Windows 8 What happened to safe mode??

Windows 8 has proven to be an issue for PC Techs like my self that depend on safe mode to clean a computer of the traces of viruses and other malware and spyware that will not come off during a normal mode scan. Its also necessary to fix a PC that will not boot to normal mode.  Microsoft Decided that it was better to decrease boot time and take out the ability to choose safe mode from the boot screen.  After some research We have found a way to put safe mode back into windows using the following steps. 1…

Virus Issues Continued

The other day a customer came into our store and complained that we sold her anti-virus software and she still got infected.  Please understand that while most anti-virus products are between 85% and 99% effective, they will not guarantee you won’t get a virus.  When doing our cleanup of computers, many times we use multiple anti-virus products to detect infections as well as multiple spyware products. So, even f you have A/V software, you still have to be careful what you do and where you go on the internet. So, please be careful.

BUGS

Last week, we talked about computer viruses, general the most physically destructive attack on a computer. Viruses and other bugs are the main reason people see us for Las Vegas computer repair.  Other bugs want your personal information, such as credit card #’s, social security #’s, etc., and still others want to have control of your computer to harm other computers or networks. Programs and their updates can also include software bugs.  If you find that programs don’t work the way they’re intended and need a patch or update to fix the issue, you might have a bug. Now for…

What is a Computer Virus?

A computer virus is a self- replicating computer program that can spread (like a cold virus spreads from person to person) to one or many, many other computers. A computer virus can damage or erase data, programs and your entire hard drive. How are viruses spread? It can mine your email program and contact list to spread to many other computers. Be very cautious of attachments you receive that you are not expecting or from persons you don’t know. A virus can also be spread by the simple act of previewing an email. A virus can also spread from a USB…

The Anatomy of a Recovery from a Disaster

Now, we hope all our readers have been paying attention when we preach backup, backup, backup.  However, there does come a time that your computer might need a wipe and reinstall to clean it completely of viruses, malware and other damaging items on your computer. So, here is what you need to do: Find your Windows disk (oh, they didn’t tell you at the big box store that your computer didn’t come with a copy of windows –would have increased the price by $10, cheap when you need it); Confirm you have a valid Windows Product Key; You then go…

PASSWORDS. HOW SECURE ARE THEY, REALLY?

We all have online passwords to protect us.  But, with password cracking software freely available on the Internet as well as even more sophisticated software available to hackers (both black hat and white hat), your personal and confidential information may be susceptible to unauthorized access if that’s your only method of security. You may notice that some websites require an authentication code AND a password.  Banks and other companies that want that extra layer of security use these methods as well as other companies that want to keep their client information unavailable to outside access.  This is called Two-factor authentication,…

Holes in Security of Videoconferencing Systems Make Meetings Rooms Vulnerable

Is it 1984 all over again?  But this time it’s the hackers watching you, not the government… The New York Times  

SECURITY

Usually when I talk to clients about security and keeping safe online, the focus is about strong passwords, safe web surfing, good anti-virus protection and backup, backup, backup. However, a recent experience with a client suggests than many of you aren’t aware about securing the data on your computers, such as confidential employee information or financial records. What happen if a hacker gets access to your computer and steals this data? What happens if you suffer identity theft or your business becomes involved in a lawsuit when you suffer the loss of customer records including social security numbers, credit card…

New Location!

Las Vegas, NV (September 18, 2011) – Computer Troubleshooters Las Vegas (CTLV), the award-winning local franchise of the global IT services firm has moved to a new location at 7795 West Sahara in the Sahara-Buffalo Business Park.  The move marks the expansion of the Las Vegas company offering a broad range of IT services to the small business and residential customer. “Moving to our new space offers our customers a retail location should they want to stop by and discuss their computer or phone needs,” said Jeff Berg, president of Computer Troubleshooters Las Vegas.  ”We will also have space to…

Tame Your Inbox

Once upon a time we managed our lives and ran our businesses without email. In the 1960s and 1970s, email existed as a text-only messaging system for people connected to the same mainframe computer. Today, nearly every teenager has an email address and it is now viewed as a ‘mission critical application’ in most businesses. Now we’re struggling with email overload. We’re receiving newsletters, defending ourselves from unsolicited commercial email (spam) and email viruses and sifting through work requests from clients in amongst jokes and recipes from friends. This month we look at how to tame the constant flow of…