DKNJ Networks | Computer Repair BLOG

A NJ Computer Repair and Search Engine Optimization Company

Just upgraded from an Apple iPhone 5 to iPhone 7

It’s been a while since I posted anything on this blog so figured it would be a good time to write something because I just got the iPhone 7.  My old phone was a beat up iPhone 5 that i’ve been using for the last 3 1/2 years so it definitely got its use. Upgrading from a 5, I am blown away with what this 7 has to offer.  1st of all, my 5 didn’t have the finger print reader so I was punching in my 4 digit code every time I wanted to open the phone.  Now, all I have to do it touch the home button and instantly get access to the home screen.  I’ve seen the finger print take a few moments on a 5s and 6 but because this processor is such a beast, I am instantly authenticated.  It’s a beautiful thing.  The camera is way better than the 5.  The night pictures are pretty amazing for a phone.  Still no where near as good as a DSLR but I am not concerned about that at all. The lack of a headphone jack is a little bit of a pain but manageable.  It’s kind of how I felt when my laptop didn’t come with a dvd drive.  I was uneasy at first and then got used to it. Overall, I love this phone and will report again when I get more familiar with it. Thanks for reading!

Share

Beware of Rogue Anti-Viruses, Scareware

Rogue Anti-virus programs (also called “Scareware”) are spreading like wildfire. These programs pretend to be legitimate anti-virus programs, and lock users out their software, making the computer inoperable. They then warn that the computer is infested with viruses, and that you need to activate the program by giving them your credit card.

DON’T GIVE THEM YOUR CARD! These are fake programs created by criminals and they are likely to charge more then what they ask for. Regular anti-virus programs won’t lock you out and ask for payment to remove infections. Since the “Scareware” program, blocks users from accessing their programs, they can be a little tricky to remove if you don’t know the proper methods.

HOW TO REMOVE

There are many different Rogue Anti-virus programs, but the proper removal process is almost always the same. In order to gain control of your computer again, you must boot into “Safe Mode with Networking”.

MANUAL REMOVAL (Advanced)

1.Restart your computer. When it first turns on, repeatedly press the “f8” key, to bring up a menu. In the menu, use your keyboard to select “Safe Mode with Networking”.

2.Now that you are in safe mode, you will usually see an icon for the rogue anti virus program on the desktop. (typical names are “Spyware Protect 2009/2012, XP-Antivirus, and System Security 2012.) Don’t open it! RIGHT CLICK on the file once and goto properties. It will now show the actual location of the virus. Almost always the virus will be located in the windows “Application Data” folder.

3.Now that you know the name and location of the Rogue Virus, browse to the folder where it is located, and delete the file. Make sure to empty the recycle bin to ensure it is gone for good.

4.Next, remove the virus from the windows startup using Msconfig. For Win7 and Vista, click the start button, and in search box, type “msconfig” and press the “enter” key. For XP and older versions, click Start, then “run”, then type “msconfig” and press the “enter” key.

5.Navigate to the “Startup” tab, and deselect the scareware program from the list. If having trouble finding it, it is usually located in the “Application Data” folder, and you should be able to see it in the list.

6.Stay in msconfig, and check the “services” tab to make sure the program isn’t located in there as well.

7.Click Apply, and close msconfig. It will ask if you want to restart. Restart the computer, and the fake anti-virus program should be gone. After you reboot, update your current real anti-virus program and do a “full scan” to ensure there are not any other infections.

BASIC REMOVAL

1.Boot into “Safe Mode with Networking” using the same instructions located above.

2.Now that you are in safe mode, download and install the free program “SuperAntiSpyware”, and run a quick scan or full scan.

3.SuperAntiSpyware should pick up the virus and remove it. After the scan, the program will usually require a restart to finish the removal process.

4.If SuperAntiSpyware doesn’t do the job, try another free program called “Malwarebytes”.

5.If both programs fail to help, use the manual removal instructions located above.

Article Provided by Eugene Computer Geeks, Computer Repair Eugene Oregon

Share

Think your WIFI network is protected?

Most people assume if they have a password set on their wireless network that they are safe.  This is usually not the case.  There are three main types of security methods, and all can usually be cracked quite easily and quickly.

WEP
WEP’s are very easy to crack, and takes almost no time at all. Software can decrypt the password by observing patterns of packets collected in the air. WEP is an older password method, but is still commonly used, and it is even set as default for many new routers. Avoid WEP whenever possible.

WPA / WPA2
WPA and WPA2 is the safest method to use, but can still be cracked if the password is too short or commonly used. The attacker will “sniff” the network and get the encrypted password. They will then feed the string into a program that goes through very large password lists or guesses every combination till it finds the decrypted key. These programs can guess thousands of passwords per second, and if the cracker uses multiple computers, they can guess many combinations VERY quickly.  Make sure to make the password very robust. A good rule of thumb is to create a password that nobody else on earth is ever likely to use.

Invisible Network
This usually can easily be circumvented by using software that waits for a user to connect to the network. This then gives away the SSID or network name away.

Mac Address filtering
Mac address filtering is another method that can easily be beaten.  The attacker can spoof their MAC address to be the same as a user on your network, and trick the router into thinking they are that user.

Rogue WIFI Networks
Another thing to look out for is Rogue WIFI networks.  Hackers can easily set up a network with the same name as yours, kick you off and force you to connect to their network without your knowledge. They then strip all the browser encryption from your session, making them able to view everything, including grabbing sensitive information like passwords, credit card numbers, and banking information.  For more information on protecting yourself from rogue networks and other attacks, please check out Eugene Computer Geeks Free Tech Support Chat.

Remember, everyone is a target. It’s possible to build very sophisticated antennas that can connect from long distances. The attacker could have many reasons to break in.  Once they penetrate your network, they can usually break into other systems on your network.  Attackers can also use your network to commit crimes and cover their identity. Once they have the password, they can decrypt packets they “sniff” from the air, and see your private data.

Use WPA or WPA2 and make sure to set a long and unique password.

Share

Parting with Firefox 3.6

Firefox 3.6 is a good browser. It’s such a good browser that 20% of Mozilla clients were still using it last month, even though Mozilla recently released the 9th edition of Firefox. In fact, 82% of Firefox users were still surfing the web with Firefox 3.6 a year ago. Since that time, many users have slowly made the transition to newer versions of the browser. Some Firefox 3.6 loyalists (the 20%), however, have decided to stick with what works for them.

Users who have enjoyed Firefox 3.6 for years and are hesitant to upgrade will be disappointed that Mozilla plans to completely retire Firefox 3.6 in April of this year. This means that Mozilla will not provide any sort of support for Firefox 3.6 users, even businesses who have been loyal to the version of the browser since its 2008 release. Earlier this year, Mozilla had stated that they would continue to support the browser for business users indefinitely, but they have since changed their minds. Firefox 3.6 will soon become a browser of the past.

Many Mozilla users claim that Firefox 3.6 is the most reliable Firefox version. Versions 4, 5, 6, and 7 all had significant problems with bugs. These problems caused users to either switch back to 3.6 or switch to another browser like Chrome or Safari. Firefox 8 seemed to have fixed most of the bug issues, but some users were understandably wary about upgrading when version 8 was released. Now that Firefox 9 is available, Mozilla is working overtime to patch up bugs and make sure the reputation of its newest Firefox version stays intact.

If you are a proud Firefox 3.6 user, the time has come for you to make a decision. You can only use your favorite browser for a few more months, and then you will have to either upgrade to a new version of Firefox or try something else out. Maybe you’ll switch back to Internet Explorer or Safari. Or maybe you’ll try out Chrome. In the end, the choice is yours. Just don’t expect any browser to be able to do exactly what Firefox 3.6 did for you.

Author’s Bio: Ryan is a Blog Content Guild writer who is interested in the subjects of web browsing, CSS, and saving money.

Share

Digital Nativity – A Digital Christmas Story

The Digital Story of the Nativity tells the story of the first Christmas through the eyes of social media.

Share

iShred iPad Snowboard – Inspired by Steve Jobs and Apple

Celebrating jobs in snowboarding, Every Third Thursday presents the iShred – a Steve Jobs inspired snowboard with built in iPad and back lit logo on the bottom of the board.

Share

Office Guy Gets Angry and Smashes Computer in Cubicle

Don’t be this guy

Share

SNL Nick Burns The Computer Guy

SNL’s Nick Burns, the company’s computer guy.

Share

Laptop Fire Damage Caused by Overheating

Is your laptop overheating? Don’t let it get this bad.  Here is a picture of a laptop damaged by a fire caused by overheating.

overheating laptop, fire damage, melted laptop

Share

Web 2.0 Video in Under 5 Minutes – The Machine is Us/ing Us

The Machine is Us/ing Us – Here is a 5 minute video explaining Web 2.0

Share