GMF Computers
  • Home
  • Home Solutions
  • Business Solutions
    • Network Support
    • CarePackages
    • Remote Backup Services
  • Deals and Promotions
  • About GMF
  • Contact Us
  • Blog

Comodo's IceDragon Web Browser

3/27/2017

0 Comments

 
Picture
Malware is a pretty big issue nowadays. Hundreds of thousands of devices are being infected daily, worldwide and those numbers are only increasing with each passing day. 

We get malware when we are browsing the internet, clicking on links that we don't really know about, where they are from and what type of damage they might cause us. I think it large part we are so absorbed by how connected the internet makes us feel - it can get instant gratification by clicking on a link to a story that sounds or looks funny, or by clicking on an ad for that new pair of shoes or jewelry you always wanted. We fail to actively and consciously protect ourselves from the dangers that the internet houses. For someone like myself, I am reasonably equipped both with my equipment and software and my mind to protect myself against malware and phishing attacks, although I am by no mean immune. For the average joe, however, who might not fully understand the potential risk, or perhaps they are fully aware but don't really know who to go about protecting themselves, there are simply tools out there that can help. 

One that comes to mind this morning is Comodo IceDragon. Comodo IceDragon, aside from having a pretty awesome name, is a web browser that actively helps protect you from malware and phishing scams. Comodo IceDragon has malware scanning in the browser with SiteInspector and it runs through the companies secure DNS service, which is helpful because it means the web browser has access to a constantly updated list of unsafe sites and links. The web browser also hosts a number of easy to use features for things like social media and it is very user friendly. The browser it also free. Visit their website to learn more about Comodo IceDragon https://icedragon.comodo.com/. If you are concerned about malware and your web browsing I highly recommend this web browser. 
0 Comments

Google Chrome 'Font Wasn't Found' Malware

2/23/2017

0 Comments

 
Picture
With around 40-50% of all browser users worldwide using Google Chrome, it makes sense for hackers to target Chrome.  Hackers are becoming more and more savvy and executing their hacking techniques with more finesse. Their hacking techniques are looking more and more legitimate and this can spell disaster if you are not vigilant in your computer use.

Chrome users need to be on the lookout when browsing the web and visiting websites that are not secure or trusted. Lately, hackers have been using website exploits in Chrome to try and get you to download or update your 'language pack' that embeds malware into your computer system. 

​It is going to look something like this:

Picture
Unfortunately, the hackers make the premise sound and look so believable it is hard to spot that it is, in fact, a hack. Also, unfortunate, if you do end up falling for this hack your system will be compromised by viruses or malware that could potentially put your system and personal information at risk. It also seems that Chrome and other anti-virus software (premium or not) are not yet picking up on this virus/malware. 

If you come across this particular hack close all dialogue boxes and navigate from the website immediately. Simply having the dialogue box show up on your computer prompting you to download or update is not enough for your computer to be infected. However, if you proceed with the prompts, download and execute the file then your computer will be infected. 
The best thing you can do is be vigilant. New hacks, viruses, and malware are being released daily and it is almost impossible to keep up with them all. No matter how legitimate something looks, be critically and if you have the smallest sense that something might be amiss, then I strongly suggest you either 1. do your research before you proceed or 2. call a professional who can check the legitimacy of whatever you are about to do.  

Malwarebytes 3.0 is the next-gen security program that protects you from the most advanced (zero-day) threats, making antivirus obsolete.The new price for Malwarebytes 3.0 is $39.99/year for 1 PC.
0 Comments

BackDoor Agent - Malware 

8/25/2016

0 Comments

 
Picture

I decided to write about this today because one of our clients was a victim of this particular piece of malware. ‘BackDoor Agent’ is a malicious program that has affected around 500,000 people, worldwide. While that number is particularly low compared to many other viruses and malware, this one deserves special mention because it gives hackers the ability to remotely access your computer system.

Once the Hackers have access to your computer system they can transmit information, modify files and install other software that is likely unwanted. These types of programs are called a ‘Trojan Horse’.  If you know anything about Greek mythology or maybe you have seen the movie Troy, you likely know the general premise behind the Trojan Horse. In Greek mythology, the Greeks constructed a huge wooden horse, hid men within it. The Greeks as a manner of subterfuge got into their boats and sailed away, leaving the Trojan Horse behind. The leaders of Troy thinking they have won, hauled the Trojan Horse inside the walls of Troy, where the armed men inside waited until night fall to attack.

In a similar way, Trojan Horse malware, are sent to you, usually through email (but not always), the computer user unsuspectingly opens the email with the attachment thinking something important has just arrive. However, they have just invited inside the firewall of their computer a Trojan Horse. These Trojan Horse’s sometime carry relatively harmless pieces of malware and sometime, they contain malware of a much greater threat. The greatest indicators of a Trojan Horse on your computer will be the degradation in computer performance and the appearance of unwanted programs that you don’t recall downloading.  
​
If you think you are the victim of a Trojan Horse or more specifically a BackDoor Agent, it is crucial that you get the malicious application off your computer immediately – if you are not comfortable doing this yourself, please bring your computer in to us at GMF Computers and we will remove any viruses or malware present and make sure your computer is up to date with the latest virus definitions and windows updates. 
0 Comments

Computer Maintenance

8/15/2016

0 Comments

 
Picture

Let’s admit it. We don’t do as good of a job as we should keeping our computers (and technology in general) maintained and while you might think it doesn’t really matter, or perhaps it is inconvenient, a properly maintained computer helps ensure it lives well beyond its typical life expectancy. And sure there are exception to this where either you got a lemon and it died well before it should have or you have a computer that just doesn’t want to die – but this are exceptions and not the rule.  

Cleaning and maintaining your computer means both the physical machine and the virtual computer itself. Dust impact can cause many problems inside the computer, for example, if there is not enough air flow and the computer begins to overheat it can cause serious damage to the components.  Not maintaining the virtual computer can cause a whole host of problems you would rather avoid.

Anti-Virus Scan

Scanning your computer is a no brainer, and yet sometime we simply forget to do it (I am no exception to this and I work in the industry). Most Anti-virus programs can be configured to run scans at predetermined times, once a month, once a week or whenever you really want it to. But these often times get missed, for example if your computer is shut down during the allotted time. Additionally, these scan are usually quick scans of the computer system which are not as thorough. That is why it is important to open your anti-virus program and run a ‘Full Scan’ at least once in a while – I would argue you should do this at least once a week.

Applications

Applications are seemingly harmless programs that sit on your computer. Some of them you use and some of them get automatically downloaded with other software you downloaded and other you downloaded but don’t use any more.  The problem with applications or any type of software is that they a prone to security failures and holes. This is not intentional (in most cases) but hackers and programs are good and exploiting holes in software. That is why it is so important to one, remove unwanted or unnecessary programs from your computer and two keep your applications up to date, because these updates often come with important security patches that help fix these security flaws.

Disk Maintenance

Your hard drive, I am begging you, literally on my hands and knees begging you to back up your data. Have you ever seen a grown man cry like a baby? As you all know, your hard drive is where all your data is stored, from application data to your personal data. What you might not know is that hard drives are incredibly finicky and temperamental creatures and if not properly cared for they will bite you. In some case you might get away with a minor flesh wound in other cases a limb. Okay, okay, enough with being dramatic.

Over time the data on your hard drive can become fragmented, data stored is not always stored in contiguous blocks which cause pieces of your data to become separated from the pack. Your computer in all likelihood can find those fragments but I would expect there to be some degradation in performance and wear and tear on the drive itself (they don’t live forever). Again, it is important to uninstall programs that are not frequently used so they are not taking up space on your hard drive. It is also important to clean up your temporary files and any files that are unnecessary. For example, sometime when you uninstall a program there are residual files that are left behind. Always a good idea to keep your downloads folder cleaned as well so you are not using up unnecessary space.

Do backup your data. This isn’t so much maintenance protocol but a keep your personal data safe protocol. Hard drives will stop working and if you don’t have your data backed up there are no guarantees that it can be retrieved. There are tools out there that will read your hard drive and give you some important information, for example, how many hours are on it, what the temperature is and if there are any bad sectors. This will help you determine if you need to replace your hard drive or not.

Quick side note: if you do decide to replace your hard drive, I highly recommend a SSD (Solid State Hard drive).  They are significantly more stable and faster.

Windows Updates
​

Windows, much like other pieces of software on your computer are prone to security flaws. As with other applications it is important to install Windows Updates, this will help protect your from any bugs within windows itself and also help protect your from any security flaws.

Computer maintenance is key, not only can it help protect you but it can increase the life of your computer. Some of these things you can do yourself – and I highly recommend that you do. However, if you want a complete top to bottom cleaning come in and see us at GMF Computers, we will clean your computer of any viruses and malware, do all your updates to windows and other software, clean out your temporary files, junk files, unnecessary files, clean your registry and do a dusting of your physical computer. Plus, we will test your hard drive and let you know its condition.


Picture
0 Comments

    Author

    GMF Computers

    Archives

    August 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016

    Categories

    All
    ATM
    BackDoor Agent
    Christmas
    Chrome
    CHUWI HI10 PRO
    Cleaning
    Cloud Storage
    Comodo IceDeagon
    Computer Maintenance
    Credit Card
    DDoS
    Debit Card
    Distributed Denial Of Service
    Dusting
    Ecryption Viruses
    Efficiency
    GMF Computers
    Google Chrome
    Hack
    HDD
    Home Network
    Intel
    Intel Core I9 X-series
    Kingston
    Malware
    Mechanical Drive
    Microsoft
    Microsoft Edge
    Microsoft Surface
    Preview Build 15002
    Privacy
    Ransomware
    Redstone 2
    Remote Access
    SDD
    Security
    Skimming Machines
    Smart Devices
    Smart Homes
    Smart Security
    Solid State Drive
    SpideOak
    Viruses
    WannaCry
    Web Browser
    Windows
    Windows 10
    Windows 10 Creators Update
    Windows Preview Build
    Windows Updates
    Zero Knowledge
    Zero Knowledge Systems

    RSS Feed

We Would Love to Have You Visit Soon!

Copyright © 2016 - 2017 GMF Computers. All Rights Reserved
  • Home
  • Home Solutions
  • Business Solutions
    • Network Support
    • CarePackages
    • Remote Backup Services
  • Deals and Promotions
  • About GMF
  • Contact Us
  • Blog