Computer Assistant
Free computer help and support. Answering all your computer related questions.
Saturday, 12 December 2015
A Fully Working Complete PC System for under £50?
Can you actually buy a complete PC with a 17" monitor, keyboard, mouse, essential software and all the cables needed to put it all together, for under £50? Well, the answer is a resounding Yes!CALL The Computer Assistant, Leeds on 0113 244 6460 TODAY
Thursday, 4 July 2013
7 Steps to Keep YOU Safe Online
If you use Microsoft Windows…
Fire up your Internet Explorer web browser and visit Microsoft Update. Just follow the instructions on the screen to update your system with the latest software. Next download and install Microsoft Security Essentials, which is their free antivirus software package.
If you use Mac OS X…
All you have to do is click the Apple logo in the top left of your screen, select “Software Update…”, and then follow along.
Download the Latest Java Plugins
Old java plugins is as good as no Java at all.
Hackers are now using Java to corrupt your computers, which is why U.S. Department Homeland Security is worried.
According to Reuters, hackers have figured out how to exploit Oracle Corp's Java software to install malicious software "enabling them to commit crimes ranging from identity theft to making an infected computer part of an ad-hoc network of computers that can be used to attack websites," the report said.
Java is widely used, which is why it's a prime target for hackers.
Latest Antivirus Software
Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically
This should not even have to be listed, if you don’t have anti-virus software installed, you’re asking for trouble! And if your reason for not installing anti-virus software is because it’s too expensive, then that can reason can be shot down because there are several free anti-virus programs out there that are considered better than commercial software packages
Do not Click on Links or Documents if Not Sure
The golden rule. The main way criminals infect PCs with malware is by luring users to click on a link or open an attachment. "Sometimes phishing emails contain obvious spelling mistakes and poor grammar and are easy to spot," says Sidaway of Integralis. "However, targeted attacks and well-executed mass mailings can be almost indistinguishable [from genuine emails]."
Expand Short links
Avoid phishing, malware, and viruses by examining short URLs before visiting them. Find out where links really take you.
go to www.longurl.org and confirm before clicking
GoogleShort URL:http://is.gd/w would Redirect you to
http://google.com
http://www.google.com
Different Password for different sites
You wouldn't have the same key for your home, car, office, safe, etc. For the same reason you shouldn't use the same password for all your online accounts
With individuals typically having anything up to 100 online accounts, the tendency has become to share one or two passwords across accounts or use very simple ones, such as loved ones' names, first pets or favorite sports teams. Indeed, research by Ofcom last month revealed that over half of UK adults (55%) use the same passwords for most, if not all, websites they visit, while one in four (26%) use birthdays or names as passwords. Any word found in the dictionary is easily crack-able. Instead, says Sian John, online security consultant at Symantec, have one memorable phrase or a line from a favorite song or poem. For example: "The Observer is a Sunday newspaper" becomes "toiasn". Add numerals and a special character thus: "T0!asn". Now for every site you log on to, add the first and last letter of that site to the start and end of the phrase, so the password for Amazon would be "AT0!asnn". At first glance, unguessable. But for you, still memorable."
Shut Doing your PC/Mac
When not using the PC/Mac, common sense dictates you shut down. PC/Mac left ON is an easy target for hackers. please read our other blog on RAT.
This is in no way a conclusive guides to statying safe online, but it is a step in the right diurection.
Friday, 14 June 2013
Stop Hackers/People Spying on YOU through your Webcam
If There’s a RAT in Your Laptop, You Won’t Know Who’s Watching You
What is a RAT (remote access Trojan)?
A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.
- Because a RAT enables administrative control, it makes it possible for the intruder to do just about anything on the targeted computer, including:
- Monitoring user behavior through keyloggers or other spyware.
- Accessing confidential information, such as credit card and social security numbers.
- Activating a system's webcam and recording video.
- Taking screenshots.
- Distributing viruses and other malware.
- Formatting drives.
- Deleting, downloading or altering files and file systems.
The Back Orifice rootkit is one of the best known examples of a RAT. A hacker group known as the Cult of the Dead Cow created Back Orifice to expose the security deficiencies of Microsoft's Windows operating systems.
RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks. The actions they perform can be similar to those of legitimate programs. Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn't alert the user that something's amiss.
To protect your system from RATs, follow the same procedures you use to prevent other malware infections: Keep antivirus software up to date and refrain from downloading programs or opening attachments that aren't from a trusted source. At the administrative level, it's always a good idea to block unused ports, turn off unused services and monitor outgoing traffic.
Thursday, 30 May 2013
Stop unwanted emails
It's unlikely work email is the only thing overloading you. The other thing taking up all that space in your inbox is spam, and while it seems impossible to get rid of, there are a lot of techniques you can use to keep it at a minimum. First, make sure you know which messages were sent directly to you and not to a mailing list, by coloring them in Outlook, highlighting them in Thunderbird, or turning on personal level indicators in Gmail. Next, you can avoid incoming spam by filtering the word "unsubscribe", and filter future spam by using a temporary, disposable email address from a service like Trashmail or Mailinator. With a few extra filters and tools, you can keep your inbox (mostly) free of any spam that comes your way.
Saturday, 11 May 2013
Welcome to Our Site
We will endeavour to answer common computer and Mac problem you are facing. Issues like my PC wont start, blue screen, windows on the loop and keeps restarting, screen to big, keyboard not working, screen freezing, computer slow performance etc
Friday, 10 May 2013
Blue screen, Black screen, Continuos restarting, Lost Doc/pictures ??...
- Are you thinking of Smashing that laptop, desktop, mac
- Are you honking you car to drive, taxi, bicycle, or bus to a repair shop/centre
- Are you feeling worried and terrified that your computer is damaged
The following are summary cause of simple issues we are likely to face. I also tried to insight to possible solutions
This could cause a non operational system. the system goes into a loop meaning it will boot up and then restart again and again continuously until you shut it down , sometimes it will just give you a black screen with an error message. Either way it is curable by just reinstalling/Recovering/Repairing the Operating System.
Composed by
Common sense is not very common
How to boot MAC Os in Safe Mode
- Be sure your Mac is shut down.
- Press the power button.
- Immediately after you hear the startup tone, hold the Shift key. The Shift key should be held as soon as possible after the startup tone, but not before the tone.
- Release the Shift key when you see the gray Apple icon and the progress indicator (looks like a spinning gear).
During startup in Mac OS X v10.4 through Mac OS X v10.6.8, you will see "Safe Boot" on the login window, which appears even if you normally log in automatically. During startup in Mac OS X v10.2 through v10.3.9, you will see "Safe Boot" on the Mac OS X startup screen.
To leave Safe Mode, restart the computer normally, without holding any keys during startup.
Additional Information
Advanced: If you can't Safe Boot with a keyboard
If for some reason you can't use the keyboard method to start in Safe Mode (the keyboard is missing or not working, for example), and you already have remote access to the computer, you can configure the computer to startup in Safe Mode via its command line
- Access the command line by either opening Terminal remotely, or by logging into the computer from another via SSH.
- Execute the following command in Terminal or on the command line:
sudo nvram boot-args="-x"
(If you want to start in Verbose mode as well, use sudo nvram boot-args="-x -v" instead )
- After using Safe Boot, to return to a normal startup, execute this command in Terminal or the command line:
sudo nvram boot-args=""
Safe mode in MAC ? What is it
- It forces a directory check of the startup volume. You may see a progress bar on the screen during this check, and the computer may take longer than usual to complete its startup.
- It loads only required kernel extensions (some of the items in /System/Library/Extensions).
- Mac OS X v10.5.6 or later: A Safe Boot deletes the dynamic loader shared cache at (/var/db/dyld/). A cache with issues may cause a blue screen on startup, particularly after a Software Update. Restarting normally recreates this cache.
- It disables all fonts other than those in /System/Library/Fonts (Mac OS X v10.4 or later).
- It moves to the Trash all font caches normally stored in /Library/Caches/com.apple.ATS/(uid)/ , where (uid) is a user ID number such as 501 (Mac OS X v10.4 or later).
- It disables all startup items and login items (Mac OS X v10.4 or later).
- In Mac OS X v10.3.9 or earlier, Safe Mode runs only Apple-installed startup items (such items may be installed either in /Library/StartupItems or in /System/Library/StartupItems; these are different than user-selected account login items).
Some features don't work in Safe Mode
Friday, 3 May 2013
Welcome to Our Site
Welcome to Our Site
We will endeavour to answer common computer and Mac problem you are facing. Issues like my PC wont start, blue screen, windows on the loop and keeps restarting, screen to big, keyboard not working, screen freezing, computer slow performance etc.