Monday, March 21, 2011

This post will be the start of 12 ways to Avoid viruses

Here at the shop we get asked alot "how do I get these viruses?"

Well Chris and I came up with a list that will alot of people out.
so, here we go!!!

1. You know not to except email attachments from people that you do not know, but most viruses are spread from contacts that you DO know. Avoid “chain” emails from friends. Do you have a friend that sends you jokes, inspirational emails, “look at this video?” Where did your friend get the email from before they sent it to you? Ask your contacts not to send you these or simply do not open and delete them.

2. Avoid email scam artists and spammers: Many scam artists send email that may look like it’s from an institution that you know, but is not. Pay attention to the reply address. For example, someone from Bank of America would have an email that ends with @bankofamerica.com…a scammer might use @bank-of-america.com or @security-bankofamerica.com. Your best bet is to not reply by email and call your institution by phone or, at the very least, go directly to their website. Do not follow (click) any links from an email claiming to be a company that you know, especially one that handles your finances. If it’s not an attempt to steal your money, then it is likely an attempt to hijack your computer…and then steal your money.

3. Avoid using “file sharing” sites or torrent programs like Limewire, Kazaa, Morpheus, etc. These resources are cesspools for viruses. Households with kids or teenagers are most at risk as they tend to look for songs, video games, ringtones and other things they cannot afford to pay for. It’s never free. You will pay a much higher price for computer repairs then you will to buy a CD at the store or legitimate download.

4. Stay away from “risqué” websites, such as gambling, pornography, free torrents, or anything of an adult or illegal nature. If this is your purpose for using a computer/Internet you are destined to pay for repairs. Also be weary of websites that offer you sales and deals that are ‘too good to be true.’

5. Be careful of external media such as CDs, DVDs, thumbdrives, external hardrives, even digital cameras and ipods..unless it is yours and you are absolutely certain that they are safe. Have you ever seen those digital picture frames at Wallmart that you upload your images to and then hang on your wall? Recently a virus, missed by the manufacturer, was found on a line of those products. Of course, something like that is unlikely, but it just goes to show, there are threats EVERYWHERE.

6. AVG and other virus protection programs have capabilities that will help you when you use a search engine like Google. You will see a green check-mark (meaning safe) next to each link or a warning that the site may be dangerous. Look for and heed these warnings.

7. Windows Users: If you’re ever in a situation on the Internet where something questionable pops up on your screen, immediately hit control+alt+delete, go to the “task manager” and find the “applications” tab (usually it will already be selected), highlight your browser application (ie Internet Explorer, Firefox) and then hit the button marked “end task” (near the bottom). While you want to do this quickly, don’t feel rushed, get it right. Hopefully it wasn’t a real threat but, if you're lucky, you will end the process before anything bad can happen..this is your best response at that moment. Wait a minute or two and see if there is any odd behavior. If there is, turn off the computer and consult a technician. IMPORTANT: Today’s browsers are made by default to open the last page visited. Your browser likely has an option to turn this feature off. We recommend doing this. Use the ‘help’ option of your browser or visit the developer’s website to learn how to achieve this.
Suggestion: Open your web browser and practice using control+alt+delete to end the process before a problem happens. This way, if a situation arises, you will be prepared.

8. Viruses for Apple/Macintosh are heavily on the rise. Don’t think because you use a Mac that you are completely safe on the internet. The same goes for Linux users. Although Linux viruses are very unlikely, Windows/Mac viruses can still be stored in a file on a Linux machine and inadvertently transferred to your other machines by way of external device. Use the same caution as if you were on Windows. You have nothing to loose by practicing safety.

9. When it comes to computers, treat your friends as strangers. Don’t allow friends or family members to run external media (thumbnails, CDs, SOFTWARE PROGRAMS) on your machine. Even if not a virus, everyone’s machine is their own personal space, why put yours at risk? If your friends have pictures, music, or videos to show you, look at it on their machine or on Youtube.

10. If you are on a business network and use “shared files” or perhaps FTP transfers, be careful. Just open what you need to. In the event of a virus or malware, it is a lot easier for a technician to investigate the source when the user knows exactly what might have caused the problem.

11. If you download a file, before you open it, right-click on that file and choose to scan it first with your virus protection software. If you are downloading music or other media from a questionable source, be weary of zip or compressed files. These are often used in an attempt to avoid detection.

12. AVOID THE FAKE REMODY: Once you have a virus or malware, you may get prompts conveniently directing you to that special virus removal tool on the internet that you can download for a certain price. This is a scam! Don’t buy it! The truth is that the virus you currently have was likely repackaged by a scam artist that DIDN’T CREATE IT…and doesn’t know how to remove it either. They just put their Paypal address on it and will scam you out of your money. Many viruses are designed to make your legitimate Norton, AVG or whatever removal program you use ineffective so that you will feel desperate and look for another remedy..got it?

One other bonus note, if you think you’ve gotten a virus, DO NOT use the Windows System Restore (to an earlier date) Function. A virus is a program and the restore function does not remove programs. By using System Restore, you will likely cause other mistakes in configuration and/or make it more difficult to remove the problem.

Sunday, August 15, 2010

Ok, its going to happen

In my last blog I said I was waiting my turn to up a business downtown. Well, it’s my turn. I am going to sub lease from a business that will give JP Computer Consulting the best visibility I could ask for. My sign is the works right now. In other news we just started airing our commercial on Kick 103.3. We are doing all HS football, Tarheels and Panthers..Looking forward to what that might bring us.

Sunday, August 1, 2010

The waiting game.

As I wait for my turn to open my own store in Downtown Lenoir NC I wonder to myself. Is this really the next step in owning my own company.

A few things that make me go HMMMM!!
There are a few downtown store fronts that have not been rented in years, but they don't want to budge on what they want for rent. I don't understand. Would you rather have 500.00 a month or nothing? In this case nothing. I know you are asking 700.00, but that number doesn't make sense. I still don't get it.

Another thing, why doesn't the City help new businesses that want to open something up. Instead they would rather collect tax money from folks that doesn't even live here and watch the building go to HELL.

I think its time to MAKE A CHANGE!!!

Saturday, March 13, 2010

Cloud Computer Really Safe

Stormy weather could be on the horizon for cloud computing as security experts warn not enough is being done to make sure one of the hottest IT trends is safe.

"There are many motivations for why an individual or a company would want to engage in cloud computing," said Thomas Parenty, managing director of Parenty Consulting, a Hong Kong-based information security consulting firm. "None of them have to do with enhanced security."

Friday, March 12, 2010

Woogle

Check out how google fiber would change my biz model if we got it.
http://www.youtube.com/group/hickorylenoir#p/a/46/G2vAov8kj1U

Friday, March 5, 2010

SLOB movement

Come and join the SLOB movement.

http://www.facebook.com/#!/group.php?gid=329498782363

Sunday, January 31, 2010

check this link out...

Please give us feedback on what you all thing

http://www.jpcomputerconsulting.com/caldwell-computer-service.php