As many users of older Macs and PCs are probably aware, there is a rather finite amount of time most companies will continue to support their software products and operating systems. Long term support for older versions of software and operating systems can be hard to find.
In the case of Microsoft, each version of Windows has a sort of “shelf life” that usually lasts around eleven years, during which time Microsoft moves from adding new features to just patching bugs and security problems. Eventually, the version reaches a point called “end of life”, wherein Microsoft releases one final update and then ceases work on the product.
Former Windows XP users are probably the most well aware of this, as XP still had a massive share of users when support for it ended in 2014. It was so widely used, that Microsoft had to extend their deadlines (twice!) to give time for the adoption of newer operating systems by XP users to reach acceptable levels. This has become relevant once again, as Windows Vista is the latest on the chopping block. Thankfully, not many people still use the ill-fated operating system, and most of its users have since moved to the more stable and well-designed 7, 8, and 10. However, there will definitely be some people left behind by this shift. Not to mention, a pretty large sum of people still use 7, which at the time of this writing has less than three years left. As with XP and Vista before it, once this deadline comes around, Windows 7 will stop receiving updates and security patches. These types of patches help keep people safe from major threats and security holes such as those exploited recently by the WannaCryptor Ransomware virus. Thankfully, with the advent of Windows 10, Microsoft has abandoned their previous release strategy, and are simply going to add new features to and update Windows 10 indefinitely.
On the Mac side, things aren’t so cut and dry. Apple does not exactly support older versions of Mac OS X, instead releasing major bug fixes for the current version between major releases. However, versions come out much more frequently than with Windows, with a new Mac OS 10.xx being released almost once a year. Not to mention, upgrades to the new versions are free, which is a move Microsoft has only made once, for users of 7 and 8 to move to Windows 10. Because every system running Mac OS is made by Apple itself, as well as the reasons listed above, Apple decides on update support by the Mac models instead.
Sometimes there’s a very real limitation, either in technology or design, for Apple to cut out support on a new update for certain models. For example, when Apple switched to Intel processors over a decade ago, the new version of OS X released at the time wasn’t compatible with the older Macs running IBM chips. Similarly, several years later, certain Macs weren’t “64-bit” compatible – as a result, they too were left behind. In some cases, certain Macs might be supported by an update, but simply don’t have the specifications to handle it. This time, the decision seems to be a bit more arbitrary in nature. However the line has been drawn pretty clearly – No Mac made before the end of 2009 can update any further than 10.11 El Capitan.
We’ve all been here before: We run into a problem, technical or otherwise, and we’re unsure how to proceed, so what do we do? We search the internet for answers. In our search, we come across a number of results that look promising – some of them may even fit the bill exactly, and we think we have our answer. But one thing many people come across, sometimes without even knowing it, is a false search result – a listing that’s either mostly unrelated to what you’re actually searching for, or worse, a listing that is meant to deceive you into believing it’s what you’re searching for, with malicious intent. So, how can we know when we come across deceptive search results?
In both cases, many of these results can appear near the top of the lists for a number of reasons. One of the most common reasons is a practice carried on almost universally, and that is to offer higher search placement to people or companies willing to pay for it – this way, the search engine can make money and the company buying the advertising gets seen by more people who might be looking for something relevant to their services or products.The danger comes when more objective search terms get bought out by illegitimate sources, and seek to mislead people into paying for service from them that might otherwise be better or outright free from the real source. One of the biggest cases of this is in searches for a tech company’s support. Whether it be a major manufacturer like HP, Dell, or Apple, or a software developer like Adobe, Intuit, or Microsoft, many of these illegitimate companies and results are tailor-made to target people looking for help from these sources.
Below is such an example of several advertised results coming up before the “real” or “intended” listing.
As you can see, the real “Microsoft Support” shows up in fifth place in these results. In the case of any major search engine, some of these advertisers can be very dangerous. Some of the above results, for example, could be tech support scammers the same as the types who have plagued users with unsolicited calls for years. Unfortunately, if you don’t know as much, there’s a good chance you’ll run into them or those like them eventually.
Usually, the best way to handle such searches is to look for signifiers that certain results may be advertised. For many search engines, advertised results will often have a small icon underneath them that says either “Ad” or “Sponsored”. Even if it isn’t necessarily a sponsored listing, there’s always a chance it could be dangerous – so if you’re looking for support from a company, it’s usually best to go straight to the company’s website. Paying attention to the actual address below the listing’s title can save you a good deal of confusion. In the case above, the only Microsoft websites are the ones with the green address listed as “support.microsoft.com”. Keep this in mind when you’re searching.
Around this time last year, we addressed a very common trend that we were seeing involving popups and scareware hijacking people’s computers while they were browsing the internet. These popups, such as the ones below, are a facade meant to convince you that your computer is either infected by a virus or at risk of serious damage. Their main goal is to get you to either download a program that will then ACTUALLY infect your computer, or call a “Support Number” wherein a call center operator will then remotely access your computer and either lock it down and hold it for ransom or “Fix the problem” and then charge you several hundred dollars for the “Service”.
Some of the most common offenders’ designs.
Seemingly innocuous messages warning of viruses.
Imitation virus scanners claiming the presence of a number of threats.
Loud colors and bold warning messages.
We get calls every week from people encountering this issue, and the prevalence of these sorts of problems has only increased over time. They affect nearly every class of user across every platform; from Windows to Mac OS, iPhone to Android, no one that browses the internet is immune to this sort of encounter.
So what can we do about it?
Unfortunately, not much – many of these people are far outside U.S. Jurisdiction for legal action, and the diversity, profitability, and widespread nature of these types of scams make them very popular and difficult to decisively put down. As a result, the best type of security against such attacks are awareness and user preparedness. Everyone knows someone who has been assailed in such a way, so it should be important to remember how to get out of such a trap.
We won’t go through the tells that will allow you to identify such a scam as we did last time, but instead leave it at thus: ANY pop up you get while browsing the internet warning of critical errors or viruses, and telling you to download something or call someone should be looked at with extreme skepticism. As far as incoming calls go, remember this: no brand or company will ever call you – this goes for all types of phone scams going today; neither Microsoft nor Apple, Windows nor Mac, Dell, HP, or anyone else has the type of information to know you may have a virus or the capacity to be receiving errors. Additionally, they do not have the type of manpower (or even the necessary information in many cases) to cold call their customers, nor do they have any desire to do so.
There are, importantly, a few methods of escaping these popups, which are important to go over again.
Method one is available to most users running a third-party internet browser; if you are running Google Chrome, Mozilla Firefox, or Opera Chromium, the option to “prevent this page from creating additional dialogues” will be available as a little checkbox at the bottom of the notification that seems to keep opening no matter how many times you close it. Checking it and acknowledging or closing the notification one more time will prevent it from appearing again, allowing you to simply close the page normally.
Method two is available to all users, but requires you forcefully close the process of your internet browser which, if you keep multiple pages open at a time, can cause you to lose whatever you are doing on the other tabs of your web browser. On your keyboard, pressing CTRL, Alt, and Delete (DEL) at the same time on a Windows PC will allow you to open the task manager. From there, simply choosing your internet browser and clicking on “End Task” will force it to close, allowing you to simply reopen it and continue working.
For Mac users, pressing the key combination of Command, Option, and Escape (esc) allows you to activate the equivalent function, “Force Quit”. From that windows, simply selecting the program you wish to close and clicking “Force Quit” will accomplish the same result.
Method three should only be used as a last resort. It’s simple to execute, but it can potentially cause problems if you perform it while your computer is updating or installing something, and can at least cause you to lose data if you are editing documents or files that haven’t been recently saved. In this case, simply holding down the power button on either a Mac or PC will force it to shut down, and the problem should be gone upon restarting it and logging back in.
Now in some cases, especially those in which you may have inadvertently installed something, you might be afflicted with something known as a “Browser Hijacker“, or “Scareware“. These pieces of software are some of the more extreme measures such call center scammers have been using in recent years, and they usually have the effect of forcing the error message or popup to appear every time you start the computer or open your web browser. If this happens, or you have questions or concerns about such pop ups, it is usually recommended that you consult your local technician.
If you’re anything like me, you’ve probably had any number of older computers through the years – from laptops to desktops, they either break down or start to feel too slow to justify keeping. Very often, we end up throwing away computers that are otherwise functional simply because they’re out of date or we don’t like how they run anymore. For some, this can be one of the more irritating situations – it works, so why can’t we continue making use of it?
Enter projects like CloudReady by Neverware, which aims to allow older computers to run like new through the use of software. Rather than attempting to improve a computer’s existing operating performance through optimizations or removal of applications or issues, CloudReady outright replaces your computer’s operating system.
As far as actually noticeable performance benefits go, one can expect to see a number of improvements across the board on a computer that has had CloudReady installed. Faster startup and load times will probably be one of the more noticeable differences – this also applies to how long it takes for the computer to actually become useable after it has started. Second will definitely be application performance; things like web browsing and document editing, in addition to email and even video or music streaming will be a breeze. Multitaskers rejoice, as most systems will handle having multiple tabs open and any of the above happening simultaneously as well. Finally, laptops and desktops alike will, in most cases, exhibit decreased power consumption due to the lower stress on these systems. While not immediately noticeable in desktops, laptops (especially older ones with weaker or more worn-out batteries) will see an improvement in battery life and a decrease in heat output. Finally, while not quite a “performance benefit”, CloudReady is also extremely safe from viruses and malware – even more so than either Windows or Mac OS.
Functionally, CloudReady differs somewhat from its counterparts in the Microsoft and Apple spaces, being Windows and Mac OS, respectively. Most noticeably, devices running CloudReady or Chrome OS are not compatible with programs on either Mac or Windows, and instead rely on web-based programs and apps from the Chrome App Store. For document handling, spreadsheets, and slideshows, CloudReady has the same integration with Google Docs as Chrome OS, which is what most schools work with for student collaboration and class assignments. Files can be stored on the computer’s hard drive like other systems, but the focus on storage for Chrome OS and CloudReady devices alike is Google Drive, Google’s cloud storage. As we’ve gone over before, Google Drive gives 15 GB of storage to users for free for documents, as well as unlimited storage for pictures and videos. Paid plans give more storage if desired, with fairly inexpensive plans offering up to 1 TB of space overall.
The benefit of Chrome OS and CloudReady being connected and managed with Google Drive is that all your documents and pictures are accessible from anywhere, so long as you can log into your Google account. Not only that, but all the apps and settings in CloudReady are synchronized and thus immediately available to you if you’re logging into a new system; whether you’ve just gotten a new Chromebook or you are switching over to a new CloudReady installation, everything will be as you left it.
All-in-all, CloudReady is one of the most complete experiences of its kind available, and is an excellent option for when you need to pep up that old system that’s been sitting in the corner collecting dust. At the very least, this might keep your computer out of the landfill for a few more years. Ewaste, which refers to any electronics that have been thrown away, is one of the biggest obstacles to recycling and waste disposal out there. Many of the components in our computers are either toxic or at least difficult to reclaim or break down. Not only that, but many students and school systems have to buy new computers each year – so save that computer from the trash; even if you can’t use it yourself, consider donating it instead!
Many people – myself included, often take for granted that their pictures, videos, music, and other information will be there every time they look. We’ve already gone over (rather exhaustively, I might add) how important it can be to back up your computers, and the myriad ways in which you can go about it. However, so many more people are starting to ignore this vital practice on the computers that, ironically, they carry around with them every day.
I’m talking, of course, about your smartphone – those small, fragile devices that most people drop or break sometimes several times a year. Those devices that many of us use so often and rely on for so much. Their functions and capabilities vary of course, but we all use them for a purpose – it could be for your ever-growing picture collection, or that music library you keep yourself working away with at the gym, or that Email server you coordinate with team members at work through. Whatever your use of it entails, your smartphone can be essential to your daily activities – so why take the chance that it will keep working forever, when it’s just one slip out of your hand away from potential destruction? Whether on the train, a bus, at the workplace, or even at home, none of us can deny seeing this plenty of times…
Thankfully, no matter what kind of smartphone you use, part of the virtue of it being “Smart” is that they are all capable of saving their information elsewhere if necessary, should the worst come to pass. The options available differ depending on what platform you use, and sometimes even depending on what version of either Android or iOS you’re running, so we’ll be keeping this as general as possible in terms of what methods should be available to most.
Before you can decide on which methods to go with, it’s helpful to know which operating system you’re working with. If your phone is made by Samsung, LG, Google, Motorola, HTC, or Huawei, you are running Android – if your phone is made by Apple, you are running iOS. Also, due to the now-ubiquitous nature of mobile operating systems, the same process for phones also holds true for tablets.
iOS Backups
Definitely one of the strengths of iOS as a whole is the relative ease-of-use – and in this respect, backing up your device can be just as simple. The two primary methods of backing up iOS are via iCloud and iTunes.
iCloud, especially in newer versions of iOS, is recommended quite extensively by Apple as the go-to backup solution for iDevices, and most of these devices will actually recommend signing into iCloud with your Apple ID during setup. iCloud is capable of backing up Contacts, Email, Calendar Events, Photos, and other information from any of your devices, however it’s limited to 5 GB of storage unless you purchase a subscription for more space. This means that, for most people who take a large number of pictures or videos, this space will be very rapidly expended for the use of their picture or video libraries.
For those that have been with Apple since the early iPod days, it’s easy to remember that the ONLY way to backup or add information to any of your devices used to be exclusively through iTunes. The ability to download updates, apps, music, or other information over-the-air is a relatively new function, and even as recently as in the early days of the first iPads, the primary method for adding anything to your device was by means of an iTunes sync. In that respect, iTunes has never lost that functionality, and any Mac or PC running iTunes can save complete backups of your devices, which are only limited by the (usually) relatively massive space of said computers’ hard drives. In some cases, iTunes can even be configured to backup your devices through your house’s wireless network while both your computer and your iDevices are online and plugged in.
Either method is effective in saving most of your information cleanly and efficiently, however the information stored is often not readily decipherable, and can be somewhat vague; it can be difficult to tell or control exactly what gets backed up, and saving information from certain third party apps can be effectively impossible. However, for the vast majority of users, storing important information safely is relatively easy.
Android Backups
Where iOS excels in simplicity and ease-of-use, Android’s strengths most certainly lie in its fine-tuned controls, customizability, and openness. In that regard, nearly any information stored on an Android device can be accessed directly and stored elsewhere. The main methods of backing up an Android device, however, are through your Google account and through Google Photos.
When setting up a new Android device, it is most highly recommended to set up a Google account for use with the phone, similarly to how Apple devices require an Apple ID. If you have an existing account or login through any of Google’s existing platforms, such as Gmail, Google Drive, Google Docs, or Youtube (to name a few), you can simply use that account for your new device. In this way, your Email, Contacts, Calendars, and Settings will be preserved in the event of your device being damaged or replaced. What this function can store is effectively unlimited, however the storage method for photos and videos is somewhat different.
When it comes to media, Google Photos is the method of choice for many Android users. Google Photos is tied into the more over-arching “Google Drive”, which is Google’s cloud storage platform. We’ve gone over comparisons of the different platforms in the past, and this one gives 15 GB of storage for free, which is shared among your other Google services, such as Gmail and Google Docs. However, in most cases, Documents and Emails take up relatively little space, so most of the storage area should be available for use with pictures and video. But by far the best thing to understand about Google Photos is the fact that it can save most photos and videos without counting against your storage usage. As we explained in our aforementioned Cloud comparison, any pictures at or below the resolution of 16 Megapixels will not count against you, and the same holds true for videos recorded at or below Full HD 1080p. In the case of most phones, your camera is probably incapable of even exceeding this image resolution, and most people do not record videos higher than 1080p due to the massive space requirements associated with recordings at Quad HD 1440p or 4K / Ultra HD 2160p.
If all else fails, or you use your phone for other purposes, you can always backup specific folders or files to Google Drive directly, or simply store the phone’s contents on your PC or Mac. In most cases, Android Phones can be connected to a trusted computer and viewed as if they were nothing more than a flash drive, making their contents easily accessible for safe-keeping. However, this method can be somewhat tricky, and you often need to have a good understanding of what you’re looking for.
Your phone can be nothing more than a convenience, or it could be your daily driver. Either way, it can be very problematic to lose its contents to a drop, spill, or random failure. Whatever the case may be, it’s important to remember that your phone is far from bulletproof, and you should always perform safe practices in keeping backups of your important information. Backing up your smartphone now can save you time and energy in the future. However, choosing the method that’s right for you or ensuring your existing method is doing the job can be understandably dizzying. Always remember that you can contact your local technician if you ever need assistance or simply some advice.
Wi-Fi is something we all use, but don’t really think about; It’s one of those things that, when it’s working well, you don’t notice – but when it isn’t, it can be a complete show-stopper. Wireless networking as a whole has come a long way in the past decade or so, especially as devices have gotten smarter and become more connected than ever before, and the importance of having a strong connection to the Internet has become greater and greater. These days, many people connect to the internet almost exclusively wirelessly. Whether they’re reading the news or checking their email, streaming movies or gaming, the demands placed on their wireless equipment have grown exponentially.
Not All Wi-Fi is Created Equal
As the technology has developed, different standards have been created to more effectively push those bits over the air. For several years now, the most mainstream protocol has been Wireless-N, offering connection speeds on the order of ten times greater than the previous standard, Wireless-G, as well as far greater effective range. However, a significantly newer standard has begun to enter the mainstream in a more prominent way, and that protocol is referred to as Wireless-AC. AC Wi-Fi gains an additional three-fold increase over Wireless-N in terms of raw speed, but it gains nothing in terms of range. Instead, AC serves to significantly increase the stability and effective speed of connections at the same maximum ranges as Wireless-N, allowing for only a minimal drop in speed even near the edge of the wireless signal’s coverage.
In the current standards of Wireless technology, there exist two primary signal frequencies, or “Bands” as they are commonly referred to, on which most wireless devices operate. These two frequencies are the 2.4 GHz (GigaHertz) and 5 GHz. Most devices currently on the market support both, and are thus referred to as having “Dual Band” wireless capabilities. Either band can be used for the same purposes, but they both have their strengths and weaknesses. Working in conjunction, devices which can access both bands are able to gain superior range and throughput than devices with access only to one band or the other. The differences between 2.4 GHz and 5 GHz bands, as well as how they relate to and are effective in different scenarios, are a bit beyond the depth of this article, and is a topic we’ll discuss at a later date.
Just as in every marketable technology, when it comes to Wireless there are many options with differing specifications, which usually fall into either the entry level, mainstream, or high-end. Depending on the price bracket, these access points (or routers, as they have colloquially come to be called) will have greater or lesser effective range, throughput, or feature set to fit a given situation. However, the truth of the matter is that even the most powerful routers cannot meet the needs of every situation, and one of the biggest causes of this problem is from obstruction and interference. Every home suffers from “Dead spots”: areas in which the WiFi signal broadcasting from your router or access point simply will not reach. Whether you’re in a studio apartment, a complex office building, or even a large mansion, there can be plenty of causes for interference or signal obstruction. While the causes of this are numerous, so too are the methods the networking industry has devised to get around them. Devices such as wireless range extenders, ethernet over power line linkups, or mesh access points are some examples of such work-arounds, and are specifically suited to particular situations.
Unfortunately, wireless can be one of the most temperamental and finicky technologies to get working well, but when it is, it can also afford some of the greatest convenience in any situation. Each of these subjects deserves some further delving, as there are some very important details to consider when making an informed and educated decision on what solution will best fit a given scenario. This article’s main purpose was as an introduction to some of the technology available, as well as to raise awareness of the fact that many of the issues users encounter with their wireless can be worked around with the right equipment. Of course, as we always recommend for potentially complex scenarios like these, contact your local technician for recommendations and support in this endeavor.
For those considering Windows 10: Take these steps first!
It’s been almost a year since the launch of Windows 10, and with it have been many people taking advantage of the free upgrade. However, we still get (even this much time later) many people who willingly take the upgrade, only to find that their computer was not properly prepared and has thusly been adversely affected. Contrary to popular belief, the Windows 10 upgrade does require some preparation to ensure the best chances of a clean, working installation.
With there being so many different manufacturers and models using so many different designs and configurations, it can be difficult to guarantee proper compatibility when you’re going from one version of Windows to another. A good deal of people had a similar experience during the days of Windows 8, when many users were trying to install Windows 7 on brand new computers that were built for use with Windows 8. Unfortunately, in many cases, some parts of the computers simply would not work with the older version, and even in the best cases there might be undesirable side-effects.
Thankfully, given the wide-spread availability of the Windows 10 upgrade, many manufacturers and brands have started listing the compatibility status on their websites for different models, giving their customers an idea on what will work, what will not, and what might need some finesse to be made to work properly.
That brings us to the first step of a prospective update – check with the manufacturer to see if your model is compatible. Below are some examples of what you might expect to find on a manufacturer’s support pages regarding Windows 10.
Dell’s Windows 10 compatibility is listed under the support page for the specific model.
HP has a support page for looking up Windows 10 compatibility as well.
In our experience, most Windows 8 users should expect full compatibility and a relatively painless upgrade. However, Windows 7 users have to be more careful, as often-times most Windows 7 computers are now more than 3 years old, which is long enough where some manufacturers may stop testing or providing new updates for them. Beyond this, it’s important to consider the fact that Windows 7 is now 7 years old and two versions behind Windows 10. As a result, it has to make a larger “leap” in software than Windows 8.
The second step that many people gloss over is to use the built-in compatibility checker on the “Get Windows 10” app itself. While limited in its capacity to fully check a system over, it can easily provide a good reference of what applications or hardware (if any) may be incompatible if the user attempts to upgrade. Simply opening the “Get Windows 10” app,
selecting the options icon in the top-left of the window,
and then clicking “Check your PC” under the “Getting the upgrade” section
will present the compatibility checker.
Keep in mind, however, that there’s a reason this is step two – the compatibility checker is not a sure-bet and can very often miss items that could cause problems after the upgrade.
The third step, which Microsoft decided would be best left to the fine print section that no one actually reads, is to disable or uninstall your antivirus before beginning the upgrade. We typically recommend uninstalling the antivirus altogether to be on the safe side. Unfortunately, this step is probably one of the most harmful steps to skip, as it usually won’t outright prevent an upgrade from happening, but it can very easily cause major hiccups or problems after the upgrade is complete. Problems we’ve observed as a result of this crucial step being overlooked have ranged from an unresponsive Start Menu, to a desktop or home screen that constantly flashes black, to even a computer that simply can’t log in to any of its user’s profiles.
There have been many more issues than these, but the aforementioned symptoms are some of the more common ones. In order to disable your antivirus before an upgrade, usually right-clicking it’s icon in the lower right-hand corner of the screen will yield the option to “turn off protection” or something of that verbage. However, to uninstall it altogether (given you have the product key or account information required to reinstall it), simply navigating to or searching out “Control Panel” and then “Programs and Features” or “Add or Remove Programs” will allow you to uninstall it.
Then, once the upgrade has gone through, simply use the same method as before to re-enable your protection if you simply disabled it, or reinstall it from the disk or website it came from, so long as you have the account information or product key available.
Whether you’re upgrading from Windows 7 or Windows 8, always bear in mind that not every upgrade will go smoothly. This type of procedure is probably the most significant software change one can make to a computer, so there is always a good chance something might not go as expected. However, with the right preparation, you can minimize your risks of encountering problems after the switch. Of course, if any problems are encountered, you can always seek help from your local technician.
We’ve spoken before on the subject of the numerous call center scams that exist for the purpose of convincing people they have a problem and taking their money to “fix it”, but with the increased frequency at which we’ve been hearing about more and more clients being affected, we decided that it would be prudent to go into more detail on the types of blue screen popups and tactics users may encounter.
As we’ve mentioned, on many occasions users might run into a page that is disguised to look like an error or even a Blue Screen of Death.
This type of message can be very jarring on its own, and to make matters worse, it will often be accompanied by a computerized voice making claims about errors or viruses on your computer. However, there are some tells that clearly indicate its illegitimacy. First off, if you take a moment and look at the screen, you can tell that this screen is clearly within the internet browser, which means the computer is still running. In every case, a blue screen is a complete crash of Windows itself, which means everything else will have closed before it can be displayed. Not only this, but it prompts for readers to call a support phone number. Microsoft has no such number that they provide on the blue screen of death. Third, and sometimes most telling, is the lack of proper spelling, grammar, or capitalization on the page. These types of trap pages are oftentimes surprisingly shoddily designed, and will often mis-word or misspell even basic terms. In the case of the example above, the message not only repeats the “Please contact Microsoft technicians” twice, but it also forgets to capitalize Microsoft, while it capitalizes “Immediately” and “Rectify” for some reason. The sentence as a whole also seems somewhat clunky and indicative of “English as a second language.”
Calling the number on the page will get you to a (usually foreign) call center that will walk you through “fixing the problem” and charge you a great deal of money to do so. Refusing to comply once they have connected after a call to them can often lead to them actually messing with your computer in some way, and if the worst happens, they may make your computer unusable. To make matters worse, the page itself usually traps visitors on it with a continuously reappearing notification that prevents you from closing it, leading even people who might know better to call the number just to get control of their computer back.
Thankfully, wrenching control back from these types of pages is not impossible, and any consequences implied by the pages in question are usually empty threats. Three methods might be available to you, depending on your situation.
Method one is available to most users running a third-party internet browser; if you are running Google Chrome, Mozilla Firefox, or Opera Chromium, the option to “prevent this page from creating additional dialogues” will be available as a little checkbox at the bottom of the notification that seems to keep opening no matter how many times you close it. Checking it and acknowledging or closing the notification one more time will prevent it from appearing again, allowing you to simply close the page normally.
Method two is available to all users, but requires you forcefully close the process of your internet browser which, if you keep multiple pages open at a time, can cause you to lose whatever you are doing on the other tabs of your web browser. On your keyboard, pressing CTRL, Alt, and Delete (DEL) at the same time on a Windows PC will allow you to open the task manager. From there, simply choosing your internet browser and clicking on “End Task” will force it to close, allowing you to simply reopen it and continue working. For Mac users, pressing the key combination of Command, Option, and Escape (esc) allows you to activate the equivalent function, “Force Quit”. From that windows, simply selecting the program you wish to close and clicking Force Quit will accomplish the same result.
The “Task Manager” window in Windows 10.
The “Force Quit” screen on a Mac.
Method three should only be used as a last resort. It’s simple to execute, but it can potentially cause problems if you perform it while your computer is updating or installing something, and can at least cause you to lose data if you have any programs open and you are editing documents or files that haven’t been recently saved. In this case, simply holding down the power button on either a Mac or PC will force it to shut down, and the problem should be gone upon restarting it and logging back in.
Now in some cases, especially those in which you may have inadvertently installed something, you might be afflicted with something known as a “Browser Hijacker“, or “Scareware“. These pieces of software are some of the more extreme measures such call center scammers have been using in recent years, and they usually have the effect of automatically defaulting the home page of your internet browser to their own error page, or even going so far as to generate an otherwise inescapable error message upon computer startup. If this is the case, getting rid of such malware can be rather complicated, at which point it is usually recommended that you consult your local technician.
Parents: did you ever keep secrets from YOUR parents when you were younger? Information such as where you went after school, if you were dating anyone, or where you spent your money? If any of this sounds familiar, you are definitely not alone. In those days, however, the exchange of information was a lot more limited, and with some things it was nearly impossible to keep a secret from your mother or father. Unlike those days, there are now far more ways in which kids can hide information from their parents, and in many cases, this information can put them in danger.
Many parents these days probably remember having a hard time getting secrets by their parents when they were younger. They had many tricks up their sleeves – skills they learned, often from being busted by their own parents. Secret contacts, convenient and unexpected schedule changes, random check-ups, or just plain intuition. You might think you had gotten off scott free, but a friend’s parent would tell your parents that you were over their house, or your parents would stop by your own house unexpectedly when you were playing hookie, or one of your friends would slip up and indicate offhandedly that you had actually visited the arcade or the movie theater instead of the book store. Whatever the case, at the end of the day, you would be in trouble. For some, that part is probably the MOST familiar part. But either way, both the rebellious acts, as well as the consequences that came with them, would be valuable experiences. After all, a bird has to stretch its wings sometime, even if that means crashing into the ground on more than one occasion. However, as technology has begun to outpace the rest of society, the amount of information that can be shared online has become far more dangerous to the well-being of many, and kids have only been finding more new ways to circumvent their parents.
One of those new methods is through a new set of secret or otherwise hidden apps, capable of doing anything from hiding pictures and text messages, to disguising themselves as other apps for privacy, to even sending temporary messages that “Self Destruct” after a time has passed. With these new tools at their disposal, gone are the days in which a parent need only look at their kids’ text logs or their internet history to see what they’ve been up to. In this case, the kids have begun developing tricks of their own.
One of the newest and most popular applications is, at first glance, a simple calculator app called “Calculator%“. This application is not just a dummy app, it actually is a fully functional calculator. However, the magic happens when you hit the decimal key, input a series of numbers, which can be set by the user, and then hit the decimal key again. Just like that, the calculator app reveals a hidden space where the user can save information at will, information which cannot be accessed any other way. Beyond this level of functionality, the app is also designed in such a way to protect its user, even if the app is found out, by taking pictures of the person trying to log in, whether they are successful or not, and including them with a time, date, and GPS coordinates of the attempt in a log that cannot be altered. This app in particular has become SO popular that an article about it was even featured on ABC news, analyzing the different ways in which this app functions, and warning parents to keep an eye out for it. Again, to parents, watch for suspicious look-alike apps like these – if they’ve gone through the trouble of setting something like this up, you can be sure that they have something serious to hide.
Another powerful asset to those looking to hide their messages specifically is a unique project called “Kaboom“. This application allows one to post or send messages that have a sort of “self-destruct” timer built into them, which causes them to disappear after a certain amount of time. This does resemble what other apps are already doing, but there are some differences. In the case of Snapchat, users can send images and videos to each other that will disappear after a single viewing. The app is quite popular among millions of people, even many celebrities, and is typically innocent enough, but its temporary nature opens it in some kids’ minds as an excellent means of sharing sensitive information that cannot be saved. What many don’t realize, however, is that receivers can still screenshot the open picture or a frame of the video, and thus save it permanently. On the other side, an app like Wickr offers an entire Instant Messaging service with self destructing text messages. The app is so secure and well designed, that it’s even used among state officials and journalists in oppressive countries to communicate discreetly. Thankfully, it’s not too popular among kids yet, but the potential it represents makes it certainly worth mentioning. What sets Kaboom apart from the former two is that it does not require users to switch to a new app or service to use, and instead allows users to send self-destructing messages through the services they already use. Nearly any major messaging application or social network can be used with the app; this includes Facebook, Twitter, Instagram, and others, but it also includes forms of communication everyone has access to already, such as Email and Text Messaging. This leaves Kaboom as one of the more potentially widespread methods of discreetly messaging.
Needless to say, this caliber of unmoderated communication that many kids have access to can be very dangerous, and the news is always rife with stories of abductions, kidnappings, or dangerous behavior. Naturally, many parents try their hardest to keep a protective eye on their kids’ online and social activities, but doing so can quickly become a full time job, and with some of the applications above, almost impossible. Thankfully, there are some good practices to follow that can significantly improve one’s chances at keeping their kids safe, and ensuring their security online.
First, the tried and true method of keeping an open contract of communication with your kids is important – talking about a problem with your kids, rather than just jumping right to a punishment, can help them understand why you feel the way you do, and that you aren’t just being completely arbitrary and controlling. Make the problem real; remember, the things you’re worried about don’t actually exist to your kids, and as you might remember, in their minds, they are invincible. Being a resource for discussion, rather than an authority to hide from, can definitely help in removing the need for such apps or secrets in the first place.
Secondly, keep your hands on the reins, but don’t hold them too tightly. As a young adult, I can definitely attest to the fact that I was more likely to fight back the more I felt the prying eyes and meddling claws of my parents in my affairs. Some kids see their parents almost as a government or state of sorts, and romanticize the thought of breaking free from their proverbial shackles. Don’t let them feel like they have anything to hide, as before, but most of all don’t let them feel like they’re being watched. You have to stay involved to keep them safe, but being subtle and non-invasive about it can make them feel a lot more comfortable. Imagine how you might react if some government agency like the FBI showed up and started installing cameras and listening devices around your house. You would protest and act pretty rebelliously too, I would imagine. Keep in mind how you want to be seen; do you want to be the noble Jedi protecting the innocent, or the sinister Galactic Empire, destroying worlds and oppressing the masses?
Third, if it seems to be turning into a real problem, you can always enforce your rules technologically, too. Don’t use passwords on your devices; they’re often easy to guess, and if you enter them around your kids enough, they’ll know them in no time. Instead, use something they can’t fake. Namely, many popular smartphones and tablets these days have fingerprint scanners; those can’t be tricked by the press of a few buttons. For those devices that don’t have fingerprint scanners, applications often exist that can allow you to log in with other more secure means. Any device with a camera will usually have the capability of working with a facial-recognition app, and some devices have other unique password-substitutes such as knocking a rhythm on the screen or drawing a pattern with your finger. While fallible, these latter methods are much harder to guess or remember to an observer than a passcode.
Beyond this, you can secure devices against the installation of applications on their own devices by a few means. In the case of a Mac or PC, making their account a standard user account one while keeping an administrator account locked with your own credentials on the same computer will require them to ask you to install the application from your own account, giving you a chance to see it for yourself prior to installation. For Android and iOS devices, where having multiple accounts on a personal phone or tablet does not make sense, you can register your child’s account for the app store under your own, and invoke the requirement of your approval for all app purchases or downloads. This is where the above methods of keeping your own devices secure is especially important, as all this is for naught if your kids can simply get into your accounts and give “your” permission.
As a parent, keeping your kids safe can be difficult, but there are always options available to you to make the job easier. If you have questions or concerns about these types of applications, as well as the methods by which you can better protect your children, feel free to call us at RGB, or contact your local technician.
If you’ve ever thrown away or recycled an old computer, there’s a good chance you have unwittingly put your personal information at risk.
Unfortunately, in this age of digital credentials and identity theft, criminals are always on the prowl searching for more convenient ways of obtaining the information on their next victim. This problem has worsened over time, of course, as a result of the more numerous and diverse methods of spending money and saving information, especially financial information, online. From online banking to online shopping, birthdays to credit card numbers, the computers of today store more of, well, you, than ever before.
In many cases, the threat of identity theft comes from online, in the form of phishing websites, trojan horses, or company breaches. However, what many don’t seem to realize is that the computer itself often saves information to its hard drive over the course of its life, some of which can be used for nefarious purposes if discovered. Many such perpetrators will actually go digging through dumps, scrap yards, or take-it-or-leave-it areas looking for old computers and their hard drives to try and acquire this information, and an alarming number of these types are quite successful at accomplishing this goal.
So, when recycling or disposing of a computer, one of the most important steps you can take to make sure you don’t fall victim to this type of scheme is to make sure that there is nothing left to retrieve. Contrary to popular belief, files are not actually deleted when they are “deleted”. Most are still perfectly retrievable with the right tools, and only through more advanced methods can data be permanently erased. However, most perfect drive wipes take a while, and involve steps that would not be so simple. As a result, the best way is usually a more direct approach.
Damaging the drive physically can be much more effective than deleting the files virtually. Anyone who has ever lost data from dropping a laptop can vouch for just how complicated or expensive it can be to try and retrieve data from a drive that suffered a thud or ding. Ergo, something like a sledgehammer impact would obliterate the disk inside, making the data completely irretrievable. In fact, damaging the disk in any way can have the same result. Most of the time, a less messy alternative can be to drill a hole through the drive.
Whatever the case may be, so long as the drive is no longer functioning when you’re through, it should be safe to dispose of.
If you’re unsure of how to do this, or would feel more comfortable, contact us at RGB Computer Solutions or your local IT.