Geek Squeak #17-020: An Advanced Users’ Malware Killer

June 6, 2017

Curious if any of the folks out there with technical expertise have ever used RogueKiller? I typically go to Malwarebytes AntiMalware; however, I see RogueKiller has pretty darn good reviews.  The main point that jumps out at me is that RogueKiller is for advanced users (see video below)…

Roguekiller is a popular and an effective tool to remove some stubborn malware but be warned; you better know what you’re doing. While a lot of more well-known tools will only scan and delete for you, this tool will show you everything it finds that is a possible problem. You need to know what to remove and what not to remove, or you could delete something you want, or need. Your results may vary, but just use caution and do your homework before removing anything or ask someone who is computer savvy.

SOURCE: Major Geeks -RogueKiller 12.11.1.0


Thank You For Visiting

MAKE SURE YOU ALSO VISIT

Main Page

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Deals  –  Archives (of all articles)


Leave A Comment


These 7 Tips (from Kim Komando) Will Help You Master Facebook

May 27, 2017

I love Kim Komando’s tech column at USAToday and find her posted information very useful and on the same parallel to my blog when it comes to assisting home-based computer users.

Kim recently posted an article, “These 7 tips will help you master Facebook” that you should read, if you are an advocate of Facebook. In all honesty, I do not care for Facebook; however, I do care about the safety and security of people (which has been my lifelong profession as a law enforcement (and security) officer and computer info specialist).

The one tip that Kim posted in this article that jumps out at me, in regards to your safety and security, is the tip “Find out where you are logged in”… Many Facebook users (carelessly) log into multiple devices, often at multiple locations, and keep their Facebook pages open in order to “conveniently” access their account without having to log in. The upside to this is user convenience; however, the downside to this is you are setting yourself up to have your account compromised, which could result in devastating consequences.

To see if your account is open on other devices and locations, here is how (as Kim Komando pointed out) to determine that:

Just to go to Settings >> Security Settings >> Where You’re Logged In, and you’ll find a list of devices that are currently accessing your Facebook account. The feature also lists login metadata, such as when and where you last checked in, plus the type of device you used. Keep in mind that cell phones sometimes show weird locations, which may refer to a cell phone tower and not necessarily to where you were standing at the time.

Facebook

That said, if your login information looks a little fishy, it’s possible your account has been compromised. It’s best to lock down access before this even happens.

Kim Komando is a consumer tech columnist for USA TODAY. She also hosts the nation’s largest radio show about the digital lifestyle, heard on 435 stations in the USA and globally on American Forces Radio. Find your local radio station, get the podcast and more at Komando.com.

SOURCE: USAToday – Kim Komando


Thank You For Visiting

MAKE SURE YOU ALSO VISIT

Main Page

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Deals  –  Archives (of all articles)


Leave A Comment


Microsoft Patches MS-Word Exploit That Spreads Malware

April 12, 2017

On the same day Microsoft officially began rolling out the Creators Update for Windows 10, they were also rolling out a patch for a zero-day exploit (that spreads malware) for all current Microsoft Office versions used on every Windows operating system (including the latest Office 2016 running on Windows 10). If you are running Microsoft Office at home, make sure you have installed the patch. To learn more, click on the source link below…

All versions of Office on all versions of Windows are vulnerable to this zero-day that spreads malware, so make sure you patch quickly

Source: Microsoft patches Word zero-day booby-trap exploit – Naked Security


Was Informed That A New Version Of Malwarebytes Has Been Released

April 4, 2017

In discussion with a computer geek friend of mine he indicated that Malwarebytes has a new version out (v3.0). I further confirmed this and learned that a new version was released on and about March 20, 2017. Based on what I am reading on their blog (for this release) — CLICK HERE — the excitement over this release is that it is being touted as a next generation anti-virus replacement and will be called only Malwarebytes.

Once you download and install you will be entitled to a 14 day free trial. If you desire to revert to the FREE edition now and turn “off” the free trial, simply click on the “settings” (at the left side) and then click on “my accounts”, then turn off the trial under “subscription details”. If you decide to stick with the free edition, you will need to periodically perform the scans manually.

Malwarebytes is one of the first things I install on a new computer and is my “go to” tool when helping others eradicate malware and other exploits…

This product is built to provide comprehensive protection against today’s threat landscape so that you can finally replace your traditional antivirus.

Our engineers have spent the last year building this product from the ground up and have combined our Anti-Malware, Anti-Exploit, Anti-Ransomware, Website Protection, and Remediation technologies all into a single product which we simply call “Malwarebytes.” And it scans your computer 4 times faster!

mb3

With the combination of our Anti-Malware ($24.95), Anti-Exploit ($24.95) and Anti-Ransomware (free, beta) technologies, we will be selling Malwarebytes 3.0 at $39.99 per computer per year, 20% less than our previous products combined and 33% less than an average traditional antivirus. But don’t worry, if you are an existing customer with an active subscription or a lifetime license to Malwarebytes Anti-Malware, you will keep your existing price and get a free upgrade to Malwarebytes 3.0. If you have both an Anti-Malware and an Anti-Exploit subscription, we will upgrade you to a single subscription to Malwarebytes 3.0, reduce your subscription price and add more licenses to your subscription.

Source: Malwarebytes


Top 10 Best Sellers – Antivirus and Security Software

March 17, 2017

Antivirus software, now often referred to as security (suite) software, due to the innumerable threats, come in a variety of different brands. To get an idea, check out the top ten sellers at Amazon (see source links below).

I personally use a FREE antivirus program called Bitdefender Antivirus Free Edition; however, you may feel more comfortable using one of the paid commercial versions such as reflected below.

Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.[2] Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks. [source: Wikipedia]

#1: Norton Security Deluxe 5 Device PC/Mac

#2: McAfee 2017 Total Protection – 5 Devices [Online Code]

#3: Norton Security Premium – 10 Devices [Download Code]

#4: Norton Security Deluxe – 3 Devices [Download Code]

#5: Kaspersky Internet Security 2017 | 1 Device | 1 Year | Download [Online Code]

#6: Norton Security Standard – 1 Device [Download Code]

#7: Norton Security Deluxe – 5 Devices [Key Card]

#8: McAfee 2017 Total Protection-5 Devices [Key Code]

#9: Webroot Internet Security Complete 2017 | 5 Devices | 1 Year | PC [Download]

#10: Webroot Antivirus 2017 | 3 Devices | 1 Year | PC [Download]


A TIP To Protect Privacy (When sending email to multiple recipients, use “Bcc”.)

March 13, 2017

The article reflected below I have posted several times since its’ original posting (back in 2010). What prompted me to dust this off and bring it back out of the archives is that today I received a local government generated email to advise recipients of other government agencies of an impending snowstorm.  What caught my attention was that as this email was sent to a very large body of people.  I was able to see every name and email address to folks I am guessing would not want their email address and name made that public. As this email get’s forwarded, more and more email addresses will be revealed. To protect the privacy of others, it is best practice to use “Bcc” when sending email to multiple recipients.

Bcc = Blind Carbon Copy

Did you know that if you use the Bcc field in your email client to address and send an email or want to send a copy of an email to multiple users, the recipients will not see whom you sent the email to?

Many know this trick; however, I still find that many do not. When using the Bcc field to send your emails, the people receiving the email will not know who the other recipients are. It is not a trick of hidden magic. It is that the addresses of the other recipients are simply not shared.

I often receive forwarded chain emails; usually consisting of jokes, humorous movies, prayer requests, etc… Occasionally I will find one these emails humorous or important enough that I will pass it on; HOWEVER, prior to doing this I perform some housecleaning steps.

I will remove any “FWD” text (usually in the subject line) and will remove any email addresses I find in the body of the email that reflects the email addresses of recipients who have already received the email. After performing these housecleaning steps, I will enter into the the Bcc field, in my email client, the recipient’s email addresses, from my address book, to send (or forward) the email. If the email client requires at least one entry in the “To” field, I simply enter my own email address.

The benefits of using the Bcc field is simply this. You are protecting the privacy of other people. Currently I have approximately (5)-five email accounts that I use for specific purposes, from a variety of email services, with one of those accounts being my primary email account. I am very protective of that primary email account address and do not want it thrown about for the spammers to get hold of or for strangers to see. For example, I have found people’s email addresses in forwarded emails that I know and have not seen for years. They are very surprised when I contact them; and, will often ask, “How did you get my email?”. I explain that I simply pulled it from a forwarded email.

Be courteous to others and learn to use the Bcc field in your email; AND, when possible avoid chain emails all together.


Did you know that Google knows almost everything that you do on their services?

March 11, 2017

You need to see this article that Phandroid has posted (see source link below) that will show you what Google knows about you, how this information is collected, where you can find this information and how you can opt out. Google collects this information, as a form of profiling, in order to better improve their products and services.

You may have already opted out of this collection of information; but, my guess is, you did not.

Did you know that Google knows almost everything that you do on their services? Find out what they know and how you can do something about it.

Source: Here is everything Google knows about you