Kaspersky’s Antivirus For FREE Soon Rolling Out

I have known Kaspersky’s Antivirus to be one of the best when it comes to computer security (however, at a price — not FREE). Soon you will be able to get a baseline version of Kaspersky’s Antivirus for FREE. This new development by Kaspersky’s (according to ZDNet) is apparently in light of the U.S. Government removing Kaspersky Lab from two lists of approved vendors used by government agencies to purchase technology equipment. Apparently, this is amid concerns the Russian-based company’s products could be used by the Kremlin to gain entry into United States networks.

The removal of Kapersky’s from the vendors list follows the accusations from US intelligence agencies that Russia hacked into Democratic Party emails, thus helping Donald Trump to election victory, despite President Vladimir Putin proclaiming his country has never engaged in hacking activities, but some “patriotic” individuals may have.

Ok, now that you have digested this, is it safe to install the free version of Kaspersky’s on our home-based computer systems? Personally, I am not installing it and will stick to the free version of BitDefender; however, if you are interested in the FREE version, click on the source link below to monitor for its’ release. Reportedly, the free version will rollout to the U.S. first…

If you do opt to give this a try, make sure you remove (uninstall) any antivirus software that is currently existing on your computer. Typically, to remove antivirus software, it is best practices to visit the website of the product and look for an uninstaller that will completely and safely remove the antivirus software from your PC.

SOURCE: Kaspersky’s Antivirus FREE

 

Malwarebytes Labs Explain The “Dark Web” AKA: “Deep Web”

I encourage you visit the source link below to learn about the “Dark Web” (aka: Deep Web). Did you know that only 5% of the Web is easily accessible to the general public and that many other sites can only be visited if you have a direct URL. I often referred to the “Dark Web” here on the blog as the underbelly of the internet…

Before you go to read the article (which is very interesting), you need to learn some terminology:

  • Surface Web is what we would call the regular World Wide Web that is indexed and where websites are easy to find.
  • The Deep Web is the unindexed part of the Web. Actually, anything that a search engine can’t find.
  • The Dark Web is intentionally hidden, anonymous, and widely known for illicit activities.

Explained: the Dark Web

SOURCE: Malwarebytes Labs – Explained: the Dark Web

Bitdefender Home Scanner – A free tool that scans your Wi-Fi network, maps devices and identifies and highlights network security flaws…

With all of the wireless devices in our daily lives we often forget about them, how many, the potential security risks, etc… Bitdefender is taking an approach to help make our wi-fi world safe by offering a free tool that scans your Wi-Fi network, maps devices and identifies and highlights network security flaws … After you download, install and run Bitdefender Home Scanner you will be prompted to set up a Bitdefender account (which is free). If you need more information about this tool, prior to installing, CLICK HERE to see the User Guide…

Bitdefender Home Scanner is able to detect any wireless device that is turned on and connected to your home network. Wireless devices can either be smart home devices such as baby monitors, WiFi cameras, games consoles, smart TVs, but also Windows, Macs, iOS and Android-based devices.

SOURCE: Bitdefender Home Scanner

Dsynchronize – Sync And Backup Your Data With This Free Program

I currently use Dsynchronize at work and at home to back up (and sync) my files. To learn how to use Dsynchronize, I suggest you set up a small test environment to practice using the program. It is very easy to use, once you get the hang of it. The thing that fascinates me with the program is that it is very fast. I have been using Dsynchronize for several years and it has never let me down.

Dsynchronize is FREE and is a standalone program (portable app) that requires no installation…

SOURCE: Dsynchronize

FREE Protection Against 99% Of Ransomware (including new strains such as Petya/NotPetya)

Wow, these ransomware events (or attacks) are causing havoc worldwide. The most recent attack is Petya (see below) where it will encrypt the files on your computer and hold your computer for ransom. Very important that you keep your computers patched with current Windows updates and security software updates.

Ransomware is alarmingly quick – Ransomware takes between five and 20 minutes to encrypt every relevant file on the average hard drive (depending on the speed of the machine and the number of files). That means that even the slowest, single-threaded ransomware can encrypt several potentially important files in seconds. Since ransomware works quickly, detection and response time is of the utmost importance, which may be problematic for certain behavioral-detection solutions.

I am seeing many of the leading security software companies coming out with various products to protect against ransomware. Big money in this… If you want something FREE that will add a level of protection to your computer, give Cybereason RansomFree a look. In a nutshell, this software uses a unique behavioral approach in detecting and blocking ransomware at the entry points where ransomware typically initiates the encryption process. When the program detects ransomware activity, it suspends the activity and displays a pop-up message warning you about an imminent attack. You will then have the option to easily stop the attack by making just one mouse click.

SOURCE: Cybereason RansomFree

Spybot – Search and Destroy Portable 2.6 Has Been Released By PortableApps.com

Get the new release of Spybot – Search & Destroy, portable version, at PortableApps.com. Great addition to your tech toolbox…

Spybot – Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behaviour to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies.

SOURCE: PortableApps.com – Spybot – Seach & Destroy

These 7 Tips (from Kim Komando) Will Help You Master Facebook

I love Kim Komando’s tech column at USAToday and find her posted information very useful and on the same parallel to my blog when it comes to assisting home-based computer users.

Kim recently posted an article, “These 7 tips will help you master Facebook” that you should read, if you are an advocate of Facebook. In all honesty, I do not care for Facebook; however, I do care about the safety and security of people (which has been my lifelong profession as a law enforcement (and security) officer and computer info specialist).

The one tip that Kim posted in this article that jumps out at me, in regards to your safety and security, is the tip “Find out where you are logged in”… Many Facebook users (carelessly) log into multiple devices, often at multiple locations, and keep their Facebook pages open in order to “conveniently” access their account without having to log in. The upside to this is user convenience; however, the downside to this is you are setting yourself up to have your account compromised, which could result in devastating consequences.

To see if your account is open on other devices and locations, here is how (as Kim Komando pointed out) to determine that:

Just to go to Settings >> Security Settings >> Where You’re Logged In, and you’ll find a list of devices that are currently accessing your Facebook account. The feature also lists login metadata, such as when and where you last checked in, plus the type of device you used. Keep in mind that cell phones sometimes show weird locations, which may refer to a cell phone tower and not necessarily to where you were standing at the time.

Facebook

That said, if your login information looks a little fishy, it’s possible your account has been compromised. It’s best to lock down access before this even happens.

Kim Komando is a consumer tech columnist for USA TODAY. She also hosts the nation’s largest radio show about the digital lifestyle, heard on 435 stations in the USA and globally on American Forces Radio. Find your local radio station, get the podcast and more at Komando.com.

SOURCE: USAToday – Kim Komando


Thank You For Visiting

MAKE SURE YOU ALSO VISIT

Main Page

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Deals  –  Archives (of all articles)


Leave A Comment

Using Minitools Partition Wizard To Extend The System Reserve Partition

… and, SEE MORE GREAT GEEK SQUEAKS’ BELOW

Ran into an issue when I went to upgrade my Minix NEO Z83-4  mini PC to the Windows 10 Creators Edition. The update would not install and I kept getting Windows error code (0xc1900200) when using the  Windows Update Assistant. I ended up researching the issue and found that the “System Reserve Partition” (64MB) was too small. I decided at this point to wait until the update made its’ rollout to my computer (to see what would happen) and when that day did come, the update started to install but soon failed. After concluding I needed to find a way to expand the system reserve partition, I went to the MiniTools Partition Wizard (free edition). What I ended up doing with this partition tool, to make the System Reserve Partition larger in size, had me sweating bullets. I backed up my computer, just in case this did not work out as intended.

MiniTool Partition Manager

In a nutshell, I used the Minitool Partition Wizard to delete an unidentified 16MB partition on the drive (which I had to do in order for this to work), then took 250 MB from drive C:.  I then took the 64MB System partition and added the 16MB space from the partition I had deleted and added the 250MB that I removed from Drive C:, giving me a total of approximately 330MB for the System Reserve Partition. At this point, I crossed my fingers (and toes) and rebooted.  The PC rebooted with no errors or problems detected.

Since the Creators Update had attempted to install previously I went into the Windows Update Settings, clicked on “Check For Updates” and the Windows 10 Creator’s Update started the installation process (which is a time consuming process with numerous reboots). I probably could have used the Windows Update Assistant tool to download and install the update, as well… In the end,  I was able sucessfully to install the Windows 10 Creators Update.

Hopefully, as a result of expanding the System Reserve Partition, using MiniTools Partition Wizard, I will not have to worry about doing this again when future major updates occur.


MORE GREAT GEEK SQUEAKS’

Multiple security holes discovered in Linksys routers – 

The flaws could allow attackers to:

  • Cause a Denial of Service (DoS) by sending requests to an unamed API. Admins would be locked out until the attack stopped.
  • Use CGI web server scripts to reveal connected devices and computers, dump the WPS Wi-Fi PIN code, and list firmware version and configuration settings.
  • Create a hidden “backdoor” account with root privileges and the ability to run commands.

Source: Naked Security

Ingenious Ways to Repurpose Your Old Tech – Check out this article at PC Mag that provided ingenius ways to repurpose your old tech… READ MORE

Ingenious Ways to Repurpose Your Old Tech

Kaspersky System Checker 1.1.0.228 – Kaspersky System Checker is a handy system diagnostics utility that allows you to check your PC system for different kinds of issues. The software then provides a detailed report about possible threats, hardware problems, and system-related issues… READ MORE

Microsoft To-Do: the end of Wunderlist – Microsoft launched a preview of To-Do, a new cross-platform task management service the other day that is “designed to make it easy to plan and manage your day”… READ MORE

microsoft to-do

 #1 Hot New Release – Samsung Chromebook Plus Convertible Touch Laptop… READ MORE

How to create a single-column Start menu in the Windows 10 Creators Update – To do this, open the Settings app and go to Personalization > Start. Scroll down past the preview to the list of on/off sliders. Turn off the one that’s labeled Show app list in Start menu. Don’t worry, you’ll still be able to get to your app list… READ MORE

———————————————————

Thank You For Visiting

MAKE SURE YOU ALSO VISIT

Main Page

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Deals  –  Archives (of all articles)


Leave A Comment

Microsoft Patches MS-Word Exploit That Spreads Malware

On the same day Microsoft officially began rolling out the Creators Update for Windows 10, they were also rolling out a patch for a zero-day exploit (that spreads malware) for all current Microsoft Office versions used on every Windows operating system (including the latest Office 2016 running on Windows 10). If you are running Microsoft Office at home, make sure you have installed the patch. To learn more, click on the source link below…

All versions of Office on all versions of Windows are vulnerable to this zero-day that spreads malware, so make sure you patch quickly

Source: Microsoft patches Word zero-day booby-trap exploit – Naked Security

Was Informed That A New Version Of Malwarebytes Has Been Released

In discussion with a computer geek friend of mine he indicated that Malwarebytes has a new version out (v3.0). I further confirmed this and learned that a new version was released on and about March 20, 2017. Based on what I am reading on their blog (for this release) — CLICK HERE — the excitement over this release is that it is being touted as a next generation anti-virus replacement and will be called only Malwarebytes.

Once you download and install you will be entitled to a 14 day free trial. If you desire to revert to the FREE edition now and turn “off” the free trial, simply click on the “settings” (at the left side) and then click on “my accounts”, then turn off the trial under “subscription details”. If you decide to stick with the free edition, you will need to periodically perform the scans manually.

Malwarebytes is one of the first things I install on a new computer and is my “go to” tool when helping others eradicate malware and other exploits…

This product is built to provide comprehensive protection against today’s threat landscape so that you can finally replace your traditional antivirus.

Our engineers have spent the last year building this product from the ground up and have combined our Anti-Malware, Anti-Exploit, Anti-Ransomware, Website Protection, and Remediation technologies all into a single product which we simply call “Malwarebytes.” And it scans your computer 4 times faster!

mb3

With the combination of our Anti-Malware ($24.95), Anti-Exploit ($24.95) and Anti-Ransomware (free, beta) technologies, we will be selling Malwarebytes 3.0 at $39.99 per computer per year, 20% less than our previous products combined and 33% less than an average traditional antivirus. But don’t worry, if you are an existing customer with an active subscription or a lifetime license to Malwarebytes Anti-Malware, you will keep your existing price and get a free upgrade to Malwarebytes 3.0. If you have both an Anti-Malware and an Anti-Exploit subscription, we will upgrade you to a single subscription to Malwarebytes 3.0, reduce your subscription price and add more licenses to your subscription.

Source: Malwarebytes

RECOMMENDED – Get On The Email List Of The US CERT / US Homeland Security’s Latest Cybersecurity Threat Updates

AKBearfood a visitor to the blog (from Alaska) recommended; “Get On The Email List Of The US CERT / US Homeland Security’s Latest Threat Update & Info E-Mails”. You can CLICK HERE to setup your email subscription.

Based on AKBearfood’s email name and additional employment information that was provided, it appears he (or she) deals with two potential threats that could impact his (or her) well being: 1) – Becoming food for bears; and,  2) Cyber Security Threats…

U.S. Department of Homeland Security Seal. United States Computer Emergency Readiness Team US-CERT

AKBearfood provided the following example of the importance of being on the email list:

As an example, the E-Mail link to their website yesterday covered: Apple Releases Security Update for iWork | US-CERT – found at the following URL: https://www.us-cert.gov/ncas/current-activity/2017/03/27/Apple-Releases-Security-Update-iWork

The e-mail subscription to the Homeland Security Website is free, and for my work group, helps us keep up with the latest threats and fixes recommended by the USA’s Cyber Security folks – at least the threat info that they release to the public without any “hacking” assistance.

The National Cyber Awareness System is America’s first cohesive national cybersecurity system for identifying, analyzing, and prioritizing emerging vulnerabilities and threats. Managed by the US-CERT, the system relays computer security update and warning information to all users. It provides all citizens—from computer security professionals to home computer users with basic skills—with free, timely, actionable information to better secure their computer systems. The National Cyber Awareness System provides valuable cybersecurity information in the form of Alerts, Tips, and Bulletins.

To take this one step further, I have subscribed to the US-Certs National Cyber Awareness System RSS feed and have posted the feed under the blog’s TECH NEWS (see tab at top of blog).  The very first thing you will see in the feeds I have posted is the most recent alerts and documents as distributed by US-Cert / U.S. Homeland Security

A big THANK YOU to AKBearfood…

Top 10 Best Sellers – Antivirus and Security Software

Antivirus software, now often referred to as security (suite) software, due to the innumerable threats, come in a variety of different brands. To get an idea, check out the top ten sellers at Amazon (see source links below).

I personally use a FREE antivirus program called Bitdefender Antivirus Free Edition; however, you may feel more comfortable using one of the paid commercial versions such as reflected below.

Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.[2] Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks. [source: Wikipedia]

#1: Norton Security Deluxe 5 Device PC/Mac

#2: McAfee 2017 Total Protection – 5 Devices [Online Code]

#3: Norton Security Premium – 10 Devices [Download Code]

#4: Norton Security Deluxe – 3 Devices [Download Code]

#5: Kaspersky Internet Security 2017 | 1 Device | 1 Year | Download [Online Code]

#6: Norton Security Standard – 1 Device [Download Code]

#7: Norton Security Deluxe – 5 Devices [Key Card]

#8: McAfee 2017 Total Protection-5 Devices [Key Code]

#9: Webroot Internet Security Complete 2017 | 5 Devices | 1 Year | PC [Download]

#10: Webroot Antivirus 2017 | 3 Devices | 1 Year | PC [Download]

A TIP To Protect Privacy (When sending email to multiple recipients, use “Bcc”.)

The article reflected below I have posted several times since its’ original posting (back in 2010). What prompted me to dust this off and bring it back out of the archives is that today I received a local government generated email to advise recipients of other government agencies of an impending snowstorm.  What caught my attention was that as this email was sent to a very large body of people.  I was able to see every name and email address to folks I am guessing would not want their email address and name made that public. As this email get’s forwarded, more and more email addresses will be revealed. To protect the privacy of others, it is best practice to use “Bcc” when sending email to multiple recipients.

Bcc = Blind Carbon Copy

Did you know that if you use the Bcc field in your email client to address and send an email or want to send a copy of an email to multiple users, the recipients will not see whom you sent the email to?

Many know this trick; however, I still find that many do not. When using the Bcc field to send your emails, the people receiving the email will not know who the other recipients are. It is not a trick of hidden magic. It is that the addresses of the other recipients are simply not shared.

I often receive forwarded chain emails; usually consisting of jokes, humorous movies, prayer requests, etc… Occasionally I will find one these emails humorous or important enough that I will pass it on; HOWEVER, prior to doing this I perform some housecleaning steps.

I will remove any “FWD” text (usually in the subject line) and will remove any email addresses I find in the body of the email that reflects the email addresses of recipients who have already received the email. After performing these housecleaning steps, I will enter into the the Bcc field, in my email client, the recipient’s email addresses, from my address book, to send (or forward) the email. If the email client requires at least one entry in the “To” field, I simply enter my own email address.

The benefits of using the Bcc field is simply this. You are protecting the privacy of other people. Currently I have approximately (5)-five email accounts that I use for specific purposes, from a variety of email services, with one of those accounts being my primary email account. I am very protective of that primary email account address and do not want it thrown about for the spammers to get hold of or for strangers to see. For example, I have found people’s email addresses in forwarded emails that I know and have not seen for years. They are very surprised when I contact them; and, will often ask, “How did you get my email?”. I explain that I simply pulled it from a forwarded email.

Be courteous to others and learn to use the Bcc field in your email; AND, when possible avoid chain emails all together.

Did you know that Google knows almost everything that you do on their services?

You need to see this article that Phandroid has posted (see source link below) that will show you what Google knows about you, how this information is collected, where you can find this information and how you can opt out. Google collects this information, as a form of profiling, in order to better improve their products and services.

You may have already opted out of this collection of information; but, my guess is, you did not.

Did you know that Google knows almost everything that you do on their services? Find out what they know and how you can do something about it.

Source: Here is everything Google knows about you

S10 Password Vault – A Hidden Gem Of A Password Manager

The majority of home based computer users use the same passwords (or easy to remember passwords) for nearly every account that they are subscribed to. Hacker’s (or criminals) know this and take advantage of these facts. If your password is easy to remember, then it is easy to hack.

To make your accounts secure, it is HIGHLY RECOMMENDED that you use a password manager to manage your accounts and the passwords associated with them. The “go to” password manager that I use (on all my computers and devices); and, have used since its’ inception is the “S10 Password Vault”. It has never let me down… The main feature I like about this software is that I have total control over my password information at the local level.

S10 Password Vault

There are so many features to the S10 Password Vault that I encourage you to visit the developer’s site by clicking the source link below.S10 Password Vault is available for Windows as a standard installer and as a portable version that allows you to run directly from a USB drive (which then also contains your data file). There is also an “S10 Vault” mobile companion app for iPhone/iPad (in the App Store) and for Android devices (in the Google Play Store and Amazon App Store).

Source: S10 Software – S10 Password Vault

A FREE Synchronization Program That I Am Messing Around With

I have found that using synchronization software is a very easy way for the home based computer user to backup data vs. the full blown backup type software (which can hard to understand for the home computer user). I am currently messing around with the FREE synchronization program called SyncFolders; that, so far in my testing, could end up being my default (go to) backup software for my computers here at home. If you are interested in giving SyncFolders a try, the source link is reflected below. SyncFolders is also available as a portable app.

SyncFolders

SyncFolders main window...

Features of SyncFolders

  • Supports two-way synchronization of files and folders.
  • Can easily be used as backup tool.
  • Shows a preview before the actual synchronization takes place. You can override actions if desired.
  • Detects conflicts or file collisions when a file has changed in both locations since the last sync operation. Therefore, SyncFolders tracks file modifications and deletions in a local database.
  • Propagates deletions and detects file renames.
  • File comparison by date and size or by content.
  • Default actions can be defined in case of synchronization conflicts.
  • Integrates with Windows’ Task Scheduler to support scheduled synchronizations.
  • Supports file and folder filters.
  • Can handle long file names and files of any size.
  • Synchronization from or to UNC paths is supported.
  • Supports multiple synchronization rules in a single rules file.
  • Deleted or overwritten files can be moved to the recycle bin or to a time-stamped history folder.
  • History files can be deleted after a user-defined period.
  • Unlimited number of files.
  • Synchronization from command line.
  • Can ignore one-hour timestamp differences caused by DST switch for synchronization to FAT file systems.
  • Easy-to-use.
  • Unrestricted freeware.
  • No spyware, adware or malware.
  • Portable, although .NET Framework is required.

AxCrypt – File Security Made Easy

If you are concerned about file (and folder) security, AxCrypt 2.0 is good choice in protecting what matters to you. In addition to the full install version, there is a portable version, as well as, a mobile app (for Android and iOS).

AxCrypt works as a separate program in it’s own window, but it’s also fully integrated into the Windows Explorer – the part of Windows where you browse your folders and files. Here is a quick video tutorial on how to use the basic functions of AxCrypt 2.0.

AxCrypt is a simple file encryption software for Windows. It integrates seamlessly with your workflow to encrypt, decrypt, store, send and work with files.

New and Updated Features

  • 256 bit encryption
  • Mobile App for iOS
  • Mobile App for Android
  • Passwordless sharing
  • Portable app for Windows
  • Secured Folders
  • Cloud Service Awareness
  • Password Manager
  • Single sign in for encryption / decryption

Source: AxCrypt – File Security Made Easy

Hyper Crypt | Portable Encryption Software

Looking for a method to protect sensitive files and folders?  If so, Hyper Crypt may be of interest to you (see source link below). Hyper Crypt consists of a standalone (portable) executable file, a pdf manual and an updater that can be run on any Windows computer (Vista and higher)…

hyper-crypt

One thing I noticed that when you encrypt a folder, the files in the folder will appear as they normally would and no copy of the original is left behind. If you attempt to open any of the files, they will not open, due to the encyption. Don’t know if that is good or not, but works for me…

By default if you encrypt a single file, a copy of the original file is left behind; however, there is an option to change that.

Hyper Crypt uses the military-grade AES-256 algorithm for file and folder encryption, along with automatic integrity validation.

With Hyper Crypt, you can easily encrypt any kind of file, from documents, to pictures and videos.

Source: Hyper Crypt | Portable Encryption Software

Nice Uninstaller Directory (and Removal Tool) For Common Windows Antivirus Software

Found this directory (and a removal tool) on the ESET website that may be a valuable resource to you. ESET is a leading IT security company that specializes in various antivirus and security products. If you are interested on trying ESET, there is some good deals on their products (click here)The directory on their support site is what jumped out at me, which outlines various antivirus and security software brands with links to those sites to access instructions and/or tools to uninstall their antivirus software. 

Why is this important? Prior to switching to other brands of antivirus or security products it is HIGHLY RECOMMENDED that you uninstall the older version to prevent conflicts, system slowdowns; and even system failures. You may think, “OK, no problem, will use the Windows Program Uninstaller applet in the control panel to do this”. You are on the right track, but the problem with that is the Windows Uninstaller may not capture and uninstall everything; and could leave remnants of files behind that can cause problems. This is where the directory on the ESET website will really come in handy to assist you with the removal of antivirus and security products.

ESET

ALSO, on the same note, I noticed ESET also has a removal tool on the same page that my do the heavy lifting for you in removing an old software product. The ESET AV Remover tool will remove almost any antivirus software previously installed on your system. ALSO, you will find a link for a list of available malware removal tools. 

Source: ESET Support – Uninstallers (removal tools) for common Windows antivirus software

Malware Called “DressCode” Found In Android Apps

If you think you are immune from malware in Android Apps; “Think Again”…

“Researchers from Check Point discovered malware they’re calling DressCode in 40 Google Play store apps and more than 400 apps listed in third-party app stores”…

“Once installed on the device, DressCode initiates communication with its command and control server,”

READ MORE @ BGR

The following video also explains how DressCode works:

Windows 10: Using The File History Feature To Backup Your Personal Files

Let’s face it, you probably do not backup your personal files on your Windows 10 computer. When I talk about personal files, I am talking about your photos, videos, documents, etc… that are personal to YOU. I know you may say it doesn’t really matter, but it will. I have found that when computer users (including myself) lose files it sort of does something to you. You actually will feel that a loss has occurred and feel helpless in recovering from that loss.

An “automated” backup solution for Windows 10 users is built right into the operating system that I have found to be very easy to use. It is called “File History”… Below you will find a short video from BTNHD that will quickly get you up and running with using File History. What I like about File History is that you can fully configure it to backup any folders that you choose (to an external hard drive), at different time intervals (making it fully automated), and the option of how long you want to keep revisions of your files. I encourage you take a look at File History, learn how to use it, and save yourself some misery when that computer crash occurs…

How To Use Windows 10 File History Feature!

FREE Tool To Remove Adware, PUP’s, Toolbar’s and Hijacker’s

Another FREE program that I use to remove unwanted programs and malware is AdwCleaner. This is a must have tool; especially, if you are the one who has the tech toolbox that is used to help others. AdwCleaner is a program that searches for and deletes Adware, Toolbar’s, Potentially Unwanted Program’s (PUP), and browser Hijacker’s from your computer. It comes with a “scan” and “clean” mode. Typically, these unwanted programs, such as adware, PUP’s, Toolbars, and hijacker’s, are bundled in with other software that we install (from the web) on our computers. ALWAYS, during a software installation, pay attention to any other optional software that may (or could) install; and, ALWAYS, research the software you intend to install. Typically, in honest cases, you are given an option (via a check box) to keep bundled software from not installing.

AdwCleaner

What FREE Antivirus Software Do You Recommend for PCs? Here’s My Recommendation…

My recommendation to anyone needing antivirus protection is BitDefender FREE… An easy installation that will quietly monitor (and scan) your system in the background with no intervention on your part (zero configuration). After installing, it is recommended that you register your FREE version via an email account. I have been using BitDefender FREE for approximately 2 years and can attest to its’ performance (and detection capabilities)…

BitDefender FREE

BitDefender FREE

“Bitdefender Antivirus Free Edition uses a combination of Cloud scanning and behavioural analysis to detect new or unknown threats that other antiviruses miss”.

Avira SafeApps – A Safe Download Portal For PC Software

Computer software is and has always been my passion. Over the years I have developed (what I think) is a sixth sense when it comes to determining what software is safe to download and install. Most folks at home are reluctant to install any software these days due to the privacy and security risks that can be associated with a bad software installation. As a result, many are missing out on some great software.

A remedy to this problem (that is currently in beta) is the Avira SafeApps download portal. What you find on the portal is a collection of software packages that has been determined by Avira to be safe… I have added SafeApps to the Downloads page under the software and apps site.

SafeApps

“Avira detects 30 million threats every day – many of these originate from download portals. By scanning every app for hidden toolbars, installers, and adware, Avira SafeApps offers you a secure download portal, free of malware and junkware”.

Geek Squeaks (#2015-40) FEATURING — Use Qwertycard To Generate And Keep Track Of Passwords — and MORE GREAT STUFF

Use Qwertycard To Generate And Keep Track Of Passwords  – As computer and internet users, where we log into numerous accounts, we are still failing to keep our information safe. From experience of helping others, I find that most people use weak passwords and will use the same password to log into numerous accounts. On top of that, most folks will write down those passwords and keep them near the computer. An easy solution to all of this is what is called a Qwerty Card. I had heard about these cards in the past; and, just recently I came across them again on Tech Crunch. How this works is that the card reflects the QWERTY keyboard and each letter on the keyboard is assigned a unique character. When you purchase a card, you are given a unique base code. To generate a really strong password, you first type your base code, then your own password, then use the Qwerty card to generate the coding for the website name. You can also simplify this process and still maintain a strong password by reducing the number of steps. To learn more on how this works, either visit Tech Crunch or the actual site that sells these cards (click here)…

Qwerty Cards

picture of qwertycard

———————————————————

EncryptOnClick Is Like Hiring Your Own Highly Experienced Data Security Guard – I nearly forgot about EncryptOnClick, until I saw that the developer recently updated it. If you want a simple, easy to use encryption program, this one is definitely a keeper. After you install EncryptOnClick, you can copy the contents of the install directory over to a flashdrive (to make it a portable app). Very nice program, that is FREE (that uses 256-bit AES encryption). You can encrypt individual files or entire directories.

EncryptOnClick

EncryptOnClick

———————————————————

Google Drive Rolling Out New Search Experience – Drive lets you search across all your files, regardless of the device they came from. To make that easier, you can use these new ways to find your files: Narrow your search to a file type from the search box on Android, iOS, and the web. Open advanced search instantly from the search box. Access recent files or search Drive from the home screen using 3D Touch on iOS. Search Drive using the iOS search bar without opening the Drive app.

The new features will be rolling out in the coming weeks…

Read About Google Drive’s New Search Experience

———————————————————

Speaking of Google Drive – Here is The Only Google Drive Guide You Will Ever Need… The guide covers: Navigation: Supported File Types | Accessing Google Drive | Storage Space | Working with Google Drive | Desktop Clients | Uploading Files & Folders | Downloading Files & Folders | File Size Restrictions | Creating a New Document | Sharing Files & Folders | Collaborating | Accessing Files Offline | Organizing Your Drive | Tweaking Your Layout | Third Party Apps | Troubleshooting | Drawbacks of Google Drive…

The Only Google Drive Guide You Will Ever Need

Google Drive will sync documents with Microsoft Office

———————————————————

MAPS.ME – GPS Navigation & Map (Android) – Get detailed maps of any country in the world (that can be downloaded) and are optimized for your phone or tablet. This is an Android app called MAP.ME… If you need a GPS unit for your car; by using your Android smartphone, this is a great option. Recently upgraded to include walking directions…

MAP.ME

 MAPS.ME - GPS Navigation & Map- screenshot thumbnail

———————————————————

A Terabyte Internal SSD Drive (by Samsung) – I am starting to see the much larger SSD drives come down in price. If your are in the market for a SSD Drive you may want to take a look at the Samsung 850 EVO 1 TB 2.5-Inch SATA III Internal SSD

Samsung 850 EVO 1 TB 2.5-Inch SATA III Internal SSD

Samsung SSD Drive - 1TB.png

———————————————————

Quick Links

Today’s Deals

12 Days of Deals

Last-Minute Deals

Year-End Deals

———————————————————

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment

Geek Squeaks (#2015-23) FEATURING — Your FREE Online Tech Tool Bag — and MORE GREAT STUFF

A FREE Online Tech Tool Bag – No, this is not a tool bag that you physically carry around. This tool bag is one that is readily available in the virtual sense and has been specifically made for those who have a passion for information technology, PC troubleshooting and repair, and the desire to learn more. What I am referring to is the GEGeek web site. This site is awesome in the sense that the developer of the site, who is a seasoned IT Professional, has successfully created a centralized index of sorts that will direct you to anything and everything that has to do with fixing and learning more about Microsoft Windows and computers. To show how important I think this site is, I have permanently included a link to the site on What’s On My PC (see tab at top of the page).

GEGeek

On top of all of this, make sure you check out the GEGeek Tech Toolkit which is a “Complete Collection of over 600 Tech Related Free Programs⁄Suites, all accessible from one Menu Launcher Utility” that you can carry around on your flash drive. This toolkit, I highly recommend if you are an IT Professional or training to become one, is available via donationware. Donate an amount that is “Reasonable” and he will send you a download link via email for the toolkit (with includes free future updates). The link to the toolkit is at the top of the GE Geek Web Site (can’t miss it and don’t miss it)…

A Porn App That Snaps Your Photo and Demands A Ransom – “If you’ve used Adult Player, sorry to hear it: It’s an Android porn app that takes a photo of you with the phone’s front-facing camera, immobilizes the device, and demands a $500 payment via a locked ransom screen to fix the phone and delete the photo”… READ MORE

See How Fast Technology Education Is Changing In The Schools – I cannot imagine being a Teacher, Student or Parent these days and attempting to stay on top of all of the information technology changes. Ask A Tech Teacher has posted an article, 13 Changes in Tech-in-Ed in Just Three Years that provides real-world insight on how quickly things have changed, just in a three year period.

13 Changes In Tech Ed

I Highly Recommend This Android App If You Use Google’s Two-Factor Authentication – I just added this app to the downloads page and it is called Authy. Authy brings the future of strong authentication to the convenience of your Android device. The Authy app generates secure 2 step verification tokens on your device. It help’s you protect your account from hackers and hijackers by adding an additional layer of security. Two-Factor Authentication prevents your Google Gmail account from being hacked.

 Authy 2-Factor Authentication

Preserve The Integrity Of An Image With A Curved Screened Monitor – The first time I experienced one of the curved computer monitors and went back to a flat panel, I immediately sensed the difference. To get an idea of what I am referring to take a look at the S27D590CS monitor by Samsung. Definitely takes entertainment to a whole new level. I just need to figure out how to get this monitor to fit into my work area.

Samsung Curved Monitor

____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment

Geek Squeaks (#2015-21) FEATURING — Windows 10 Enhancement Update Coming In November — and MORE GREAT STUFF

Windows 10 Enhancement Update Coming In November – Microsoft is referring to this update as an enhancement update and it will be called Threshold 2. Best read on this is at BGR where they are reporting “The most important Windows 10 update yet is coming in November – here’s what we know so far.“… Expected changes mentioned is support for Microsoft Edge browser extensions, a desktop messaging app that will apparently work across various lines of messaging services and more “under-the-hood” improvements that will benefit Universal apps.

Windows 10 Threshold 2 Update

Here Are Steps To Take To Keep Your Android Smartphone Locked Down – Have you ever misplaced your smartphone or had it stolen? I have and the feeling that I experienced was not a good feeling (even though I had the phone locked down and protected). Our phones are an extension of ourselves and we don’t realize that until it is gone. The information you carry on that phone is all about you; your online account information, your personal text and email messages, pictures, documents, etc…  Not good, if this information falls into the wrong hands. To take a step in the right direction to protect you and your phone, please read How to Keep Your Android as Secure as Possible at Drippler…

Secure Your Android

Microsoft Can Track Your Keystrokes (in Windows 10) – Microsoft can track your keystrokes, your speech, and more. Here are the settings to turn it all off — CLICK HERE … Microsoft openly put into the Windows 10 Technical Preview a keylogger. At that time, the company admitted that “we may collect voice information” and “typed characters.” Apparently they are still collecting information in the released version of Windows 10.

Keylogger In Windows 10

A Talking Alarm Clock or Talking Desktop Clock For Your Computer – If you would like to install an alarm clock that will remind you of important dates and events, then take a look at Talking Alarm Clock… An alarm can talk using either Microsoft® Agent or Microsoft® Speech (a.k.a. SAPI5). Information on installing the Talking Alarm Clock and the related speech engines can be found at the site. Also, on the same site as the Talking Alarm Clock you will find the Talking Desktop Clock that will announce the time on the hour, ½ hour, or ¼ hour, or at any interval you choose. There are optional clock styles and chimes to choose from.

Talking Clocks

Prices Slashed On Motorola Nexus 6 Smartphone – The Nexus brand is the brand that is supported by Google. I noticed that the pricing on the 32 GB model and the 64 bit model (at Amazon) have been sliced dramatically. If you are looking for an unlocked Android smartphone, here is your chance to get hold of one…  I don’t know how long this will last, but this a great deal.

Nexus 6

____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment

Geek Squeaks (#2015-19) – View And Control Your Android Device From Your Computer — and MORE FREE STUFF

View And Control Your Android Device From Your ComputerVysor is a Google Chrome extension that is currently in beta (testing) that allows you to mirror (and control) your Android device (smartphone or tablet) from your Windows based computer. Keep in mind this utility is in beta testing, so there may be bugaboos… Your smartphone or tablet must be connected to your computer via USB. Typically this is not a problem for many Android device users, due this is a method that we often use to charge our devices. You can read in detail — CLICK HERE — the steps and driver involved for this to work. If you are successful, I think you will find that Vysor is an awesome application in the making where you can control every aspect of your Android device from your computer (even texting).

In summary, the ingredients to make this work are: USB debugging must be enabled on your device; your device connected to your computer via USB; the Google Chrome browser; the Google Chrome Vysor extension,; and the ABD driver installed. May sound complicated, but is not as hard as you think and in the end you have a very impressive (and useful) application.

Maryland University To Eliminate Textbooks – A spokesman at the University said “students will be able use a variety of materials like readings and videos online at no cost”.  Many Universities have been following similar models; however, UMUC is the first in making a transition of this magnitude

(Photo: UMUC)

4-Port USB Car Charger with Intelligent Charging Technology – Check out this Inateck Aluminum 4-Port USB Car Charger with Intelligent Charging Technology. The intelligent charging technology has a built-in smart chipset that detects your devices automatically to deliver the safest current.

Inatech 4-Port Charger

Sandboxie Now Supports Windows 10 – If you do not know what Sandboxie is then you are missing out on a very special piece of software that can keep you safe… Sandboxie is a software application that gives you the ability to run other software applications and surf the internet in an isolated abstraction area called a sandbox. Under the supervision of Sandboxie, an application operates normally and at full speed, but can’t effect permanent changes to your computer. Instead, the changes are effected only in the sandbox; thus, in the event of a malware infection or the software does not meet your needs, you simply delete the sandbox. I currently use Sandboxie to test software that I am not sure about. Since the my upgrade to Windows 10, I found that the developers of Sandboxie are working on a compatible version for Windows 10. If you are a Windows 10 and Sandboxie user, you may want to give the beta (test) version a try (CLICK HERE); HOWEVER, please note that SBIE Beta v5 does not support Windows Metro Apps or the Edge browser at this time. You will need to change your default web browser in Win 10 from Edge to something else. For example, in my case, I am currently (and safely) using Sandboxie to run the Google Chrome browser inside a sandbox.

____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment

Geek Squeaks #2015-11 @ What’s On My PC (Featuring: A Quick Study On The Anatomy Of A Good Password and MORE)

A Quick Study On The Anatomy Of A Good Password – I plucked the information below from my work security notices about passwords and thought it would be good to share with my readers. It pretty much sums it up nicely about the creation and the composition of a good password.

Did you know the longer the password, the harder it is to crack? Consider a 12-character password or longer. Things to avoid: Names, places, dictionary words. Mix it up. Use variations on capitalization, spelling, numbers, and punctuation. Most importantly, don’t save passwords or use “remember me” especially on public computers.  Make sure your computer is secure.  Never give your password out to anyone and don’t post your password in plain sight.

From my experience I have found that people that use computers (and other devices) on the personal level (such as at home) use very weak passwords, never change them and are very liberal on who has access to those passwords. To solve this problem, I highly recommend that you use a password manager such as S10 Password Vault that will help you manage, organize, store and generate your passwords.

S10 Password Vault

Hope You Don’t Miss Out On This Deal At Best Buy ($49.99) – My Passport Ultra 1TB External USB 3.0 Hard Drive – Black … Apparently Best Buy is clearing these out (which are the older models — but still a great buy)… If you miss out, and want one of the newer models, then try this link – CLICK HERE

WD - My Passport Ultra 1TB External USB 3.0 Hard Drive - Black - Larger Front

Here’s How To Use A Compass For Better Photography – If you have never visited Backcounty Gallery, then you do not know what you are missing… The site has FREE wallpapers that are to die for if you are a nature lover, featuring photos from the site’s developer (and photographer). If you are wondering, “How does he do that?”; then, read this article, at Backcountry Gallery, “Can A Compass Help You Get Better Photos?‘…

Backcountry Gallery

Have you ever tried going offline for days at a time? I don’t know if I could detach myself from my devices. I am serious, I have never tried it. Found this blog post at the Huffington Post “Why You Need To Go Offline For A Week” where the author explains that “you go completely offline (no internet allowed at all) and off grid (so no phone calls, texts etc.) to have a complete break from technology and communication with anyone you’re not physically with”. I encourage you to read this article to see his end results… I definitely need to go offline, get off the grid and go to hermit land.

Going Offline

Check out this men’s lithium powered mountain bike – This is an example of how battery technology is improving all of the time. This bike (or scooter) is by X-Treme Scooters (Model XB-300Li)… The Lithium Powered Electric Bicycle has a 300-Watt rear brushless hub motor for power operation. The bike has a key start and a variable speed control twist throttle. The bike can be powered exclusively by the motor, can be pedaled and power assisted, or be exclusively pedaled. Mountain bike components that make the bike great for trail and road riding include a seven-speed Shimano Tourney Gears Shifter System, lightweight 100 percent aluminum alloy frame, fully adjustable seat, and a RST Capa T7 hydraulic front fork for maximum shock absorption. The bike is also equipped with strong front and rear brakes, a battery indicator, a headlight, tool kit, and cargo rack.

Battery Powered Bicycle

____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment

Read About Malwarebytes Amnesty Program

If you have been pirating the Malwarebytes Anti-malware Premium version, you will receive an amnesty.

Malwarebytes Anti-Malware Premium

The developers of Malwarebytes is rolling out a new licensing key system to track their licensees and to prevent pirating; however, to bring this system up to speed they are giving the software pirates an amnesty by giving them a 1 year subscription key (for FREE). From what I have researched, the developer, “in a nutshell”, lost track of who was legal and who was not; and, the only way to remedy the issue was to perform an audit to collect data to determine what keys are still alive, and who are they used by. If you are a true pirate, the furthest you will get is a year’s worth of Malwarebytes. To read a good article about this CLICK HERE

What the end user of Malwarebytes will see, whether you are a pirate of not, is the following message:

Select the option below (in your Malwarebytes Anti-Malware Premium product) that describes how you originally received your Malwarebytes Anti-Malware Pro or Premium license. We’ll assign you a new key, and you’ll be good to go.

  1. I’m not sure where I got my key, or I downloaded it from the Internet. (Select this option and we will issue you a brand-new key with 12 free months of Malwarebytes Anti-Malware Premium.)

  2. I purchased my key. (Select this option and we will issue you a replacement key with the same license to Malwarebytes Anti-Malware as your original key.)

Malwarebytes Anti-Malware is an industry-leading scanner that detects and removes worms, Trojans, rootkits, rogues, spyware, and other dangerous malware from your home PC. There is a FREE version and a paid premium version. The FREE version does not perform background scanning; whereas, the premium version (with background scanning and more features) is ready and alert at all times.

 ____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the Day Leave A Comment

Microsoft Security Essentials (Windows Defender) Did Not Make The Cut

Call me crazy, but I have never paid for antivirus software due to the FREE options that are available (and have never had a virus on any of my PC’s — “knock on wood”). I personally do not care for the security suites that often ship with new PC’s and will actually remove them. I have found that these suites embed themselves too much; are often times memory hogs; and can be over aggressive at times (causing confusion for the end user). No matter what antivirus package you have installed, if you do not use good common sense and pay attention to what links you are clicking on, you are susceptible. If you have a doubt, don’t do it…  Believe nothing and verify everything!

If you are looking for a FREE antivirus option, I encourage you to read PCMag’s recent article, “The Best Free Antivirus for 2015“…

PCMag - Antivirus Comparison

The top two on their list (Panda Free Antivirus 2015 and Bitdefender Antivirus Free Edition 2014), I use, and highly recommend. Pay close attention to this article and you will see that Microsoft’s Security Essentials (Windows Defender) did not make the cut.

Just remember, if you do decide to uninstall antivirus software from your PC, make sure you visit the antivirus software maker’s website for uninstall instructions. Often times they will have a specialized utility developed that will uninstall the software completely from your computer.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection –

Leave A Comment

Add WOT (Web of Trust) To Your Browser To Protect Yourself From Online Threats

To supplement the security on your computer, installing the Web of Trust (WOT) to your computer enables you to make informed decisions on what web sites are safe and those that are not. Web of Trust uses an unique crowdsourcing approach (through global communication) to rate and comment on websites on the internet. I have featured WOT many times in the past here on the blog.

WOT works in a very simple way – it shows website reputations as traffic lights next to search results when using Google, Yahoo!, Bing or any other search engine. They are also visible next to links in social networking sites like Facebook and Twitter and email like Gmail and Yahoo! Mail as well as other popular sites like Wikipedia. By clicking the traffic light icons you can find out more information about a website’s reputation and other users’ opinions.

To help you understand how WOT works… Best example is when you perform a search on the internet (i.e. Google, Yahoo, Bing, etc…). Many times you do not know what is behind those links that you click on that could ultimately lead you to scams, untrustworthy links and rogue web stores. Many of the people I have assisted in the past with malware infections, acquired those infections from visiting malicious web sites that they thought were safe. WOT helps protect you from clicking on links that may lead you to these sites by using a simple traffic light system.  A green traffic light means users have rated the site as trusted and reliable, red warns about potential threats and yellow indicates that you need to be cautious when using a site.

WOT - Web of Trust

I have WOT installed on all of my computers, have used it for years, and use it to help me sort out the good and bad sites; AND, most importantly to keep me sensitized to the fact that there is a criminal element on the internet that will take advantage of me, if I let it.

Web of Trust

To learn more about WOT – Web of Trust — CLICK HERE

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Leave A Comment

 

You May Want To Try The Google Chrome Software Removal Tool (CRST) When You Suspect Chrome Has Been Hijacked

The Chrome Software Removal Tool (CRST) is software (developed by Google), that is currently in beta, that scans your computer for programs known to cause problems with Chrome, and then offers to remove them for you. This program is to be used only on occasions where the Google Chrome Browser is (obviously) behaving strangely and you suspect it may be due to an unwanted program on your computer (for example, showing you unusual start-up pages, toolbars, or pop-up ads you can’t get rid of). Typically, these types of examples are referred to as browser hijackers.

Two things you need to know before using CRST:

  1. To discourage attackers from changing the names of their programs, the Software Removal Tool does not reveal the names of the suspicious programs it finds. You’ll only see the number of programs detected.
  2. The Software Removal Tool beta is Windows-only (all versions) and you need to have admin rights to use it.  To learn more, please visit the Software Removal Tool beta help page.

google software removal tool

Setting up & using the Software Removal Tool beta

  1. The Software Removal Tool scans your computer for programs known to cause problems with Chrome, and then offers to remove them for you. To start:
  2. Visit the Software Removal Tool homepage.
  3. Click the Download button.
  4. Review the Terms of Service and Privacy Policy. To agree, click Accept and Download.

The Software Removal Tool will download to your computer.

  1. Open the Software Removal Tool. It will immediately start searching your computer for suspicious programs.
  2. A message will tell you how many programs were found, if any.
  3. Click Remove suspicious programs. Wait until you see the message “Removal complete.” Some open applications may be closed in the process.
  4. Click Continue to quit the tool. (If your computer needs to reboot, the button will say Restart.)
  5. Chrome will automatically reopen, asking you to reset your browser settings. Click Reset.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Leave A Comment

Terminate Known Malware Processes With RKill – Then Run Your Security Software

Did you ever wrestle with a Malware infection, think you have the PC cleaned; but, when you reboot the PC it comes back with a vengeance? This is where you need to have the utility by BleepingComputer.com, called RKill in your toolbox.

What RKill does is that it will attempt to terminate known malware processes.  It does not delete any files and only stops the malware processes from temporarily occurring, giving you that window of opportunity to run your security software (such as Malwarebytes Anti-Malware). To learn, in detail, what RKill does and and what it doesn’t — click here

Below is what RKill looks like running, in a console screen. That console screen will continue to run until it RKill has finished. Once finished, the box will close and a log will be displayed showing all of the processes that were terminated by RKill and while RKill was running.

RKill

RKill just kills 32-bit and 64-bit malware processes and scans the registry for entries that would not allow you to run various legitimate programs. When scanning the Registry, Rkill will search for malicious Image File Execution Objects, DisallowRuns entries, executable hijacks, and policies that restrict your use of various Windows utilities. When changing Windows Registry entries it will create a backup of these entries and save them in the rkill folder on your desktop. Each registry backup will contain a time stamp so that the backups are not overwritten on subsequent runs of Rkill. For a list of changes in Rkill, please see the change log at the bottom of this post.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Leave A Comment

Be Ready For When The Cybercriminal That Misrepresents Microsoft Calls You

I want to start off this post by stating something I tell people, especially the elderly, who came from a generation that trusted other people.

“If you receive an unsolicited telephone call, whether it be a charity, a politician, an alarm company, your grandson is locked up in a jail in Canada, etc… where the caller is wanting money, PLEASE disconnect the call”.

What I am finding is once you get hooked by these calls you are placed on a call list that is sold to others AND the calls will perpetuate into more calls. It is like getting spammed by telephone and it gets so bad that you do not know what is real and what is not. My general rule of thumb is, when I get a phone call at my house and there is a delay of 3 seconds, GUESS WHAT? You just got disconnected.

 

One of my favorite blogging sites is TCAT Shelbyville – Technical Blog. Recently they posted an article (that I reblogged) titled, “No, you are not a Microsoft employee, no I don’t have a virus and by the way, you are definitely talking to the wrong people” that really hit home with me personally. I actually know several people, including members of my immediate family, where this fraudulent activity occurred.

The fraudulent activity I refer to is where a person (usually with a foreign accent) will randomly call you and tell you that they are a Microsoft Tech and will offer to fix your computer problems or sell you a software license. They will convince you into taking over your computer remotely and then they will go to work attempting one or all of the following:

  • Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software.
  • Convince you to visit legitimate websites (like http://www.ammyy.com) to download software that will allow them to take control of your computer remotely and adjust settings to leave your computer vulnerable.
  • Request credit card information so they can bill you for phony services.
  • Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there

After reading the TCAT-Shelbyville article, I started wondering if Microsoft is aware that they are being misrepresented in this manner. What I discovered is that they do know and actually have a page up on their Safety & Security Site that focuses specifically on this matter. I strongly encourage you to visit Microsoft and read, “Avoid Tech Support Phone Scams” where you will learn the following:

  • Telephone tech support scams: What you need to know
  • How to protect yourself from telephone tech support scams
  • What to do if you already gave information to a tech support person
  • Will Microsoft ever call me?

How to report this crime:

The CyberCriminals that initiate these calls know that most people will not report the crime. I suggest that if you are victim of a call such as this, especially if you find your credit card has been compromised, that you report the matter to the local authorities and contact your credit card company immediately to be issued another card.

Microsoft also encourages you to contact them, as well:

Whenever you receive a phone call or see a pop-up window on your PC and feel uncertain whether it is from someone at Microsoft, don’t take the risk. Reach out directly to one of their technical support experts dedicated to helping you at the Microsoft Answer Desk. Or you can simply call Microsoft at 1-800-426-9400 or one of their customer service phone numbers for people located around the world.

Report phone scams 

In the United States, use the FTC Complaint Assistant form.

In Canada, the Canadian Anti-Fraud Centre can provide support.

In the United Kingdom, you can report fraud as well as unsolicited calls.

_____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (all articles)

Comment

FREE SafeHouse Explorer – An Excellent Alternative Replacement To TrueCrypt

As a geek who has a passion for software, I often get on these kicks where I will focus on one particular software category. Lately, with all the news of various cloud based services being compromised, I started on the hunt for some good file/folder encryption software. What I was looking for was something that I could run as a standalone application (portable app) that could be executed, not only from my computer, but from a flash drive; PLUS, I wanted something where I could encrypt my files prior to copying them and making them resident in the cloud.

What I was finding that there are many encryption utilities out there; however, many of them I felt uncomfortable with due that they are not being actively updated and/or further developed. I wanted something that had weathered the changes in Windows operating system and was still being actively developed and promoted. As a matter of fact, TrueCrypt, one of the most recognized encryption utilities out there, recently experienced a setback and mysteriously vaporized leaving existing users wondering about the security of their data.

During my thought processes of all of this I remembered featuring on the blog (just over 2 years ago) a FREE encryption utility, called SafeHouse Explorer. Sure enough, after visiting and browsing the SafeHouse Explorer site, the software is still running strong and is current with Windows 8. They even offer a commercial version of their software.

After downloading SafeHouse Explorer and testing out the software, it was then I realized that with cloud storage being the thing, SafeHouse Explorer may have been ahead of its’ time when I first used it a couple years back. SafeHouse Explorer can be stored on the cloud where it can be downloaded and run from any Windows based computer. It also has the ability to create what is called self-extracting EXE encrypted storage vaults where you could encypt a bunch of files, package them as an EXE, and send them up to the cloud; THEN, when you need the files again you would download and run the EXE, enter your password, and the files are then accessible to you. If your cloud based service will not accept EXE files, simply upload the vault file

Following my testing of SafeHouse Explorer and using it in the various scenarious (i.e. as a portable app, as a cloud encryption solution) I can say SafeHouse Explorer is the way to go. My suggestion is to download, run and take the time to learn how SafeHouse Explorer works. You will not be disappointed:PLUS, you will gain the satisfaction that you have a solution in hand to protect files you store on the internet.

  • Complete full-featured stand-alone security solution.
  • Hides, locks and encrypts documents, spreadsheets, photos, videos and anything else.
  • Perfect for USB memory sticks and other portable media – even iPods!
  • Super strong 256-bit Twofish advanced encryption ensures your total protection.
  • Unlimited number of private storage vaults as large as 2,000 Gigabytes each.
  • Graphical password strength meter helps you choose strong passwords.
  • Can be run directly from USB memory sticks without prior Windows installation.
  • Can create self-extracting EXE encrypted storage vaults. Just click and run.
  • Fully-compatible with all other SafeHouse products and file formats.
  • Full version is 100% FREE and freely distributable. Never expires!

 SPECIAL NOTETo make SafeHouse Explorer a portable app, download the software and there is a feature in the software that makes it easy to transfer the SafeHouse Explorer program to your flash drive (or other portable media).


VIDEO – See SafeHouse Explorer In Action

 

An Ultra Light Mobile Browser For Your Android Phone That Is Small, Speedy and Secure

[FEATURED GEEK SQUEAK] An Ultra Light Mobile Browser For Your Android Phone That Is Small, Speedy and Secure – When it comes to web browsers it seems we get stuck on top named browsers (such as Chrome, Firefox, and Internet Explorer); but, did you know there are numerous other browsers out there that is competing on the Android mobile phone platform that is giving these browsers a run for their money?

A web browser that has become a mainstay on my Nexus 5 is CM (Clean Master) Browser-Fast. The install for this browser is SMALL (less that 2MB). It is SPEEDY (featuring a preload mechanism that makes browsing very fast). It is SECURE (warns you when browsing potentially fraudulent or malicious websites).

CM (Clean Master) Browser-Fast

Two things that stands out with me with CM (Clean Master) Browser-Fast is that it actually is fast and will protect your privacy from unsolicited tracking.

[ COMMENTS ARE WELCOME – CLICK HERE ]

Learn a byte at a time, at What’s On My PC, with Geek Squeaks’ — featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it… I just plain love tech!


MORE GEEK SQUEAKS

[FILE ENCRYPTION] A Small, Easy-To-Use Encryption Program – Drag’n’Crypt ULTRA is a small, easy-to-use encryption program using which you can protect confidential data from unauthorized access. You move the file to encrypt (s) simply on the program window (the drop zone ) and DCU encrypt the file (s) with the very safe Twofish encryption algorithm… @Drag’n’Crypt ULTRA

[COMPUTER SECURITY] Run software in an isolated environment to prevent it from making changes to your system –  Sandboxie is an innovative program that makes it possible to run applications in complete isolation from the rest of your system – in a sandbox. This means that any problems that may crop up in an isolated piece of software do not spread to other areas of your system; this help to protect against full system crashes, and also the spread of malware. Sandboxie can also be used to run web browser sessions in isolation so that any malicious web sites that may be encountered are not able to cause any damage outside the sandbox… @DownloadCrew

[DROWNING SIMULATOR] After Watching This You Will Think Twice About Not Wearing Your Life Jacket – @Sortieenmer.com

[WALLPAPERS] Take Your Desktop to New Heights with These Mountainous Wallpapers – @lifehacker

Mountainous Wallpapers

[MUSIC PLAYER] 3 Ways To Use Google Chrome As A Music Player For Local Files – What if you wanted to ditch your music player and use Chrome instead? With no additional apps or extensions installed, you can open an MP3 file in Chrome by dragging & dropping it on to a tab, or by using the Ctrl+O function and selecting it from your library and the file will play… @Addictive Tips

[RINGTONE MAKER] Free Ringtone Maker (Free Download) – an extremely simple and handy Windows software for making your own free ringtones… @musetips

[HOT TECH NEWS] Important Information If You Use TrueCrypt – At present, the reasons for the abrupt ending of TrueCrypt development are not known.  Various rumours persist, including NSA involvement, the web site being hacked, a spat among the developers, and more besides… @gizmo’s

[NEW CHROMEBOOK] ASUS Chromebook C200MA-DS01 11.6-Inch Laptop Coming To Amazon on June 26, 2014

ASUS Chromebook C200MA-DS01 11.6-Inch Laptop

Unprecedented 11-Hours Battery Life. 802.11 A/C Wireless for incredible speed. 16 GB solid state storage. 11.6″ HD LED display. Intel Bay Trail N2830 2.16 GHz (turbo 2.41GHz). 2GB DDR3. 1.2MP camera. 1x USB 3.0, 1x USB 2.0, 1x HDMI, SD card slot, Bluetooth 4.0… @Amazon


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Make Google Your Personal Dictionary

[FEATURED GEEK SQUEAK] Make Google Your Personal Dictionary – One of my favorite Google Search tips is how to use the dictionary feature that is available in Google. It is quite simple, faster than grabbing a dictionary off of the shelf, and is one of the most overlooked tips out there.

Simply visit Google’s Search Page and type in the word define followed by a colon and the word you wish to get a definition. For example, if you typed define:computer you would get a result similar to what you see below.

[ COMMENTS ARE WELCOME – CLICK HERE ]

Learn a byte at a time, at What’s On My PC, with Geek Squeaks’ — featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it… I just plain love tech!


MORE GEEK SQUEAKS

[COMPUTER SECURITY] Don’t fall for tech support scammers offering costly PC cleanup ‘solutions’ – We’re all familiar with how telemarketers occasionally interrupt our lives, often at the most inopportune times. However, even more upsetting is receiving an unexpected phone call claiming that your PC has been infected with viruses and can be cleaned only for a hefty fee. What’s worse is that the caller is almost certainly a fake — a bad guy who pretends to work for Microsoft or one of our partners… @The Official Microsoft Blog

[ANDROID – HOW TO] How to set up Daydream: Android’s overlooked, customizable docking screen – Let’s say I want to use that screen while my phone is charging or docked. Let’s say I want to use it as a digital clock or photo frame. I’m in luck (and so are you), because Android 4.2 and up actually has a little-known, built-in feature that allows me to do just that! It’s called Daydream, and it’s a quick, easy way to customize your Android device’s charging/docking screen to display practically anything you want… @greenbot

[SOFTWARE] Sandboxie – This innovative program makes it possible to run applications in complete isolation from the rest of your system – in a sandbox. This means that any problems that may crop up in an isolated piece of software do not spread to other areas of your system; this help to protect against full system crashes, and also the spread of malware. Sandboxie can also be used to run web browser sessions in isolation so that any malicious web sites that may be encountered are not able to cause any damage outside the sandbox… @Download Crew

[ALL-IN-ONE COMPUTER] Lenovo IdeaCentre C365 19.5-Inch All-in-One Touchscreen Desktop@Amazon

Lenovo IdeaCentre C365

Lenovo IdeaCentre C365

[TECH NEWS] U.S. may act to keep Chinese hackers out of Def Con hacker eventWashington is considering using visa restrictions to prevent Chinese nationals from attending popular summer hacking conferences in Las Vegas as part of a broader effort to curb Chinese cyber espionage, a senior administration official said Saturday… @Yahoo News

[WALLPAPER] Desktop wallpaper by Adan Vivar@Wallpapers Room

Desktop wallpaper by Adan Vivar


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

The Easiest Way To Tell If The Windows 8.1 Update Is Installed On Your Computer

[FEATURED GEEK SQUEAK] The Easiest Way To Tell If The Windows 8.1 Update Is Installed On Your Computer – If you are confused about Windows 8.1 and the Windows 8.1 Update, you are not alone. In a nutshell; Windows 8.1 was an update to Windows 8.  Windows 8.1 Update, which is a completely different thing from Windows 8.1, is an update to Windows 8.1 (and Windows 8). Still confused?

The bottom line is that you want to make sure your computer is completely up to date. To determine if you have the Windows 8.1 Update installed go to the Start screen. If you see a Search button near your account name at the top of the Start screen, you already have the update.

image

[ COMMENTS ARE WELCOME – CLICK HERE ]

Learn a byte at a time, at What’s On My PC, with Geek Squeaks’ — featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it… I just plain love tech!


MORE GEEK SQUEAKS

[COMPUTER SECURITY] SOLUTION: “This is Microsoft Support” telephone scam – Computer ransom lockout – A trend of the past couple of years has been for scammers to contact computer owners directly via telephone in the United States in an effort to convince them that there is a problem with their PC and they’ll need to pay to have it fixed.  In general, these people cannot fix anything, and instead they merely charge exorbitant fees for absolutely nothing. In other words, they scam you… @Triple-S Computers

[HARDWARE] A Programmable Computer Mouse – Do more, more easily with your mouse. With soft rubber grips and a contoured shape, this full size mouse provides all-day comfort, while Back/Forward buttons, side-to-side scrolling plus zoom and programmable buttons empower you to click, scroll and zoom with the flick of a finger… @Amazon

Logitech M510 Wireless Mouse

Logitech M510 Wireless Mouse

[ANDROID] magicApp by magicJack – Get unlimited local & long distance calling to the U.S. and Canada with magicApp. For international callers, make FREE unlimited magicApp-to-magicApp calls worldwide… @Google play

[FILE ENCRYPTION] Quick Crypt – A portable solution for encrypting and decrypting files.  Many features… @Valkova

[TECH NEWS] Lenovo Slides Past Apple to Claim #3 PC Sales Spot in U.S., Posts Record Earnings – Lenovo also made significant inroads in the U.S. market, where HP and Dell are still in first and second place. Lenovo’s strengthened PC lineup allowed it to vault past Apple to claim the third place spot for its fiscal fourth quarter (January through March 2014)… @DailyTech

[HOW TO] Averting Disaster – A Guide To Computer Backups (2014) – Backups are simply duplicates of data which are archived, and which can be restored to a previous point in time. The key is the data must be duplicated, and you have to be able to go back to an earlier time. Anything that doesn’t meet both of those requirements is not a backup… @AnandTech

[WALLPAPER] Cracked Windows Computer Screen@The Paper Wall

Cracked Windows Computer Screen


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – December 13, 2013

MONITOR THE STATUS OF YOUR FAVORITE WEB SERVICES, with “down right now”, to let you know when there is service trouble…  Thanks to GEGeek for this submission…

CLEAN MASTER (CLEANER) FREE – MOST DOWNLOADED ANDROID CLEANER and Ram Booster recently udpated with a new user interface (that looks awesome). This is a great utility to help keep your Android phone or tablet running in tip top shape…

TODAY’S RANDOM TECH SITE PICK is a site that gives you hope; Computer Hope that is…

A WEAK-PASSWORD PREVENTION SYSTEM that will try to guess each character of your password before you type it.

WATCH, PAUSE, AND RECORD TV ON YOUR PC, in a window or full screen.

[ COMMENTS ARE WELCOME – CLICK HERE ]


down right now

image

You know the feeling: you’re happily using one of your favorite web sites when, all of a sudden, you’re interrupted by an error message. It can be frustrating. Is there a bug in the web site, or is your Internet provider acting up again? Where can you turn to find out if others are having the same problem?… CHECK IT OUT HERE


Clean Master (Cleaner) – FREE

(Android)

image

Memory Boost/Task Killer – Boosting apps and games speed is much easier with Clean Master.

Clean – Delete those junk files (cache and residual) that take up valuable storage space.

Clear
– Protect your privacy by deleting personal information like your search and browser history

App Management
– Move apps to an SD card, remove pre-installed apps and backup .apk files

GET IT HERE


Today’s Random Tech Site Pick (with sample article)

image

(as listed @ Bookmarks4Tech.com)

Replace Windows Explorer with Multi Commander – Microsoft Windows Explorer is great for general file management tasks. However, there are several more complicated tasks that Windows Explorer is unable to handle. This is where Multi Commander can come in handy… READ MORE


Use this Site to Help You Create Stronger Online Passwords

@ Gizmo’s

image

Want a way to help you create passwords that are harder to crack? The web has many sites that claim to test how strong your passwords are. Many of these simply look at the length, which can be misleading. Others try to do better by looking at the variety of character types used. However, many of the tricks used by hackers are not tested by these sites. Now Microsoft Research has come up with a new site that is more sophisticated and may help you to create better passwords… LEARN MORE ABOUT THIS SITE (AND TEST YOUR PASSWORDS)


Hauppauge 1196 WinTV-HVR-1250 PCI-E x1 TV Tuner

image

The WinTV-HVR-1250 lets you watch ATSC digital TV as well as QAM digital TV and analog cable TV directly on your computer. ATSC digital TV, which typically requires an antenna for reception, is the over-the-air HDTV standard for North America. ATSC broadcasts range in resolution from standard definition up to the high definition 1080i format… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – November 13, 2013


WOT – WEB OF TRUST hits the 100 million download mark!!!

IMPORTANT TO KNOW – Did you know that taking a picture with your digital camera, tablet, or smartphone may be revealing the precise location where the picture was taken? Read the article below from TCAT Shelbyville to see why this can come back to haunt you…

NEW FEATURE IN GMAIL now gives you the ability to view attachments and save files directly to Google Drive without ever leaving Gmail

CONNECT YOUR PHONE TO YOUR TV with this slimport HDMI adapter. The phone has to be slimport or MyDP compatible to work. Your phone, in essence, turns your TV into a media center.

Geek Squeaks’ features a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

[ COMMENTS ARE WELCOME – CLICK HERE ]


WOT is celebrating 100.000.000 downloads!

WOT – Web of Trust is a browser add-on (for Chrome, Firefox, Internet Explorer, Opera and Safari) that serves as an aid in helping you determine what sites are safe and what sites potentially are not. I have used WOT since day one, through the thick and thin, and have come to rely on its’ purpose. Congratulation to the WOT team for reaching the 100 million milestone and for the FREE service that is provided to help protect us on the internet.

Watch Video To  See WOT In Action

  • Traffic light style icons guide you find trustworthy links on search engine results, social media, online email, and many popular sites
  • You can leave your own ratings to help other web users stay safe
  • Third-party trusted sources provide technical security
  • It’s fast, free, and easy-to-use
  • Interested to know how the WOT system works? Learn more here

GET IT HERE


Remove EXIF information from your pictures

@ TCAT Shelbyville

Did you know that today’s digital cameras and smartphone cameras will implant into the EXIF data of the picture the lattitude and longitude of where the picture was taken? IMPORTANT – You need to read this article to learn about the consequences of this and what you can do to stop it.

image

Most people still don’t know that their tablet, camera or smartphone might be tagging their latitude and longitude.   Why is this dangerous?  It can show the location of where you or your family is at.  It can give away corporate data or information that can harm your corporation… READ MORE


Attachments in Gmail,
now with the power of Google Drive

@ Google | Official Blog

Gmail continues to improve and these recently announced improvements are BIG!

image

You’re probably used to downloading email attachments, but each of those files takes time to download, eats up space on your device, and can get buried deep inside your “Downloads” folder. With today’s update to Gmail, you can skip that whole process. Instead, you can view attachments and save files directly to Google Drive without ever leaving Gmail, making it easy to access them later from whatever device you’re on—computer, phone or tablet… READ MORE


Connect SlimPort (or MyDP) Enabled Smartphones And Tablets To TVs, Monitors, Notebooks And Projectors

SlimPort HDMI Adapter

image

This HDMI adapter connects SlimPort® or MyDP-enabled smartphones and tablets to TVs, monitors, notebooks and projectors with an HDMI connection. Capable of Full HD resolutions, this adapter displays the content of your mobile device on the big screen for all to share. Enjoy multi- screen productivity with the connection of a simple cable. Unlock the full power of your device for endless productivity and high definition entertainment… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Today’s Geek Squeaks – October 22, 2013

Today’s Geek Squeaks’ consists of a NEW Geek Squeaks layout, Malwarebytes Anti-Malware for Android, a small portable app called Snap2Html (to generate html folder listings), and some of the best selling tablet PCs that are out there!

Geek Squeaks’, features a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!
 
 

Trying A NEW Look With Geek Squeaks’

image

As I continue to transform the blog toward the Geek Squeaks’ theme, which I am truly enjoying,  I am looking to find the best way to layout and present information to you so that you can quickly get a good idea of what the content of the post is about.

The layout I am experimenting with, starting today, begins with a brief intro summary followed up with brief mini-posts with links to the larger picture. If you subscribe to the blog via email or rss feed, you will generally see the brief intro summary and hopefully that will entice you to visit and explore the site more.


Malwarebytes Anti-Malware Has Gone Mobile

Many of you, I am sure, are aware of Malwarebytes Anti-Malware that is available for your PC. Let it be known that the developers of Malwarebytes has released an Android version for your smartphones and tablets…

image

The world’s most popular anti-malware technology protects your phone or tablet from malware, infected apps, and unauthorized surveillance… GET IT HERE


Snap2HTML

This utility I currently use to take a snapshot of my program files directory and my portable apps directory. I do this in the event of a system crash. I can refer back to this snapshot to see what programs I had installed. I can see where Snap2HTML could be useful in a variety of scenarios.

image

Snap2HTML takes a “snapshot” of folder structures on your harddrive and saves as HTML files. What’s unique about Snap2HTML is that the HTML file uses modern techniques to make it feel more like a “real” application, similar to Windows Explorer, displaying a treeview with folders that you can click to view the files contained within (see example output). There is also a built in file search. Still, everything is contained in a single HTML file that you can easily store or distribute… GET IT HERE


Best Selling Tablets

image

Tablet PCs are where it is at… Desktop sales continue to decline because of these slim, easy to carry and easy to use computer devices. If you do not own a tablet, I encourage you to visit Amazon to explore the best selling tablets; not necessarily to purchase one, but to explore the specs, customer reviews and to learn more about these newest innovations in the world of computing… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com


Today’s Geek Squeaks – September 12, 2013

A summary of Today’s Geek Squeaks:

Squeak #1: If you are looking for a level of protection when browsing the internet, then you may want to use (install) “the new” Web of Trust (WOT). WOT warns users about websites with potential issues. I have used WOT for years; BUT, one problem with WOT was that some sites, honest in nature, were being improperly rated. “The NEW WOT” is to change that. If you don’t know what WOT is, check it out (see below);

Squeak #2: Now this is something to really think about. The same cable that we often use to connect to a computer to charge the phone could be compromising your data; especially, if it is not your computer you are using. Please read the article below from TechNewsWorld (see below);

Squeak #3: If you are into assisting others on their computers, then you need to check out TeamViewer. I use the FREE version of TeamViewer to provide remote support and actually have it setup on my home network to access the desktops on all my PC’s (see below); AND,

Squeak #4:  Today’s featured tech product is something that is very cool and is an example of the future.  It is a smartphone enabled deadbolt, called KEVO (see below)…

[ CLICK HERE TO LEAVE A COMMENT ]

Plan on seeing  a lot more of Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


Web of Trust – Rating Feature Is Completely Revamped

image

Web of Trust (WOT), a crowdsourced website reputation service with over 90 million global downloads, has announced a new version today. The renewed WOT significantly enhances the user experience with improved visibility to reasons behind website reputations.

The new WOT prompts users to provide specific reasons for their website ratings. Users rating a site are requested to select at least one reason – labeled as a ‘category’ – to explain their rating… READ MORE

GET WEB OF TRUST HERE


LockedUSB Keeps Devices Safe While They Charge

@TechNewsWorld

image

LockedUSB is a small firewall adapter that plugs into a USB charging port. The smartphone cable plugs into the device, securing data lines and preventing automatic data syncs from taking place… READ MORE


TeamViewer – All-In-One Software For Remote Support

image

TeamViewer is a simple and fast solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy… GET IT HERE


With Kevo Your Smartphone Literally Becomes a Key

image

With Kevo, your Smartphone is now your key. No more fumbling for your keys. Keep your phone in your pocket or purse and just touch the lock to open. No Smartphone? No Problem. Enjoy the same touch to open convenience with the fob… CHECK IT OUT HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

[SUPER BLOGROLL][GE GEEK][DOWNLOADS][TECH NEWS]

Today’s Geek Squeaks – August 21, 2013

A summary of Today’s Geek Squeaks:

Squeak #1: To help protect your kids (and yourself) on the internet from sexually explicit websites, I encourage you to use the DNS service by MetaCert (see below):

Squeak #2: Did you ever wonder if anyone is tapping into your wireless network and robbing you of bandwidth (and possibly data)? Check out this little wi-fi tool designed to monitor your wi-fi network for intrusion (see below);

Squeak #3: Windows 8.1 will soon be here.  One of the new options is giving you the ability to log directly into your desktop, instead of the Start Screen.  Read the article below, from bleepingcomputer.com that shows you how to take advantage of this option; AND,

Squeak #4: There are so many variations of cable connections these days.  Take a look at this kit by Belkin that will help eliminate some of the clutter (see below)…

[ CLICK HERE TO LEAVE A COMMENT ]

Plan on seeing  a lot more of Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!

See An Endless Stream Of Geek Squeaks’ [ HERE ]


MetaCert DNS For Family Safety

image

The MetaCert DNS is the world’s most sophisticated method of blocking pornography without blocking access to innocent websites. It blocks over 655 million pages of sexually explicit content – or 32+ billion URLs… READ MORE


Essential Tool For Everyone Running A Small WiFi Network And Striving To Keep It Secure

SoftPerfect WiFi Guard

image

SoftPerfect WiFi Guard will alert you if your network is used without your knowledge. It is a specialised network scanner that runs through your network at set intervals and reports immediately if it has found any new connected devices that could possibly belong to an intruder… GET IT HERE


How to sign in directly to the Windows 8.1 desktop

@ bleepingcomputer.com

image

One of the biggest issues many people have had with Windows 8 is that it automatically logs you into the Windows 8 Start screen rather than the traditional Windows desktop. For those people who do not want to use the Start screen and instead work off the desktop this change has been very frustrating. If this has been an issue for you, Windows 8.1 allows you to skip the Start screen and boot directly into the desktop… LEARN HOW HERE


Belkin F3X1724 7-in-1 Retractable Cable Travel Pack

image

This convenient kit offers a great solution for the mobile professional. It gives you an easy way to connect your USB and networking devices to your notebook computer, virtually anywhere you go… SEE HERE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Powered by WordPress.com.

Up ↑