Speed up a slow machine

Many people come to me, frustrated that their PC or laptop seems to have slowed down over time.

While that is a symptom of system ‘bloat’ – people don’t realize just how many programs and applications they install over time, there are measures that can be taken to add some pep to their machine.

First and foremost, if you are still using Microsoft Windows XP, and many are, as it is still a worthy, stable and useful operating system, do yourself a favor: at a convenient time, when you don’t intend to use the computer for a time, let the machine run a full defrag (short for defragmentation). Hard disk fragmentation happens naturally over time and using the defrag utility can speed up a slow machine noticeably – particularly when you have a large hard drive capacity. It could be advisable to run the CHKDSK (checkdisk) utility also. Both tools can be found by clicking My Computer, then right-clicking on the hard drive (C: drive), choose Properties, then click on the Tools tab, and there you’ll find the tools labeled: Defragmentation and Error Checking. Note, however, that  sometimes, when a machine is really dragging, that can be a sign of a failing hard drive.  Note also that in Windows Vista and Windows 7, defragmentation is conveniently automatically scheduled for periods of computer inactivity.

Second, check to see how much memory your machine has installed. The minimum system requirements specified by Microsoft are often inadequate when you consider the programs that you are running on top of the operating system – think anti-virus, among other things. A memory upgrade can be a very economical way to add life to slowing PC. Memory prices decline over time. The older the machine, the cheaper this upgrade becomes.

Lastly, consider installing an SSD hard drive. SSD refers to a Solid State Drive. SSD hard drives of the same storage technology as portable ‘flash’ or ‘thumb’ or ‘usb’ drives with higher capacities. SSD hard drive capacities have increased over time which reduce prices on lower capacity models. This can be the most expensive upgrade option, but it usually pays the highest dividend. Why? Because the most commonly used hard disk drives (HDD) have moving parts, similar to a record player (remember those?) where in order to read or write the required information, the HDD platters must spin (like the record) and a magnetic head must move (like the needle) to the appropriate area of the platter to read or write the information. If the HDD is fragmented, as mentioned above, the head has to move to multiple locations on the platter to find the required information – that really slows things down! None of this occurs with an SSD. There are no moving parts.  This upgrade can be particularly useful in a laptop because it is also far more energy efficient.

When I built my first Windows 7 machine. I originally did so using an traditional HDD. Windows 7 has a built in rating utility (the Windows Experience Index) that will indicate which parts of the machine are the slowest and rank the system on a scale of 1.0 to 7.9, with 7.9 being the fastest. My original build indicated a 2.9. The slowest part? The HDD. I quickly decided that that would not do! I installed the operating system to a newly purchased SSD and relegated my general storage to the traditional HDD. The revised speed rating of my machine? 6.6!  The slowest part now is the video adapter – I can live with that!

Again, an SSD is not an inexpensive proposition. But in terms of return on investment, replacing an older platter HDD with an SSD makes a hugely noticeable difference.

Is your computer running slow?  You may want to consider these things.

Catch Notes – for mobile devices

One of my favorite apps for Android is Catch Notes.

At the time of this posting, Catch Notes has a user rating of 4.4 with 42,705 downloads.

I use Catch in lieu of paper notes and post-its. I can’t say I’ve used all of the features, so I won’t attempt to describe them all. The features I use most often are the typed Text Notes, the Reminder notes, the Voice Notes, the Checklist notes, and the recently Sketch notes.

Catch, by default, categorizes your notes into a “Space” called “My Ideas”. If you use the app to its fullest and take a lot of notes, you can categorize your notes into different customized “Spaces”.

I used to jot notes down on any scrap of paper available and they would collect and build up in my pockets or brief case. I would try to throw them away when no longer needed. Some, I would lose. Most ended up tattered. Now, I use Catch.

The Checklist notes are aptly named and perfect for lists of any type. I use them for listing items and tools I must remember for field work. I use Checklist notes for shopping lists, for example a list of home repair items that I need to pick up from the hardware department. Before Catch, I don’t think there was a time when I didn’t forget to bring home one item or another that I intended to remember when making my pilgrimage to Lowe’s or Home Depot.

The Voice notes are perfect for when typing is not convenient or simply not an option. Tap to create a voice note and speak your note, the note is saved by date and time.

Reminder notes will pop-up a reminder message at the date and time specified.

Text notes are the standard note entered using your keypad.

Using your phones camera or photo ‘gallery’, you can also save photo notes.

The Sketch notes are the most recent addition and, in my opinion, the coolest of notes, which is why I saved this style for last. Using the touch screen, sketch, draw or write anything you’d like and save it as a note.

You can share notes using social media, collaborate with others, tag, location tag, add attachments to notes, with full search functionality.

There is one more feature that I must mention: the app is free; free with no adds! You haven’t downloaded it yet? 😉

You can find Catch Notes on Google Play. Catch is available for Android, iPhone and iPad. Learn more at Catch.com

Synology server – a robust solution for centralized, secure storage and computer backups

Synology Disk Station

Synology makes a terrific home and small business server, sometimes referred to as an NAS (network attached storage).

I have installed Synology servers at over 8 client locations and, in addition, run one myself.

The Synology server is an economical yet robust and secure piece of hardware for centralized file storage, computer backup storage and more!

I’ve recommended the Synology server to clients for many reasons. It runs on a linux platform, has an easy to use web based management system and it ships with more features than most people will use. I won’t go into all of the features here. They can be found in detail at the Synology web site. But I will go through some of what I’ve found to be the most important.

The Synology servers I employ feature a RAID disk array. What that means is that your data is replicated on two, mirrored, identical, hard disk drives. If one drive should fail, your data is safely stored on the second, for redundancy. Is that fail safe assurance that your data is safe and secure? Well no, there is still the possibility of catastrophic failure including fire, theft and natural disaster – for that reason, your Synology server can be backed up as well. But the chances of two hard drives failing at the same time are remote and the entire device is small and light enough that it can be taken with you in an emergency.

Unlike Windows (and other) servers which require license purchases per user, the Synology server’s linux operating server won’t cost you per user. While there are physical limitations to the number of users, the target consumer for this type of system will never come close to that limit.

You can utilize the Synology server as the destination repository for manual or scheduled backups of the data stored on individual PCs. Synology includes an application named Synology Data Replicator which will run attended or unattended backups scheduled when it is convenient for you. All data stored on the Synology server is password protected and secure.

You can also configure your Synology server to store shared files and folders. Your server can be configured in a workgroup or domain environment for shared, centralized, file storage and conveniently mapped as drives on your Windows workstations.

Of the many more features, your server can be configured for remote access. You can retrieve files from home or when traveling. It includes a fully functional web and email server for web and email hosting. It includes a security/surveillance application for the recording and storage of video from security cameras, which can also be viewed live and captured remotely (this feature does require the purchase of additional camera licenses as well as cameras). You can stream music, and create your own photo galleries of digital pictures.

In addition to remote access of the features mentioned above, Synology includes mobile device applications which allow the full remote access functionality right from your Apple or Android device!

This hardware is well worth considering. Call or email me for more information. I can also provide a demonstration. I haven’t even mentioned the low cost!!

Better Understanding of Malware

I have repaired many computers and have encountered most forms of malicious software. The question I am asked most often by the infected party is “How did it happen?”. After the fact, that is a very difficult thing to determine.

The term “computer virus” has become a catch-all phrase that incorporates all forms of “malware”, “spyware”, and “adware”. The thread that binds these malicious programs together is the fact that they are employed for nefarious purposes. The differences, briefly, include the “worm” which can travel from machine to machine over a network exploiting security holes in operating systems and programs, the “virus” which is self-replicating and must be executed (run – like any other program), and the “trojan horse” which, true to its name, presents itself in some friendly way, concealing malicious intent, and must also be executed.

The best way to avoid worms: keep your software and operating system up to date by installing the latest security patches, and use a firewall.

To avoid viruses: install and run a reputable antivirus program, and keep it up to date. Don’t install software if you don’t know where it came from. If it’s free, unless it was recommended by a reputable source, I avoid it. Avoid file-sharing: music and video are commonly shared files and often the source is unknown. Avoid opening email attachments where the file ends in “.exe”, “.zip”, “.bat”, “.com”, “.vbs”, “.scr” to name a few (make sure “Hide extensions for know file types” is unchecked in Windows Folder Options, under View). Be careful of Microsoft Office files that contain “macros” – again, know the source.

To avoid Trojan Horses: remember ‘”all that glitters is not gold”, know what types of alerts are legitimate Windows alerts and know the legitimate alerts from your particular anti-virus program. Also, follow the steps for avoiding viruses.

With regard to email messages, don’t fall for messages that try to create a sense of urgency with statements like “Your account has been compromised” or “Your account information has been stolen”. These email messages generally provide a link where you can “log in” to correct the situation. In reality, these emails are cover for a “phishing” scheme where you are lead to a phony web page, created to look incredibly realistic. Once you enter your log in credentials – you’ve just given the schemer all he/she needs to know: that you have an account at Bank of America/Wachovia/TD Bank, that your user name is XYZ and your password is 1234.

Look closely at the link contained in the message. Generally, a user friendly address is provided indicating ‘bankofamerica.com/login’ when the address behind the link is along the lines of ‘bankofamerica.iwillgetyou.com/login’. As you should be suspicious of strangers at your door, or telemarketers asking questions like ‘what’s your street address?’ and ‘What kind of security system do you have?’, you should also be suspicious of an email telling you that your account has been compromised and providing a link for you to ‘log in’. If you are unsure, log on to your account by typing the actual web site address yourself, or by using the link saved to your “favorites” – or call the company in question and ask if they sent out an alert. Most companies will tell you that they would never send out an email of that nature and would instead suspend your account until you reinstate it. By the way – Microsoft will never contact you by email to let you know that there’s an update you need to install.

Recently, I received a call from someone who was very alarmed by what she was seeing on her computer screen. Apparently, there were pop-ups and messages indicating the presence of “viruses” and “trojans”. Not knowing whether those pop-ups were legitimate or not, I suggested that she simply power off the computer. She did better than that! She put it into standby which enabled me to later pick up right where she left off. Because of that, I was able to document a trojan attack attempt. I detailed it in the hopes that it will help you guard yourself against similar attempts. Visit the next page if you’d like to see a malware attack in progress.


Further Information / Reading:

Malware

Computer Virus

Spyware

Adware

Trojan Horse

Rootkit

Phishing


If you have any questions about what you’ve read, or have similar experiences to share, please don’t hesitate to drop me an email.

Computer and email security has really come a long way.

Like water, which will take the path of least resistance, most cyber criminals gear their efforts toward taking advantage of the human element rather than trying to break through software and hardware security. That aspect of computer security is referred to as “social engineering”. It is much easier to trick the computer user (you) than it is to thwart, crack or ‘hack’ computers.

How is this done?

You probably see it all the time. I know I do. Any email sender can ‘spoof’ the sender information. In United States Postal Service (snail mail) terms, it is as easy as my sending you a letter and putting someone else’s return address on it. The spam emails that I see regularly have return addresses from major banks, the IRS, the Better Business Bureau, UPS, and many, many more. You get the idea: mostly familiar names; senders who might pique your curiosity: “Hmm, I didn’t order anything from XYZ company lately, what might this be?”. “Or, Oh no, why does the IRS say I owe them money?”

If you receive messages such as this, often times you can simply disregard and delete them. Sometimes they are too coincidental, perhaps coinciding with a recent purchase or transaction. Opening the message itself rarely presents the problem. Most of the actual infections occur with message attachments. Often times, the attachments take the form of a PDF, or a ZIP file.

That makes protecting yourself much easier doesn’t it? If the message seems suspicious, and it contains no useful information but has an attachment, don’t open the attachment.

Think about it: How did the IRS get your email address? If you do owe them money, do you really think they’d send you an email? Wouldn’t they call? I laugh to myself when I receive a message from a bank with which I do not do business.

Please remember to remain on guard with respect to email messages. If you do not know the sender, or if it seems odd that you would be receiving a message from a particular sender, or with a particular message, it is probably spam. Always be particularly suspicious if the email contains an attachment.

No email spam filter is perfect; spammers are always trying to find ways through corporate defenses. Remain vigilant and, as always, if there is a question, don’t hesitate to contact me.

iPods and iPads can be repaired!

In addition to desktop computers and laptops, I also repair tablets and small devices including iPods and iPhones.  If you have a cracked screen, buttons that no longer function, or a dead battery, you don’t necessarily have to think in terms of replacement; your device may be repairable.  I am happy to offer my opinion.

Malware attack in progress

If you’ve reached this page, you received my email about a recent web browsing experience that led to a mailicous attacker attempting to dupe me into installing a trojan on my PC.

Read below to follow the series of events. You’ll know how to avoid the situation yourself, should it arise.

Click any of the images below for a larger version

1) After innocently clicking a link to a desired web site, I was redirected to a url at http://extra-security-scanv.com.

The first thing that appeared was a (JavaScript) pop-up alert: “Warning!!! Your PC needs to install antimalware software! Antivir can perform fast and free scan of your computer .” [sic]

Trojan attack image 1

I clicked the ‘Cancel’ button, but nevertheless, was redirected to another web page.

2) The subsequent page was designed to look just like a Windows (XP) Explorer Window – ‘My Computer’. Notice, however, that it appears within the browser window – in this case Firefox.

Notice the warning in red: “All information on this PC can be stolen” and the text in the red box – “Your Computer is Infected”

Looks very convincing doesn’t it?

Trojan attack image 2

Just look at all those problems that this scan picked up: 97 trojans in my ‘Shared Documents’ folder, 334 in ‘My Documents’, 353 on the C: drive and even 78 on the D: drive!

4) After attempting to close the tab, another JavaScript alert pops up stating: “This computer is under attack They can seriously harm your private data or files, and should be healed immediately.Return to Antvir and download it secure to your PC” [sic].

Trojan attack image 3

Again, I clicked cancel and was redirected to yet another page:

5) This time, mind you still caught in a craftily constructed, malicious, web page, a very authentic looking Windows Security Center window complete with a red “X” in the corner to close the window!

Trojan attack image 4

6) Now here’s the ‘gotcha’. Clicking that security center window initiates the download of Setup_2001-15.exe – the real threat.

Trojan attack image 5

The only time my computer was in any real danger, was when the final popup prompted me to download and install the Setup_2001-15.exe file. That would have been the point of infection and that, my friends, is why this type of attack is referred to as a ‘trojan horse’. It is an attack that is meant to trick you into inviting your very foe inside your (fire)walled and protected city. In essence, I would have infected the machine myself.

At this critical point – simply cancel the download. That’s right, click the ‘Cancel’ button. In fact, if you encounter a similar scenario, keep clicking the ‘Cancel’ button, no matter how many popups appear. At the first opportune moment, close your browser window, then clear your cache (Temporary Internet Files). For those of you with experience using the ‘Task Manager’, use it to end the task.

Keep your cool. Don’t be alarmed by the ‘red alerts’, and the overwhelming number of ‘threats’ found on your computer. All you are seeing is an animated web page deceptively trying to fool you into installing malicious software.


If you have any questions about what you’ve read, or have similar experiences to share, please don’t hesitate to drop me an email.