When it comes to processors or CPU’s, you have one of two manufacturers to choose from: AMD and Intel. These companies make virtually all of the world’s desktop PC CPUs, but that’s where the similarities between the two firms end, for the most part. So, should you go for an AMD or Intel CPU when building your PC?
Here, we will delve into the differences between Intel’s and AMD’s CPU offerings, which will help you make an educated decision when it comes to purchasing a new computer.
There’s no real “right” answer when you’re trying to decide whether you should go for an AMD or Intel processor.
The Intel Line up begins with the I3 processor. The computers that are based upon this processor are for everyday use and casual gaming such as apps on Facebook, and sites like Pogo.com. The AMD counterpart to this would be the A6 processor.
Next up we have the Intel’s i5 processor based computers. These units are good for watching movies, creating and sharing home movies through programs like Movie Maker. The AMD counterpart is the A8 processor.
The next two are the high performance gaming machines The Intel i7 and the AMD A10. The computers based upon these processors pack a serious computing punch and look to pay for that performance.
The price difference at this level of performance for a laptop based on the AMD A10 processor vs the Intel i7 can be as much as $400-$500 for essentially the same performance.
For an everyday user who does more that checking email, updating their various social media pages I would recommend the AMDA8/Intel i5 processor, however, If you just check email, log into banking to pay bills and check Facebook etc. The i3/ A6 series processors will do you just fine.
Macs are known for their high tolerance and good security against viruses. However, every once in a while some Mac computers may develop cookies, viruses, and Trojans. Don’t panic if you do have a virus on your mac, because virus removal on Macbook is possible!
The various types of dangers
The main three types of threats to your computer’s security through using the Internet are:
Trojans are becoming more serious and common in infecting Mac computers. Trojans allow your computer’s DNS records to be modified, hijacked, infected and watched. The most serious Trojan is called a flashback and infects your computer by downloading malicious components. Flashback tricked users by disguising the installer for Adobe Flash.
What to Avoid:
– Only download Adobe Flash Player from the official site to avoid downloading a Trojan.
– Disable the “open safe files after downloading” option in preferences to avoid automatic installations of potentially dangerous programs.
Get Rid of Viruses
Getting rid of viruses is a little more complicated but still do-able. Download ClamXay for your specific Mac OS and install recent apple security updates.
With these two completely up to date, ClamXay will take you through the necessary steps if a virus is detected.
Virus removal on mac isn’t easy! If you cannot get rid of your virus or are in need of professional
Ransom ware is a variety of malware that, once it infects its host-machine, at least says it’s encrypted the data on or locked its victim’s machine in some other way. The malware then informs the infected user that he or she must pay a ransom in order to unlock their files. Of course, there is never any guarantee whatsoever that paying the ransom will unlock anything. In this case the Cryptolocker really carries out the threat, The virus encrypts files stored on local hard drives and mounted network drives using public-key cryptography, and then displays a message saying that the files will be decrypted by a 2048-bit RSA key pair if a fee is paid through an anonymous payment service by a specified deadline, beyond which decryption is no longer possible. There is no way to decrypt the key.
US-CERT issued an advisory this week warning businesses and consumers of the risks presented by CryptoLocker, which has been on the radar of security experts since late October. US-CERT said infections are on the rise and urge victims not to pay the ransom, instead report it to the FBI’s Internet Crime Complaint Center.
How the virus works – What does it steal from you? Who does it Target?
CryptoLocker installs itself to the Documents and Settings folder on your system and then proceeds to search for specific file types like Microsoft Word Docs or Adobe PDFs. It applies an asymmetric encryption which requires both a public and private key to unlock. The public key is stored in the virus itself and is used to encrypt the files. The private key is hosted on the hacker’s server.
We have noticed a high infection rate here in Baltimore County as well as the surrounding metro Baltimore area. This is serious business for these thugs and for the first time this type of attack is being considered organized crime.
How do I get it?
- As an email sent to company addresses pretending to be from customer support from FedEx, UPS, DHL, etc. The virus is attached to the email, usually labeled as a tracking number.
- In PDF documents that are attached to emails.
- Via hacked websites that can exploit computer vulnerabilities to install the infection.
- Through Trojans that pretend to be programs you need to download in order to watch videos online.
Some versions of CryptoLocker are reportedly capable of affecting not only local files but also files stored in Removable Media such as USB sticks, external hard drives, network file shares and some cloud storage services that are able to sync local folders with online storage. The US-CERT notification also warns that the malware can jump from machine to machine within a network and advises that infected users remove affected machines from their networks immediately.
Can Baltimore PC Repair remove the virus?
The techs and engineers here at Perry Hall PC Repair have had success with removing the virus but at this point it is impossible to retrieve the encrypted files so honestly the best practice is to wipe the hard drive and start over.
IMPORTANT SAFETY INFORMATION
- Beware of attachments – Always look at your attachments. If you get an email with an attachment from any sender you don’t personally know don’t open it. If you get an attachment from people you do know, but it isn’t something they would normally send, don’t open it. For all other attachments, try confirming that the file attached is in fact legitimate by asking the sender.
- Backup your data – Be sure to always backup your data on a regular basis. If you backup files on a daily or even weekly basis and are infected, you can easily wipe your hard drives and start again without losing much in the way of data.
- Know what to do if infected – If you are infected the first thing you should do is disconnect from the network to limit the chance of the virus spreading to other systems. If you have backed up your system and data, you can probably revert your system. If not, your best plan of attack would be to contact us to see if we can help, as we may be able to get around the encryption or even delete it
Well it is almost holiday shopping season. During this period; many people opt to online for doing a good majority of their Christmas shopping. Virus hijackers like to take advantage of the extra online traffic by writing new virus code and infecting thousands of sites in order to get their malware out into the wild. We see it happen year after year. One of the most aggressive of these infections is ransom ware called the FBI virus. This virus is brutal once it gets into your system. Depending on how long it stays in your system, your computer can be locked down sometimes even in safe mode with no easy way to get into your operating system. The fake screen that pops up looks very real and can be intimidating for many people. Essentially the virus lets you believe that you are committing a violation and you need to pay $200.00. The money is usually requested to be made as a money pak from Walgreen’s or Wal Mart. As real as it may appear, it is a fake program. Do Not Pay the $200.00 as the screen will still remain on your computer and the virus will still be there.
One of the worst aspects of the FBI virus is that it is almost never stopped by anti-virus software. It appears to be most common with video sites and X rated websites.
In addition we have seen an increase in exe hijackers and the system restore virus that actually changes the configuration of your files so that you think they have been erased. These virus variants are a bit easier to remove but registry fixes often have to be implemented in order to get the machine back to a normal state. Most of these virus attacks will take several steps to completely remove. It can almost never be done just by a simple scan from your anti-virus program.
Connected PC Solutions – Local Perry Hall Computer Repair
Mevvo protects your precious files by keeping a copy safely online. It’s hassle-free, easy-to-install, completely secure – and backs up your entire PC or Mac, no matter how many files you’ve got! Keep your files safe!
Mevvo works quietly in the background to protect your files as you use your computer. You don’t need any technical knowledge, and it backs up all of your files – no matter how many you’ve got. You can restore your files at any time with one click. View your files anywhere.
Once you’ve backed up your files with Mevvo you can view them from anywhere – from any web browser, or from your mobile and tablet. You can view your photos and documents, and even listen to your music and watch your movies, wherever you are. Complete peace of mind.
With Mevvo you can be sure your files are safe and secure. We keep multiple copies of your files, so you can get to them at any time, and we encrypt them with military-grade encryption, so that they’re completely private. If you need help at any time our outstanding support comes free!
We at Perry Hall PC Repair love the ease of us and the affordable pricing for secure online back up. In fact not only is it in use at our shop backing up our business files, We also use it on our home pc’s to back up the kids school work, and other important documents, Pictures and music files!