Perry Hall Computing offers a Total Care plan
With our Our Total Care Plan you will get
- Managed Anti-Virus software
- Unlimited free virus removals
- Reports are run every hour to check for infections, Windows services stopped, Hard Drive space and health, and other critical components
- Daily update checks for Windows and third party security updates (java, flash etc)
- Daily automated mini-tune up to keep your customer’s computers running smooth
- Sneaker ware Prevention – Automatically chooses “No” during software installation for additional software (toolbars, adware etc)
- Website Filtering – Blocks known attack sites, and other categories the customer requests such as Adult sites etc..
Only $21.00 Per month be safe , secure and have your computer running at peak performance
Since 1999 we have been offering onsite computer repair I’ve come across countless open Wifi networks. If you use a laptop or other wireless device in an urban area you’ve seen them too. Some networks are set up this way to allow others in the neighborhood to share an Internet connection (though your ISP may frown on this). Others because the person lives far enough away from anyone that they believe distance protects them from hackers or the like. After all, sometimes your Wifi signal doesn’t reach much further than the walls of the house.
The problem is that when your network is open pretty much everything you do on your computer is visible to anyone else on that network, if they know how to look for it. And, while you may not be able to see your wireless network very far beyond the borders of your home, most of the people who want to snoop on your connection have much more powerful antennas that allow them to connect over great distances. It’s also not just your data that you need to worry about. You can also be hurt by what the person connecting to your wireless does with your Internet connection.
The good news is that securing your wireless network is a fairly easy and straight forward process. The reality is that most people who want to do bad things with your wireless connection are looking for an easy score. They will likely see that your network is protected and just move on to greener pastures.
Perry Hall PC Repair Wireless Security Service Special
For Only $89 We will come to your home and secure your wireless network to keep your network activity safe from prying eyes. With an Un-secured wireless network your Banking activity, online purchase information is up for grabs
$89 is a small price to pay for peace of mind
Macs are known for their high tolerance and good security against viruses. However, every once in a while some Mac computers may develop cookies, viruses, and Trojans. Don’t panic if you do have a virus on your mac, because virus removal on Macbook is possible!
The various types of dangers
The main three types of threats to your computer’s security through using the Internet are:
Trojans are becoming more serious and common in infecting Mac computers. Trojans allow your computer’s DNS records to be modified, hijacked, infected and watched. The most serious Trojan is called a flashback and infects your computer by downloading malicious components. Flashback tricked users by disguising the installer for Adobe Flash.
What to Avoid:
– Only download Adobe Flash Player from the official site to avoid downloading a Trojan.
– Disable the “open safe files after downloading” option in preferences to avoid automatic installations of potentially dangerous programs.
Get Rid of Viruses
Getting rid of viruses is a little more complicated but still do-able. Download ClamXay for your specific Mac OS and install recent apple security updates.
With these two completely up to date, ClamXay will take you through the necessary steps if a virus is detected.
Virus removal on mac isn’t easy! If you cannot get rid of your virus or are in need of professional
Ransom ware is a variety of malware that, once it infects its host-machine, at least says it’s encrypted the data on or locked its victim’s machine in some other way. The malware then informs the infected user that he or she must pay a ransom in order to unlock their files. Of course, there is never any guarantee whatsoever that paying the ransom will unlock anything. In this case the Cryptolocker really carries out the threat, The virus encrypts files stored on local hard drives and mounted network drives using public-key cryptography, and then displays a message saying that the files will be decrypted by a 2048-bit RSA key pair if a fee is paid through an anonymous payment service by a specified deadline, beyond which decryption is no longer possible. There is no way to decrypt the key.
US-CERT issued an advisory this week warning businesses and consumers of the risks presented by CryptoLocker, which has been on the radar of security experts since late October. US-CERT said infections are on the rise and urge victims not to pay the ransom, instead report it to the FBI’s Internet Crime Complaint Center.
How the virus works – What does it steal from you? Who does it Target?
CryptoLocker installs itself to the Documents and Settings folder on your system and then proceeds to search for specific file types like Microsoft Word Docs or Adobe PDFs. It applies an asymmetric encryption which requires both a public and private key to unlock. The public key is stored in the virus itself and is used to encrypt the files. The private key is hosted on the hacker’s server.
We have noticed a high infection rate here in Baltimore County as well as the surrounding metro Baltimore area. This is serious business for these thugs and for the first time this type of attack is being considered organized crime.
How do I get it?
- As an email sent to company addresses pretending to be from customer support from FedEx, UPS, DHL, etc. The virus is attached to the email, usually labeled as a tracking number.
- In PDF documents that are attached to emails.
- Via hacked websites that can exploit computer vulnerabilities to install the infection.
- Through Trojans that pretend to be programs you need to download in order to watch videos online.
Some versions of CryptoLocker are reportedly capable of affecting not only local files but also files stored in Removable Media such as USB sticks, external hard drives, network file shares and some cloud storage services that are able to sync local folders with online storage. The US-CERT notification also warns that the malware can jump from machine to machine within a network and advises that infected users remove affected machines from their networks immediately.
Can Baltimore PC Repair remove the virus?
The techs and engineers here at Perry Hall PC Repair have had success with removing the virus but at this point it is impossible to retrieve the encrypted files so honestly the best practice is to wipe the hard drive and start over.
IMPORTANT SAFETY INFORMATION
- Beware of attachments – Always look at your attachments. If you get an email with an attachment from any sender you don’t personally know don’t open it. If you get an attachment from people you do know, but it isn’t something they would normally send, don’t open it. For all other attachments, try confirming that the file attached is in fact legitimate by asking the sender.
- Backup your data – Be sure to always backup your data on a regular basis. If you backup files on a daily or even weekly basis and are infected, you can easily wipe your hard drives and start again without losing much in the way of data.
- Know what to do if infected – If you are infected the first thing you should do is disconnect from the network to limit the chance of the virus spreading to other systems. If you have backed up your system and data, you can probably revert your system. If not, your best plan of attack would be to contact us to see if we can help, as we may be able to get around the encryption or even delete it
Even though Cyber Monday, and Black Friday may mark the high points of the holiday shopping season, but they are by no means the end of it. In a still struggling economy, with everyone searching for value, consumers will encounter technology deals that might seem too good to be true.
As reported by the Dow Jones news wire, Online shopping may well top $1 billion dollars on a single day this year. With more and more consumers willing to spend money Online, sales will rise, but so will the risk of exposure to some sort of scam or cyber-crime right alongside those fabulous deals.
So, how can you avoid being taken advantage of?
There are many ways to keep yourself, your privacy, and your money safe this holiday season. But, as the countdown to Christmas grows shorter, many of us abandon our common sense in the desperate pursuit of that one great gift or that one fantastic deal.
Therein lies the problem. The number one way to guard against Online scams is to employ some common sense.
For example, many of us will go to extreme lengths to save a few dollars. This often includes venturing off the ‘beaten path’ and looking outside the major retailers on Online auction or classified sites such as E-Bay or Craigslist, which the Better Business Bureau has cautioned against. While many of the deals offered on such sites are perfectly legitimate, the likelihood of stumbling into a scam is far greater on these sorts of sites.
If a deal seems too great, it probably is, especially if it’s from an individual user or a ‘minor’ retailer. Be suspicious of any deal or sale that you can’t believe is real. Maybe you’ve found the best buy of the season, but it’s more likely that you’ve stumbled into a scam set up to defraud you and steal your money or information.
It’s also important to remember that anyone you do business with Online knows more about Internet commerce — and its dangers — than you do.
Is to do some research about any Online vendor you’re considering making a purchase from. Some vendors believe quality customer service goes hand in hand with turning a profit.
Consumers would also be wise to investigate other forms of payment, such as Papal or Bill Me Later, a Papal service. While alternative methods may not offer the convenience of credit cards, they may provide more security against potential scams and those who know how to abuse the system.
Regardless of where and when you shop Online Be cautious
For the online shopper: understand your credit cards. Broker and other merchants like him, were able to take advantage of customers because of the rules set up by the credit cards those customers use.
With credit card purchases being the dominant form of Online shopping, it’s vital that consumers know the policies of the cards they use and what recourse they have should those policies be abused.