Remedies For Home
—
We are frequently asked for computer advice by staff, family and friends and we are more than willing to help…
We’re geeks – this is what we do – contrary to the official Technology Team t-shirt
We’re geeks – this is what we do – contrary to the official Technology Team t-shirt
—

—
—
Infections – Viruses, Malware and Hijackers – OH MY!!
—
Probably the most often-asked questions concern how to deal with infections – usually after a computer is already infected.
—
There are several things to keep in mind regarding this issue…
—
– Browser hijackers, viruses and trojans, and malware in its various forms, and more recently ‘fake alerts’ and ‘ransomware’, are all very different and there is no one product that we’ve found that will adequately protect you from the wrath of malicious software, websites, email, social networking hacks, etc…
—
– Because they’re so different, most anti-virus programs don’t look for malware and vice-versa.
—
– And just because a program came installed on your system doesn’t mean that it’s necessarily good at what it does… Most preinstalled applications are there because of deals the company has made with the system builders and many are trial versions that will ask you to pay a subscription fee after 30 days or so.
—
– And in the case of anti-virus software, more is definitely NOT better… running multiple anti-virus programs is asking for trouble and could render a system unusable as each looks at the actions of the other and blocks it as a potential threat and this in-fighting takes over your computer.
—
—
What is a virus?? A computer virus is a computer program that can replicate itself and spread from one computer to another. The term “virus” is also commonly but erroneously used to refer to types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
—
What is malware?? Malware, short for malicious software, is software (or script or code) designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software.
—
Adware?? Adware, or advertising-supported software, is any software package which automatically renders advertisements. These advertisements can be in the form of a pop-up or may also be in the user interface of the software or on a screen presented to the user during the installation process. The object of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however, some adware may come with integrated spyware such as key loggers (which record every keystroke in hopes of catching passwords, credit card numbers, etc.) and other privacy-invasive software.
—
Spyware?? Spyware is a type of malware installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect.
—
Trojan?? A Trojan horse, or Trojan, is a standalone malicious program that does attempt to infect other computers in a completely automatic manner without help from outside forces like other programs and human intervention. Trojan horses can make copies of themselves, steal information, or harm their host computer systems. The term is derived from the Trojan Horse story in Greek mythology because the first and many current Trojan horses attempt to appear as helpful programs. Others rely on ‘drive-by’ downloads in order to reach target computers.
—
Fake Alerts?? Fake alerts are a type of Trojan or malware that masquerades as some sort of helpful program that’s ‘detected a problem’… it starts by shutting down your Internet access or the ability to print or hides all your folders and documents or all the shortcuts to programs, etc. Then pretends to do scan of your system that looks very official and reports all these software or hardware errors that it can fix for you which is when they hit you up for their fee – usually about $100!! The simple fact is your system was fine and the only problems it’s having are the ones being caused by the fake alert itself.
—
Ransomware?? This has become more prevalent in recent years… you’re doing something on your computer when all of a sudden the screen is filled with a warning… (a popular one is made to look like the FBI caught you doing something)… somewhere on that screen or a subsequent screen it will ask for money… usually in the $200-400 range… and paying it is no guarantee that you’ll receive instructions on how to free up your computer which is now locked and can do nothing – even if you turn it off or unplug it completely!! It can take days or weeks just to attempt to disinfect a computer in this state.
—
In most cases when a computer is infected by any of the above it can be cleaned and recovered though we have seen several occasions where the computer had to be wiped out and everything needed to be reinstalled. It is usually possible to backup your files prior to reloading a computer but we’d highly recommend scanning all files before copying them back into a freshly loaded system.
—
Available Software…
As stated previously, there is no single software solution that we are aware of that can totally protect your computer – regardless of what the box might say. While we employ some serious hardware and software approaches to secure the school’s network, that isn’t practical in a home environment where we use different ‘tools’ and methods to protect our computers.
—
Anti-virus– There are a number of anti-virus programs available in stores and online and you might be surprised to learn that some of the most efficient and effective ones are FREE!!
—
– McAfee is the one most people have heard of because it comes pre-installed on the greatest number of computers. While it is reasonably good at protecting your computer it has been known to be a performance killer – bringing your computer to its knees as far as operating speed. After the trial period it will ask you to subscribe to it’s service to keep it up to date and effective – if you don’t pay their subscription you won’t be able to get updates and thus unprotected from new and future attacks..
—
– Norton (Symantec) – Norton Anti-Virus / Symantec Endpoint Protection had fallen on some rough times a few years ago but has recently shown dramatic signs of improvement. This also frequently appears as a pre-installed trial.
—
Our two favorites currently are both free and both very good…
—
– Avast Free – Avast. The world’s #1 antivirus.With more than 230 million users, Avast is the most trusted security & antivirus in the world.
—————————————————You are now just a few clicks away from protecting your PC for free…
—————————————————You are now just a few clicks away from protecting your PC for free…
—
——-——
– Bitdefender Free – “great if you want a strong, silent, and free antivirus solution.” PC MAG Excellent Rating…

—————————————————Click the link to the right to download it…
—
—
Malware, Spyware and Adware Cleaning– There may come a time when something anywhere between mildly annoying to downright nasty finds its way into your system with a variety of symptoms… The first thing most people notice is that their computer is just running slower than molasses in January… maybe your browser seems to have a mind of its own (browser hijacker), you’re getting bombarded with pop-ups, fake warnings or advertisements, or a window opens and appears to be scanning your
system or tells you that your computer has numerous infections or possible hardware issues (fake alert or scareware), all your icons are gone from your desktop or when you click on them nothing happens, etc. These are all indications of a possible infection. How do you recover from such an attack?? That’s tough to say – some are fairly easy to remove while others are more clever in their payload delivery and require a bit of computer tenacity and even that is sometimes not enough.
Malware, Spyware and Adware Cleaning– There may come a time when something anywhere between mildly annoying to downright nasty finds its way into your system with a variety of symptoms… The first thing most people notice is that their computer is just running slower than molasses in January… maybe your browser seems to have a mind of its own (browser hijacker), you’re getting bombarded with pop-ups, fake warnings or advertisements, or a window opens and appears to be scanning your

Assuming your anti-virus software is up to date and you’ve run a full scan on your system (many malware attacks will block your legit software from updating or running at all in some cases) the next step will to be to scan (or attempt to install and scan) with a good malware cleaner. If you haven’t installed one already you may not be able to depending on the level of malware loose in your computer (many will deny you access to the internet or take away the rights that allow you to install software). In some cases it’s possible to boot into Safe Mode – a Windows diagnostic mode accessed by pressing the F8 key while your computer is starting – (where most malware doesn’t load) and run some scans from there which may get you to a point where you can function in normal mode and continue the cleanup effort.
—


—
—
The best protection is to practice ‘safe computing’…
—
——————————– don’t open suspicious emails – especially from people you don’t know…
——————————– don’t click on suspicious links in emails or on websites
——————————– monitor what your kids (or parents) are clicking on…
——————————– and become familiar with the icons representing what, if any, anti-virus and anti-malware programs you are actually running so that if a message pops up telling
———————————you that you’re infected and offers to scan and fix it for you, you might identify it as a fake and can quickly close it before it gets its hooks into your system.
——————————– and become familiar with the icons representing what, if any, anti-virus and anti-malware programs you are actually running so that if a message pops up telling
———————————you that you’re infected and offers to scan and fix it for you, you might identify it as a fake and can quickly close it before it gets its hooks into your system.
—
—
—
Other Useful Utilities…
—
In addition to the above programs here are some other handy programs to help keep your computer humming along and more…
—

—

—

—

—

—
NOTE: This program requires a PS2PDF converter such as Ghostscript (recommended). A link is provided on the CutePDF website where you can get the free GPL Ghostscript 8.15. After you’ve downloaded both the CuteWriter and converter files, install them in that order
—

—

—

—
– Image Resizer – this used to be part of the Power Toys for Windows but you can still find variations of it on the web to match whatever OS you may be running… it allows you to select a photo or groups of photos from within My Computer or Windows Explorer, RIGHT click and select resize from the menu and it will quickly and easily resize them to one of 4 sizes for emailing or websites and still leave the original in tact!!
—

—

—
The last version of Photo Story (3.1) was designed for use with Windows XP but we’ve had no problems running it on Vista or Windows 7.
—
Windows Movie Maker 2012 does a good job of converting into an intermediate .avi format (although this will be some 30 times larger than the original wmv) which many DVD Authoring packages will accept as input. The final DVD compatible MPEG2 file size will typically be 5 to 6 times larger than the original .wmv file (or about 6 times smaller than the avi).
—

—

—