• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

CompuClever Antivirus PLUS Achieves VB100 Certification With a Full Mark and a Favorable Review

August 15, 2016 by Andy Thompson

 

Victoria, British Columbia — CompuClever is pleased to announce Antivirus PLUS, its all-in-one PC security software, has achieved a favorable review from Virus Bulletin’s renowned VB100 certification programme.

“As part of its review, released in the summer of 2016, Virus Bulletin noted that CompuClever Antivirus PLUS is accurate, stable and responsive, with a slick and attractive interface,” says Andy Thompson, CompuClever Communications Director and Editor-in-Chief. “In its review Virus Bulletin also noted that CompuClever Antivirus PLUS provides a range of PC optimization tools and other software alongside its anti-malware offering, including a browser plug-in wallet system.”

This is the second time CompuClever Antivirus PLUS received a VB100 rating of “Solid” from Virus Bulletin, with no false positives and “excellent detection.”  CompuClever Antivirus PLUS has also passed the Windows 10 Logo Certification Test, which means it has obtained Microsoft’s approval for running on the Windows 10 operating system.

“CompuClever Antivirus PLUS relies on sophisticated security technology to protect Windows computers against malware threats and is fully compatible with Windows 10, 8, 7, Vista and XP,” says CompuClever’s  Andy Thompson. “CompuClever Antivirus PLUS is designed to deliver the best performance for your PC and it’s built on the most advanced antivirus technology available today.”

Easy to use, CompuClever Antivirus PLUS allows any PC owner to manage security with a single click. The intuitive technology also guards online privacy and digital identity, including banking and credit card details, as well as email passwords and social media information.

About Virus Bulletin

Based in the United Kingdon, Virus Bulletin is a magazine about the prevention, detection and removal of malware and spam. It regularly features analyses of the latest virus threats, articles exploring new developments in the fight against viruses, interviews with anti-virus experts, and evaluations of current anti-malware products.

About CompuClever

Founded in 2010, CompuClever’s mission is to provide PC users with a safe and enjoyable computing experience. CompuClever offers products and services, powered by knowledge, know-how and expertise, aimed at enhancing computer safety, performance and stability. CompuClever software products are designed from the ground up to provide powerful utility and optimization software that can be used quickly and effectively, even by novice computer users.

Contact

Andy Thompson

media[at]compuclever.com
957 Alston St. Victoria, BC
Victoria, BC, Canada, V9A 3S5
www.compuclever.com

Filed Under: Press Release Tagged With: antivirus, PC Security, VB100

Firewalls – First Line Filtration

June 28, 2016 by Andy Thompson

If our PC could be considered a well-protected fortress, we would think of the firewall as an essential part of the moat and drawbridge system – it monitors and controls entry. Most of us associate firewalls with large network corporations and sophisticated security systems. You might, however, be surprised to find your PC and personal devices have security issues similar to large corporate networks. This is why firewall technology is built into your PC and offers the first line of protection from offensive web sites and potential hackers.

We’ll begin with a definition of what a firewall is and then move into some basic questions and answers.  After that we’re going to provide information for those that might want to beef up their firewall protection.

The Firewall Basics

Effectively a firewall is a filter.  It is designed to prevent dubious programs and Internet services from establishing a connection or gaining access to your computer.

Firewall Defined: A firewall is hardware or software technology designed to monitor and filter incoming and outgoing traffic to your PC.  It is a network security function that effectively acts as a barrier.  The data that passes through depends on the pre-determined set of rules which are configured in the firewall settings.

A Little Q and A

Now that we know basically what it is, we can answer some questions.

  1. Why do I need one?

A firewall tries to screen out incoming Internet streams of data from unwanted sources and it also prevents programs on your PC to access the Internet without authorization.  The purpose is to prevent unwanted and malicious programs from communicating to, or from, your computer.

  1. Who makes firewalls?

Microsoft includes a firewall with Windows – we’ll cover this in more detail below.  There are also a significant number of known makers of free and paid solutions.  The best known names would include Norton, McAfee, BitDefender, Kaspersky, as well as Zone Alarm, Webroot, and Comodo.  Some routers also have firewalls built into them.  While we are not recommending any specific option, selecting one of the manufacturers listed above should provide greater security.

  1. When do I need one?

Quite simply – you need a firewall when you connect to the Internet. This is why you should also consider a solution for your smart phone or mobile device.  Most malware programs these days attempt to get money from you and your mobile devices are also targets of malware attacks and cyber crime.

  1. Doesn’t Windows already come with a firewall?

Yes, it does, and it may be all you need.   It blocks unwanted connections and will prompt you if you want to allow a connection or not.  There is a list of programs to block and you can enter exceptions to identify programs you deem safe.

Windows Firewall is equipped to monitor traffic, but lacks in the area of program control.  Despite shortcomings, Windows Firewall may be all you need.   Other tools will provide additional functions such as the ability to create activity logs.  In this way you can review what was happening in terms of attempted connections so you can fine tune the security parameters.  The bottom line is that the Windows Firewall will suffice for most users and should not be regarded as providing insufficient security.

If you find surfing the net is slow, begin by optimizing the browsers and Windows configuration for accessing the Internet.  We recommend looking at the articles: Improve Internet Speed and Restore Browser Speed.  After this, if you are more certain that the firewall is affecting performance, you may want to replace it.  If your PC is encountering issues with viral infections then first look at your antivirus protection, and if you have a top notch AV solution and are still getting breaches, that too would be a reason for looking for a new firewall.

  1. Is a firewall all the protection I need?

In a previous article we covered some myths about antivirus protection and this came up.  We can review briefly here.  As we have described, firewalls can filter nefarious traffic.  However, they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not able to scan for infected files – you need an antivirus solution specific to this purpose.

Cyber criminals exploit potential security holes and look for ways to openly connect with your PC.  A firewall can minimize this risk and offer the first line of defense.  However, it is not sufficient in blocking the myriad of virus and malware threats that are prevalent.  Malware creators are very clever in disguising data and can even disable your firewall in an effort to steal private or personal data.

Antivirus Protection:In a nutshell… we are pleased to offer CompuClever Antivirus PLUS, an AV solution that delivers 100% protection against both known and unknown viruses, comparable to any first-tier antivirus software like Norton, Kaspersky, Bitdefender, and MacAfee.  As a matter of fact, an independent third-party lab test revealed that our antivirus product not only delivers a high level of protection, it also creates a very low impact to PC performance.

For more information about CompuClever Antivirus PLUS click here: Are You Well Protected?

Turning Windows Firewall On and Off

Microsoft states: “You only need one firewall app on your PC (in addition to the firewall that’s probably built into your network router).  Having more than one firewall app on your PC can cause conflicts and problems.” [1]  It is also good practice to NOT turn off a firewall unless you have another one turned on.

With these safe practices in mind, you can view the status of Windows Firewall and you can turn it off or on.  The easiest way to begin is to type “firewall” in the Search field located in the Start menu.  For more information and instructions specific to your operating system follow one of these links:

Windows 10  / Windows 8 / Windows 7 / Windows Vista / Windows XP

What to Consider if Seeking an Alternative

Here is our list to help you better decide on alternatives to the built-in firewall for Windows.

  1. You need to consider how accurately a firewall solution will identify threats to your system. You do not want it to miss threats but you also do not want it blackball safe and known programs.  No one wants an unending stream of warnings from their firewall for no valid reason.  The very best firewalls handle unknown programs by monitoring them closely for suspicious activity and signs of improper network activity behaviour.
  2. The fewer resources it requires the better. This will allow your system to run programs faster and dedicate resources to perform duties related to regular day-to-day activities.
  3. Supply only the functions you need. Some “suite” applications will include antivirus and performance tools.  If you already have these areas covered by other applications there is no need to pay for bloated software that is inadequate in these other areas.
  4. You will also need to know what kind of coverage you require in terms of the devices you are needing to protect (desktop, laptop, tablet, or phone), and if your solution will suffice.

Other Considerations

Now to finish off with some final points related to installing a new firewall solution.

Install Your Firewall 

There isn’t any one “right” place to install a firewall; it comes down to the devices you use and the programs you run.  If you are looking for a firewall for your business then the normal firewall is not what you need; you need what is known as a “Next Generation Firewall” or, “NGFW’.  These are more sophisticated and expensive, ranging from $500 to $80,000, and are beyond what we will discuss here.

Also, some routers have firewalls built right into them, meaning any system behind them does not need a firewall.  This is useful as it means that there is no performance loss for Windows as a result of a firewall performing checks on data streams.  However, if you have a portable device (like a laptop, tablet, or phone), then you need a firewall installed to the device that can be turned on whenever you connect to the Internet when away from home.

Common Problems

The most common problem in using a firewall is blocking a program you know is good.  When this happens you need to create an “exclusion” or “exception” (search the program help files for those terms).  Effectively, this provides you the ability to override what the firewall would normally do.  Firewalls are designed to run in the background so most people have little to no interaction with these programs once they are installed and exceptions are generated.

Summary

While we haven’t gone into detail about hardware and software firewall technologies and the various viral threats to firewalls, we have covered the basics.  Standard coverage should get you started and you have the option of customizing the onboard Windows Firewall.  As an alternative to Windows, you can follow our introductory guidelines for taking on an alternative firewall solution.  In either event, remember that an effective antivirus solution is part of your fortress of protection.

We would like to thank Richard from our Tech Support team for his first wave of research on this subject.  We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com


[1] http://windows.microsoft.com/en-US/windows-8/Windows-Firewall-from-start-to-finish

Filed Under: Antivirus, Blog, online security, Windows tips Tagged With: antivirus, firewall, privacy, security, windows tips

Antivirus Software – 7 Myths Debunked

June 8, 2016 by Andy Thompson

Making use of an Antivirus application is commonly understood to be a prerequisite of operating your computer in a connected, online world. Generally speaking, it is unthinkable that one would run a PC without being actively protected by legitimate AV software with a valid subscription, whether paid or free. Nevertheless, there are some common myths about antivirus applications. Some of these myths prevent users from providing themselves with adequate protection while other myths perpetuate untruths and misinformation.

Here are 7 myths about antivirus software that we get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.

The Top 7:

Here are the myths that we cover in this article along with the real truths about each.

1. Authentication and encryption offers me all the protection I need.

It’s true that authentication and encryption can make it challenging for a criminal to get to your confidential information but not impossible.  Some authentication systems use a One Time Passcode (OTP) and send a Simple Messaging System (SMS) or computer generated call back system.

Unfortunately, cyber criminals have already found ways to circumvent multi-factor authentication which was supposed to radically reduce online criminal activity.  New malware versions are now able to intercept authentication codes that are sent to your phone, so criminals can still get access to your OTP without you knowing about it.

Encryption scrambles your information to render it useless and requires you to use an encryption key to unlock the data.  However, it does not fully protect you from key-logging malware that can read your password used to access the encryption key.

While both of these technologies are useful in protecting sensitive data on your PC, they do not protect your PC from contracting malicious software.  In other words, your system can be hacked and be held hostage – you can fall victim to ransomware and other debilitating viruses.

2. I don’t download files so I am safe from virus attacks.

You don’t have to actively download files to be the victim of virus attacks.  Browser based attacks are now much more common.  In fact, some of the most popular websites, including Yahoo, New York Times, Huffington Post, and CNN.com, have fallen prey to malware attacks that are integrated in display ads.  This is known as “malvertising”.

Malvertising is a common online criminal tactic which can easily spread among popular websites for maximum gain.  There are two types of malvertising attacks.  One is when a user clicks an ad and the malware infects their system.  The other type is not even triggered by user interaction as it uses embedded malware code within iframes that results in the ability to manipulate the browser to grab files from other malicious sources.  Simply browsing to a site can result in falling victim to malware attacks.

There are also attacks, referred to as “Man in the Middle” where an “…attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other”.[1] For example, the Man-in-the-Browser (MITB) attack utilizes a Trojan horse virus.

Online banking is very susceptible to the MITB attack.  In these cases the infected web browser uses altered web pages and content without the user knowing it.  The information is exchanged between the user and the host bank and the confirmation screens are all the same.  However, in the background, the criminal can be altering the data so as to change the transaction destination and the amount.

These examples illustrate that files do not have to be downloaded in order for you to be compromised.  Fortunately, Trojan viruses can be detected and removed by effective AV engines.

3. Firewalls protect me from malicious activities.

A Firewall… is a network security feature that can allow or deny incoming and outgoing PC communications based on a predetermined set of rules.  The firewall rules are a standard preset configuration or can be modified by you or your administrator.  The Windows firewall is by default configured to block incoming threats – you need to change the settings to deal with outgoing threats.

Firewalls block certain nefarious traffic but they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not designed to scan for infected files – you need an AV engine specific to this purpose.

It is crucial to eliminate potential security holes.  Port scanning can be problematic as criminals look for ways to openly connect with your PC.  A properly configured firewall can minimize this risk and new Windows operating systems come with firewall functionality.  While this is the first line of defense… it is not sufficient in blocking the myriad of virus and malware threats that are out there.

A firewall can be configured to block outbound traffic as well.  However, malware writers have been able to disable a firewall so traffic can escape from your system.  AV vendors have already created mechanisms to minimize this problem, but cyber criminals have proven themselves to be very clever in being able to hide the information within normal http traffic so as to disguise the data as innocent web requests.

4. Viruses and malware are written by AV companies.

There is no shortage of conspiracy theories.  So… is there any truth to AV companies creating malware?

There is an old technique that Firefighters use known as back burning.  Firemen create a controlled fire to burn up all of the debris that can fuel a fire which leaves a black zone. This method reduces the chance of a wildfire from jumping across the black line of defense.  This is similar to a strategy that Antivirus companies employ with viral attacks.  They use existing malware or create viruses to test their AV engine so they can understand the limits of their program, improve their software, and eliminate the vulnerability associated with such attacks that are known and encountered in the real world.

The real and full truth here is that there have been billions of dollars in loss suffered by companies and private individuals as a result of cyber criminals utilizing malware for profit.  There are in fact real criminals that focus their energies and skill on a variety of heinous activities such as stealing money, selling stolen credit card information, hiring other malicious code writers, selling malware to other cyber criminals, holding an infected PC ransom, and more.  Cyber crime is a billion dollar industry and it will continue to grow as long as criminals see an opportunity to make money.

5. You can get good protection from free AV programs.

There are free antivirus programs that provide a basic level of protection, like Microsoft Windows Defender.  However, many of these lack key security features to reduce exposure to attacks, some have slower scanning speeds, others do not provide technical support, several do not respond quickly to emergencies, and some do not detect new threat categories effectively.

Free AV programs generally do not provide web protection.  This fundamental security feature is designed to block malicious links, prevent phishing attempts, and stop fraudulent links from compromising your system.  As we stated previously, online criminals want to make money and they will target personal or financial information.

Some free antivirus products offer a personal firewall that can block unauthorized communication.  You will need to verify your AV solution is equipped with this and activate it during the enrollment process.  And keep in mind, if your PC is already infected, cyber criminals could be actively stealing your information.

Choosing a free or paid antivirus program can be a difficult challenge as you need to weigh out your own privacy concerns along with getting full protection.  Third party publications can help narrow down your choices so we recommend that you review articles from publications such as: PC Magazine, Cnet, AV-Test, AV Comparatives, or Virus Bulletin.

We are pleased that CompuClever AV PLUS has been certified by Virus Bulletin (VB100).  You can find the review on this virus bulletin site (search for “CompuClever”).  More on this later…

6. AV applications are not equipped to deal with APT attacks.

Advanced Persistent Threat (APT) is a recently used term spoken in such a way as to conjure up dark and scary creatures that we can speak of when gathering around a campfire at night.  In reality, APT is not dramatically different from malware that was launched ten years ago.  It’s quite common for cyber criminals to use similar tactics in new ways when launching their latest PC threats.

APT attacks are generally designed to target and penetrate companies, government agencies, or even political organizations.  If you want additional insights about APTs, please read the article: Setting the Record Straight: What’s an Advanced Persistent Threat?

Malware writers are very innovative as they quickly change their attack methods while still leveraging criminal underground networks and strategies all the while remaining focused at absconding funds or making their mark.  Case in point: Ashley Madison hackers were motivated as a result of outrage due to the activities of the targeted website.

AV companies have evolved by using a combination of malware signatures, heuristics, and behavior techniques to capture new and unknown threats.  They will not however detect all malware attacks.  Some AV companies detect unknown threats better and more consistently than others.

Let’s turn our focus on third party testing companies that specifically test for unknown and zero-day malware threats.  Companies that specialize in preventing APT attacks generate a lot of revenue, but it is surprising to see that these vendors have not submitted their products for testing by a third party organization.  Why is that?

For most users, the most affordable and best option is a reputable AV program along with using common sense.  It also helps to get recent and frequent software updates.

7. I can get good information about AV app comparisons from the AV vendor.

The simple answer to this is: make sure you get independent reviews.

Often times, AV test reports sponsored by a company range from being biased to blatantly skewed.  These reports typically highlight specific detection techniques and compare a limited number of vendors.  On the other hand, third party, non-profit malware testing organizations publicly provide their testing methodology to be scrutinized by all participating vendors.

All AV vendors are allowed to participate in third party tests and reviews, compared to being selected and tested by a vendor who is paying for the report.  There are different testing scenarios to help understand efficacy characteristics.

One test, involves capturing malware for a specific period of time and preventing the update mechanism from fetching the latest files from the AV vendor.  This particular test determines whether the AV engine can proactively prevent new or unknown threats from infecting a PC without file updates.[2] Another test involves speed performance tests which measure the impact of the AV program on the performance of a computer system.

An Independent Review: CompuClever Antivirus PLUS

We are pleased to report that we were tested and received a glowing review by VB100, “…a world-renowned independent testing and certification body, active in testing, reviewing and benchmarking security solutions for over 20 years.”[3]

VB100 had this to say about CompuClever Antivirus PLUS:

“The design is slick and attractive, with a good range of options available and intuitive deployment of controls.”

“Stability was perfect throughout testing, with not the slightest shake even under heavy stress. Performance impact was decent too, with RAM use perhaps a little above average but CPU usage and impact on our set of tasks both pretty low.”

“Detection was as excellent as one would expect, with good scores everywhere. The WildList and clean sets were handled with pinpoint accuracy, earning CompuClever its first VB100 award on its debut.”

Check out the virus bulletin full review.

For more information about CompuClever AV PLUS click here: Are You Well Protected?

Summary:

With the information provided in this article we feel you now have a much clearer understanding of AV applications and virus attacks.  We strongly recommend that you protect your PC from viral dangers that are prevalent in our daily computing world.

We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com


 

[1] https://en.wikipedia.org/wiki/Man-in-the-middle_attack
[2] How to Properly Evaluate an APT Security Solution
[3] https://www.virusbulletin.com/testing/

Filed Under: Antivirus, Blog, CompuClever Antivirus PLUS, online security, PC security

f.lux – How to Elinimate Digital Eye Strain

May 6, 2016 by Andy Thompson

We’re going to explore night and day and everything in between – as it applies to levels of light.  There are natural lighting levels that we are exposed to as determined by the onset of sunset and sunrise.  Of course night time we may choose to be in front of a monitor or screen but there may be tradeoffs with respect to eye strain, headaches, or improper sleep.  The technology known as “f.lux” may help to alleviate this.  We like the concept and we also like the company as they are dedicated to offering this technology for free.

The Technology

To put it simply, f.lux automatically changes the color of your screen depending on the time of the day, for the purpose of reducing blue light exposure.  During the day time, your screen appears normal and as evening approaches it becomes pinker or rose colored.  It works well with computers and laptops and it can be used to work with iPhones and iPads.  There are also similar applications for Android devices.

Theory

PC screens, monitors, and mobile phones all emit full spectrum light to resemble full daylight conditions.  The makers of f.lux state:

“Exposure to blue light at the wrong time of day can keep you awake later and interfere with the quality of your sleep.  f.lux tries to help this by removing blue and green light to help you wind down in the evenings.”

Day time – we have bright sunlight to help stimulate wakefulness. Night time – lighting is dim and our brains secrete melatonin which causes us to feel sleepy.  It’s a 24-hour rhythm based on an internal circadian clock that is affected by our exposure to light and dark cycles.

While some computers adjust the brightness levels based on sensors, the color temperature does not change.  This is why you see more pink tones when using f.lux which help with melatonin levels and eye strain.

Research To Back It Up:

If you want to see the research behind any of this we encourage you to find independent online studies.  You can also begin with the f.lux page which offers many links to reports and studies from trustworthy sources: https://justgetflux.com/research.html

f.lux – The Company

The f.lux site, like the application, is pretty easy to pick up and understand.  Right up front they describe their technology as a “labor of love”.  It’s free as they pay for the development based on donations received.  They state that 100% of donated money goes to the ongoing development and operations related to f.lux.

In terms of the future of this technology, it appears as though major platform developers are beginning to include some form of night time mode in their operating system.  There is NightShift for Mac and there is Blue Shade for Amazon Fire tablets and Night Mode for Android N.  The makers of f.lux are working to make their technology available on a wide range of operating systems but they have had a hard time with mobile devices due to restrictions from the platform makers.

Before You Decide:

You can always get a preview of how your screen would look if you decide on trying out the f.lux software.  Simply go to the fluxometer page.  You can select your computer or device and try out different levels.

To Start:

If you are running Windows, Mac, or Linux… you can download and install f.lux from their website.  There is also a version for Android devices but there are some limitations – we recommend using Twilight.  Twilight is an Android app that offers similar functions to those of f.lux and we have used the free version of it and find it meets our use requirements and expectations.

For iPhone and iPad users, Mac has a similar feature called Night Shift (for more information on setting this up click here: Enable NightShift on Your iPhone).

When you have done downloading and installing the software, f.lux will attempt to detect your location.  This may not work so well and we recommend that you click the Change button as seen below and set your location.  As it says on their site: “f.lux works a lot better if it knows exactly where you are (we make a guess, but it’s not always good.)”

You also have the option of adjusting the lighting level for day or night as well as the transition speed.

When Not To Use It:

You may want to disable f.lux at certain times.  For instance if you are working on graphics or images, you can choose to disable it for an hour using the disable option as seen above, or use the Alt-End key combination.  There is a movie mode that disables f.lux for 2 ½ hours.  As the company states on their website: “We designed Movie Mode to preserve sky colors and shadow detail, while still providing a warmer color tone. It’s not perfect on either count, but it strikes a balance.”

FAQ:

If you have questions or issues, start with the frequently asked questions page which has lots of useful information: https://justgetflux.com/faq.html

Final Words:

There are still shortcomings with this technology including a reduction of contrast (blacks turn to a dark shade of red), and with Android, certain buttons can be inaccessible.[1] Overall, you will notice that it is easier on the eyes and decreases glare.

As for sleep… the American Medical Association’s Council on Science and Public Health states: “…exposure to excessive light at night, including extended use of various electronic media, can disrupt sleep or exacerbate sleep disorders”.[2]

If you have to be in front of a monitor or device screen… it makes sense to try f.lux.  We have enjoyed the benefits of this free technology and hope it will help you as well.

We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  To view our archive of past articles, follow this link: Back Issues. If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com


 

[1] http://www.makeuseof.com/tag/get-good-nights-sleep-filtering-phones-blue-light/
[2] http://www.atmob.org/

Filed Under: Blog, Health & Fitness, PC hardware Tagged With: Blue Light, Digital Eye Strain, Health & Fitness, how to, Review

BloomSky – Serious but Fun

April 15, 2016 by Andy Thompson

Welcome to the third and concluding edition of our series on the BloomSky Weather Sensor review. In the previous articles we covered the introduction to the community and the technology. The second article focused on putting the device together right out of the box. Now it’s time to provide information on the software for the device and then give our overall review of the product along with our recommendations

The Device


There are going to be some of our readers who are inspired by this weather sensor technology and want to take the step of buying an actual weather device for themselves. We covered how to assemble the device and now we will look at connecting it with the available software. First we’ll review some of the features of the device.

A Serious Weather Station

For weather hobbyists, you will immediately recognize the value of the BloomSky device. It has sensors to constantly measure the temperature, humidity, barometric pressure, along with ultra-violet sun exposure and a rain sensor. It is built to withstand weather extremes and it can last 20 days on one battery charge, and it can be powered by solar or AC power.

BloomSky enables you to connect your device and share weather data with Internet weather service like the Weather Underground. Those who are serious about collecting weather data can trust BloomSky’s industrial grade quality when it comes to withstanding the most severe weather conditions. We couldn’t help but share this photo that was posted on Xiao’s, BloomSky’s CEO, personal blog. He proudly stated that the seemingly frozen device below is still powered on, functioning, and transmitting weather data!

Dashboard – the Device Software

To connect to your device and examine the data that is now being collected, you can access the software known as the dashboard. Simply go to this link: https://dashboard.bloomsky.com/ using your desktop or mobile device. You’ll need to create an account with a user name and password. Once your device is up and running for a day or more, you can view time-lapse captures of previous days’ recordings using a calendar view to select the day you want to view.


There is also a Data view with graphs that display the weather information you are taking from your location as can be seen here:

A Fun Device

For those of us who are not weather hobbyists, BloomSky is a fun device that allows you to connect with others in ways that you’ve never imagined before. The BloomSky device takes pictures of the sky every few minutes and has a fish-eye lens that is pointed upwards. The 170 degree ultra-wide lens can be adjusted vertically.

The devices are designed to forward images to the BloomSky website, which assembles the pictures and produces a time-lapse video on its cloud-based network. You can then check out the weather in another location for yourself and get a firsthand look at transmissions along with corresponding temperature measurements. So, by getting this unit, you are plugging yourself into a weather information network.

Furthermore, all of the information collected, including the time-lapse video generated daily, can be easily shared with the rest of the world including your family and friends who may be keen on admiring the weather you are enjoying. Along with the BloomSky website, sharing is also made easy through the BloomSky app, which supports mobile devices running on either the iOS (Apple App store) or Android (Google Play) platform. What’s also amazing is that your friends and family can subscribe to your BloomSky weather station through the app and receive not only daily time-lapse videos but also “push messages” you send regarding important updates and alerts.

Our Tech Corner Evaluation:

Our Technical Support specialist Richard has this to say:

I have to admit that at first blush I was skeptical of the weather sensor device. It wasn’t that I did not believe it could be accurate in its measurements or incapable of handling wet or cold weather, but rather the utility of such a device. That is always the acid test isn’t it, what purpose does it serve?

For some people being able to check the weather conditions at home while they are away is valuable, but then you’d have to be away from home for long periods to justify it. So, I went to the BloomSky webpage to see if they could sell me on it.

One of the first things I came across was IFTTT technology (IF This, Then That). This refers to the ability to use the information gathered from the device for a purpose. Simply put, if a condition arises than a corresponding action ensues. That is to say, you would be able to set your home thermostat according to the temperature changes. “For example, you can have BloomSky trigger your connected thermostat to turn on (or off) when an outside temperature is reached.” We see other options are available as well including have your home thermostat adjusted remotely using a device such as a Wi-Fi thermostat controller. Or, you could simply contact a friend or neighbor who could adjust it for you. There is also the option to have it record data and present it to you. Getting an idea of how much rainfall you had locally or overnight or tracking freezing temperatures could be very useful for farmers and gardeners.

As global weather and forecasting becomes increasingly variant and harder to predict, the value of this technology could be even more salient. BloomSky has also placed considerable effort toward establishing a weather network community. They have a Facebook page and anyone can join in regardless of whether you have the BloomSky hardware.

Recommendation and Offer

We feel that this is really the definition of an emerging technology, and the impact is hard to predict, but we can easily see value for such devices as it relates to automation of homes, for people to use in their businesses, and to assist with travel plans. In reading their blogs we also see opportunities to learn about how weather affects people in different vocations and walks of life. Certainly handling the device for a couple of days, and seeing what is being done with it has been an education for our team.

An offer for our readers:

For those who are interested in joining the BloomSky network, BloomSky is currently offering an unprecedented special promotion to our readers. Simply follow the link and use coupon code: COMPUCLEVER to get up to $40 off when you purchase a solar powered BloomSky weather station.

Disclaimer: CompuClever will not financially benefit from any purchase that may result from this article, which serves as a purely independent review.

With the BloomSky device the sky may really be the limit!

We hope you enjoyed our volume of the newly minted “Gears and Gadgets” column. We will bring more creative and smart high-tech products to you on a regular base. If you have any specific interest that you would like us to cover, simply send us an email to: newsletter@compuclever.com

Filed Under: Blog, Gears and Gadgets, Outdoor, Smart Device Tagged With: BloomSky, Gears and Gadges, Product Review

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 17
  • Next Page »

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.