consumer/mobiles/kyb15fw02u/kyb15fw02u.exe


Lenovo Legion Y740 Series 17" Model:

https://download.lenovo.com/consumer/mobiles/kyb17fw02u/kyb17fw02u.exe


Pacific NW Computers

Thursday, October 19, 2023

How To Protect Yourself From Scammers

How To Protect Yourself From Scammers

Scammers are versatile in their tactics, posing as various entities, including banks, real estate agencies, utility companies, and even family members or government agencies. They often employ pressure tactics to create a false sense of urgency, leading to rushed decisions and financial losses. To safeguard your interests, it's essential to be vigilant and take proactive steps to prevent falling victim to scams. This article offers insights and tips on how to protect yourself from scammers.


Question Too-Good-To-Be-True Offers

Scammers often dangle tempting promises of high returns, low risk, and "golden" opportunities. If something sounds too good to be true, it probably is. Take your time to ask questions, verify claims, and conduct due diligence before making any financial commitments. This cautious approach can help you avoid falling prey to fraudulent schemes.

Be Wary of "Grandparent Scams"

One common scam involves imposters claiming to be family members, especially grandparents, seeking financial help. If someone purports to be a family member, independently verify their identity by calling them directly. In cases where you suspect a family member needs assistance, reach out to them through a trusted phone number or in-person contact. Avoid responding to such pleas via email, social media, or text, and always consult with the person's parents before sending money to a potential scammer.

Guard Your Passwords and PINs

Your passwords and PINs are the keys to your online security. Never share them, even with close friends, family, or relatives. Keeping this information confidential is vital for safeguarding your financial and personal data.

Protect Against Phishing Emails

Phishing emails are a favored tool among scammers. Pay close attention to any email that appears as a bill or a security alert. Be cautious if you notice misspelled words, your name is absent, the links seem suspicious, or if you're asked to "verify" your account or personal information. In such cases, delete the email and promptly report it to the relevant authorities.

Implement Security Best Practices

  • Be Cautious with Money Transfers: 
    • Avoid sending money to individuals you don't know in real life, particularly through third-party services like Zelle, Venmo, and Cash App. 
    • Refrain from using gift cards to settle bills; legitimate businesses do not request payment via gift cards.
  • Ignore Unsolicited Messages: 
    • Delete random texts and emails that ask you to click a link or provide personal information.
    • Never click on links from untrusted sources.
  • Regularly Monitor Your Accounts: 
    • Stay vigilant by regularly monitoring your financial accounts. 
    • Respond promptly to fraud alerts and report any unauthorized transactions.

Enable Multifactor Authentication

For added security, enable multifactor authentication (MFA) for your accounts whenever possible. MFA provides an extra layer of protection that can thwart account hacks or hijacks even if a malicious actor obtains your login information.

Understanding Fake Websites and How Scammers Exploit Them

Fake websites are tools scammers use to deceive individuals into divulging sensitive information, downloading malware, or making purchases from non-existent products. Scammers often employ these websites as part of phishing attacks.

Recognizing fake websites is becoming increasingly challenging. To ensure you're not dealing with a fraudulent website, remain vigilant and apply the aforementioned protection measures. By staying informed and exercising caution, you can significantly reduce your vulnerability to scams and safeguard your online security.

In conclusion, being proactive, skeptical, and informed is the best defense against scammers. Protect your personal and financial information by following these guidelines, and remember that it's always better to be cautious than to fall victim to fraudulent schemes.


We Also Recommend Reading:

11 Ways To Spot a Fake Website

 11 Ways To Spot a Fake Website

A fake website posing as the PayPal login screen. Source: The SSL Store
  1. Check the domain name closely:
    The easiest way to tell that you’re on a fake website is when the domain name doesn’t match the official website of the company. For example, scammers often use domain names that are similar to, or even contain, the official URL within the fake domain name.

  2. Look for a padlock symbol (but don’t trust it as a sole means of verification):
    All web browsers (such as Safari, Firefox, and Google Chrome) show whether a site has what’s called a “security certificate.” This certificate (also known as an SSL certificate) verifies that any information you send to the site can’t be intercepted by hackers.
    You can check if a site has a valid security certificate by looking for a padlock symbol by the URL in the address bar. (Again, make sure you’re on the correct page first.)

  3. Use a website checker or safe browsing tools:
    A website checker helps you answer if a website is safe to visit. For example, it tells you if the site uses encryption to protect your data, along with the site’s level of verification certificate. There are some good free resources that you can use to check if a website is safe to use.

  4. Look for poor spelling, design issues, and other red flags:
    Scammers move quickly and often don’t want to take too long to build fake websites (which could be identified as fraudulent and get taken down). Similar to scam emails and texts, phishing websites often include basic flaws and mistakes that legitimate companies wouldn’t miss.

  5. Check the domain age (how long the site has been active):
    Fake websites rarely stay online for long. One way to tell if a website is real or fake is to check how long it’s been active by using the Whois Lookup domain tracker.
    Enter the website’s URL and you’ll be able to see details such as the owner’s organization name, country of registration, and domain age. It’s probably a fake website if the company claims to be registered in the United States, but their Whois Lookup query shows that they’re in another country."
    Alternatively, you can try to use the Wayback Machine to see archived versions of the website and determine if it’s been used for multiple purposes.

  6. Be wary of deals that seem too good to be true:
    Scammers know you’re willing to set your suspicions aside for a good deal. When shopping online, don’t be fooled into trusting sketchy websites because you might save money. These fake shopping sites either steal your financial information or send you cheap knock-off versions of the items that you think you’re buying.
    A good rule of thumb is that if a site advertises prices that are all +50% off, you should take steps to confirm it’s not a fake website. For example, verify it with a website checker, look for spelling and grammar mistakes, and check the domain age and information against what’s listed.

  7. Look for user reviews, and check for reports of scams:
    In an effort to look more legitimate, scammers often post fake reviews on their websites. But at the same time, real customers (who might have gotten scammed) can also write reviews warning you about their experiences. Read on- and off-site reviews for mentions of fraud, non-delivery, or even identity theft. While you’re checking reviews, see if anything feels off. Scammers often create fake bot accounts on review sites in order to build trust.
    If there aren’t any reviews on the site, you can run a Google search for “Is [website name/URL] real/a scam?” The Better Business Bureau’s Scam Tracker website is also a great place to check for negative reviews about a company.

  8. Read the shipping and return policy:
    Official retailers have a dedicated webpage detailing their shipping and return policy. If the website you’re on doesn’t explain how to return an item, it’s a scam. The website should also include basic legal information, such as its terms and conditions, privacy policy, and data collection policy. If you can’t find this information, it’s likely not a legitimate company.

  9. Scrutinize your payment options:
    Fake websites sometimes try to force you to pay for goods using non-reversible or non-traceable payment methods; such as gift cards, bank transfers, cryptocurrencies, or payment apps like Zelle, Cash App, and Venmo. Legitimate brands will always give you the option of paying with more traditional and safer methods; including credit and debit cards, PayPal, or “buy now, pay later” options, such as Klarna and Afterpay. When in doubt, contact the issuing organization for the trust mark to verify the company's legitimacy.

  10. Run a virus scan if you experience numerous ads and pop-ups:
    Sometimes the goal of a fake website isn’t to steal your information, passwords, or money — but to infect your device with malware. Hackers create pop-ups and ad-riddled websites that can infect your phone or computer with viruses that let cybercriminals spy on you, scan your device for sensitive data, or lock your device until you pay a ransom. f you’ve been to a site like this recently, you need to make sure your device hasn’t been compromised.
Original Article/Source:
How To Identify Fake Websites: 11 Warning Signs
December 13, 2022

Friday, August 18, 2023

Protect Your Comcast.net Email from Hijackers


How to Protect Your Comcast.net Email Account from Hijackers

If you use Comcast.net email, you may have heard of some cases where customers’ email accounts were hijacked by hackers. This can be a very frustrating and scary situation, as hackers can use your email account to scam your contacts, steal your personal information, or cause other damages.

In this blog article, I will explain how hackers can hijack your Comcast.net email account, what they can do with it, and how you can protect yourself from this threat.

How Hackers Can Hijack Your Comcast.net Email Account

There are different ways that hackers can gain access to your Comcast.net email account, but one of the most common methods is phishing. Phishing is when hackers send you fake emails or direct you to fake websites that look like they are from Comcast or other legitimate sources. They may ask you to enter your email address and password or click on a link or attachment that contains malware. If you fall for their tricks, they can capture your login credentials and use them to access your email account.

Another possible method that hackers can use to hijack your Comcast.net email account is through a data breach. A data breach is when hackers break into a database that contains sensitive information, such as email addresses and passwords. If the database belongs to Comcast or a third-party service that you use with your Comcast.net email account, hackers may be able to obtain your login credentials and use them to access your email account.

What Hackers Can Do With Your Comcast.net Email Account

Once hackers have access to your Comcast.net email account, they can do a lot of malicious things with it. Some of the common things that hackers can do are:
  • Set up email redirection or auto-forwarding rules. This means that hackers can forward emails coming into your account to their own email account and continue their attack on those who are emailing you directly.
  • Create a spoof email account that looks very similar to your actual email address but with a different domain name. For example, if your email address is johnsomeguy@comcast.net, hackers may create a spoof email address like johnsomeguy@outlook.com. They can then use the spoof email address to impersonate you and scam your contacts in various ways.
  • Attempt to hijack and take over other various online accounts, as the hackers can now receive/redirect security and login authentication emails.
  • Delete all contacts in your address book, storage folders in your email account, or incoming email messages. This can cause you to lose important data and communication.
  • Send spam or malicious emails from your email account to other people. This can damage your reputation and expose others to potential harm.

How You Can Protect Yourself From This Threat

If you suspect that your Comcast.net email account has been hijacked by hackers, you should take immediate action to secure it and prevent further damage. Here are some steps that you can take:
  • Change your password as soon as possible. Make sure that you use a strong password that does not use any common words or phrases. You can use a password manager or generator tool to help you create and remember a strong password.
  • Check your email settings and rules. Look for any suspicious redirection or auto-forwarding rules that hackers may have set up and delete them. Also, check if hackers have changed any other settings, such as your signature, reply-to address, or recovery options.
  • Scan your computer and devices for malware. Use reputable antivirus or anti-malware software to scan your computer and devices for any malware that hackers may have installed on them. Malware can compromise your security and allow hackers to access your email account or other accounts.
  • Contact your contacts and inform them of the situation. Let them know that your email account has been hijacked and warn them not to open any emails or click on any links or attachments that they may have received from you recently. Also, ask them to report any suspicious emails that they may receive from the spoof email address that hackers may have created.
  • Consider switching to a more secure email provider. Comcast.net email does not always offer some of the advanced security features that other email providers do, such as two-factor authentication (2FA). 2FA is when you need to enter a code or use another device to verify your identity when you log in to your email account. This adds an extra layer of protection against hackers who may have stolen your password. You may want to switch to an email provider that offers 2FA or other security features.

I hope this blog article has helped you understand how hackers can hijack your Comcast.net email account, what they can do with it, and how you can protect yourself from this threat. If you have any questions or comments, please feel free to leave them below.

Pacific NW Computers

Thursday, June 8, 2023

Gigabyte Motherboard BIOS Restore/Repair

Gigabyte Motherboard BIOS Restore/Repair

If your Gigabyte Motherboard BIOS becomes corrupt or damaged, and the board has a "Dual BIOS", you can use one of the methods below to restore/switch from your damaged/corrupted BIOS over to the other/working BIOS.


Method 1:

  1. Shut off your computer
  2. Hold the power button until your computer starts and shuts down again
  3. Press the power button again, your backup BIOS might now be loaded and the system may POST.

Method 2:

  1. Shut off your computer
  2. Hold power AND the reset button for about 10 sec, then release.
  3. If this method works, your system will now boot into the backup BIOS now.

Method 3:

Only use this method if nothing else has worked!!! You could potentially permanently damage your motherboard when attempting this last method!
  1. Make sure you have a speaker built into your motherboard, or you have one attached to your motherboard's front panel connection header.
  2. You can short out pins 1 and 6 on the main BIOS chip by attaching a jumper to both pins (Pin #1 of the chip should be marked with a dot).
  3. As you short the pins, press the power button while you are still holding the jumper on the pins. You might want to have a friend help with this process so you don't accidentally short any other pins on the BIOS chip.
  4. Remove the jumper you're holding between pins 1 and 6 when you hear the POST beep.
  5. The backup BIOS should now be loaded and the system should POST.

Once you get the system up and running again, re-flash the other BIOS so you have yet another, alternative working BIOS.


Jon Pienkowski
Pacific NW Computers
360.624.7379