Our Blog

Tips and advice for maintenance, optimization, and daily computing tasks.

Our Blog

Blog

Microsoft will soon stop offering free upgrades to Windows 10, so if you want to save some money now is the time to make the change. However if you do decide to upgrade to Windows 10, be warned: the new operating system is missing some pretty important features. Here are four tips for improving Windows 10.

should you upgrade to windows 10

If you have been on the fence about upgrading to Windows 10 for free, you’re going to have to make a decision soon: on July 29, 2016, Microsoft will end free upgrades to Windows 10. After that you’ll have to pay for it.

Why upgrade?

Windows 10 is a dramatic improvement over Windows 8. The new OS not only looks nice, the desktop software is intended to seamlessly integrate with tablet apps.  CNN’s review of Windows 10 provides a quick snapshot of what’s new in Windows 10. As well, with the upcoming consumer release of the first service pack for the operating system it may be a good time to reconsider upgrading. On top of that, Microsoft will eventually stop issuing security patches for Windows 7 and 8, so you’re going to want to upgrade someday anyway.

If your PC is not powerful enough for Windows 10, don’t upgrade. However for everyone else now is the time to upgrade to Windows 10. As well, many people are starting to consider purchasing a system pre-installed with Windows 10.

So, for upgraders and new purchasers alike, there are some things we have learned about the default Windows 10 installation settings that need to be addressed to keep your system and data as safe as possible.

Tip 1: What to Do When Windows 10 Upgrade Process Fails

windows update fix

While purchasers of a computer that comes installed with Windows 10 will never have to worry about this, sometime there is an error during the actual process of upgrading to Windows 10 and everything grinds to a halt.  Happily, PC TuneUp Maestro does have a tool for addressing a number of Windows Update errors and should be the first thing to try if you have the program installed.

To use PC TuneUp Maestro’s Windows Update Tool to recover from this problem simply:

  • Open PC TuneUp Maestro on your computer
  • Click “Fix & Clean”
  • Click “Windows Update Tool”
  • Run the tool and see if that fixes the issue. Should the issue persist:
    • Go to the “About” panel (from the main menu of the program)
    • Click “Get product support”
    • Click “Send error report”

We can then look at the issues to see what can be done to resolve the issue.

Another approach is to use the installer service from Microsoft and, just to be safe, bypass the automatic update process entirely. You can download the Microsoft Update Installer here.

Tip 2: How to Create a Recovery Disk

windows update installer

Your new system most likely comes with Windows 10 preinstalled, which means you don’t have to worry at all about upgrading from Windows 7 or Windows 8. However, what you might not realize is that Windows 10 does not come with CD’s to reinstall the OS if your hard drive crashes.

To be on the safe side, you will need to create restore disks.

To do this, you’ll need:

  • USB thumbdrive with 4 GB of space or more
  • Your computer running Windows 10

How to create a recovery disk:

  • In Windows 10, click Start and type: create recovery
  • Hit “Enter” on your keyboard
  • Open “Recovery”
  • Click “Create Recovery drive”
  • Make sure your thumbdrive is connected
  • Click “Next”
  • Wait while the wizard prepares to copy files to your thumbdrive
  • Again, make sure your thumbdrive is at 4 GB, click “Next”
  • Creating the recovery drive can take some time—you can do something else while it is prepared.
  • When complete, click “Finish”

When you need to use the recovery drive, simply connect it to your computer and boot from it. For more help, use this Microsoft link and follow the directions.

Tip 3: How to Enable “System Restore” on Windows 10

windows 10 system restore

In Windows 10, for some reason the System Restore function is disabled in the final set up of the install — this is as baffling as the Safe Mode being removed! We recommend re-enabling System Restore. It’s a quick fix that can be done in just a couple of minutes.

To enable System Restore:

  • Click in the “Search Windows” area of the Task Bar
  • Type in “Create a restore point”
  • In the panel that appears, click the circle beside “Turn on system protection”
  • For system protection, 5-10 GB should be ample space
  • Click “OK”

You will now have a System Restore disk installed on your USB. This makes recovering from a serious crash quick and simple to do.

Tip 4: How to Play Videos on Windows 10

windows 10 dvd player

This may seem absolutely crazy, but Windows 10 does not come with a video player. Microsoft does offer a video player on their version of the app store, but what’s even nuttier is they want US$14.99 for it!

There are a couple of free solutions:

  1. If you already have PC TuneUp Maestro we recommend using Ultra File Opener to play videos—you can download Ultra File Opener and get a free license number for it by installing the program and opening it.
  2. If you do not have PC TuneUp Maestro the a program like the VLC Media player is free and also an excellent way to play videos and even Blu-rays.

In Conclusion

Windows 10 is a powerful new operating system, and it’s here to stay. While you may decide not to upgrade and stay with Windows 7 or Windows 8, if you do buy a new computer you are now prepared to get the most out of it. If you have any questions or tips of your own about installing Windows 10, send us an email at newsletter[at]compuclever.com.

Making use of an Antivirus application is commonly understood to be a prerequisite of operating your computer in a connected, online world.  Generally speaking, it is unthinkable that one would run a PC without being actively protected by legitimate AV software with a valid subscription, whether paid or free.  Nevertheless, there are some common myths about antivirus applications.  Some of these myths prevent users from providing themselves with adequate protection while other myths perpetuate untruths and misinformation.

Here are 7 myths about antivirus software that we get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.

The Top 7:

Here are the myths that we cover in this article along with the real truths about each.

1. Authentication and encryption offers me all the protection I need.

It’s true that authentication and encryption can make it challenging for a criminal to get to your confidential information but not impossible.  Some authentication systems use a One Time Passcode (OTP) and send a Simple Messaging System (SMS) or computer generated call back system.

Unfortunately, cyber criminals have already found ways to circumvent multi-factor authentication which was supposed to radically reduce online criminal activity.  New malware versions are now able to intercept authentication codes that are sent to your phone, so criminals can still get access to your OTP without you knowing about it.

Encryption scrambles your information to render it useless and requires you to use an encryption key to unlock the data.  However, it does not fully protect you from key-logging malware that can read your password used to access the encryption key.

While both of these technologies are useful in protecting sensitive data on your PC, they do not protect your PC from contracting malicious software.  In other words, your system can be hacked and be held hostage – you can fall victim to ransomware and other debilitating viruses.

2. I don’t download files so I am safe from virus attacks.

You don’t have to actively download files to be the victim of virus attacks.  Browser based attacks are now much more common.  In fact, some of the most popular websites, including Yahoo, New York Times, Huffington Post, and CNN.com, have fallen prey to malware attacks that are integrated in display ads.  This is known as “malvertising”.

Malvertising is a common online criminal tactic which can easily spread among popular websites for maximum gain.  There are two types of malvertising attacks.  One is when a user clicks an ad and the malware infects their system.  The other type is not even triggered by user interaction as it uses embedded malware code within iframes that results in the ability to manipulate the browser to grab files from other malicious sources.  Simply browsing to a site can result in falling victim to malware attacks.

There are also attacks, referred to as “Man in the Middle” where an “…attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other”.[1] For example, the Man-in-the-Browser (MITB) attack utilizes a Trojan horse virus.

Online banking is very susceptible to the MITB attack.  In these cases the infected web browser uses altered web pages and content without the user knowing it.  The information is exchanged between the user and the host bank and the confirmation screens are all the same.  However, in the background, the criminal can be altering the data so as to change the transaction destination and the amount.

These examples illustrate that files do not have to be downloaded in order for you to be compromised.  Fortunately, Trojan viruses can be detected and removed by effective AV engines.

3. Firewalls protect me from malicious activities.

A Firewall… is a network security feature that can allow or deny incoming and outgoing PC communications based on a predetermined set of rules.  The firewall rules are a standard preset configuration or can be modified by you or your administrator.  The Windows firewall is by default configured to block incoming threats – you need to change the settings to deal with outgoing threats.

Firewalls block certain nefarious traffic but they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not designed to scan for infected files – you need an AV engine specific to this purpose.

It is crucial to eliminate potential security holes.  Port scanning can be problematic as criminals look for ways to openly connect with your PC.  A properly configured firewall can minimize this risk and new Windows operating systems come with firewall functionality.  While this is the first line of defense… it is not sufficient in blocking the myriad of virus and malware threats that are out there.

A firewall can be configured to block outbound traffic as well.  However, malware writers have been able to disable a firewall so traffic can escape from your system.  AV vendors have already created mechanisms to minimize this problem, but cyber criminals have proven themselves to be very clever in being able to hide the information within normal http traffic so as to disguise the data as innocent web requests.

4. Viruses and malware are written by AV companies.

There is no shortage of conspiracy theories.  So… is there any truth to AV companies creating malware?

There is an old technique that Firefighters use known as back burning.  Firemen create a controlled fire to burn up all of the debris that can fuel a fire which leaves a black zone. This method reduces the chance of a wildfire from jumping across the black line of defense.  This is similar to a strategy that Antivirus companies employ with viral attacks.  They use existing malware or create viruses to test their AV engine so they can understand the limits of their program, improve their software, and eliminate the vulnerability associated with such attacks that are known and encountered in the real world.

The real and full truth here is that there have been billions of dollars in loss suffered by companies and private individuals as a result of cyber criminals utilizing malware for profit.  There are in fact real criminals that focus their energies and skill on a variety of heinous activities such as stealing money, selling stolen credit card information, hiring other malicious code writers, selling malware to other cyber criminals, holding an infected PC ransom, and more.  Cyber crime is a billion dollar industry and it will continue to grow as long as criminals see an opportunity to make money.

5. You can get good protection from free AV programs.

There are free antivirus programs that provide a basic level of protection, like Microsoft Windows Defender.  However, many of these lack key security features to reduce exposure to attacks, some have slower scanning speeds, others do not provide technical support, several do not respond quickly to emergencies, and some do not detect new threat categories effectively.

Free AV programs generally do not provide web protection.  This fundamental security feature is designed to block malicious links, prevent phishing attempts, and stop fraudulent links from compromising your system.  As we stated previously, online criminals want to make money and they will target personal or financial information.

Some free antivirus products offer a personal firewall that can block unauthorized communication.  You will need to verify your AV solution is equipped with this and activate it during the enrollment process.  And keep in mind, if your PC is already infected, cyber criminals could be actively stealing your information.

Choosing a free or paid antivirus program can be a difficult challenge as you need to weigh out your own privacy concerns along with getting full protection.  Third party publications can help narrow down your choices so we recommend that you review articles from publications such as: PC Magazine, Cnet, AV-Test, AV Comparatives, or Virus Bulletin.

We are pleased that CompuClever AV PLUS has been certified by Virus Bulletin (VB100).  You can find the review on this virus bulletin site (search for “CompuClever”).  More on this later…

6. AV applications are not equipped to deal with APT attacks.

Advanced Persistent Threat (APT) is a recently used term spoken in such a way as to conjure up dark and scary creatures that we can speak of when gathering around a campfire at night.  In reality, APT is not dramatically different from malware that was launched ten years ago.  It’s quite common for cyber criminals to use similar tactics in new ways when launching their latest PC threats.

APT attacks are generally designed to target and penetrate companies, government agencies, or even political organizations.  If you want additional insights about APTs, please read the article: Setting the Record Straight: What’s an Advanced Persistent Threat?

Malware writers are very innovative as they quickly change their attack methods while still leveraging criminal underground networks and strategies all the while remaining focused at absconding funds or making their mark.  Case in point: Ashley Madison hackers were motivated as a result of outrage due to the activities of the targeted website.

AV companies have evolved by using a combination of malware signatures, heuristics, and behavior techniques to capture new and unknown threats.  They will not however detect all malware attacks.  Some AV companies detect unknown threats better and more consistently than others.

Let’s turn our focus on third party testing companies that specifically test for unknown and zero-day malware threats.  Companies that specialize in preventing APT attacks generate a lot of revenue, but it is surprising to see that these vendors have not submitted their products for testing by a third party organization.  Why is that?

For most users, the most affordable and best option is a reputable AV program along with using common sense.  It also helps to get recent and frequent software updates.

7. I can get good information about AV app comparisons from the AV vendor.

The simple answer to this is: make sure you get independent reviews.

Often times, AV test reports sponsored by a company range from being biased to blatantly skewed.  These reports typically highlight specific detection techniques and compare a limited number of vendors.  On the other hand, third party, non-profit malware testing organizations publicly provide their testing methodology to be scrutinized by all participating vendors.

All AV vendors are allowed to participate in third party tests and reviews, compared to being selected and tested by a vendor who is paying for the report.  There are different testing scenarios to help understand efficacy characteristics.

One test, involves capturing malware for a specific period of time and preventing the update mechanism from fetching the latest files from the AV vendor.  This particular test determines whether the AV engine can proactively prevent new or unknown threats from infecting a PC without file updates.[2] Another test involves speed performance tests which measure the impact of the AV program on the performance of a computer system.

An Independent Review: CompuClever Antivirus PLUS

We are pleased to report that we were tested and received a glowing review by VB100, “…a world-renowned independent testing and certification body, active in testing, reviewing and benchmarking security solutions for over 20 years.”[3]

VB100 had this to say about CompuClever Antivirus PLUS:

“The design is slick and attractive, with a good range of options available and intuitive deployment of controls.”

“Stability was perfect throughout testing, with not the slightest shake even under heavy stress. Performance impact was decent too, with RAM use perhaps a little above average but CPU usage and impact on our set of tasks both pretty low.”

“Detection was as excellent as one would expect, with good scores everywhere. The WildList and clean sets were handled with pinpoint accuracy, earning CompuClever its first VB100 award on its debut.”

Check out the virus bulletin full review.

For more information about CompuClever AV PLUS click here: Are You Well Protected?

Summary:

With the information provided in this article we feel you now have a much clearer understanding of AV applications and virus attacks.  We strongly recommend that you protect your PC from viral dangers that are prevalent in our daily computing world.

We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com

How to Turn Your Old Computer Into a Media Server

by Charles Edward Nevin May 25, 2016

Many of us have one old — but still usuable — computer sitting in a closet somewhere around the house. Here’s a quick and easy way to convert it into a home media server. Everyone loves getting a new computer. Switching on a brand-new and more powerful PC is a bit like playing in freshly-fallen […]

Read the full article →

Office 365 Versus Office 2016: What’s the Difference?

by Charles Edward Nevin May 13, 2016

It can be confusing when trying tell the difference between Office 365 and Office 2016. In this informative blog post, we explain how they’re different so you can determine which one is best for you. If you have purchased a new Windows computer over the past year or so, you have likely been puzzled when […]

Read the full article →

f.lux – How to Elinimate Digital Eye Strain

by Andy Thompson May 6, 2016

There are natural lighting levels that we are exposed to as determined by the onset of sunset and sunrise. Of course night time we may choose to be in front of a monitor or screen but there may be tradeoffs with respect to eye strain, headaches, or improper sleep. The technology known as “f.lux” may help to alleviate this. We like the concept and we also like the company as they are dedicated to offering this technology for free.

Read the full article →

How to Protect Your Computer from Ransomware

by Charles Edward Nevin April 29, 2016

Ransomware is the latest threat to afflict millions of computer users worldwide. What’s really startling is that even police departments are being affected. Let’s take a look at what ransomware is, and how you can protect yourself against it. Cyber-criminals have so far collected more than $200 million in the first three months of 2016, […]

Read the full article →

Tech Corner: How to Extend Your Home WiFi With Just a Soda Can

by Charles Edward Nevin April 25, 2016

“A strong WiFi signal makes for a happy home,” should be the new adage for the 21st Century. At least that’s been my experience based on the turmoil my own home falls into when the WiFi is not working properly! Here are some tips for improving the range of your home WiFi setup. Note: This […]

Read the full article →

BloomSky – Serious but Fun

by Andy Thompson April 15, 2016

BloomSky is a personal weather station for the serious weather hobbyists meanwhile it is also a fun device for sharing your weather data and images with your friends and family.

Read the full article →

BloomSky Weather Sensor – Setup

by Andy Thompson April 8, 2016

Welcome to the next installment of our series on BloomSky – the weather technology. In this article we review the BloomSky Weather sensor. We will be taking the device, as any new user would, out of the box. Then we will follow the instructions and put it together. Get ready for our first impressions offered by our Tech Support specialist as he unwraps and assembles the weather sensor device from BloomSky.

Read the full article →

Introducing the BloomSky Network

by Andy Thompson March 31, 2016

Our CompuClever review experts have set their sights on BloomSky – an innovative 5-in-1 weather station kit with an HD camera that captures weather conditions in real-time. More than this… BloomSky is a technology that aims at connecting people to a world-wide community that collects and makes available “hyperlocal” weather information.

Read the full article →