Friday, July 18, 2014

Top 10 Fixes for Common Computer Problems

 There are questions that are unanswerable for most when coming across issues with your PC.

Many people look at their devices and have no idea how to start fixing the problem.

This article from PC World will provide you with helpful tips to deal with your computer obstacles and resolve issues regarding blue screen, slow run times, and recovery & backup.

Per PC Advisor/

From backups to BSODs, Lincoln Spector lists the top 10 tips he gathered from the past two years of Answers Line letters.


Top 10 Fixes for Computer Problems

Here are 10 Answer Line articles from the last two years that every Windows user should read.

1. Attack of the Blue Screen of Death
You’re working on an important project, and suddenly your screen displays nothing but white text against a blue background. If it happens once, you curse, reboot, and hope for the best. But if you’re getting these BSODs frequently, you’ve got a problem that needs fixing.

Brewski13 had such a problem, and I provided advice for diagnosing, and hopefully fixing, the underlying cause.

2. How to recover deleted files
Now you see them, now you don’t. Files are like that sometimes.

So where are they? Are you sure you don’t have a backup somewhere? Files can hide in the Recycle Bin and “empty” sectors of your hard drive, even if you’ve deleted them.

Megan Aitken’s partner lost “a load of photos.” I walked her, and other readers, through the steps toward recovery.

3. Introduction to backup
I don’t get a lot of questions about backup. I sure get a lot from people who should have backed up, though.

Scarcely a week goes by without at least one email from a terrified reader with a crashed disk or an overwritten file. I remember a grad student who lost a laptop with all the notes for his dissertation.

Rickaber asked the right question. Before disaster hit, he wanted someone to explain the basics of backing up. I was happy to oblige.

4. Protect your privacy while you browse
What once sounded like paranoia is now common sense. Steve asked for safe and secure ways to access the Internet without being tracked by crooks, corporations, and governments.

While there’s no such thing as complete,  perfect privacy or security, you can use plenty of tricks to provide a reasonable degree of anonymity. You can use your browser’s private mode, then supplement that mode with the right add-ons. You can also replace that browser with one designed to keep your real self a secret.

When Steve asked, I explained the options.

5. Speed up a slow PC without buying new hardware
If a once-fast computer has slowed to a crawl, you can’t really blame the hardware. Sure, you can speed things up by adding RAM, upgrading the CPU, or replacing the hard drive with an SSD. But none of those solutions–all of which cost money–address the underlying problem. Your hardware isn’t necessarily underpowered. It’s probably just overloaded.

Gamersim17 complained that his PC was “moving extremely slowly and not performing like it should.” I provided advice for identifying and removing the software that slowed it down.

6. Is one antivirus program really better than two?
Arcticsid made the mistake of installing one antivirus program on a new PC that already had another.

Running two antivirus programs is a bit like mixing a fine, vintage Cabernet with breakfast cereal. Each is good in its own right, but the combination may have unpleasant side effects.

My original article explains the issues and offers a better way to get a second opinion on your system’s health.

7. How to securely wipe sensitive files–or your entire hard drive
When you delete a file, the data doesn’t actually go away–even after you’ve emptied the Recycle Bin. The actual bits remain written on the drive until some other disk activity writes over them. Even when you format a drive, the files are still there for those who want and know how to read them.

That’s good news if you’ve lost some files. It’s not so great if you truly want a file to go away, or if you’re giving away an old PC and to want make sure that your private records won’t be accessible. You have to take special steps to protect yourself.

I give Rommel advice on how to remove files so that no one can get them.

8. An obscenely slow Internet connection when you’re paying for a fast one
Interronator was paying Time Warner for 20mbps Internet service, but was only getting about 0.7.

Almost no one gets the Internet performance that their ISP advertises, but the difference between advertised and real speed should be reasonably close.

Is the fault in your equipment, or is your ISP to blame? I provide step-by-step diagnostics to help you identify the bottleneck.

9. How to archive files so they’ll stay around for years
Nothing lasts forever, but you want at least some of your files to last a very long time. So it was no surprise when Daisky asked about making family photos available to future generations.

No one is really sure how long you can archive digital files so that your great-grandchildren will enjoy them. In fact, no one is really sure if it’s possible.

If you follow my suggestions, you’ll increase the odds of preserving your precious digital memories. But you won’t really be sure of your success for a few decades.

10. Actually, you do need to share your passwords
As I just said, nothing lasts forever. And that includes you and me.

When we die, loved ones will need access to our bank accounts, email accounts, and the encrypted parts of our computers. So, despite the generally good advice about not sharing passwords, there is one big exception. You must find someone you can trust with that information, and make sure they can access your various passwords.

By Lincoln Spector

Related posts:

Fake iPhone 5 GS EmailWatch Out for Malware in Fake iPhone 5 Emails

  Symantec Endpoint ProtectionSymantec Confirms Reports of Stolen & Leaked Norton Antivirus Source Code

  Rich Twitter birdTweets from Public Twitter Accounts to be Used for “Market Research Purposes”

Christopher ChaneyCelebrity Email Hacker Pleads Guilty, Reminds Us

Wednesday, July 9, 2014

This Day in Tech History: July 9

Gil Amelio Ousted from Apple


Today in tech history on July 9, 1997,  Apple Computer announced the resignation of Gil Amelio as CEO.
Amelio was ousted by the board of directors and his departure paved the way for Steve Jobs to re-take command of Apple.

It was the ousting of  Amelio who brought Mr.Jobs back into Apple by purchasing Jobs’ company NeXT .
NeXT was used as a basis for the Mac operating system.

Donkey Kong and Mario’s Birthday


On July 9, 1981, the two most famous character video games were released for sale.

Donkey Kong, created by Nintendo, a Japanese playing card and toy company turned into an enthusiastic video game developer.

The game took off in the North American market.

The video game had challenges with acquiring a license to create a video game based on the Popeye character.

Nintendo decided to create a game depicting the characteristics and constant battle between Popeye and Bluto.

Donkey Kong is named after the game’s villain, which is a  pet gorilla that has gone rogue.

The game’s original hero was called Jumpman, but then renamed Mario, once the game became popular and Nintendo decided to use the character in future games.

The similarity between Donkey Kong and King Kong landed Nintendo with a lawsuit.

Because Kong, is a common Japanese slang for gorilla, the lawsuit was ruled in favor of Nintendo.

Donkey Kong successfully helped Nintendo become one of the dominant companies in the video game market.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Brown, Marcel
This Day in Tech History

Related posts:

Apple Co-Founder Steve WozniakDid you see Apple Co-Founder Steve Wozniak in Line for the iPhone 4S?

Pic of Fake iPad Being Sold in iPad Gas Station ScamFake iPads Being Sold in Southern States

  All We Want for Christmas 2011Which Tech Gadgets Top the Holiday Wishlist for 2011? [INFOGRAPHIC]

  Apple WarningNew Mac Trojan Exploiting Same [Patched] Java

Monday, July 7, 2014

Microsoft Patch Inconsistencies

Microsoft-Patch It's been a busy week for Microsoft. The email patch on Tuesday was stopped by Microsoft, then they changed their mind. The Redmondians (Microsoft's headquarters ) sent out a decree last Friday stating that email notifications of security advisories are coming to a stop on July 1st. The decree mentions "changing governmental policies concerning the insurance of automated electronic messaging". This new Canadian anti-spam law takes effect on July 1st. The announcement is as followed:
Notice to IT professionals:
As of July 1, 2014, due to changing governmental policies concerning the issuance of automated electronic messaging, Microsoft is suspending the use of email notifications that announce the following:
* Security bulletin advance notifications
* Security bulletin summaries
* New security advisories and bulletins
* Major and minor revisions to security advisories and bulletins
The new law attempts to rid of annoying spam email, it is required to consent for a commercial business to communicate through email, text message and social media messages. Canada's moving from email opt-OUT to email opt-IN. Penalties stated in the notice say, if your business sends a notice of a special sale to someone who only signed up for an e-newsletter, and the party complains then:
  • Your business may be fined up to $10,000,000
  • Your CEO, and each officer, may be fined up to $1,000,000
  • Your Marketing Agency may be fined up to $10,000,000
  • You, as an individual, may be fined $10,000
Canada couldn't understand how Microsoft could be misreading the law like this. Neil Schwartzman, executive director of the Coalition Against Unsolicited Commercial Email (CAUCE), and CASL accommodates emails concerning warranty and product safety and security alerts. This means Microsoft's security advisories would be exempt.
He quotes Schwartzman:
I am at a complete and total loss to understand how the people in Redmond made such an apparently panicked decision ... This is the first company I know of that’s been that dumb.
CAUCE board member Jeff Williams, a former group program manager at Microsoft’s Malware Protection Center, told Krebs that Microsoft’s decision likely could be attributed to having come out of a tough choice rather than a lack of legal understanding or grey matter:
I can imagine the discussion and wondering among the lawyers and [Microsoft] whether they should try to get hundreds of millions of opt-ins before June 30 or if they should change the way they share info. I’m sure it wasn’t an easy decision, but I wouldn’t call it an overreaction.
But, fear not, Microsoft has now performed a restart on its security notifications. A spokesperson told Brian Krebs late yesterday that Microsoft will be re-starting its emails early in July.
On June 27, 2014, Microsoft notified customers that we were suspending Microsoft Security Notifications due to changing governmental policies concerning the issuance of automated electronic messaging. We have reviewed our processes and will resume these security notifications with our monthly Advanced Notification Service (ANS) on July 3, 2014. [via: NakedSecurity]
We stay up-to-date on patches and notifications, stay tunes with us for more updates! Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+. Referenced: Vaas, Lisa Microsoft stops Patch Tuesday emails, blames Canada, then does U-turn Published: July 1, 2014

Related posts:


Microsoft-XP-2013-End-of-SupportMicrosoft drops Windows XP, protect yourself now!

  Windows Update, Y U NO INSTALL UPDATES?!Windows Updates Failing to Install? Try Using Windows Troubleshooter

  google-yahoo-censorshipMicrosoft, Apple, Google and Facebook tighten grip on NSA spying

  xp-supportWindows XP is ending, are you

Publishers Clearing House Scam Alert


Everyone wants to win the lottery!  There’s a dream within all of us that wins a ginormous amount of money or a major sweepstakes.

Sometimes people get too caught up in the idea of becoming a millionaire and lose touch with reality.

There’s something about the chance of winning something great that gets us to fantasize the possibility of it really happening.

This is an avenue that con artists take advantage of.


Often, Publishers Clearing House, a legitimate business, is used as bait.

The multi-million dollar giveaway from Publishers Clearing House are among the highest paying sweepstakes that receives millions of entries weekly.

So how do you know if you are entering into a legitimate sweepstakes or a scam?
  • If you receive an email, telephone call, or bulk mail letter saying that you’ve won a big prize, it’s a scam.  If you actually won anything from PCH, you would receive a certified or express letter or get an in person visit!
  • Receiving a check does not mean it’s a valid.  It’s nothing more than a piece of paper.
  • Never trust anyone asking you to send them money.  PCH will not ask you to send them money in order to receive money.
Here are a few emails received from the fake PCH:
“I just received a notice in the mail supposedly from Publishers Clearing House. They are saying that I have won a sweepstakes. Is this real?”
“I received a win letter along with a check from Publishers Clearing House to cover expenses. Did I really win?”
“Publishers Clearing House keeps calling and saying I’ve won $100,000,000. They say I have to pay 1% in taxes before they release the prize. What should I do?”

You can go directly to the site to get more tips  from here.
Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Lawrence, Shelby
Publishers Clearing House Scam Alert – ArkLaTex…

Related posts:

Facebook Charging Grid HoaxHoax Alert: Facebook to Start Charging Membership Fees?

  Mmm.. SPAM.Even Nigerian Scammers Admit Advanced Fee Schemes Are All “Lies and Deceit”

  paypal-transaction-declined-phishing-1PayPal Transaction 

Wednesday, June 25, 2014

Top 10 Tips for Computer Security


Being in the Internet Age, we use computers to pay bills online, go shopping, take college courses, and endlessly entertain ourselves.

Before you allow the computer to consume your whole life, take the necessary steps to ensure your finances stay personal.

  1.  Use passwords for protection
  2. Get your guard up
  3. Up the ‘anti’ with software
  4. Run scans to stay current
  5. Take wireless precautions
  6. Pump up password protocol
  7. Watch out for attachments and downloads
  8. Avoid going public
  9. Watch your phones and PDAs
  10. Clean up your computer

These are all ‘best practices’ for technical security precautions.

Following these precautions will help you keep your data and personal information safe.  Be sure to never run your computer as administrator unless you must do so for a specific task.

Maintain your software and be sure to run updates on your device.

By backing up your data frequently, you protect your files and hinders your operating system from crashing.    This will also prevent hardware failure and virus attacks.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Allebrand, Cheryl
10 tips to computer security – Bankrate…
Best practices for computer security – Indiana University

Monday, June 23, 2014

USPS Email Scam

A USPS email scam leads users to malicious computer malware.

A woman has claimed that she cant get rid of the malware that was put on her computer from a bogus U.S. Postal Service email came through.

The woman received an email with a shipping label link in it.  She clicked on the link for the shipping label and realized she may have done something wrong.  With the uneasy feeling of potentially clicking on something that isn’t trusted, she ran a computer scan and found that her device was infected with a data-stealing virus from the bogus link.

The woman said she received an email from claiming that a package could not be delivered to her residence.

“Your parcel has arrived at May 24, 2014. Courier was unable to deliver the parcel to you,” stated the email.
“Print your label and show it in the nearest post office to get a parcel.”

The email had the link, “Print Shipping Label” to get the proper package identification, displayed at the bottom.

The real USPS email states that they do not contact customers via email if a package could not be delivered.

USPS is aware of this scam along with others like it.  They have posted a warning on their website cautioning customers about the situation.

Clicking the link activates a virus, which can steal personal information like user names, passwords, and other private data stored on your computer.

If you receive this email, delete the message and report the spam at

This marketing scam has already been uncovered by the Postal Inspection Service where fraudsters mask themselves as USPS employees and calling residents requesting D.O.B. along with SSN for package deliveries.

Always check suspicious emails for; poor grammar, spelling errors, funny formats, and security symbols in the url.

The email received by residents, states that a parcel has arrived “at” May 24th.  Also, the sender information on the “From” line for the email address states “donotreply?, not a

It is advised for anyone who received on of these scam email to forward it to  Or recipients may call the postal inspection service at 1-877-876-2455.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Marquez, Homer
Fake USPS email leads to malware – MyPlainview

Thursday, June 19, 2014

Start using hashtags when shopping online


Amazon, the online e-commerce giant, wants you to begin using hashtags when shopping on their website.

The company’s new hashtag #AmazonCart and #AmazonBasket rolled out last month with mediocre popularity.

This is designed to make it easy to add items to your shopping cart without leaving your Twitter feed.

This new hashtag shopping tactic is a way to attract new, socially savvy, consumers to spend more time on the Twitter smartphone app.

“Twitter offers a great environment for our customers to discover product recommendations from artists, experts, brands and friends,” said an Amazon spokeswoman.

Making purchases through Twitter may come off as not going together, but it is just another way the Internet is changing our shopping habits.

This isn’t the first account of social media integrating with online shopping.  In 2012, Facebook started to let users send each other actual gifts through the timeline.

This method didn’t last long, nor was it popular.


Chinese social network Weibo, which is the Chinese version of Twitter, launched a “buy” button last year.

This was done with the partnership of an e-commerce company Alibaba.


Chirpify is another similar shopping campaign on Twitter that allows brands and agencies to leverage social channels through hashtags.  They have been in business for two years now.

Many businesses create campaigns with ‘Action hashtags’ to trigger accelerated internet marketing.  #Win a free t-shirt! #$25GiftCard, or #EnterToWin.

#AmazonCart will send an item to a cart, the @MyAmazon  account sent from Twitter, will automatically respond to the action hashtag tweets delivering 3,357 tweets replying to the action hashtag #AmazonCart.

Amazon’s official Twitter accounts have promoted hashtags and brands through this means.


Amazon and Twitter have partnered to strengthen their mobile social network and sales conversions.

Consumers are increasingly spending time on their phones instead of PCs.  It just makes sense for Amazon to campaign with Twitter.  78% of Twitter users access their site through a mobile device.

Amazon is campaigning for not only mobile users but also for the power of social media to advertise and make people want to buy more, according to CRT Capital Group Analyst Neil Doshi.

“Amazon has a very strong mobile presence, that is a tailwind for its e-commerce business,” he said. “Using Twitter just shows that Amazon is willing to use social mobile experiences to drive more sales. But, we wonder how many Twitter users would use this feature, as it might be a new way to shop.”

This is a chance for Amazon to change the perception of social shopping.   Across the board, convenience, speed, and mobility will improve any business.

Would you purchase through #AmazonCart from Twitter?  Do you think this will help or hurt shopping carts?  Please leave your comments below!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.


Why Amazon wants you to use Twitter hashtags to shop – C|Net
Published: May 6, 2014

Related posts:

Facebook Square IconPhishing Page Offers Fake Security App to Facebook Users

  enduser_computing-landing-pg_shutterstock_91847048Close the divide between your IT