<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Andy Thompson, Author at CompuClever</title>
	<atom:link href="https://www.compuclever.com/posts/author/yida/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.compuclever.com/posts/author/yida/</link>
	<description></description>
	<lastBuildDate>Fri, 07 Aug 2020 18:38:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://www.compuclever.com/posts/wp-content/uploads/cropped-compuclever_128-1-32x32.png</url>
	<title>Andy Thompson, Author at CompuClever</title>
	<link>https://www.compuclever.com/posts/author/yida/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How Blue Light Affects Your Health and What to Do About It</title>
		<link>https://www.compuclever.com/posts/how-blue-light-affect-your-health-and-what-to-do-about-it/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-blue-light-affect-your-health-and-what-to-do-about-it</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 11 May 2018 17:17:40 +0000</pubDate>
				<category><![CDATA[Health & Fitness]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[Blue Light]]></category>
		<category><![CDATA[cancer]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[digital]]></category>
		<category><![CDATA[eye strain]]></category>
		<category><![CDATA[f.lux]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[Windows APP]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3959</guid>

					<description><![CDATA[<p>We’ve had some recent news on a study involving the effects of blue light and cancer.  We felt it was just what we needed to update an article we wrote previously.  Our focus at the time was primarily on monitor screens – this recent study expands on this to include outdoor LED exposure.  We’ll kick start it with an overview of the study and then segue into information about reduction of blue light in our home and work environments. </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/how-blue-light-affect-your-health-and-what-to-do-about-it/">How Blue Light Affects Your Health and What to Do About It</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We’ve had some <a href="https://www.cnn.com/2018/04/27/health/artificial-blue-light-prostate-breast-cancer-study/index.html" target="_blank" rel="noopener">recent news on a study involving the effects of blue light and cancer</a>.  We felt it was just what we needed to update <a href="https://www.compuclever.com/posts/f-lux-how-to-elinimate-digital-eye-strain/" target="_blank" rel="noopener">an article we wrote previously</a>.  Our focus at the time was primarily on monitor screens – this recent study expands on this to include outdoor LED exposure.  We’ll kick start it with an overview of the study and then segue into information about reduction of blue light in our home and work environments.</p>
<h1><strong>The Study</strong></h1>
<p>The conclusion of a recent study from the University of Exeter was that exposure to blue light from outdoor LEDs, as is emitted with smartphones and tablets, can increase your risk to cancer.  The study focused primarily on outdoor blue light exposure and while previous studies have used satellite imagery to calculate intensity of artificial light in large cities, this was the first to look specifically at blue light.</p>
<p>The researchers found that those exposed to high levels of outdoor blue light at night had around a 1.5-fold higher risk of developing breast cancer and a twofold higher risk of developing prostate cancer, compared with those who were less exposed.  Men exposed to high levels of indoor artificial light also had 2.8-fold higher risk of developing prostate cancer, according to the study.<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<p><strong>Blue Light</strong>:  Compared to other light in the visible spectrum, blue light has a shorter wavelength – this means more energy than other types.  Exposure to blue light can decrease melatonin in the brain which supports our body’s circadian rhythm.</p>
<p>And to reiterate, blue light is also emitted from our monitors such as laptops, smartphones, and tablets.</p>
<h1><strong>The Technology</strong></h1>
<p>There are applications available to reduce our exposure to blue light.  We have taken the time to review f.lux, one of the pioneer applications in this field.</p>
<p>To put it simply, f.lux automatically changes the color of your screen, depending on the time of the day, for the purpose of reducing blue light exposure.  During the day time, your screen appears normal and as evening approaches it becomes more pink or rose colored.  It works well with computers and laptops and it can be used to work with iPhones and iPads.  There are also similar applications for Android devices.</p>
<h1>Theory</h1>
<p>PC screens, monitors, and mobile phones all emit full spectrum light to resemble full daylight conditions.  The makers of f.lux state:</p>
<p>“Exposure to blue light at the wrong time of day can keep you awake later and interfere with the quality of your sleep.  f.lux tries to help this by removing blue and green light to help you wind down in the evenings.”</p>
<p>Day time – we have bright sunlight to help stimulate wakefulness. Night time – lighting is dim and our brains secrete melatonin which causes us to feel sleepy.  It’s a 24-hour rhythm based on an internal circadian clock that is affected by our exposure to light and dark cycles.</p>
<p>While some computers adjust the brightness levels based on sensors, the color temperature does not change.  This is why you see more pink tones when using f.lux which help with melatonin levels and eye strain.</p>
<div class="quick_facts">
<h3>Research To Back It Up:</h3>
<p>If you want to see the research behind any of this we encourage you to find independent online studies.  You can also begin with the f.lux page which offers many links to reports and studies from trustworthy sources: <a href="https://justgetflux.com/research.html" target="_blank" rel="noopener">https://justgetflux.com/research.html</a></p>
</div>
<p>&nbsp;</p>
<h1><strong>f.lux – The Company</strong></h1>
<p>The f.lux site, like the application, is pretty easy to pick up and understand.  Right up front they describe their technology as a “labor of love”.  It’s free as they pay for the development based on donations received.  They state that 100% of donated money goes to the ongoing development and operations related to f.lux.</p>
<p>In terms of the future of this technology, it appears as though major platform developers are beginning to include some form of night time mode in their operating system.  There is NightShift for Mac and there is Blue Shade for Amazon Fire tablets and Night Mode for Android N.  The makers of f.lux are working to make their technology available on a wide range of operating systems but they have had a hard time with mobile devices due to restrictions from the platform makers.</p>
<h3><strong>Before You Decide:</strong></h3>
<p>You can always get a preview of how your screen would look if you decide on trying out the f.lux software.  Simply go to the <a href="https://fluxometer.com/rainbow/#!id=Macbook%20Pro%202009/5000K-MacbookPro2009" target="_blank" rel="noopener">fluxometer page</a>.  You can select your computer or device and try out different levels.</p>
<h2>Start Using f.lux</h2>
<p>f.lux works on <a href="https://www.microsoft.com/en-ca/store/p/flux/9n9kdphv91jt" target="_blank" rel="noopener">Windows</a>, Mac, or Linux. There is also <a href="https://play.google.com/store/apps/details?id=com.justgetflux.flux" target="_blank" rel="noopener">a version for Android devices</a> but there are some limitations – we recommend using <a href="https://play.google.com/store/apps/details?id=com.urbandroid.lux" target="_blank" rel="noopener">Twilight</a>.  Twilight is an Android app that offers similar functions to those of f.lux and we have used the free version of it and find it meets our use requirements and expectations.</p>
<p>If your Android is rooted, then CF.lumen found on the <a href="https://play.google.com/store/apps/details?id=eu.chainfire.lumen" target="_blank" rel="noopener">Google Play store</a>, is a good choice.<a href="#_ftn2" name="_ftnref2">[2]</a></p>
<p>For iPhone and iPad users, Mac has a similar feature called Night Shift (for more information on setting this up click here: <a href="http://www.howtogeek.com/246582/how-to-enable-night-shift-on-your-iphone-for-easy-nighttime-reading/" target="_blank" rel="noopener">Enable NightShift on Your iPhone</a>).</p>
<p>Other blue light reduction options include:</p>
<ul>
<li><a href="http://www.skytopia.com/software/sunsetscreen/" target="_blank" rel="noopener">SunsetScreen</a>: a free Windows app and among the best.</li>
<li><a href="https://iristech.co/" target="_blank" rel="noopener">Iris</a>: one time purchase of $15</li>
<li><a href="http://jonls.dk/redshift/" target="_blank" rel="noopener">Redshift</a>: a free, open source program inspired by f.lux</li>
</ul>
<h3><strong>How to make f.lux work<br />
</strong></h3>
<p>When you have <a href="https://justgetflux.com/" target="_blank" rel="noopener">downloaded and installed the program from their website</a>, you can begin setting up and using f.lux.</p>
<p>You will need to:</p>
<ul>
<li><strong>Set your location:</strong> f.lux works a lot better if it knows when the sun rises and sets. The sun is the brightest light we see every day, so setting this up matters a lot for understanding your circadian timing.</li>
<li><strong>Choose your usual wake time:</strong> If you wake at a different time each day, you can pick a time on the earlier side.</li>
<li><strong>Adjust color settings</strong> so it looks as you like it. Just move the big slider to adjust, and f.lux will learn what you like.</li>
<li>You can set f.lux to “disable” automatically for apps where color quality is critical.</li>
</ul>
<p><img decoding="async" width="1024" height="502" class="aligncenter size-large wp-image-3963" src="https://www.compuclever.com/posts/wp-content/uploads/flux_menu-1024x502.jpg" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/flux_menu-1024x502.jpg 1024w, https://www.compuclever.com/posts/wp-content/uploads/flux_menu-300x147.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/flux_menu-768x376.jpg 768w, https://www.compuclever.com/posts/wp-content/uploads/flux_menu-24x12.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/flux_menu-36x18.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/flux_menu-48x24.jpg 48w, https://www.compuclever.com/posts/wp-content/uploads/flux_menu.jpg 1394w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<h3>When Not To Use It:</h3>
<p>You may want to disable f.lux at certain times.  For instance if you are working on graphics or images, you can choose to disable it by right-clicking the icon in the taskbar.</p>
<p>There are three modes to choose from including a movie mode that disables f.lux for 2 ½ hours.  As the company states on their website: “We designed Movie Mode to preserve sky colors and shadow detail, while still providing a warmer color tone. It&#8217;s not perfect on either count, but it strikes a balance.”</p>
<h3><strong>FAQ: </strong></h3>
<p>If you have questions or issues, start with the frequently asked questions page which has lots of useful information: <a href="https://justgetflux.com/faq.html" target="_blank" rel="noopener">https://justgetflux.com/faq.html</a></p>
<h1>Recommendations:</h1>
<p>In the past there have been some shortcomings with f.lux, however, they are on version 4.60 and have made improvements.</p>
<p>Overall, you will notice this and technologies like it will make adjustments to your monitor so that it is easier on the eyes and decreases glare.</p>
<p>As for sleep… the American Medical Association’s Council on Science and Public Health states: “…exposure to excessive light at night, including extended use of various electronic media, can disrupt sleep or exacerbate sleep disorders”.<a href="#_ftn3" name="_ftnref3">[3]</a></p>
<p>We recommend reducing your exposure to monitor screens especially in the evening and nighttime.</p>
<p>If you have to be in front of a monitor or device screen… it makes sense to try f.lux.  We have enjoyed the benefits of this free technology and hope it will help you as well.</p>
<p>We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users. If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<hr />
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://www.cnn.com/2018/04/27/health/artificial-blue-light-prostate-breast-cancer-study/index.html" target="_blank" rel="noopener">https://www.cnn.com</a><br />
<a href="#_ftnref2" name="_ftn2">[2]</a> <a href="http://www.makeuseof.com/tag/get-good-nights-sleep-filtering-phones-blue-light/" target="_blank" rel="noopener">http://www.makeuseof.com</a><br />
<a href="#_ftnref3" name="_ftn3">[3]</a> <a href="http://www.atmob.org/library/resources/AMA%20Health%20Effects%20Light%20at%20Night.pdf" target="_blank" rel="noopener">http://www.atmob.org</a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/how-blue-light-affect-your-health-and-what-to-do-about-it/">How Blue Light Affects Your Health and What to Do About It</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Protect Your Privacy &#038; Identity on Facebook &#8211; Part 2</title>
		<link>https://www.compuclever.com/posts/protect-your-privacy-identity-on-facebook/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-your-privacy-identity-on-facebook</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 18 Apr 2018 17:21:35 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[Online Share]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security breach]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3939</guid>

					<description><![CDATA[<p>We began our two-part series by providing company background, highlighting recent news, and then describing the Facebook data collection machine, and the worldwide response.<br />
In Part 2, we’re going to look at what the response is from Facebook and Mark Zuckerberg.<br />
More than this – we will emphasize what you can do.  We’ll provided three best-practice recommendation for protecting your identity and privacy.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protect-your-privacy-identity-on-facebook/">How to Protect Your Privacy &#038; Identity on Facebook &#8211; Part 2</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In our <a href="https://www.compuclever.com/posts/facing-truth-facebook-privacy/" target="_blank" rel="noopener noreferrer">Part 1 article</a> we covered news related to the Facebook privacy scandal. In Part 2, we will emphasize what you can do.  We’ll provided three best-practice recommendation for protecting your identity and privacy.</p>
<h1>Our Private Data</h1>
<p>As Facebook users we accept the privacy policies when we sign on.  For the most part we don’t even read over the extensive policy pages.  Instead we set up our account and enter data related to our personal lives.  We understand in the process this information gets recorded and stored.</p>
<h2><strong>Take Action:</strong></h2>
<p>We recommend that you get a clear idea of how much and what kind of data Facebook collects on you.  Check out the <a href="https://www.compuclever.com/posts/facing-truth-facebook-privacy/#download_fb_data" target="_blank" rel="noopener noreferrer">“Data In” section of our previous article</a> for directions on accessing the data Facebook has collected from you.</p>
<p>Facebook is a free service and we can expect that they make revenue by providing our data to advertisers.  What many of us are not aware of is that they pass on our data to third party developers and organizations.</p>
<p>This is why we can sign on to a new app or online service using our Facebook login.  Right away they can access our data so that it is easier for us to create a new account with the third party app rather than having to enter all the personal information they require once again.</p>
<p>But what kinds of control are in place once our data leaves the hands of Facebook?  What kind of regulations are there to protect our privacy and information?  This is what Facebook’s Mark Zuckerberg has to address.</p>
<h1>Facebook Updates</h1>
<p>In the past Facebook has revised its privacy policies.  However, these previous revisions have been toward openness and sharing rather than protection of privacy.  Unfortunately, “…they were optimizing for profitability rather than security and privacy of their members” says David Kirkpatrick author of the Facebook Effect.<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<p>Zuckerberg’s promise at the beginning of this year was to fix Facebook in 2018 – this is no small task.  In fact, he has stated that fixing the company’s problems will take years.</p>
<p>Presently, users are informing users in their News Feed if they&#8217;re among the millions of people whose data was improperly harvested by Cambridge Analytica.</p>
<p>Other changes we can expect in the near future: <a href="#_ftn2" name="_ftnref2">[2]</a></p>
<ul>
<li>Users will receive notice of all apps they use and what data is shared with those apps.  They then have a chance to delete apps they no longer want.</li>
<li>Facebook will restrict access to certain data that applications can acquire.</li>
<li>The option to search for users by entering a phone number or an email address will be removed.</li>
<li>Facebook will set out to delete all logs after a year and only time of calls will be collected.</li>
<li>New policy will also make users aware that WhatsApp and Instagram are part of Facebook and that the companies share information about users.  WhatsApp will still have a separate policy while Facebook and Instagram continue to share one.</li>
</ul>
<h1>Free</h1>
<p>Whenever something is offered for free we need to ask: how is this business generating revenue?  Some companies offer a trial license for their software as a means to test drive the service.  Others rely on donation.</p>
<p>In the case of Facebook, it is free to users but there are associated costs.  Not only does Facebook sell data to advertisers who then place ads that are targeted to meet our purchasing preferences, they also harvests our data for app developers as well.</p>
<div class=".quick_facts">
<p style="padding-left: 30px;"><strong>Surveillance Capitalism:</strong></p>
<p style="padding-left: 30px;">One term being used in many news sources related to this Facebook scandal is “surveillance capitalism”.  Shoshana Zuboff, Harvard Business School professor states that it drives much of the internet.</p>
<p style="padding-left: 30px;">It&#8217;s behind most of the &#8220;free&#8221; services, and many of the paid ones as well.  It utilizes psychological manipulation in the form of personalized advertising to persuade you to buy something or do something, like vote for a candidate.</p>
<p style="padding-left: 30px;">“…while Facebook is one of the biggest players in this space, there are thousands of other companies that spy on and manipulate us for profit.” <a href="#_ftn3" name="_ftnref3">[3]</a></p>
</div>
<p>We need lawmakers to force these companies into the public spotlight and to enforce lawful conduct.</p>
<h1>Regulation</h1>
<p>Although Facebook is in the process of change and updates we need to ask: how is it possible to keep private data secure after it’s sold to third parties?  Facebook has admitted that it is impossible to monitor what these third parties do with the data once it is out of their hands.  However, Mark Zuckerberg has <a href="https://www.wired.com/story/mark-zuckerberg-talks-to-wired-about-facebooks-privacy-problem/">said</a> <a href="https://www.theverge.com/2018/3/21/17150270/mark-zuckerberg-facebook-regulated">that</a> his industry should be regulated.</p>
<p>At present he is facing Congress and has delivered an apology and is answering questions.  But what will be the outcome of this?  What about past regulation?  Zuckerberg has stated they regularly testify before Congress on a number of topics.</p>
<p>In 2011, Facebook offered privacy assurances in a settlement with the FTC (Federal Trade Commission).  Allowing Cambridge Analytica to harvest data could be a violation of that settlement.  The ability to transfer the data of users’ friends should have been banned with the 2011 consent.  But what is the FTC going to do to enforce existing regulations?</p>
<p style="padding-left: 30px;"><strong>Turning Up The Heat:</strong></p>
<p style="padding-left: 30px;">In 2016, the European Union passed the comprehensive General Data Protection Regulation, or GDPR.  One mandate restricts collection of personal data of EU citizens to be only saved for &#8220;specific, explicit, and legitimate purposes” and only with user consent.</p>
<p style="padding-left: 30px;">This means, consent cannot be buried in the terms and conditions.</p>
<p style="padding-left: 30px;">This law will take effect in May and companies worldwide are paying attention.  It is expected that this will expose the industry like nothing else.  In preparation for this law, PayPal published a list of companies it might share your personal data with – over 600 companies.</p>
<h1> Best Practices – Privacy at Stake</h1>
<p>There is no doubt that privacy of information is at stake.</p>
<p>It’s essential that we throttle back on what information we make available online and what data is stored on our PC.  Here are our recommendations.</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>We recommend the privacy functionality associated with <a href="https://www.compuclever.com/products/compuclever-pc-tuneup/">PC Cleaner</a>. By using the available functionality you can see all the personal and private data you have on your PC which could be accessed by illegitimate means.</li>
</ol>
</li>
</ol>
<ol>
<li style="list-style-type: none;">
<ol>
<li>When on a public Wi-Fi network, we highly recommend not sharing out any sensitive data. Even downloading records online from a public location or terminal can leave your data vulnerable to hacks.</li>
</ol>
</li>
</ol>
<ol>
<li>If you decide to delete your Facebook account, consider the following:
<ul>
<li>You will need to sever all ties with Facebook including Messenger, WhatsApp, and Instagram. Your data can be shared with these apps and policies are similar or, as with Facebook and Instagram, shared.</li>
<li>Any apps that you “log in using Facebook“ will no longer work and you will have to enter your log in credentials for these.</li>
<li>Delete all Facebook instances from all devices including your mobile ones. Make sure you delete and not deactivate.  <a href="https://www.facebook.com/help/contact.php?show_form=delete_account" target="_blank" rel="noopener noreferrer">Use this link from Facebook</a>.</li>
<li>Do not even attempt to log in to Facebook for at least two weeks or you will cancel the account deletion process.</li>
</ul>
</li>
</ol>
<h1>Last Comment</h1>
<p>We started out this two part series asking a question of what to do as a Facebook user.  Undoubtedly, the data breach has been the final straw for some and these users are choosing to delete.</p>
<p>Do we throw the baby out with the bath water?</p>
<p>We need to acknowledge that there are positive online developments, <em>and</em> we need to take an active role in shaping it.</p>
<p>With respect to the baby / bath water analogy – we certainly can agree the bath water is dirty!</p>
<p>As for the baby – in the case of social media technology – we need to closely examine if it’s being overfed.</p>
<p style="padding-left: 30px;">“…the thing we need to understand now,” Shoshana Zuboff states, “is that the online world, which used to be <em>our </em>world, is now where capitalism is developing in new ways.”</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="http://money.cnn.com/2018/04/09/technology/facebook-data-tool-cambridge-analytica/index.html">http://money.cnn.com/2018/04/09/technology/</a></p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://www.ctvnews.ca/sci-tech/up-to-87-million-people-affected-in-facebook-privacy-scandal-1.3870656">https://www.ctvnews.ca/sci-tech/</a></p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.schneier.com/blog/archives/2018/03/facebook_and_ca.html">https://www.schneier.com/</a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protect-your-privacy-identity-on-facebook/">How to Protect Your Privacy &#038; Identity on Facebook &#8211; Part 2</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facing the Truth &#8211; Facebook &#038; Privacy</title>
		<link>https://www.compuclever.com/posts/facing-truth-facebook-privacy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=facing-truth-facebook-privacy</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Sat, 07 Apr 2018 02:01:29 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[social media]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3931</guid>

					<description><![CDATA[<p>In light of the news and recent findings about Facebook, we present a straightforward way of looking at what Facebook knows about you – “data in”, and how they use this information – “data out”.  In addition, we will show you how you can get your entire Facebook data “dossier” so you are crystal clear about the information publicly available on you and the risks you may be exposed to.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/facing-truth-facebook-privacy/">Facing the Truth &#8211; Facebook &#038; Privacy</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Feeling connected is fundamental to the human experience – feeling part of the whole.  What better way to do that then from the privacy of our home?  We pick and choose when and where and for how long we want to connect when using online social media.</p>
<p>In a <a href="https://www.compuclever.com/posts/facebook-uncovered/" target="_blank" rel="noopener">previous article</a> we examined Facebook and pointed out its allure.  We listed the aspects of this “free” service and we identified “Likes” and “Dislikes”.  Were we too quick to accept at face value, the company’s emphasis on the importance of privacy?</p>
<h1>A Bit about Facebook</h1>
<ul>
<li>Facebook, launched in 2004, is the most popular online social media and social networking service. It is based in the U.S. and is the creation of Mark Zuckerberg and his fellow Harvard friends and roommates.</li>
<li>As of June 2017, Facebook reached 2 billion active users.</li>
<li>It is a giant in terms of net worth. According to Wikipedia, as of Mar 25, 2018, it is worth US$62.2 billion.</li>
<li>Recently the company has faced considerable scrutiny and public pressure in relation to hate speech, fake news, depictions of violence, and privacy.</li>
</ul>
<h1>Recent News</h1>
<p>Facebook has been in the news multiple times of late.  With news related to privacy of data, we need to start with Aleksandr Kogan, a University of Cambridge professor, who created a survey filled out by 270,000 people.  In doing so, he was able to access the data of what was reported as more than 50 million Facebook users – recent news has been released whereby Facebook has admitted that upwards of 87 million people were affected by this breach.<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<p>While Kogan gained access to this information using legitimate means, via proper channels governing all developers on Facebook, he violated rules related to passing the data to third parties which included Cambridge Analytica.</p>
<p>Zuckerberg was aware of this in 2015.  The action taken at that time was to ban Kogan’s app and demand legal certification from Kogan and others he shared it with.  According to Zuckerberg<a href="#_ftn2" name="_ftnref2">[2]</a>, Cambridge Analtyica completed certification and told Facebook that they actually hadn’t received raw Facebook data at all.  Furthermore, Cambridge Analytica deleted it and weren’t using it.</p>
<p>This reliance on certification turned out to be, as Zuckerberg admits, one of the biggest mistakes made.</p>
<p><strong>Cambridge Analytica</strong>:  Is a British political consulting firm established in 2013, that combines data mining, data brokerage, and data analysis along with strategic communication.  They are in part owned by Robert Mercer and Alexander Nix has been the CEO however, this position was suspended after a Channel 4 news segment was broadcasted.  In this he was videotaped in an undercover, hidden camera video interview during which he spoke to someone he believed would use the firm in Sri Lanka for election persuasion purposes.  Nix speaks of creating sex scandals and using fake news to manipulate voters.</p>
<p>Cambridge Analytica has been involved in elections worldwide.  Their executives claim the company has worked in more than 200 elections around the world, including Nigeria, Kenya, the Czech Republic, India, and Argentina.</p>
<p>In 2016 they became involved in the 2016 Brexit referendum by supporting persuadable voters to vote for leaving the EU.  On 18 May 2017, the US Congress began investigation with their connection to Russian attempts to interfere with the 2016 U.S. presidential election.  Cambridge Analytica worked for Donald Trump’s political campaign but there is some question as to the level of involvement.<a href="#_ftn3" name="_ftnref3">[3]</a></p>
<p>Nix has made bold claims and it is uncertain if some statements have been embellished.  He was quoted as saying this in October, 2016:</p>
<p>Today in the United States we have somewhere close to four or five thousand data points on every individual &#8230; So we model the personality of every adult across the United States, some 230 million people. <a href="#_ftn4" name="_ftnref4">[4]</a></p>
<h1>The Data</h1>
<p>News reports point to unethical organizations making use of personal data made available by Facebook.  This begs the question: what data do they have on us and how can they use it?</p>
<h2><strong>Data In</strong>:</h2>
<p>As soon as a user signs up, data and information is collected.  This includes all data – conversations, pictures, videos, and even documents sent via Messenger.  Does this surprise you?  Would you want to see what the information on you includes?</p>
<p>Should we be concerned?  If you use Facebook on your phone and your phone is an Android device, or you use Messenger to send attachments… it would be a good idea to take a closer look.</p>
<p>Users are discovering that they can request to have all of their Facebook data in a zip file.  Some are astonished to find that this data can include data on every call made and text sent.  There are users that are discovering that the data held by Facebook includes rental property lease forms, tenant ledger reports, bill statements, and screen shots of bank transfers.<a href="#_ftn5" name="_ftnref5">[5]</a></p>
<p><a name="download_fb_data"></a><br />
<img decoding="async" loading="lazy" width="537" height="373" class="aligncenter size-full wp-image-3941" style="max-width: 537px; width: 100%; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/fb-download-data.png" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/fb-download-data.png 537w, https://www.compuclever.com/posts/wp-content/uploads/fb-download-data-300x208.png 300w, https://www.compuclever.com/posts/wp-content/uploads/fb-download-data-24x17.png 24w, https://www.compuclever.com/posts/wp-content/uploads/fb-download-data-36x25.png 36w, https://www.compuclever.com/posts/wp-content/uploads/fb-download-data-48x33.png 48w" sizes="(max-width: 537px) 100vw, 537px" />To download your information:</p>
<ol class="_1_ex">
<li class="_1_ez">Click the down-pointing triangle at the top right of any Facebook page and select <b>Settings</b></li>
<li class="_1_ez">Click <b>Download a copy of your Facebook data</b> at the bottom of General Account Settings</li>
<li class="_1_ez">Click <b>Start My Archive</b></li>
</ol>
<p>In about 10 minutes Facebook processes the request and you&#8217;ll get an email and notification when the file is ready to download.</p>
<h2><strong>Data Out</strong>:</h2>
<p>Likely no one is surprised to know that our personal data is being used and shared out to advertisers.  Facebook makes money on sharing out data to advertisers and to app developers.  The challenge is that there is no control of how the data is used once passed to these groups.</p>
<p>Indeed the most alarming aspect of Cambridge Analytica&#8217;s &#8220;breach&#8221; is that it wasn&#8217;t a breach at all. It happened almost entirely above board and in line with Facebook policy.<a href="#_ftn6" name="_ftnref6">[6]</a></p>
<h1>World Response</h1>
<p>Investigations are ramping up world-wide.</p>
<p><strong>US:</strong>   Zuckerberg will testify before Congress.  On April 10, before a joint hearing of the Senate Commerce and Judiciary Committees and the next day before the House Energy and Commerce Committee.  The U.S. Federal Trade Commission are conducting separate investigations. <a href="#_ftn7" name="_ftnref7">[7]</a></p>
<p>This is a serious matter as stated by Senator Amy Klobuchar who serves on the Senate Judiciary Committee.  The senator will ask him to explain &#8220;what Facebook knew about misusing data from 50 million Americans in order to target political advertising and manipulate voters.&#8221; <a href="#_ftn8" name="_ftnref8">[8]</a></p>
<p><strong>UK:</strong>   Damian Collins, chair for the Digital, Culture, Media and Sport Committee in the House of Commons, questions Facebook user data policies.  &#8220;Their answers have consistently understated this risk, and have also been misleading to the Committee,&#8221; Collins said. &#8220;I will be writing to Mark Zuckerberg asking that either he, or another senior executive from the company, appear to give evidence in front of the Committee as part our inquiry.&#8221; <a href="#_ftn9" name="_ftnref9">[9]</a></p>
<p>MPs on the digital, culture, media and sport committee have accused Facebook of misleading it in a previous evidence session and called for Mark Zuckerberg to appear before them to answer questions.  They have also recalled Nix. <a href="#_ftn10" name="_ftnref10">[10]</a></p>
<p>A U.K. parliamentary media committee summoned CEO Mark Zuckerberg to testify about how Facebook uses data.  U.K. Information Commissioner Elizabeth Denham is investigating how Cambridge Analytica got the data. <a href="#_ftn11" name="_ftnref11">[11]</a></p>
<p><strong>Germany: </strong>After a meeting with its executives about the abuse of users&#8217; data, the justice minister of Germany stated she wants closer oversight.</p>
<p><strong>Australia: </strong>The Information and Privacy Commission has demanded that Facebook provide information on whether any Australian citizens were affected by unauthorized use of profile data. <a href="#_ftn12" name="_ftnref12">[12]</a></p>
<p><strong>The Response</strong>:  Zuckerberg is set to testify next week before a U.S. congressional committee, and he said top executives at the company would be dispatched to other countries wanting to hold government hearings on the scandal. <a href="#_ftn13" name="_ftnref13">[13]</a></p>
<h1>User Response</h1>
<p>Zuckerberg has stated that the users affected by the misuse of personal data by Cambridge Analytica will be notified.  To date, this has not yet happened.  There are users that are going to delete Facebook as a result of this news and one of the questions we have posed has been: What is the best course of action with regard to Facebook and social media services?</p>
<p>We invite you to give this some thought and to check in with us next week for our Part 2 edition as we outline what Facebook is doing to correct this wrong and we identify the costs associated with what we thought was a “free” service.</p>
<p>We’ll provide out best practices and recommendations for being active on a social media service like Facebook.  However, we’ll leave it up to you to choose your level of exposure and if posting online personal information is worth the associated costs.</p>
<p>This concludes the first part of our Facebook and Privacy article.</p>
<p>We’ll pick it up next week.  Stay tuned!</p>
<hr />
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://www.ctvnews.ca/sci-tech/up-to-87-million-people-affected-in-facebook-privacy-scandal-1.3870656">https://www.ctvnews.ca/<br />
</a><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://www.wired.com/story/mark-zuckerberg-talks-to-wired-about-facebooks-privacy-problem/">https://www.wired.com/<br />
</a><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://en.wikipedia.org/wiki/Cambridge_Analytica">https://en.wikipedia.org/<br />
</a><a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://news.sky.com/story/behind-the-scenes-at-donald-trumps-uk-digital-war-room-10626155">https://news.sky.com/<br />
</a><a href="#_ftnref5" name="_ftn5">[5]</a> <a href="http://www.nzherald.co.nz/business/news/article.cfm?c_id=3&amp;objectid=12003431">http://www.nzherald.co.nz/</a><br />
<a href="#_ftnref6" name="_ftn6">[6]</a> <a href="http://money.cnn.com/2018/03/19/technology/business/facebook-data-privacy-crisis/index.html">http://money.cnn.com/2018/03/19/</a><br />
<a href="#_ftnref7" name="_ftn7">[7]</a> <a href="https://www.ctvnews.ca/sci-tech/up-to-87-million-people-affected-in-facebook-privacy-scandal-1.3870656">https://www.ctvnews.ca/</a><br />
<a href="#_ftnref8" name="_ftn8">[8]</a> <a href="http://money.cnn.com/2018/03/19/technology/business/facebook-data-privacy-crisis/index.html">http://money.cnn.com/2018/03/19/</a><br />
<a href="#_ftnref9" name="_ftn9">[9]</a> <a href="https://www.parliament.uk/business/committees/committees-a-z/commons-select/digital-culture-media-and-sport-committee/news/cambridge-analytica-statement/">https://www.parliament.uk/business/committees/</a><br />
<a href="#_ftnref10" name="_ftn10">[10]</a> <a href="https://www.theguardian.com/uk-news/2018/mar/22/cambridge-analytica-scandal-the-biggest-revelations-so-far">https://www.theguardian.com/uk-news/2018/mar/22/</a><br />
<a href="#_ftnref11" name="_ftn11">[11]</a> <a href="https://www.ctvnews.ca/business/ftc-is-investigating-facebook-over-privacy-practices-1.3858780">https://www.ctvnews.ca/business/</a><br />
<a href="#_ftnref12" name="_ftn12">[12]</a> <a href="https://www.theguardian.com/uk-news/2018/mar/22/cambridge-analytica-scandal-the-biggest-revelations-so-far">https://www.theguardian.com/uk-news/2018/mar/22/</a><br />
<a href="#_ftnref13" name="_ftn13">[13]</a> <a href="http://www.metronews.ca/life/2018/04/04/data-of-620-000-canadians-improperly-shared-with-consulting-firm-facebook.html">http://www.metronews.ca/life/2018/04/04/</a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/facing-truth-facebook-privacy/">Facing the Truth &#8211; Facebook &#038; Privacy</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices</title>
		<link>https://www.compuclever.com/posts/spectre-and-meltdown-massive-security-holes-impacting-all-mac-and-pc-devices/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=spectre-and-meltdown-massive-security-holes-impacting-all-mac-and-pc-devices</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 12 Jan 2018 19:13:13 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[meltdown]]></category>
		<category><![CDATA[PC Security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[slow]]></category>
		<category><![CDATA[spectre]]></category>
		<category><![CDATA[Windows Update]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3892</guid>

					<description><![CDATA[<p>Just as we start a new year, there are new computer vulnerabilities identified by researchers.  The impact of these defects could be experienced by almost any computer worldwide!  The implication – millions of devices could be vulnerable to hacking or, if patched, suffer some degradation in speed.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/spectre-and-meltdown-massive-security-holes-impacting-all-mac-and-pc-devices/">Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Just as we start a new year, there are new computer vulnerabilities identified by researchers. The impact of these defects could be experienced by almost any computer worldwide! The implication – millions of devices could be vulnerable to hacking or, if patched, suffer some degradation in speed.</p>
<p>The identified flaws are in the very core of the computer hardware – the CPUs or also known as the processors.</p>
<h1>About The Defect</h1>
<p>The two newly identified defects have wide ranging impacts on devices from the phone you are carrying to the servers that send data to it as well as other mobile devices, laptops and desktops whether PC or Mac. The vulnerabilities enables hackers to access people’s personal information.</p>
<p>Google’s Project Zero team states that these flaws can enable hackers to gain passwords and other sensitive data from system memory.<br />
The two flaws are known as Spectre and Meltdown.</p>
<p style="padding-left: 30px;"><strong>Meltdown</strong>: Named this way because it melts security boundaries which are normally enforced by the hardware. This was found mostly in Intel processors (as far back as 1995). Also ARM has reported their processors are affected, but it is unclear at this time if AMD processors are affected. This vulnerability can be patched through an update. However, this fix could slow down computers as much as 30%.</p>
<p style="padding-left: 30px;"><strong>Spectre</strong>: The name is derived from the root cause: speculative execution. It is not easy to fix &#8211; it requires a re-design of computer chips – so it is likely to haunt us for some time to come. This defect was found in Intel processors as well as AMD and ARM chips. While this flaw is harder to exploit for hackers, it is also more difficult to mitigate for users.</p>
<p>For more information on these we highly recommend going to: <a href="https://meltdownattack.com/" target="_blank" rel="noopener">https://meltdownattack.com/</a></p>
<h1>The Impact</h1>
<p>Google engineers discovered these flaws and had kept the news a secret to enable time for fixes to be created and issued before other computer hackers could take advantage. However, Intel was forced to disclose as the story received coverage when a British tech website, The Register, uncovered it. This led to a drop in Intel’s stock.</p>
<p>These flaws have wide ranging impacts on all types of chip-based devices including cell phones, laptops and desktops – whether PC or Mac.</p>
<p>According to researchers:</p>
<p style="padding-left: 30px;">&#8220;While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs,&#8221;<a href="#foot_note_ref"><sup>[1]</sup></a></p>
<p>News reports are emerging that any computer made over the last 20 years could be impacted and that fixing the issue could cause significant disruption around the world. So in a nutshell, it is almost certain that your PC is affected, especially if it uses an Intel based chip.</p>
<p>Companies such as Amazon state they are in the process of creating and distributing a fix for their services and devices. They made a statement: &#8220;This is a vulnerability that has existed for more than 20 years in modern processor architectures like Intel, AMD, and ARM across servers, desktops, and mobile devices.&#8221;<a href="#foot_note_ref"><sup>[2]</sup></a> They further stated that most of its infrastructure had now been made safe.</p>
<p>However, for older computers the update could be more difficult. Many devices have few updates as phone makers are slow to provide updates.</p>
<h1>Risk Mitigation</h1>
<p>It is not safe to work with sensitive information given there is a chance of leaking information if your device has a vulnerable processor and runs an unpatched operating system. This is applicable to personal computers and anyone using cloud infrastructure.</p>
<p>To deal with these defects you will need to update your software as patches become available.</p>
<p>Unfortunately, with older computers it may be harder to update. For many devices – especially those running Android – updates are few and far between since phone makers are often slow to provide their customers with new updates.</p>
<p>According to the Meltdown site:</p>
<p style="padding-left: 30px;">There are patches against Meltdown for Linux , Windows, and OS X. There is also work to harden software against future exploitation of Spectre, respectively to patch software after exploitation through Spectre.</p>
<p style="padding-left: 30px;">There is also work to harden software against future exploitation of Spectre, respectively to patch software after exploitation through Spectre.</p>
<p>The site goes on to explain that unlike usual malware, Meltdown and Spectre are hard to distinguish from regular benign applications. However, your Antivirus program may detect malware whichuses the attacks by comparing binaries after they become known.</p>
<p>We highly recommend that you ensure using a legitimate and effective Antivirus program such as: <a href="https://www.compuclever.com/products/antivirus/" target="_blank" rel="noopener">CompuClever Antivirus PLUS</a>.</p>
<h1>Brace for a Slowdown</h1>
<p>To add salt to the wound, your device could be slower after you have made it safer from hacks. Hard to imagine – you fix your device and it actually results in a slowdown!</p>
<p>Intel says the average computer user won&#8217;t experience significant slowdowns after receiving the fix.</p>
<p>However, there are news reports<a href="#foot_note_ref"><sup>[3]</sup></a> that state fixing these defects will slow performance – especially for devices more than five years old. And for companies that deal with considerable network traffic and processing power the slowdown could be even more severe. This includes cloud computing providers, systems that crunch data, and retailers that process consumer transactions.</p>
<p>Was there ever a time that having your PC running at peak performance was more critical?</p>
<p>Which brings us to our second recommendation: <a href="https://www.compuclever.com/posts/ccpctunup-email-evergreen-cart" target="_blank" rel="noopener">CompuClever PC TuneUp Pro</a> – not only will you find areas of improved system performance you can also better manage security of sensitive data.</p>
<p><strong>Moving Forward</strong>: There are reports<a href="#foot_note_ref"><sup>[4]</sup></a> that point out that some experts are saying the affected processors will need to be replaced entirely in order to completely get rid of the risks created by these flaws. We can’t foresee newly designed chips replacing flawed ones in existing devices in the near future.</p>
<p>At present, there are no available processors that can replace the vulnerable ones and still provide the same kind of functionality. It will be years before new chips that can perform the same tasks safely and effectively, will be made available.</p>
<p>During the wait we need to take whatever measures we have that are at our disposal, to remain safe and to ensure the best performance we can manifest.</p>
<p><a name="foot_note_ref"></a></p>
<hr />
<p>[1] <a href="https://meltdownattack.com/">https://meltdownattack.com/</a></p>
<p>[2] <a href="https://aws.amazon.com/security/security-bulletins/AWS-2018-013/v1/">https://aws.amazon.com/security/security-bulletins/AWS-2018-013/v1/</a></p>
<p>[3 &amp; 4] <a href="http://money.cnn.com/2018/01/04/technology/business/apple-macs-ios-spectre-meltdown/index.html">http://money.cnn.com/2018/01/04/technology/business/apple-macs-ios-spectre-meltdown/index.html</a> </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/spectre-and-meltdown-massive-security-holes-impacting-all-mac-and-pc-devices/">Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Correct Ergonomics Sitting at a Computer Desk</title>
		<link>https://www.compuclever.com/posts/correct-ergonomic-sitting-computer-desk/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=correct-ergonomic-sitting-computer-desk</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 17 Nov 2017 20:21:45 +0000</pubDate>
				<category><![CDATA[Health & Fitness]]></category>
		<category><![CDATA[Back Pain]]></category>
		<category><![CDATA[Coccyx cushions]]></category>
		<category><![CDATA[Computer Desk]]></category>
		<category><![CDATA[Posture]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3819</guid>

					<description><![CDATA[<p>Sitting is the new smoking. In this article we share my “back story” and how I reclaimed my back health by sitting less and sitting properly.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/correct-ergonomic-sitting-computer-desk/">Correct Ergonomics Sitting at a Computer Desk</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>“Sitting is the New Smoking” says many healthcare professionals like <a href="http://www.cnn.com/2017/09/11/health/sitting-increases-risk-of-death-study/index.html" target="_blank" rel="noopener">Dr. Sanjay Gupta</a>. I for one have real first-hand experience of debilitating back pain due to prolonged sitting related to my job.</p>
<p>In this article we share my “back story” and how I reclaimed my back health by sitting less and sitting properly.</p>
<h1>My Back Story</h1>
<p>My “sit”uation is not unusual – as a high-tech professional I have to endure prolonged sitting in front of my PC.  My back pain came on unexpectedly and demanded me to discontinue my day-to-day activities.  It was so severe in fact, that I was bed ridden for almost six months.</p>
<p>Pinpointing the source was problematic to say the least and I’m sure, like many others suffering from back pain, this is a common experience.  In time, with the help of experts, I discovered that my back problem was actually tailbone related and included having a herniated L4/L5 disc.  It went out of alignment at the Sacroiliac (SI) joint and eventually pinched my nerve to the point that it was unresponsive for quite some time.</p>
<p><a href="https://www.amazon.com/dp/B074CV2HQC" target="_blank" rel="noopener"><img decoding="async" loading="lazy" width="500" height="500" class="aligncenter size-full wp-image-3829" style="max-width: 500px; width: 100%; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/d3cf08771141.jpg" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/d3cf08771141.jpg 500w, https://www.compuclever.com/posts/wp-content/uploads/d3cf08771141-150x150.jpg 150w, https://www.compuclever.com/posts/wp-content/uploads/d3cf08771141-300x300.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/d3cf08771141-24x24.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/d3cf08771141-36x36.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/d3cf08771141-48x48.jpg 48w, https://www.compuclever.com/posts/wp-content/uploads/d3cf08771141-45x45.jpg 45w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<h1>Moving Forward</h1>
<p>Getting the right attention along with rest and gentle rehabilitation, is fundamental.  And now that I am relatively back to my old self I am well aware of the need to correct what went wrong.  The fundamental reality is – we need to listen to our body!</p>
<p>If you have sat too long you understand pain associated with the tailbone whether intermittent and frequent or lasting pain.  It has very real consequences as it can take everyday tasks – like sitting, bending, and even walking – and make them near impossible.  At times the area feels numb and aches and other times it is sharp and is brought on by certain movements such as picking items up.</p>
<p>Regardless of the cause or length of suffering, this kind of Coccyx pain can be reduced with the help of proper cushioning as an aid to improve alignment.</p>
<p><a href="https://www.amazon.com/dp/B074CV2HQC" target="_blank" rel="noopener"><img decoding="async" loading="lazy" width="587" height="587" class="aligncenter size-full wp-image-3823" style="max-width: 587px;" src="https://www.compuclever.com/posts/wp-content/uploads/71WbPBeu33L._SY587_.jpg" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/71WbPBeu33L._SY587_.jpg 587w, https://www.compuclever.com/posts/wp-content/uploads/71WbPBeu33L._SY587_-150x150.jpg 150w, https://www.compuclever.com/posts/wp-content/uploads/71WbPBeu33L._SY587_-300x300.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/71WbPBeu33L._SY587_-24x24.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/71WbPBeu33L._SY587_-36x36.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/71WbPBeu33L._SY587_-48x48.jpg 48w, https://www.compuclever.com/posts/wp-content/uploads/71WbPBeu33L._SY587_-45x45.jpg 45w" sizes="(max-width: 587px) 100vw, 587px" /></a></p>
<h1>Coccyx Cushion</h1>
<p>While at work, I now alternate between standing (using a standing desk), and <a href="https://www.amazon.com/dp/B074CV2HQC" target="_blank" rel="noopener">sitting using a Coccyx cushion</a>, which enforces correct posture and ergonomics.  Here is a rundown of the features if you are unfamiliar with this kind of supportive aid.</p>
<ul>
<li><strong>Ergonomic design</strong>: The U-shaped cushion relieves hip pressure by hugging the thighs and prevents leg numbness due to poor blood circulation while the back pillow promotes good posture. This supports recovery from lower back and Sciatica pain, Arthritis issues, herniated discs, tailbone injuries, Coccyx pain, Hemorrhoids, pressure sores, backache pain, butt pain, and other spinal issues.</li>
<li style="margin-top: 5px;"><strong>Cut-out design</strong>: It allows you to pile the weight on and take the pressure off your spine. This ensures that the tailbone does not touch the sitting surface and prevents soreness or discomfort from prolonged sitting.</li>
<li style="margin-top: 5px;"><strong>100% Orthopedic Memory Foam</strong>: The comfortable seat cushion and lumbar pillow reduce the back pain and give you the best back support.</li>
<li style="margin-top: 5px;"><strong>Perfect Size &amp; Thickness</strong>: The seat cushion can hug your buttocks fully allowing for hours of sitting without experiencing any pain, aches, fatigue, or soreness. It can be used as a seat cushion and lumbar support back pillow for those of us that spend considerable time driving or traveling in a sitting position.</li>
</ul>
<p>Coccyx cushions can make an already comfy place to sit, easier on your body. Even soft chairs can inflame sensitive areas as they simply weren&#8217;t made to help prevent back pain. However, by adding a layer on top of the chair, you can achieve the luxury of coziness without affecting the tailbone.</p>
<p><a href="https://www.amazon.com/dp/B07458QZSC" target="_blank" rel="noopener"><img decoding="async" loading="lazy" width="1000" height="734" class="aligncenter size-full wp-image-3827" style="max-width: 500px; width: 100%; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/61y95oeML5L._SL1000_.jpg" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/61y95oeML5L._SL1000_.jpg 1000w, https://www.compuclever.com/posts/wp-content/uploads/61y95oeML5L._SL1000_-300x220.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/61y95oeML5L._SL1000_-768x564.jpg 768w, https://www.compuclever.com/posts/wp-content/uploads/61y95oeML5L._SL1000_-610x448.jpg 610w, https://www.compuclever.com/posts/wp-content/uploads/61y95oeML5L._SL1000_-24x18.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/61y95oeML5L._SL1000_-36x26.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/61y95oeML5L._SL1000_-48x35.jpg 48w" sizes="(max-width: 1000px) 100vw, 1000px" /></a></p>
<h1>Posture Up</h1>
<p>What I really find beneficial from <a href="https://www.amazon.com/dp/B07458QZSC" target="_blank" rel="noopener">this tailbone cushion</a> (as shown above) is that it helps improve my posture. When I use it on my chair I can comfortably sit up straight. When seated correctly, my spine is better aligned, circulation is improved, my ribs are adjusted for a more efficient position, and general posture is enhanced.</p>
<p>Most medical professionals agree proper posture is one of the easiest ways to reduce pain and inflammation. Achieving this on one’s own is not easy to do as we are up against some unconscious daily habits. With Coccyx cushions, the change is barely noticeable!  It trains the body gradually with each use.</p>
<p>All of these changes – which are subtle, yet important – work to alleviate pain. Gradually, the body learns to better align itself and will begin to do so even when not seated and when not using the cushion.</p>
<h1>What I Recommend</h1>
<p>I purchased two Coccyx cushions from Amazon:</p>
<ul>
<li>An <a href="https://www.amazon.com/dp/B07458QZSC" target="_blank" rel="noopener">Orthopedic Memory Foam Seat Cushion</a> for work, and</li>
<li>a <a href="https://www.amazon.com/dp/B074CV2HQC" target="_blank" rel="noopener">Memory Foam Seat Cushion and Lumbar Support</a> for driving</li>
</ul>
<p>I have had them for a few months and both seem to be of good quality and provide the support and relief as I was looking for.</p>
<h1>Sit Less</h1>
<p>Last but not the least, after telling you how well a Coccyx cushion can improve your way of sitting, I still would like to recommend that you sit less and be more active. Whether you go for a brisk walk, or simply stand up and do some gentle stretches, your body isn&#8217;t stuck in one position or one posture for too long.</p>
<p>The world is too big to be &#8220;stuck&#8221; in one place.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/correct-ergonomic-sitting-computer-desk/">Correct Ergonomics Sitting at a Computer Desk</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Going Incognito &#8211; Browse Web in Privacy Mode</title>
		<link>https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=going-incognito-browse-web-privacy-mode</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 04 Aug 2017 16:44:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Icognito mode]]></category>
		<category><![CDATA[microsoft edge]]></category>
		<category><![CDATA[privacy mode]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3746</guid>

					<description><![CDATA[<p>Who uses Incognito or Private browsing and why?  Do they have something to hide or are they being safe in terms of sensitive data such as login credentials?<br />
One thing is certain - surfing the web using Incognito or Private browsing DOES NOT keep you completely anonymous and stealthy.  Knowing the levels of privacy that this mode of browsing offers is necessary if you are concerned about how private and secure your online activities are</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/">Going Incognito &#8211; Browse Web in Privacy Mode</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><b>Incognito</b>, <a href="https://en.wikipedia.org/wiki/Incognito" target="_blank" rel="noopener noreferrer">according to Wikipedia</a>, from the Latin <i>incognitus</i>, refers to a person who wants to remain anonymous to the world and others, in hiding or shut off from humanity.</p>
<p>Web surfers have the option to enable privacy mode or “Incognito” mode on their browser.  Each of the main browser type offers some level of private browsing.  It is known as Private Browsing, InPrivate Browsing, and Incognito depending on the type of browser used.</p>
<p>Basically &#8211; this is a privacy feature that quite simply provides some privacy on your local computing device but, DOES NOT provide hidden detection or stealth beyond that.  Your ISP (Internet Service Provider) and other agencies connected on the Internet can detect your activities via your unique IP address on the web servers.</p>
<p>Disabling functions such as the web cache and browsing history make this a relatively private way of browsing the web.  Cookies, the data holders sent by web sites to recognize or track your online activity, are also disabled.</p>
<h2>Items Deleted or Not Saved:</h2>
<p>The list  of items that are deleted or not saved when you browse during Incognito or Privacy  mode are:</p>
<ul>
<li>Website history.</li>
<li>The cache of files stored during your browse session.</li>
<li>History of files downloaded.</li>
<li>Search history stored by the browser.</li>
<li>Cookies from browsed sites.</li>
<li>Data on forms you have filled out.</li>
</ul>
<h2>Items That Are NOT Private:</h2>
<p>There are items that are not deleted and the ways you remain exposed to detection:</p>
<ul>
<li>Search histories stored from search providers like Google are not deleted.</li>
<li>Websites can identify you and keep a record of your visit.</li>
<li>Your ISP can detect your network traffic and identify your IP address.</li>
<li>Any malware on your PC or device can track your activities.</li>
</ul>
<p>Also, it is important that you keep in mind the browser does not likely perform a secure delete and items from your browsing session can be recovered.  Until that data is overwritten with other data it can be undeleted using special recovery software.</p>
<h1>Pros and Cons?</h1>
<p>So why would you want to use Incognito?  It doesn’t seem entirely private after all.</p>
<h2>Pros</h2>
<p>The reasons for using this more of browsing include:</p>
<ol>
<li>Reducing the history, browsing, and personal data stored on your PC or device.</li>
<li>You can prevent storage of sensitive data such as log-in credentials.</li>
<li>You can also use multiple accounts simultaneously using several tabs at once.<br />
<i>Tip</i>: You can let a friend check their email or log onto Facebook without you having to log out.  Just start up a new Incognito window.</li>
<li>You can perform searches that are not influenced by any prior browsing history.</li>
<li>Browser extensions are disabled so that Facebook and Google and other services can’t track you.</li>
</ol>
<p>One of the main reasons however is to hide your online interactions on the computing device you are using from those sharing the same device.</p>
<p>In a busy household full of people… using Incognito mode can prevent others from seeing potentially embarrassing items.  It also prevents others from revealing your search history or the cache of browsed files.</p>
<h2>Cons</h2>
<p>We’ll, conversely, you may want to monitor online activities on your PC or device.  You may be concerned that someone will incur a malware infection or that they are browsing to websites that could be considered risky, unethical, or harmful. This is when you would want to disable Privacy / Incognito functionality as described below.</p>
<p>Also, having a false sense of protection can lead to consequences.  ISPs pass data to copyright holders (such as music, videos, books, or games), who are cracking down on the downloading of copyright materials.  The ISP is required to forward notices from the copyright holder alleging infringement of that work.</p>
<p>And, as we have pointed out, you are not completely stealthy.</p>
<h1>How to Go Incognito</h1>
<p>So now that you have a better idea of what the limits and benefits of this mode of browsing are, you can follow the easy steps outlined below to activate it.  Of course it will depend on which browser you are using.</p>
<ul>
<li><strong>Chrome</strong>: Click on the ellipsis menu (<strong>…</strong>) at the right end of the menu bar, and select: “New Incognito Window”.</li>
<li><strong>Firefox</strong>: Click on the icon with three horizontal lines near the top right corner of the browser, and select: “New Private Window”.</li>
<li><strong>Internet Explorer</strong>: To change to an “InPrivate” session in Internet Explorer you would hold down Ctrl+Shift and press P (Ctrl+Shift+P).</li>
<li><strong>Microsoft Edge</strong>: Click the button with three dots (<strong>…</strong>), called the “More” button, and select: “New InPrivate Windows”.</li>
</ul>
<h2>Disabling It</h2>
<p>As we mentioned above, you may want to disable this function so that you can detect for yourself the online activities of others in your household. Click the links below to take you to the specific directions for your browser type.</p>
<ul>
<li><a href="https://community.spiceworks.com/how_to/75544-how-to-disable-incognito-mode-in-google-chrome" target="_blank" rel="noopener noreferrer">Chrome</a></li>
<li><a href="http://www.thewindowsclub.com/disable-private-browsing-internet-explorer-chrome-firefox" target="_blank" rel="noopener noreferrer">IE / Firefox / and a freeware tool for Chrome</a></li>
<li><a href="http://mywindowshub.com/enable-disable-microsoft-edge-inprivate-browsing-windows-10/" target="_blank" rel="noopener noreferrer">Microsoft Edge</a></li>
</ul>
<p><em>Warning</em>: most of these procedures require a change to the registry.  We recommend you do a backup beforehand and proceed with caution.</p>
<h2>For Parents:</h2>
<p>If you’re a parent worried about your kids and their private online activities (for example, pornography or social networking sites), then you can first try to disable the functionality as mentioned above.  That way you can check the search and browsing history items.</p>
<p>You can also take the next step and look at filtering software such as <a href="https://www.netnanny.com/" target="_blank" rel="noopener noreferrer">NetNanny</a> that will block porn and whatever else you want to filter even when the browser is in Incognito mode.  They have it for computers and mobile devices.  It&#8217;s not free but could be worth the peace of mind.</p>
<h1>Last Note</h1>
<p>We’re in favor of providing information that in the right hands is used with good intent.  To reach a higher level of stealth you would need to look at using a VPN solution.  A VPN masks your physical location and IP address so the website you’re visiting doesn’t really know who or where you are.</p>
<p>We hope this information has been of help to you and enhances your web browsing experiences.  For more information on this topic see our past posts:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/privacy-dont-give-it-away/" target="_blank" rel="noopener noreferrer">Privacy – Don’t Give It Away</a></li>
<li><a href="https://www.compuclever.com/posts/vpn-need-one/" target="_blank" rel="noopener noreferrer">What Is a VPN, and Why Do You Need One?</a></li>
</ul>
<p>Feel free to contact us with any questions or comments on this and other subjects.  Simply send us an email at: newsletter@compuclever.com</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/">Going Incognito &#8211; Browse Web in Privacy Mode</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don&#8217;t be Held at Ransomeware</title>
		<link>https://www.compuclever.com/posts/held-at-ransomeware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=held-at-ransomeware</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 14 Jul 2017 17:23:49 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows 8]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[PC Security]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomeware]]></category>
		<category><![CDATA[Wannacry]]></category>
		<category><![CDATA[Windows Update]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3718</guid>

					<description><![CDATA[<p>Ever get the feeling that computers have come a long way, yet… why are we still susceptible to PC virus attacks?  Recently there were two major worldwide attacks known as “ransomware”.  We’re going to offer information about these attacks and how you can be prepared to fend off a ransomware infection.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>With two prominent malware attacks occurring back-to-back during the past two months, you&#8217;re likely familiar with the term  &#8211; &#8220;Ransomware&#8221; &#8211; a cyber-crime gaining worldwide attention. In this article we explore ransomware in depth and offer recommendations and instructions to prevent it from happening and to protect your PC.</p>
<h1>Ransomware defined:</h1>
<p>You can think of ransomware as &#8220;data kidnapping&#8221;. It is the result of a malware attack that blocks access to a user&#8217;s PC data. Once infected, the attackers try to force you into paying money so you can regain access. In some cases there is a threat to publish or delete the data unless the ransom is paid. Data and access is blocked by using strong file encryption.</p>
<p>Computers can be infected whether at home or in the work environment. This includes PCs on an enterprise network or government agency servers.</p>
<p>Some ways of infecting your PC include:</p>
<ul>
<li>Surfing to unsafe or fake websites.</li>
<li>Opening emails and email attachments from unknown sources.</li>
<li>Opening malicious links in emails, Facebook, Twitter, and from online chat apps such as Skype.</li>
</ul>
<p>The two main types of ransomware are: Lockscreen and Encryption.</p>
<ol>
<li>Lockscreen ransomware prevents you from accessing your PC or files and instead displays a full-screen message saying you have to pay a ransom to regain access.</li>
<li>Encryption ransomware prevents you from opening your files by encrypting them. The encryption is very strong (uses an AES-256 &#8220;military grade&#8221; cipher algorithm), and would take an estimated 3&#215;10<sup>51</sup> years to crack. Also, a unique encryption key is generated for each infected computer so you can&#8217;t just get someone else&#8217;s key.</li>
</ol>
<p>Note: There are older versions of ransomware that display false messages such as claiming you have performed an illegal activity with your PC. They then state you are being fined by a police force or government agency. We want to stress that these claims are false and can be considered a scare tactic designed to extort money from you.</p>
<h1>What is the result of the attack?</h1>
<p>While there are various forms of ransomware, all of them prevent you from performing normal PC functions. This includes:</p>
<ul>
<li>Getting locked out! Preventing you from accessing your operating system.</li>
<li>Blocked access to files! Files are now encrypted and you can&#8217;t access them.</li>
<li>Disabled apps! Certain programs (like your web browser), are no longer able to run.</li>
</ul>
<h1>What about the ransom?</h1>
<p>Some ransomware attacks involve the victim having to pay money while some make you complete a survey. Payment of money is performed online and sometimes involves the victim having to pay in Internet currency Bitcoins. Due to the nature of those that commit these cybercrimes &#8211; there is no guarantee that your data or PC will return to the pre-attack state.</p>
<h1>How much do they extort?</h1>
<p>Symantec gained access to a malware server in 2012. This provided them first hand insight of the ransoms that were paid out. In a single day 5,700 computers were infected and 2.9% paid the ransom. This comes out to approximately $33,600 for one day.</p>
<p>&#8220;Given the number of different gangs operating ransomware scams, a conservative estimate is that over $5 million dollars a year is being extorted from victims. The real number is, however, likely much higher.&#8221;<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<h1>Recent Ransomware attacks&#8230;</h1>
<h2>WannaCrypt; May 12, 2017:</h2>
<p>Many users around the world were victims of the malicious &#8220;WannaCrypt&#8221; software attack which has been considered one of the worst and most widespread cyber-attacks. More than 230,000 computers in over 150 countries were affected. All files on infected PCs were locked and the demanded ransom was 300 dollars in bitcoins.</p>
<p>Interestingly, people running Windows 10 were not targeted by the attack. Despite this, this attack was serious as evidenced in the steps Microsoft took. They took a highly unusual step in providing a security update for all customers to protect even the Windows platforms that are in custom support only. This includes Windows XP, Windows 8, and Windows Server 2003.</p>
<p>Supported versions of the operating system (Vista, Windows 7, 8.1, 10, etc.), have access to the security update MS17-010. If users have automatic updates enabled or have installed the update, they are protected. Microsoft states<a href="#_ftn2" name="_ftnref2">[2]</a>: &#8220;For those organizations who have not yet applied the security update, we suggest you immediately deploy <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx" target="_blank" rel="noopener noreferrer">Microsoft Security Bulletin MS17-010</a><u></u><em>&#8220;. </em>They go on to state that this attack may evolve over time and additional defense strategies are warranted.</p>
<h2>Petya; June 27, 2017:</h2>
<p>Companies across Europe and the US were affected by the &#8216;Petya&#8217; ransomware attacks. Infected computers displayed a message demanding a Bitcoin ransom of $300. Victims were unable to unlock their computers even if they paid the ransom.<a href="#_ftn3" name="_ftnref3">[3]</a> The instructions included sending confirmation of payment to an email address. However, that email address was shut down by the email provider and there was no way to contact the attacker for a decryption key to unlock their computer.</p>
<p>This ransomware attack exploited the same Microsoft exploit as WannaCry &#8211; the vulnerability known as EternalBlue. Even with the patch, this cyber-attack has two other ways to spread within an organization focusing on the network administrator&#8217;s tools. Experts believe the initial infection is suspected to have been delivered through email (as with WannaCry).</p>
<h1>If Infected With Ransomware:</h1>
<p>You are a victim of a ransomware infection once you see some form of ransom demand appearing in a dialog window, an app, or a full-screen message. Unfortunately, this demand is displayed after encrypting your files or disabling some part of your PC.</p>
<p>Before you try to recover your files, Microsoft suggests trying to fully clean your PC with <a href="https://support.microsoft.com/en-us/help/17466" target="_blank" rel="noopener noreferrer">Windows Defender Offline</a>. After this you can try to <a href="https://support.microsoft.com/en-us/instantanswers/62ed802d-7c8d-35d9-9b82-6cace4b08185/backup-and-restore-in-windows-10" target="_blank" rel="noopener noreferrer">Backup and Restore in Windows</a>.</p>
<p>We fully agree with Microsoft: &#8220;Do not pay any money to recover your files. Even if you were to pay the ransom, there is no guarantee that you will regain access to your PC or files.&#8221;</p>
<h1>If You Already Paid:</h1>
<p>If you paid the ransom, contact your bank and local authorities immediately. Your bank may be able to block the transaction and return your funds if you paid with a credit card. Inform your bank if you did submit credit card details to the cyber thieves.</p>
<p>We suggest you also contact the following government agencies that deal with fraud and scam reporting:</p>
<ul>
<li>In the United States, go to: <a href="http://www.onguardonline.gov/" target="_blank" rel="noopener noreferrer">On Guard Online</a>.</li>
<li>In Canada, go to: <a href="http://www.antifraudcentre-centreantifraude.ca/" target="_blank" rel="noopener noreferrer">Canadian Anti-Fraud Centre</a>.</li>
<li>For other countries: go to this <a href="https://support.microsoft.com/en-us/help/4013550/windows-protect-your-pc-from-ransomware" target="_blank" rel="noopener noreferrer">Microsoft site</a>.</li>
</ul>
<h1>Prevention:</h1>
<p>There are safe measures you can take to lessen the impact of attacks and failures and there are ways to prevent malicious attacks from crippling your PC and network.</p>
<ol>
<li>Keep a current back up of your data files (images, video, documents and music).</li>
<li>Keep your Windows install up-to-date with the latest Windows security updates.</li>
<li>Keep your antivirus program up-to-date. We highly recommend a reputable AV program with active subscription (one that keeps up to recent malicious attacks). We invite you to check out the performance and protection offered by <a href="https://www.compuclever.com/products/antivirus/" target="_blank" rel="noopener noreferrer">CompuClever Antivirus PLUS</a>.</li>
<li>Do not open email links or files from a sender you do not recognize. In many cases you can recognize a fake email and webpage because they have bad spelling or look unusual.</li>
<li>Be careful where you surf on the internet especially with less reputable sites. There is a greater chance of contracting a malware virus. Quite often unsafe sites can look convincing and have only subtle differences.</li>
</ol>
<p>Microsoft states<a href="#_ftn4" name="_ftnref4">[4]</a>: &#8220;Look out for strange spellings of company names (like &#8220;PayePal&#8221; instead of &#8220;PayPal&#8221;) or unusual spaces, symbols, or punctuation (like &#8220;iTunesCustomer Service&#8221; instead of &#8220;iTunes Customer Service&#8221;).&#8221;</p>
<h1>Stay Safe:</h1>
<p>Hundreds of millions of emails that include a ransomware attachment are being sent out every month. Many of these are being blocked and software vendors are working hard to shrink security holes and fix this ongoing cyber-crime.</p>
<p>As can be seen with the information provided here, staying informed, taking precautions, and using safe practices can help prevent you from getting an infection that could save you time and your data. If you require further information on this subject we recommend Microsoft&#8217;s <a href="https://www.microsoft.com/en-us/wdsi/threats/ransomware" target="_blank" rel="noopener noreferrer">Ransomware FAQ</a> page.</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf" target="_blank" rel="noopener noreferrer">http://www.symantec.com</a><br />
<a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/" target="_blank" rel="noopener noreferrer">https://blogs.technet.microsoft.com</a><br />
<a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe" target="_blank" rel="noopener noreferrer">https://www.theguardian.com</a><br />
<a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx" target="_blank" rel="noopener noreferrer">General information on ransomware</a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Quick Start Guide for Digital Care ReadyBoost USB Disc</title>
		<link>https://www.compuclever.com/posts/readyboost-quickstart/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=readyboost-quickstart</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Mon, 10 Jul 2017 21:05:46 +0000</pubDate>
				<category><![CDATA[computer fixes]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[PC hardware]]></category>
		<category><![CDATA[PC TuneUp Maestro]]></category>
		<category><![CDATA[ReadyBoost]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows 8]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[PC Speed]]></category>
		<category><![CDATA[User Guide]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3701</guid>

					<description><![CDATA[<p>&#160; Thanks for choosing Digital Care ReadyBoost Disc, featuring Microsoft ReadyBoost technology. Before you start, please save all your documents and exit all running applications. Follow the steps below to install your Digital Care ReadyBoost Disc and optimize your PC. Step 1. Insert the Digital Care ReadyBoost Disc to a USB slot of your choice. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/readyboost-quickstart/">A Quick Start Guide for Digital Care ReadyBoost USB Disc</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Thanks for choosing <a href="https://www.compuclevergear.com/products/digital-care-usb-low-profile-flash-drive-for-readyboost">Digital Care ReadyBoost Disc</a>, featuring Microsoft ReadyBoost technology. Before you start, please save all your documents and exit all running applications. Follow the steps below to install your Digital Care ReadyBoost Disc and optimize your PC.</p>
<p><strong>Step 1</strong>. Insert the Digital Care ReadyBoost Disc to a USB slot of your choice.</p>
<p><strong>Step 2.</strong> If AutoPlay/AutoRun is enabled, you can click the <strong>Speed up my system using Windows ReadyBoost</strong> option.</p>
<p><img decoding="async" loading="lazy" width="325" height="227" class="aligncenter size-full wp-image-3702" style="width: 100%, max-width:325px; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-StartPrompt.jpg" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-StartPrompt.jpg 325w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-StartPrompt-300x210.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-StartPrompt-24x17.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-StartPrompt-36x25.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-StartPrompt-48x34.jpg 48w" sizes="(max-width: 325px) 100vw, 325px" /></p>
<p>Alternatively, you can open <strong>Windows</strong> | <strong>File Explorer</strong> (or use keyboard shortcut: <em>Windows Key</em> + <em>E</em>), right-click the newly discovered removable drive and select <strong>Properties</strong> from the menu. Select the <strong>ReadyBoost</strong> tab from the Properties dialog box that appears.</p>
<p>If Windows states that &#8220;<em>This device cannot be used for ReadyBoost &#8211; The device does not have the required performance characteristics for use in speeding up your system</em>&#8220;, follow the instructions of <strong>Reformatting Your Digital Care ReadyBoost Disc</strong> below. And then come back to this step.</p>
<p>If Windows states that &#8220;<em>ReadyBoost is not enabled because this computer is fast enough that ReadyBoost is unlikely to provide additional benefit</em>&#8220;, this probably means that Windows is installed on an SSD and no performance gain is possible. Please contact our support team (support@paretologic.com) for further options of how to speed up your PC.</p>
<p><img decoding="async" loading="lazy" width="528" height="418" class="aligncenter size-full wp-image-3703" style="width: 100%, max-width:528px; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Property.jpg" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Property.jpg 528w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Property-300x238.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Property-24x19.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Property-36x29.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Property-48x38.jpg 48w" sizes="(max-width: 528px) 100vw, 528px" /></p>
<p>&nbsp;</p>
<p><strong>Step 3.</strong> If ReadyBoost options appear, you can use the device for speeding up Windows Vista, 7, 8/8.1 or 10.</p>
<p>In Windows Vista, enable the <strong>Use this device option</strong> and move the Space to reserve for system speed slider all the way to the right.</p>
<p><img decoding="async" loading="lazy" width="363" height="473" class="aligncenter size-full wp-image-3704" style="width: 100%, max-width:363px; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-UseDevice.jpg" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-UseDevice.jpg 363w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-UseDevice-230x300.jpg 230w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-UseDevice-18x24.jpg 18w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-UseDevice-28x36.jpg 28w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-UseDevice-37x48.jpg 37w" sizes="(max-width: 363px) 100vw, 363px" /></p>
<p>In Windows 7, 8, 8.1 and 10, select the <strong>Dedicate this device to ReadyBoost</strong> option.</p>
<p><img decoding="async" loading="lazy" width="368" height="475" class="aligncenter size-full wp-image-3705" style="width: 100%, max-width:368px; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-DedicateDevice.jpg" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-DedicateDevice.jpg 368w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-DedicateDevice-232x300.jpg 232w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-DedicateDevice-19x24.jpg 19w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-DedicateDevice-28x36.jpg 28w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-DedicateDevice-37x48.jpg 37w" sizes="(max-width: 368px) 100vw, 368px" /></p>
<p>Click OK and your Digital Care ReadyBoost Disc device is ready!</p>
<h1><strong>Reformatting Your Digital Care ReadyBoost Disc</strong></h1>
<p>Occasionally, your Digital Care ReadyBoost Disc requires initial reformatting prior being used. Follow the steps below to format your drive.</p>
<p><strong>Step 1.</strong> Open <strong>Windows</strong> | <strong>File Explorer</strong> (or use keyboard shortcut: <em>Windows Key</em> + <em>E</em>), right-click the newly discovered removable drive and select <strong>Format.</strong></p>
<p><img decoding="async" loading="lazy" width="322" height="353" class="aligncenter size-full wp-image-3706" style="width: 100%, max-width:322px; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Format.png" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Format.png 322w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Format-274x300.png 274w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Format-22x24.png 22w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Format-33x36.png 33w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-Format-44x48.png 44w" sizes="(max-width: 322px) 100vw, 322px" /></p>
<p><strong>Step 2</strong>. In <em>File system</em> dropdown menu, choose <strong>NTFS</strong>. In <em>Allocation unit size</em>, choose <strong>Default allocation size</strong>. And check <strong>Quick Format</strong> under <em>Format options</em>. Click <strong>Start</strong>.</p>
<p><img decoding="async" loading="lazy" width="267" height="465" class="aligncenter size-full wp-image-3707" style="width: 100%, max-width:267px; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-QuickFormat.png" alt="" srcset="https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-QuickFormat.png 267w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-QuickFormat-172x300.png 172w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-QuickFormat-14x24.png 14w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-QuickFormat-21x36.png 21w, https://www.compuclever.com/posts/wp-content/uploads/ReadyBoost-QuickFormat-28x48.png 28w" sizes="(max-width: 267px) 100vw, 267px" /></p>
<p>You will be notified once your Digital Care ReadyBoost Disc has been formatted and ready for being used. Simply follow the steps in the previous section to finish setting up your Digital Care ReadyBoost Disc.</p>
<p><strong>Need Support or Help?</strong></p>
<p>Email us at <a href="mailto:support@compuclever.com">support@compuclever.com</a> for more information and get help with using your Digital Care ReadyBoost Disc device.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/readyboost-quickstart/">A Quick Start Guide for Digital Care ReadyBoost USB Disc</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FAQ &#8211; Digital Care ReadyBoost USB Disc</title>
		<link>https://www.compuclever.com/posts/faq-digital-care-readyboost-usb-disc/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=faq-digital-care-readyboost-usb-disc</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 07 Jul 2017 17:19:50 +0000</pubDate>
				<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[PC hardware]]></category>
		<category><![CDATA[ReadyBoost]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows 8]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[PC Speed]]></category>
		<category><![CDATA[TuneUp]]></category>
		<category><![CDATA[USB Flash Drive]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3691</guid>

					<description><![CDATA[<p>ReadyBoost is a Microsoft Windows technology that allows you to use ReadyBoost compatible USB flash drive, such as Digital Care ReadyBoost USB Disc, as an additional memory. Doing so, ReadyBoost improves your system’s performance by providing quicker access to data compared to accessing the information from the hard drive.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/faq-digital-care-readyboost-usb-disc/">FAQ &#8211; Digital Care ReadyBoost USB Disc</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;<br />
<strong>Q: What is ReadyBoost and how does it help my PC speed?</strong></p>
<p>A: ReadyBoost is a Microsoft Windows technology that allows you to use ReadyBoost compatible USB flash drive, such as Digital Care ReadyBoost USB Disc, as an additional memory. Doing so, ReadyBoost improves your system’s performance by providing quicker access to data compared to accessing the information from the hard drive. To learn more about the ReadyBoost technology, <a href="https://www.compuclever.com/posts/readyboost/" target="_blank" rel="noopener noreferrer">please read this blog post</a>.</p>
<p>&nbsp;</p>
<p><strong>Q: What’s the System Requirement for Digital Care ReadyBoost USB Disc?</strong></p>
<p>A: Digital Care ReadyBoost USB Disc supports Windows Vista, Windows 7, Windows 8/8.1, and Windows 10</p>
<p>&nbsp;</p>
<p><strong>Q: Do all USB flash drives support the ReadyBoost technology?</strong></p>
<p>A: No. A USB flash drive must meet the minimum random ready and write speeds requirements to support the ReadyBoost feature.  In order for ReadyBoost to work, it requires a USB storage device to have at least: 64MB, USB 2.0, read at 3.5 MB/s, and write at 2.5 MB/s. Our Digital Care ReadyBoost USB Disc well exceeds this requirements.</p>
<p>&nbsp;</p>
<p><strong>Q: Aren’t Hard Disks faster than flash? My HDD has 80MB/sec throughput.</strong><br />
A: Hard drives are great for large sequential I/O. For those situations, ReadyBoost gets out of the way. We concentrate on improving the performance of small, random I/Os, like paging to and from disk.</p>
<p>&nbsp;</p>
<p><strong>Q: What’s the recommended capacity for a USB flash drive for ReadyBoost?</strong></p>
<p>A: We recommend a 1:1 ratio of flash to system memory at the low end and as high as 3:1 flash to system memory. So if your existing PC has a 4 GB of RAM, then you should choose a 4 GB USB flash drive for ReadyBoost, or consider an 8 GB or 12 GB USB flash drive if possible.</p>
<p>&nbsp;</p>
<p><strong>Q: I encounter the message: “</strong><strong><em>This device cannot be used for ReadyBoost &#8211; The device does not have the required performance characteristics for use in speeding up your system”</em></strong><strong>. What should I do?</strong></p>
<p>A: Your Digital Care ReadyBoost USB Disc is fully compatible for Microsoft ReadyBoost technology. When you encounter this message, you simply need to format your USB flash drive.</p>
<p>To do so, open <strong>Windows</strong> | <strong>File Explorer</strong> (or use keyboard shortcut: <em>Windows Key</em> + <em>E</em>), right-click the newly discovered removable drive and select <strong>Format…</strong></p>
<p>In <em>File system</em> dropdown menu, choose <strong>NTFS</strong>. In <em>Allocation unit size</em>, choose <strong>Default allocation size</strong>. And check <strong>Quick Format</strong> under <em>Format options</em>. Click <strong>Start</strong>.</p>
<p>Once the formatting is completed, your Digital Care ReadyBoost USB Disc is ready to be used.</p>
<p>&nbsp;</p>
<p><strong>Q: What does it mean if Windows states that &#8220;<em>ReadyBoost is not enabled because this computer is fast enough that ReadyBoost is unlikely to provide additional benefit</em>&#8220;?</strong></p>
<p>A: This probably means that your Windows operating systems is installed on an SSD and no performance gain is possible. This is only true in theory because each PC is different. If you feel that your PC is sluggish and requires optimization, please contact our support team (support@CompuClever.com) for further options of how to speed up your PC.</p>
<p>&nbsp;</p>
<p><strong>Q: What happens when you remove the drive? </strong><br />
A: When a surprise remove event occurs and we can’t find the drive, Windows fall back to disk. Again, all pages on the device are backed by a page on disk. No exceptions. This isn’t a separate page file store, but rather a cache to speed up access to frequently used data. So no data loss will occur.</p>
<p>&nbsp;</p>
<p><strong>Q: Won’t ReadyBoost wear out the drive?</strong><br />
A: Nope. ReadyBoost technology is designed to take care of the lifecycle issues with flash drives and are smart about how and when it performs writes to the device. Relevant third party tests show that you will get at least 10+ years out of flash devices by using the ReadyBoost technology.</p>
<p>&nbsp;</p>
<p><strong>Q: How secure is ReadyBoost?</strong></p>
<p>A: ReadyBoost is secure. ReadyBoost by default uses Advanced Encryption Standard 128 (AES-128) encryption, which should be sufficient as the chances of exposing sensitive data are very slim.</p>
<p>&nbsp;</p>
<p><strong>Q: What alternatives are there to ReadyBoost?</strong></p>
<p>A: Two alternatives that will significantly improve performance over ReadyBoost are:</p>
<ul>
<li>Using a Solid State Drive (SSD) for your Operating System drive.</li>
<li>Adding additional memory (RAM) to your computer.</li>
</ul>
<p>Nevertheless, neither alternatives are cheap or easy to perform, as compared to using the ReadyBoost option.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/faq-digital-care-readyboost-usb-disc/">FAQ &#8211; Digital Care ReadyBoost USB Disc</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Repair Windows 7 with Your Recovery Disc</title>
		<link>https://www.compuclever.com/posts/repair-windows-7-with-recovery-disc/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=repair-windows-7-with-recovery-disc</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Mon, 10 Apr 2017 21:15:23 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Recovery Disc]]></category>
		<category><![CDATA[Repair Windows 7]]></category>
		<category><![CDATA[windows 7]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3551</guid>

					<description><![CDATA[<p>A Windows Recovery Disk can repair Windows 7 and restore Windows to its factory default state. If you don’t have a Windows 7 Recovery Disc, you can get from our CompuCleverGEAR site. How to Repair Windows 7 This process will repair your systems Windows files and is useful for correcting issues within the operating system [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/repair-windows-7-with-recovery-disc/">Repair Windows 7 with Your Recovery Disc</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A Windows Recovery Disk can repair Windows 7 and restore Windows to its factory default state. If you don’t have a Windows 7 Recovery Disc, <a href="https://www.compuclevergear.com/products/windows-7-system-repair-disc-recovery-drive-usb" target="_blank">you can get from our CompuCleverGEAR site</a>.</p>
<h1>How to Repair Windows 7</h1>
<p>This process will repair your systems Windows files and is useful for correcting issues within the operating system itself; the process will not delete your personal files or data.  Windows Store programs are also safe, but you may need to reinstall third party programs in some cases.</p>
<p>Insert the USB key, Restart your system. Wait for the first screen to pop up, then, click F8 or F12 (you can see which shortcut key on the screen) to enter the boot menu. Then select USB HDD option on the boot menu.</p>
<p><a href="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1.jpg"><img decoding="async" loading="lazy" class="alignnone wp-image-3509" src="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-300x222.jpg" alt="Win 7 image 1" width="627" height="464" srcset="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-300x222.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-610x452.jpg 610w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-24x18.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-36x27.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1-48x36.jpg 48w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-1.jpg 613w" sizes="(max-width: 627px) 100vw, 627px" /></a></p>
<p>Select the Time and Keyboard options, and click &#8220;Next&#8221;</p>
<p><a href="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2.jpg"><img decoding="async" loading="lazy" class="alignnone wp-image-3510" src="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-300x222.jpg" alt="Win 7 image 2" width="632" height="468" srcset="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-300x222.jpg 300w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-610x452.jpg 610w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-24x18.jpg 24w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-36x27.jpg 36w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2-48x36.jpg 48w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-2.jpg 618w" sizes="(max-width: 632px) 100vw, 632px" /></a></p>
<p>Click &#8220;Repair your computer&#8221;</p>
<p><a href="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3.png"><img decoding="async" loading="lazy" class="alignnone wp-image-3511 size-full" src="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3.png" alt="Win 7 image 3" width="394" height="297" srcset="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3.png 394w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3-300x226.png 300w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3-24x18.png 24w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3-36x27.png 36w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-3-48x36.png 48w" sizes="(max-width: 394px) 100vw, 394px" /></a></p>
<p>Select the first option: &#8220;Use recovery tools that can help fix problems starting Windows. Select an operating system to repair&#8221;, click &#8220;Next&#8221;.</p>
<p><a href="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4.png"><img decoding="async" loading="lazy" class="alignnone wp-image-3512 size-full" src="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4.png" alt="Win 7 image 4" width="491" height="368" srcset="https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4.png 491w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4-300x225.png 300w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4-24x18.png 24w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4-36x27.png 36w, https://www.compuclever.com/posts/wp-content/uploads/Win-7-image-4-48x36.png 48w" sizes="(max-width: 491px) 100vw, 491px" /></a></p>
<p>Choose a recovery tool base on your computer problem:</p>
<p>1)  If you have issues about starting, click &#8220;Startup Repair&#8221;. If it detects a problem, it will automatically fix the problems that are preventing Windows from starting. If not, please select another option.</p>
<p>2)  If you want to restore Windows to an earlier point in time, please click &#8220;System Restore&#8221;. If you have more than one save point to restore please do them in the order of most recent to oldest.  You may have to restart the computer between each restore to complete the restore process, the computer will tell you is you need to restart the system.</p>
<p>Windows 7 is set to automatically create Restore points so even if you have not created any but have used the system for a while, there normally will be several restore point to choose from.   Using the &#8220;System Restore&#8221; may remove programs (if they were installed after the date you go to they will need to be installed again), but it will not affect your data files.</p>
<p>3)  If you want to recover your computer using a system image you created earlier, please click &#8220;System Image Recovery&#8221;.  (Please note, using the &#8220;System Image Recovery&#8221; will result in data and personal files being erased, as well as programs (unless you created the image after installing your programs).  We advise only using this option when all else fails and after your data files are backed up.) It will search on your system to find the image. If you backup the system image on a DVD, you need to insert the DVD.</p>
<h1>Create System Recovery Image</h1>
<p>In case the system you purchased did not have an image created you can do this for yourself.  If you are organized you could create one after your programs are installed, this would mean you would only need to backup data files and restoring the image would correct Windows and install all of your programs too!</p>
<p>If you would like to create an image please perform the steps detailed below:</p>
<p>Click Start (normally in the lower left corner of the screen)<br />
Click &#8220;Control Panel&#8221;<br />
Click &#8220;System and Security&#8221;<br />
Click &#8220;Back up your computer&#8221;</p>
<p>The Backup and Restore Center then opens.</p>
<p>Click &#8220;Create a system image&#8221;</p>
<p>Windows looks for available backup devices, such as a hard drive, DVD burning drive, or network drive.</p>
<p>Choose the location to save your system image<br />
Click &#8220;Next&#8221;</p>
<p>***Do not save the backup to the recovery partition: FACTORY_IMAGE or Recovery. Doing so corrupts the recovery information.</p>
<p>Confirm the settings, and then click &#8220;Start backup&#8221;</p>
<p>***Make sure that you have enough blank space on the external drive or enough blank DVDs to create the system image.</p>
<p>Windows will then prepare to create the system image. (If you are backing up to DVD, label and insert a blank DVD in the DVD drive.)</p>
<p>If you are backing up to DVD and a message displays requesting to format the DVD, choose to format the DVD.</p>
<p>If using DVDs label and insert a blank DVD when you are prompted. Continue to follow the on-screen instructions until the image is complete. This might take from several minutes to several hours, please store the backup in a safe place once the image is complete.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/repair-windows-7-with-recovery-disc/">Repair Windows 7 with Your Recovery Disc</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
