Saturday, 12 December 2015

For All Your Mac Device Repairs Visit:

Save Money on Screen Repairs, Data Transfer and Recovery, Virus Removal, System Upgrades, Logic Board Repairs and Lots More!

MacStars provide friendly, efficient and experienced specialist services for iPads, MacBooks and iMacs. Located in Leeds city centre but serving all West Yorkshire, their No Fix No Fee, Free Diagnostics and No Fix No Fee policies are guaranteed to keep you smiling.

A Fully Working Complete PC System for under £50?

Can you actually buy a complete PC with a 17" monitor, keyboard, mouse, essential software and all the cables needed to put it all together, for under £50? Well, the answer is a resounding Yes!

CALL The Computer Assistant, Leeds on  0113 244 6460   TODAY

Thursday, 4 July 2013

7 Steps to Keep YOU Safe Online


Staying safe online is Priceless.

Do you use the same password for all websites? Do you over share on Facebook, twitter, hi5 etc? If so, you're a target for cyber criminals – whose computer scams are costing Britain £27bn a year.

I will briefly detail 7 simple steps that would help keep you safe online

Have The Latest Update ( Browser/Windows/Mac)
Outdated software is the enemy of online safety and security. Fortunately this process is easy and you should do this right now, even before reading the rest of this article.
If you use Microsoft Windows…
Fire up your Internet Explorer web browser and visit Microsoft Update. Just follow the instructions on the screen to update your system with the latest software. Next download and install Microsoft Security Essentials, which is their free antivirus software package.
If you use Mac OS X…
All you have to do is click the Apple logo in the top left of your screen, select “Software Update…”, and then follow along.


Download the Latest Java Plugins
Old java plugins is as good as no Java at all.
Hackers are now using Java to corrupt your computers, which is why U.S. Department Homeland Security is worried.
According to Reuters, hackers have figured out how to exploit Oracle Corp's Java software to install malicious software "enabling them to commit crimes ranging from identity theft to making an infected computer part of an ad-hoc network of computers that can be used to attack websites," the report said.
Java is widely used, which is why it's a prime target for hackers.


Latest Antivirus Software
Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically

This should not even have to be listed, if you don’t have anti-virus software installed, you’re asking for trouble! And if your reason for not installing anti-virus software is because it’s too expensive, then that can reason can be shot down because there are several free anti-virus programs out there that are considered better than commercial software packages


Do not Click on Links or Documents if Not Sure
The golden rule. The main way criminals infect PCs with malware is by luring users to click on a link or open an attachment. "Sometimes phishing emails contain obvious spelling mistakes and poor grammar and are easy to spot," says Sidaway of Integralis. "However, targeted attacks and well-executed mass mailings can be almost indistinguishable [from genuine emails]." 

Social media has helped criminals profile individuals, allowing them to be much more easily targeted, he adds. "They can see what you're interested in or what you [post] about and send you crafted messages, inviting you to click on something. Don't."


Expand Short links
Avoid phishing, malware, and viruses by examining short URLs before visiting them. Find out where links really take you.
go to www.longurl.org and confirm before clicking
EXAMPLE IS BELOW
Title:
GoogleShort URL:http://is.gd/w would Redirect you to
http://google.com
http://www.google.com

Different Password for different sites
You wouldn't have the same key for your home, car, office, safe, etc. For the same reason you shouldn't use the same password for all your online accounts
With individuals typically having anything up to 100 online accounts, the tendency has become to share one or two passwords across accounts or use very simple ones, such as loved ones' names, first pets or favorite sports teams. Indeed, research by Ofcom last month revealed that over half of UK adults (55%) use the same passwords for most, if not all, websites they visit, while one in four (26%) use birthdays or names as passwords. Any word found in the dictionary is easily crack-able. Instead, says Sian John, online security consultant at Symantec, have one memorable phrase or a line from a favorite song or poem. For example: "The Observer is a Sunday newspaper" becomes "toiasn". Add numerals and a special character thus: "T0!asn". Now for every site you log on to, add the first and last letter of that site to the start and end of the phrase, so the password for Amazon would be "AT0!asnn". At first glance, unguessable. But for you, still memorable."


Shut Doing your PC/Mac
When not using the PC/Mac, common sense dictates you shut down. PC/Mac left ON is an easy target for hackers. please read our other blog on RAT.


This is in no way a conclusive guides to statying safe online, but it is a step in the right diurection.



Friday, 14 June 2013

Stop Hackers/People Spying on YOU through your Webcam

If There’s a RAT in Your Laptop, You Won’t Know Who’s Watching You


RAT also stands for remote administration tool.

What is a RAT (remote access Trojan)?

A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.

  1. Because a RAT enables administrative control, it makes it possible for the intruder to do just about anything on the targeted computer, including:
  2. Monitoring user behavior through keyloggers or other spyware.
  3. Accessing confidential information, such as credit card and social security numbers.
  4. Activating a system's webcam and recording video.
  5. Taking screenshots.
  6. Distributing viruses and other malware.
  7. Formatting drives.
  8. Deleting, downloading or altering files and file systems.

The Back Orifice rootkit is one of the best known examples of a RAT. A hacker group known as the Cult of the Dead Cow created Back Orifice to expose the security deficiencies of Microsoft's Windows operating systems.

RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks. The actions they perform can be similar to those of legitimate programs. Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn't alert the user that something's amiss.

To protect your system from RATs, follow the same procedures you use to prevent other malware infections: Keep antivirus software up to date and refrain from downloading programs or opening attachments that aren't from a trusted source. At the administrative level, it's always a good idea to block unused ports, turn off unused services and monitor outgoing traffic.

Thursday, 30 May 2013

Stop unwanted emails

Top 10 Tricks for Dealing With Email Overload

It's unlikely work email is the only thing overloading you. The other thing taking up all that space in your inbox is spam, and while it seems impossible to get rid of, there are a lot of techniques you can use to keep it at a minimum. First, make sure you know which messages were sent directly to you and not to a mailing list, by coloring them in Outlookhighlighting them in Thunderbird, or turning on personal level indicators in Gmail. Next, you can avoid incoming spam by filtering the word "unsubscribe", and filter future spam by using a temporary, disposable email address from a service like Trashmail or Mailinator. With a few extra filters and tools, you can keep your inbox (mostly) free of any spam that comes your way.


Saturday, 11 May 2013

Welcome to Our Site

Welcome to Our Site

Welcome to our Blog. This site is very new and we will fully update and upload NEW Helps and tutorial over the next few weeks. Thanks for your patience.

We will endeavour to answer common computer and Mac problem you are facing. Issues like my PC wont start, blue screen, windows on the loop and keeps restarting, screen to big, keyboard not working, screen freezing, computer slow performance etc

Friday, 10 May 2013

Blue screen, Black screen, Continuos restarting, Lost Doc/pictures ??...



  • Are you thinking of Smashing that laptop, desktop, mac 
  • Are you honking you car to drive, taxi, bicycle, or bus to a repair shop/centre
  • Are you feeling worried and terrified that your computer is damaged
Please for these quick simple guides to determine the cause of the issue and possible solution.
Remember, the computer or mac technician would respect and think twice of ripping you off, if  you seems to know about the issue regarding your gadgets.


The following are summary cause of simple issues we are likely to face. I also tried to insight to possible solutions


A blue screen is mostly as a result of Hardware failure- Memory, Hard drive,Bios etc. It can be a very simple fault as well as a more serious fault. It’s called the blue screen of death because in most cases the parts involved would need replacement 

A black Screen is due to Hardware/Software failure- GPU,BGA,Inverter,Screen etc., the screen can be perfectly fine and than go black simply because the graphics card has failed or the inverter is defective also the backlight could be faulty. So remember just because the screen is black and not displaying that does not mean that the screen is broke or computer is dead.

Lost Documents/Pictures It is very easy to accidently delete important documents or pictures, don’t worry, most deleted files can be recovered. Even if your hard drive failed on you and it cannot be repaired and has to be replaced, don’t worry data recovery  (document and pictures and so on)  from the broken hard drive is a possibility. 

No Charge  Laptop not Charging? There are also a few reasons why a laptop does not charge, its either your power supply is broken or the dc jack in your laptop could be broken or loose or a connection failure on the motherboard or even faulty battery.

DIY Disaster Sometimes when we clean up our Laptop, computer, tablet we erase important files on the system not knowing that we did so and in that case corrupt the Operating System. 
This could cause a non operational system. the system goes into a loop meaning it will boot up  and then restart again and again continuously until you shut it down , sometimes it will just give you a black screen with an error message. Either way it is curable by just reinstalling/Recovering/Repairing  the Operating System.


Composed by

Bianca
Common sense is not very common

How to boot MAC Os in Safe Mode

To start up into Safe Mode (to Safe Boot), do this:

  1. Be sure your Mac is shut down.
  2. Press the power button.
  3. Immediately after you hear the startup tone, hold the Shift key. The Shift key should be held as soon as possible after the startup tone, but not before the tone.
  4. Release the Shift key when you see the gray Apple icon and the progress indicator (looks like a spinning gear).

During startup in Mac OS X v10.4 through Mac OS X v10.6.8, you will see "Safe Boot" on the login window, which appears even if you normally log in automatically. During startup in Mac OS X v10.2 through v10.3.9, you will see "Safe Boot" on the Mac OS X startup screen.

To leave Safe Mode, restart the computer normally, without holding any keys during startup.

Additional Information

Advanced: If you can't Safe Boot with a keyboard

If for some reason you can't use the keyboard method to start in Safe Mode (the keyboard is missing or not working, for example), and you already have remote access to the computer, you can configure the computer to startup in Safe Mode via its command line

  1. Access the command line by either opening Terminal remotely, or by logging into the computer from another via SSH.
  2. Execute the following command in Terminal or on the command line:

    sudo nvram boot-args="-x"

    (If you want to start in Verbose mode as well, use sudo nvram boot-args="-x -v" instead )
     
  1. After using Safe Boot, to return to a normal startup, execute this command in Terminal or the command line:

    sudo nvram boot-args=""

Safe mode in MAC ? What is it


Safe Mode is the state into which you can start up your Mac by performing a Safe Boot. To perform a Safe Boot, press and hold the Shift key immediately after your Mac starts up. Continue holding down the Shift key until a gray Apple logo appears on the screen.

Starting up into Safe Mode does several things:
  • It forces a directory check of the startup volume. You may see a progress bar on the screen during this check, and the computer may take longer than usual to complete its startup.
  • It loads only required kernel extensions (some of the items in /System/Library/Extensions).
  • Mac OS X v10.5.6 or later: A Safe Boot deletes the dynamic loader shared cache at (/var/db/dyld/). A cache with issues may cause a blue screen on startup, particularly after a Software Update. Restarting normally recreates this cache.
  • It disables all fonts other than those in /System/Library/Fonts (Mac OS X v10.4 or later).
  • It moves to the Trash all font caches normally stored in /Library/Caches/com.apple.ATS/(uid)/ , where (uid) is a user ID number such as 501 (Mac OS X v10.4 or later).
  • It disables all startup items and login items (Mac OS X v10.4 or later).
  • In Mac OS X v10.3.9 or earlier, Safe Mode runs only Apple-installed startup items (such items may be installed either in /Library/StartupItems or in /System/Library/StartupItems; these are different than user-selected account login items).
Taken together, these changes can help resolve software or directory issues that may exist on the startup volume.

Some features don't work in Safe Mode

Safe Mode can be useful for troubleshooting. However, certain Mac OS X features do not work in Safe Mode. For example, you can't use DVD Player, capture video in iMovie, use audio input or output devices, or use an internal or external USB modem. The behavior of some devices such as wireless networking may vary depending on computer and Mac OS X version.
Safe Mode in Mac OS X v10.5 or later also disables Quartz Extreme (hardware accelerated graphics). Applications that depend on Quartz Extreme will not open, and the Mac OS X menu bar will appear solid even if "Translucent Menu Bar" is enabled in Desktop & Screen Saver preferences.
Safe Mode in Mac OS X v10.6 or later also disables File Sharing access. This means you will not be able to mount Time Capsule disks or volumes being served by other computers running Mac OS X. 

Friday, 3 May 2013

Welcome to Our Site


Welcome to Our Site

Welcome to our Blog. This site is very new and we will fully update and upload NEW Helps and tutorial over the next few weeks. Thanks for your patience.

We will endeavour to answer common computer and Mac problem you are facing. Issues like my PC wont start, blue screen, windows on the loop and keeps restarting, screen to big, keyboard not working, screen freezing, computer slow performance etc.