I have sent emails, tweets, posted links and articles on Facebook and so much more, all to warn you about the different crypto locker schemes out there. Apparently I failed to write a specific article on how to prevent it.
Hey you Linux and Apple people, you need to be alert for this too!
Here are the Four major things to do in order to prevent crypto locker with two additional options.
While I am upset with FedEx, I am even more upset with FeDex!
Just a reminder for you to not open all email you receive. This is a malware attachment. The real FedEx knows about these. http://www.fedex.com/us/security/prevent-fraud/email.html and http://www.fedex.com/us/update2.html
Instead of delving into the type of scam this is, Phishing, and instead of talking about the malware inside the zip file, I want to tell you to “just say no” and don’t open such emails.
Not so right email header
In this most recent series I have been going over the parts for building a PC, what I use and why.
In this exciting fun filled episode, I want to go over some of the software we use when building a computer. Let’s start with the most important part, the Operating system. I recommend Windows.
I know a bunch of you Linux people just started yelling at your screens. Don’t have a tizzy!
I learned on UNIX based systems back in the 80’s and from 2003 to 2006 I promoted, through free training, and on this blog several flavors of Linux. My issue with Linux was and is the “my version is better than your version” attitude while leaving the end user out of the equation. At one point Red Hat had their version of “automatic updates”. That was a good idea. They stopped doing that. Others instead of making a universal way to update and patch quarreled and squabbled, leaving those that just needed an operating system to run their business or home computers, out. Microsoft has one way to update and patch. Good for them. Continue reading
It has been a while since I put out a “technology” article and figure it is way past time to. I have been working on a couple reviews on the Galaxy S-5 phone, the Samsung SM-W750v (Windows phone), on a Jabra headset/Bluetooth, and my Lenovo IdeaPad Yoga. But as for the tech tips and how to’s I just have no excuse for not writing on them.
In this article I want to go over how I cleanup malware, spyware, crapware, worms, viruses, Trojans, rootkits and other infections. Partly because I have had a wave of them come in (customers get infected) and because you probably go new devices for Christmas and or got bored over the Holiday’s and surfed around and got infected. Continue reading
I have spoken and written about technology for many years now. One of the common themes I try to insist is that it is not always someone you can blames fault.
Very specifically, Worms, Trojans, Viruses and other malicious software is not often intentionally put on your computers or networks by a user or web site. There are these infections, literally living on the world wide web. The only way to “kill” them it to turn the entire internet infrastructure off and reset every device back to hardware level. Continue reading