• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

Product Review: A 4-in-1 Leisure Outdoor Backpack for Your Laptop

January 21, 2016 by Andy Thompson

Welcome to our first installment of our all new “Gears & Gadgets” column! With these articles we set out to provide well-researched feedback and review of items that could in fact make your “PC and tech life” more enjoyable. As the editor-in-chief, I took the liberty of penning the introductory issue and picking the first product: a 4-in-1 multifunctional backpack.

– Andy Thompson, Editor-in-Chief

This past Christmas, my wife and I decided to escape the wet and chilly weather common to the Pacific Northwest to spend some holiday time in Long Beach, CA.  Two weeks before the trip, I realized that instead of bringing my laptop shoulder bag I actually needed a different bag other than my usual Samsonite carry-on suitcase.  This bag needs to be more than just multifunctional.

I actually sat back and wrote down my “wish-list” for such an item:

  • It must provide a secure compartment for my laptop because I will be working occasionally during the trip.
  • It must be a backpack because I will use it during my daily excursion trips to various tourist attractions in L.A.
  • It should provide good compartment space, but not too big to carry, and it must fit in the overhead bin because it will be part of my 2-piece carry-on.
  • It should be well-constructed with high quality material to suit my ongoing needs when I am back in the Pacific Northwest; like hiking and camping trips.

To be honest, this list is very demanding and I wasn’t even sure this type of luggage even existed.  I started my quest using Amazon.com by searching for certain keywords.  After spending some time filtering through hundreds of results, I took specific interest in a multifunctional backpack that not only satisfied my list but also provided many more other options.  According to the product images and description, this is a 4-in-1 multifunctional bag that serves as: a backpack, a travel duffle bag, a messenger bag, or a carry bag.  I was quiet amazed and thrilled.

As an avid reader and technical writer, I have been a long-time Amazon member for over a decade.  My purchases have only been for books, including both paperbacks and lately Kindle versions.  But I had never purchased any physical goods from Amazon.  So I emailed the vender with a few questions, verifying that the bag can fit my 15” laptop.  I placed the order and the bag arrived the day before my trip so I had an opportunity to test the bag. The result?  It exceeded my expectation!  Here is what I like about this bag:

4-in-1 multifunctional

This bag can indeed be converted to one of the following types:

  • A backpack for daily usage or outdoor purpose.
  • A travel duffel bag that can be stuffed and tossed in your trunk.
  • A messenger bag that one can carry over one shoulder.
  • A handbag to carry with a single hand.

The design of conversion was well thought of because converting from one type to another takes less than 10 seconds, whether it involves removing / attaching shoulder straps or revealing / hiding the backpack shoulder straps.

A secure laptop storage

This bag can not only fit in my 15” laptop but also features a purposefully designed laptop storage compartment with secure strips.  The back of the backpack is also designed to provide enough cushioning for shock absorption as well as provide ventilation for extended comfort.

Roomy but not bulky

The capacity is amazing; although I only chose the medium size bag, it can host quite a bit of stuff.  I managed to stuff an entire IKEA sofa cushion (see image below) while my laptop snuggly tucked away in its own compartment.

Nevertheless, you can still stay stylish, in the event you decide to dress in business-casual and use it as a messenger bag or hand bag. It is because the bag doesn’t look bloated when not stuffed to its full extent.

Good design and quality

The material and construction of the bag is high quality, featuring waterproofing, terylene oxford nylon fabric and heavy duty durable luggage parts (I refer here to the buckles, the straps, the zips, etc.).


After returning from the holiday trip, I lost the bag to my 13-year old son who convinced me that he could make much better use of it as a school bag because he has way more “important stuff” to carry on a daily basis.  Well, I just ordered another one because I am more than convinced that this bag really fits my ongoing needs as well, whether for mountaineering, hiking, camping, backpacking, business travel, or personal vacation.

Recommendation and Offer

As is fairly obvious – I recommend this item highly.  So much so, that during the course of writing this column, I managed to get a few of my CompuClever colleagues convinced that this is a worthwhile purchase so I actually reached out to the vendor and managed to get some fairly awesome discounts.

Furthermore, I was also authorized to pass these discounts to our readers and subscribers for a limited period of time.  If you are interested in this multifunctional bag and want to purchase one for yourself, you can use the following coupons to get some considerable discounts.

  • Visit our very own online store at CompuCleverGear.com for an amazing deal of this versatile backpack.

That said, I have to provide a disclaimer: neither CompuClever nor myself will financially benefit from any purchase that may result from this article, which serves as a purely independent review.

I hope you enjoyed our very first volume of the newly minted “Gears and Gadgets” column.  We will bring more creative and smart high-tech products to you on a regular base.  If you have any specific interest that you would like us to cover, simply send us an email to: newsletter@compuclever.com

Filed Under: backpack, bags, Blog, Gears and Gadgets, Outdoor, suitcases

Windows 10 – How Many Stars Out of 10?

January 9, 2016 by Andy Thompson

We’re certain many PC users have been giving some thought to the tempting offer of upgrading to the new Windows 10 operating system while it is still free.  The question is: what are you getting with the latest – and possibly last – Windows operating system?  In our previous article on Windows 10 we covered an overview / introduction to the new system.  Here we are going to be as systematic as possible in assisting you to decide on whether it is right for you.  We want you to decide how good it is for you based on your present system.  And, we will be doing this using a Tech Support point of view.

Free for Now

So, for some PC users the Windows 10 upgrade is free at this time.  Microsoft is making…

…Windows 10 available as a free upgrade for compatible devices that are running genuine Windows 7 Service Pack 1 or Windows 8.1 Update.

The free upgrade is a full version of Windows (not a trial or introductory version) and is available until July 29, 2016. Once you upgrade, you’ll have Windows 10 for free on that device. [1]

If your computer is set to automatically download and install updates, there is likely a 3 GB file already stored on your computer to start the upgrade process.

Who Will Likely Benefit Most?

There are some easy answers here.  We’ll outline these as best we can.

– Windows Vista or XP users:  You will need to upgrade to Win 7 or 8.1 so you may as well be deciding on paying for the Windows 10 OS.  You will need to keep in mind the necessary system requirements for Windows 10.  The older the system, the less likely you will appreciate moving to Windows 10.  If your system came with XP or Vista, and you upgraded to Windows 7 or 8, the same caution applies, you may find the final result less than satisfying.

Windows 10 System Requirements Includes:
Processor: 1 gigahertz (GHz) or faster processor or SoC
RAM: 1 gigabyte (GB) for 32-bit or 2 GB for 64-bit
For the complete list:
https://www.microsoft.com/en-US/windows/windows-10-specifications#sysreqs

– Windows 7 (SP1) or 8.1 users:  You may have been waiting for others to take on the first installs of the new OS and the associated pains that come with using a brand new version of Windows.  The good news is the worst issues are patched by now.  The bad news is you will need to catch up on all the latest changes and how to get around using the newest OS.

Windows 10 blends the Start menu from Windows 7 with the new Tile screen approach used in Windows 8.  The operating system will detect if the system has a touch screen and if it does, it provides more access in the tile area than it does for non-touch systems.  So no matter which version of Windows you are currently using, you ARE going to see changes and need to adapt.  We will be covering some subjects in this area in future articles, but be ready to spend a little time acclimating to the new commands and tools.

Note:  If you have Windows 7 or 8.1 and want to stop the Windows 10 update there is a free program you can install to stop the “Get Windows 10” program that Microsoft installs to computers in order to upgrade to Windows 10.  You can get the file at the following site: http://ultimateoutsider.com/downloads/

First Things First – Issues

Perhaps one of the first considerations we need to address is to consider how well the computer is performing.  If you are encountering error messages or poor performance you should address the issues first.  Trying to update a system when the current operating system is not working properly is an invitation for larger issues.  If this is the case, we recommend that before you upgrade to Windows 10, consider using PC TuneUp Maestro to send an error report and description of the problem to us here at CompuClever Tech Support.

To create an Error report, do the following:

  1. From the Main Menu page, click the About button.
  2. In the Product Support section of the About page, click the Get Product Support button and select Submit PC Error Report.
  3. Read the information in the window that is displayed and click: I Agree and Continue.

Note: After error information is collected, a PC Error Analysis dialog appears including the total errors discovered and the type of errors.  You can read the Error report. Click the Read Error Report button and a text dialog appears with all the details of the report.

  1. Provide the necessary information and send the report as described.  This includes filling out the required fields and then clicking the Send to Support button.

Pros and Cons of Windows 10

If you are now at the point that your system can support the new upgrade, and you have no performance issues to deal with, you may need some more oversight on the overall pros and cons of the new OS.  Here are some of the notable pros and cons we have picked out for you.

Pros

  • The install itself is much simpler than previous versions and uses less technical jargon.
  • One of our technicians noticed that running Windows 10 on their home system (which previously had Windows 7), brought about better performance with comparable functions.
  • Internet Explorer, which was often the cause of security concerns for Windows, has been replaced with Microsoft Edge.
  • Windows 10 re-introduces the Start Menu so it is more familiar for long term users of Windows than the previous Windows 8 OS.  If you are familiar with Windows 8 do not be afraid, the Start Menu also includes the Tiled system of Windows 8 and supports touch screens.

Cons

  • Security in Windows 10 is improved but not air tight, and some of the new functions for connectivity (like Wireless connections), are raising concerns in some corners.  It is still advisable to use a third party program to secure your computer.  We recommend that you get CompuClever Antivirus PLUS – the AV solution that is vigilant, silent, and hassle free.
  • The new version of Windows appears to be incorporating advertising and charges.  For example, to stop the ads in Solitaire you need to pay $10 to Microsoft.  Some are easily resolved by simply finding another free program to replace them, but some charges may be harder to avoid.  This could be the last Windows operating system of its kind as Windows is moving towards a full “service” platform so the licensing for the program may end up being an annual charge.
  • Older applications may not work with the newer version of Windows.  If there is a program you absolutely must have, it is best to check with the maker of the program to see if it works with Windows 10 before upgrading.  There are stipulations but you can revert to your previous operating system – see the Note in the Conclusion section.  Also, check to see if your devices (printers, input devices like graphics tablets, etc.), are supported by Windows 10.
  • Windows 10 does not come with a viewer to play DVD files.  If this is a concern we would suggest looking at Ultra File Opener as it will handle many of these formats.
  • The new web browser, Microsoft Edge, does not automatically import your Favorites from Internet Explorer.  You would need to do the following:
    1. Open Microsoft Edge.
    2. Click on the “Hub”.
    3. Click “Import Favorites”.

Conclusions:

So how does Windows 10 rate?  As we have stated, this largely depends on you – your needs and your current PC system.  If you do have an older system and are happy with it we would advise the old adage: “if it ain’t broke…” stay with what you have until you decide you need to replace the hardware.  If your system has the available hardware to support the new upgrade, and you do not have any PC issues, and the pros outweigh the cons, you may want to give it a try yourself.  Keep in mind that you can restore to your previous operating system under certain conditions.

Restore to Previous OS:   You can restore to your previous operating system but you need to be aware beforehand that there may be challenges in doing so.  Microsoft lists the following methods:

-If it’s been less than a month since you’ve upgraded to Windows 10, you’ll be able to go back to your previous version of Windows from Settings > Update & security > Recovery.
-If your PC manufacturer provided the option, you might be able to restore your device to factory settings.
-If options to go back and restore factory settings aren’t available, you can use installation media and a product key to install a previous version of Windows.

If you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: newsletter@compuclever.com


[1] http://windows.microsoft.com/en-ca/windows-10/upgrade-to-windows-10-faq

Filed Under: Blog, improving performance, Newsletter, Windows 10, Windows tips

New Year Beginnings

January 2, 2016 by Andy Thompson

Over the past year we presented topics and subject matter related to PC enhancement.  Here, we highlight the best of these with respect to enabling you to take action against unwanted behavior or to improve your PC skills.  It is our hope that you can take a look at this year in review and select any article that will assist you to carry out your PC goals for the upcoming year.  It’s likely that you too have a wish list of items that need attention.

Here is an overview of the articles in three categories:

Privacy / Security:

  • A Personal Encounter with Ashley Madison (Oct 03)
  • Antivirus Solutions (Aug 01)
  • Signs of a PC Attack (Dec 05)

TuneUp / Clean Up:

  • Restore Browser Speed (June 13)
  • Don’t Get Bogged Down by Your Internet (May 16)

Support:

  • Groovy Windows Shortcuts (Oct 24)
  • The Art of PC Support… and You (Dec 12)

Here are the articles we have chosen from 2015.

A Personal Encounter with Ashley Madison (Oct 03)

About:  We examined both the overall effect of the greatest modern day hack as well as how it came to our attention via someone seeking our support and professional guidance.  This event involved hackers stealing close to 40 million users’ records from Ashley Madison.  The online “hook up” site that is marketed to married people and committed couples, made claims shortly after the incident that its members remained anonymous.  However, in early August of this year it was clear that this was not the case as hackers released details of millions of email addresses, billing information, and account details tied to the site.

Recommendations:  We rolled out some “be aware” recommendations that include: be aware of the data on your PC, be aware of what data becomes stored on your PC, and be aware of what data is sent from your PC.  Read the entire article here.

Antivirus Solutions (Aug 01)

About: Drum roll please… We were more than a little excited to unveil our latest product – CompuClever Antivirus PLUS.  And, what better way to do it than to include feedback from our user base on what they want in an AV product.  The most critical aspects of AV products include the potential of slowing down a PC, becoming a nuisance with popup messages, and virtually “taking over” operations of your PC.

Action: Take a look at what CompuClever Antivirus PLUS offers: best protection from virus attacks with lowest impact on PC speed.  Safety provided by proactive technology; safe online banking functionality; safe social networking; safe search and web browsing!  Here’s the AV solution that is vigilant, silent and hassle free.  Read the entire article here.

Signs of a PC Attack (Dec 05)

About:  PC attacks and hacks can be targeted at systems that are well guarded and protected.  Two examples: well used online sites such as Ashley Madison and the CIA director John Brennan’s email account.  Two of the biggest hacks this year!  We examined these and then brought the message home: we provided 11 signs that your PC is compromised or is the process of being attacked.

Action:  Be familiar with what many users experience and DON’T let it happen to you.  And don’t forget to get real protection for your PC in the form of AV protection.  CompuClever Antivirus PLUS has proactive technology that can monitor suspicious activity and can take the necessary action – including blocking your browser from surfing to malicious websites.  Read the entire article here…

Restore Browser Speed (June 13)

About:  This article was about web browser add-ons – those items that mysteriously appear on your browser toolbar with redirection links.  We asked the question… are you feeling intimidated by overbearing bully software that either slows you down to a stop, or adds functionality you do not need, or redirects you to online destinations you don’t want to travel?

Action:  We covered how these items get added to your PC and how to avoid them in the first place.  We also instruct you how to return your browser to its previous condition using PC Clean Maestro.  Read the entire article here.

Don’t Get Bogged Down by Your Internet (May 16)

About:  Where to start here?  This was the second article that we covered on Internet traffic slowdowns.  In the first article we revealed items that exist that are out of your control.  In this article we examine software running in the background which can also bring about web browser overload.  We looked at “bog down” – computer and network resources that can affect PC responsiveness.  We looked at installation of unwanted items on your PC.  One ubiquitous example is software packages such as McAfee Security Scan being bundled with Adobe Reader where you have to de-select it (opt out) from installing.

Action:  There were three action items that we covered here:

  1. Use PC Clean Maestro to examine and uninstall unwanted items using the Uninstaller tool.
  2. Use the Startup Manager available with PC TuneUp Maestro to enable and disable items that open automatically each time you start your PC.
  3. Use safe practices that include examining email attachments and files that can negatively impact your PC.

Read the entire article here.

Groovy Windows Shortcuts (Oct 24)

About:  This article was well received by our readership.  We dealt with the special case of the WindowsWindows logo keyLogo key – that Windows flag key on your keyboard.  This and other shortcuts can save a lot of time and energy.  Who doesn’t want to know how to navigate easily from one window to another, how to easily get to your desktop when you have multiple windows open, and how to find certain Windows tools that are typically hard to find?

Action:  Create a shortcut link to this article.  You then have access to shortcuts and PC tricks including:

  1. How to shake the active window so that all other windows are minimized to the taskbar.
  2. How to easily toggle from one window to another using the Alt + Tab key combo.
  3. How to easily magnify your screen.

Read the entire article here.

The Art of PC Support… and You (Dec 12)

About:  Drum roll, one more time… We are pleased to introduce Tech Corner articles from our technical support team!  This was the first one and in it we examined PC error messages and what to do when you come across them.

Action:  We provide instruction on writing down the required information, contacting technical support, and resolving the issue with the assistance of a qualified technician.  We also provide instruction on how to take a screenshot.  Read the entire article here.

Here’s to 2016…

We thank you for taking interest in our articles this past year.  May you continue the rediscovery of using your PC without stress or frustration in 2016.  Welcome to the New Year!

We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com

 

Filed Under: Blog, Windows tips

The Art of PC Support… And You

December 11, 2015 by Andy Thompson

Zen and the Art of Motorcycle Maintenance is a book we hold in high regard at CompuClever.  We would even go as far as to say that every technical support person should read it.  Not only is it a work of philosophical non-fiction, Robert Pirsig wrote it over a four year period while he was working as a technical writer creating computer manuals.

Pirsig describes the book by what it is not: “it should in no way be associated with that great body of factual information relating to orthodox Zen Buddhist practice. It’s not very factual on motorcycles, either.”  It can be considered an investigation of quality; the metaphysics of quality.  The main character strives to find the answer to what is considered good or “quality”.

We start from this point as we are seeking how to best determine the quality of our PC.  One valuable way to identify PC health is to examine and take full advantage of error messages.  They are technically specific and often incomprehensible to the person using the computer, which makes them rather maddening to appear on your screen.  In many cases people will report a problem and make some mention of an error message, but in most cases, use vague terms.

What To Do

While the frustration being encountered is understandable (we too have encountered issues on our systems and had to contact support to get it resolved), there are things that you can do to help yourself get the issue resolved faster.  First we suggest that you keep a pen and paper at your computer so that if an error message appears you can follow the steps we have laid out here:

1)  Write it down. Error codes will not normally tell the user what the issue is but, they should tell the company making the program what the error is and will typically provide specific information.  We of course are presuming the message comes from their application.  If the message is not from their program it can be used to research the issue and to find a solution.

You can also gather a “screenshot” of the desktop and send it attached to your email asking for help.  See the section on Screenshots below for more information.

2)  Describe steps leading to the error. Take note of what was being done on the computer before the error appeared.  By doing so you can then see if performing the steps always results in an error or not.   If it does, this information will help the technician zero in on what the cause of the issue is faster.

3)  Contact tech support. If what you are trying to do is something that is very important you can tell the technician when you contact the technical support team.  If the error cannot be immediately resolved a good technician should be able to advise you as to how to get the task completed to lessen the pressure you are under.

4)  Don’t Delay. Report the issue right away rather than spend hours in frustration.  You need to let the support team know and, keep in mind, perhaps the issue is one they have resolved for others and they can get you going much faster than if you attempt it alone.  You can try to resolve the issue on your own but the sooner you ask for help the sooner you will find a solution.

Screenshots

Taking a screenshot will save you on writing things down.  For a new user this may feel like more than what you want to take on.  There are ways to make this easier on yourself.

For people with digital cameras or cell phones, taking a picture of the screen and sending the image is an easy way to include detailed error information.  Do not make the picture too small – pictures of computer displays are usually quite poor due to the camera shutter speed being faster than the refreshing of the screen.  Smaller images can be very hard to read and resizing them to make them larger results in a fuzzy image.

If you do not have a device that can take a picture there are other ways to gather this information.  Taking a screenshot using onboard Windows functionality varies depending on what operating system you are running.  We suggest doing a search online.  One good source is www.wikihow.com.  You can refer to this article: http://www.wikihow.com/Take-a-Screenshot-in-Microsoft-Windows.

There is also a free application called “Jing” which you can use to take a screenshot and save it to the internet.  Then you can simply send the link of the image as part of the help request.

Jing:    To get the program click here: https://www.techsmith.com/jing.html.
Next, click on “Free Download” and then click on “Windows Download”. 

The website will lead you through the download and install process.  Once the install completes the program opens and actually takes you through the process of gathering a screenshot, saving it to the internet, and then gathering the link to send to the person so they can have access to the image.

We have covered the basics of PC errors and how to take the required information that will solve your issue and get you up and running again.  Keep in mind that if an application is causing errors to occur you can contact the manufacturers and get solid support.  We feel this is the mark of QUALITY software and QUALITY service.

Feel free to visit our Support Center at: https://www.compuclever.com/support/

If you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: newsletter@compuclever.com

Filed Under: computer fixes, PC TuneUp Maestro, Windows tips

Signs of a PC Attack

December 2, 2015 by Andy Thompson

“Errare Humanum Est” – To err is human.

We take no pleasure in pointing out that there have been PC security breaches that have had considerable impact on people’s lives.  Sensitive data can fall into the wrong hands and we fully appreciate that this happens.  We point it out here to emphasize that one, it does happen; and two, it can happen to the best of us.  Well… to those of us that have placed considerable effort, time, and resources on having high levels of security in place.

Despite best efforts and intentions – it can happen.  So let’s first review some recent hacks and then move on to detecting the signs that your PC may have been compromised.

Ashley Madison


Let’s start off with the details of the Ashley Madison attack which are now more available to the public – along with all the compromised data. The aftermath of this unprecendented privacy attack had even reached our own team at CompuClever.

What Was Taken? Employee emails – 300 GB of emails – as well as tens of thousands of user pictures and messages.  The data stolen includes: names, addresses, email accounts, and details about sexual preferences.  The sexual preference data was made public in the files that were released.

How? It’s called a SQL-injection hack.  This attack takes advantage of a software application running on the site which causes the site’s databases to fork over the data.

What Was The Motive? “…because they [the attackers] were morally outraged at the behavior its web sites [Ashley Madison’s sites] condoned”[1]

Security: What Did They Do Right? They didn’t store full credit card information in the database and they were able to protect customer passwords.

What Did They Do Wrong? This would include the following…

  • Not effectively protecting credit card transactions and personal information.
  • Recording IP addresses of their accountholders.  This opens the door in determining that, for example, hundreds of US government employees, some with positions in the White House, Congress and law enforcement agencies, were using government web connections to access their Ashley Madison accounts.  The list includes an attorney in the Justice Dept and a government hacker working for the Department of Homeland Security!

CIA Director – John Brennan


We were surprised to hear of a recent hack to the email account of the CIA Director John Brennan.  It may not have been as well publicized, but it does come as being equally shocking.  Let’s use the same format to look more closely at the details.

How? There was a claim made by a hacker who describes having broken into John Brennan’s AOL account.  The hacker says he first did a reverse lookup of Brennan’s mobile phone number to discover that he was a Verizon customer.  Then one of the hackers posed as a Verizon technician and called the company asking for details about Brennan’s account.  Verizon gave up information including: account number, four-digit PIN, the backup mobile number on the account, Brennan’s AOL email address, and the last four digits on his bank card.  The hacking team then contacted AOL stating their account had been locked out and they lured AOL into resetting the password.  Brennan’s AOL account was repeatedly reset despite Brennan’s efforts to regain control of it.  The hackers also breached the Comcast account of Homeland Security Secretary, Jeh Johnson.

What Was Taken? The hackers described gaining access to sensitive government documents stored as attachments in Brennan’s personal account after he had forwarded them from his work email.  The documents include a sensitive 47 page SF86 form that Brennan had filled out to obtain his top-secret government security clearance.

“Among the attachments was a spreadsheet containing names and Social Security numbers—some of them for US intelligence officials—and a letter from the Senate asking the CIA to halt its use of harsh interrogation techniques—that is, its controversial use of torture tactics.” [2]

There have been in fact two letters published by WikiLeaks by former senator chairman Christopher Bond listing the types of torture that should be forbidden for US personnel.  For now, six pilfered files have been made public including the SF86 form.

What Was The Motive? The hacker states he’s less than 20 years old and was working with two other people on the breach.  He had contacted Brennan by VoIP (online chat call), and when asked what it was they wanted, he replied: ““We just want Palestine to be free and for you to stop killing innocent people.”

Security:  What Did They Do Right? Given the information here, the struggle to gain control of the AOL account took three attempts and in the end Brennan had to delete his AOL account.  At that point the attackers had enjoyed three days of access.

What Did They Do Wrong? Transferring sensitive data from work emails (with likely adequate security) to AOL emails.

Signs of a PC Attack


If you are suspicious that your PC has been acting “funny” or there are certain indicators which lead you to suspect it may have been tampered with – it could be it is displaying signs of a real malicious attack.  There are certain common traits that our CompuClever support team is very familiar with and that we have found in our research on this topic.  Here is our list.

1. Friends receive fake emails from you

If you open up your email “Spam” folder you are likely to see a lot of emails sent by friends and they likely have no idea the emails are being sent.  Likewise, your PC could be sending emails automatically to people in your address book.

Solution:  This was the first method of passing on viruses in the early days of computing.  These days it is more likely that only some emails are sent to a subset of your email addresses.  It could be that the emails and contact information was stolen from social media sites and has nothing to do with your computer.  To be on the safe side it is best to run an AV scan and check for unwanted items installed on your PC.

PC Clean Maestro also has an Uninstaller tool.  You can open the program, select the “Uninstaller” tab, and examine the items listed in the “Recently Added” tab.  Select any item that is unwanted and click the “Uninstall” button.

2. Unwanted browser toolbars

This is a common sign of malware exploitation.  You are likely experiencing several toolbars on your web browser that were not there previously.  Unless you recognize the vendor or know how it got there – you need to take action.

Solution:  Remove unwanted toolbars and, if required, reset your browser to the original settings.

Open PC Clean Maestro and click the “Browsers” tab.  Select the web browser you are using and click the “Restore [browser name] Default Settings” button at the top right. For more information, read our previous coverage about how to clean and restore web browser.

3. Frequent random popups

This is both common and annoying! What you experience is browser popups from websites.  There are websites that can be hijacked or are illegitimate and they can override the mechanisms in place to prevent popups.

Solution:  Get rid of any toolbars that are recently added (see item #2 above) and recently installed items that are unfamiliar to you (as above in item #1). For more information, read our previous coverage about foistware and how to remove them.

4. Fake AV (antivirus) messages

This is similar to the previous item.  The chances are if you are seeing warning messages, you are likely infected.  In all likelihood malware has taken advantage of an unpatched application such as Java software or an Adobe program.  The scam includes a fake scan of your system identifying lots of viruses that are not really there.  If you follow the directions you can be taken to a well-designed site which accepts your financial payment information.  This scam also results in their gaining full control of your system.

Solution:  Save any information and close any applications that you can and then power down your PC.  You can disconnect from any wireless source by turning off your Wi-Fi router (or open in Safe mode if you are familiar with this), and then remove any items that have recently been installed (as above in item #1).  Connect to the Internet again if it feels safe to do so and then run a full AV scan.

5. Booby trap website

This is where you click a link (such as the ones that come up after a web search), and the link takes you to a site you were not expecting.  In some cases a message pops up on your screen and displays a warning that you have a virus.  Next, a voice comes on your speakers saying you need to call the phone number provided right away or your system will be infected.  You are unable to turn off these warnings even when closing the browser.

Solution:  Turn down your speakers or mute them.  Press the following keys in sequence: Ctrl + Shift + Esc.  Your Task Manager will appear and you can select the items in the list and click the button “End Task”.  If you can’t find the item on that list open the “Processes” tab and examine the CPU column.  Select items that are showing CPU activity and do not appear to be part of the system functions, and then select “End Process”.

6. Online passwords change

If you experience an online password or passwords having changed it could be that you have been hacked or the site has been hacked.  We covered this scenario in the CIA Director hack.  The term for this is a phishing scam.  Confidential information was obtained through illegitimate means.  The hacker then changes the logon information (such as the password), and then can proceed to steal finances or make transactions.  In some cases the hacker can pretend to be you using your information in an attempt to gain finances from friends or acquaintances.

Solution:  Notify the online service to report the compromised account.  If friends or acquaintances are involved, notify all your contacts and warn them to not fall victim to the scam.  If you used the same login information on other sites or financial institutions, change the credentials right away.

7. Unexpected software installs

We have in past articles referred to PUPs – Potentially Unwanted Programs and how they appear on your PC without apparent provocation.  You may have read also how we strongly recommend that you read software licenses and un-select any items that may appear during installation of a legitimate application.  In many cases these items appear after you have installed a program you want but the installation was a bundled software package.

Solution:  As stated in item #1 above, locate the item or items and uninstall.

8. Your mouse moves by itself

Yikes!  You have been hacked.  Sometime a mouse can jump on the screen to a different section but if it appears it is making selections as though being operated from an invisible user – you have been hacked.  This often can be seen when your system is idle for a long period of time and hackers will attempt to access your finances or perform various malicious actions for financial gain or to further cripple your system.

Solution:  If you can take a video of the event this will help when attempting to recover any losses.  If they are accessing your financial accounts power off your system or turn off the WiFi router.  You’ll need to use an unaffected PC and change all your account credentials / passwords to any financial transaction sites.   Next, report the attack and contact professionals.  You may need to completely restore your PC (see item #9).

Note:   The Federal Trade Commission, or FTC, is an independent US agency that works for consumers.  The FTC offers a complaint assistance site

9. Certain functions are disabled and can’t be restarted

Another common sign that is a clear indication that your system is compromised is having certain functions disabled – especially your AV application or Windows Task Manager.  If you do not know how these were disabled and suspect they were tampered with you need to take action immediately.

Solution:  You will need to restore your system to a previous working condition.  Start by examining your system using the methods described above.  Next…

…open up PC TuneUp Maestro and click the “Fix & Clean” menu item in the left panel.  Select “Backup & Restore” and follow the steps.

10. Your bank account is missing money

Hackers will steal large sums of money if they have your financial credentials.  Typically this involves transferring funds to a foreign exchange or bank.  This could mean that you have been the victim of a phishing scam or that your PC has been sabotaged.

Solution:  In most cases financial institutions will replace stolen funds and will work to stop the transaction before the damage is done.  There have been some cases where the courts rule in favor of the bank if negligence is proven on the part of the customer.  Contact your financial institution immediately and perform an AV scan of your system.  In terms of prevention, make sure your financial institution sends you alerts in the event of suspicious activities or if certain transactions thresholds are exceeded. We strongly recommend that you acquire a qualified antivirus solution that provides you with adequate protection for online banking.

11. Online purchases are made by a hacker

This involves having the perpetrator hijack an online account, making a purchase, and shipping the purchased item(s) to a select destination.  This can involve ordering many items of merchandise at one time when you still have sufficient funds to cover the purchases.

Solution:  You need to change your logon credentials and determine how they were compromised in the first place.  The previous solutions above can be considered.  Fortunately, credit card companies deal with fraudulent transactions much better than in previous years.  We recommend reporting the crime as pointed out above in item #8 and scanning your system for evidence of infection.

Note:  For more information and links for attacks related to identity theft and other compromises to credentials and finances, see our article on Tech Support Fraud.

Antivirus Solutions

Let’s face it, being 100% on top of potential malware attacks all the time is not achievable.  Having the right tools in place takes most of the burden off.  AV security tools are a necessary part of our PC reality.  This year we are pleased to have entered this arena with what we know to be a top contender – CompuClever AntiVirus PLUS. It is capable of monitoring the behaviour of PC processes in real-time and it detects suspicious activities.

Many AV applications need to face the ongoing challenge of dealing with new malware exploits – especially those that are less than 24 hours old.  In order to do this, heuristics are utilized.

Heuristics:   This is a rule-based method of identifying new viruses.  This method does not rely on specific signatures of a virus.  Instead it needs to “intelligently” recognize behaviours that are potentially malicious.

In Summary

We have covered a great deal of PC attack scenarios.  It is our hope that you do not experience any of these.  If you do see the warning signs, we encourage you to take the necessary actions as described here.  Keep in mind that there are agencies and professionals that can assist you when the chips are down.  For our CompuClever customers we have a well qualified team of support technicians that are available.  Visit our Support Center at: https://www.compuclever.com/support/

If you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: newsletter@compuclever.com


[1]http://www.wired.com/2015/08/
[2]http://www.wired.com/2015/10/

Filed Under: Uncategorized

  • « Previous Page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 17
  • Next Page »

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.