<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>PC security Archives - CompuClever</title>
	<atom:link href="https://www.compuclever.com/posts/category/blog/pc-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.compuclever.com/posts/category/blog/pc-security/</link>
	<description></description>
	<lastBuildDate>Fri, 04 Aug 2017 21:30:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://www.compuclever.com/posts/wp-content/uploads/cropped-compuclever_128-1-32x32.png</url>
	<title>PC security Archives - CompuClever</title>
	<link>https://www.compuclever.com/posts/category/blog/pc-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Going Incognito &#8211; Browse Web in Privacy Mode</title>
		<link>https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=going-incognito-browse-web-privacy-mode</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 04 Aug 2017 16:44:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Icognito mode]]></category>
		<category><![CDATA[microsoft edge]]></category>
		<category><![CDATA[privacy mode]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3746</guid>

					<description><![CDATA[<p>Who uses Incognito or Private browsing and why?  Do they have something to hide or are they being safe in terms of sensitive data such as login credentials?<br />
One thing is certain - surfing the web using Incognito or Private browsing DOES NOT keep you completely anonymous and stealthy.  Knowing the levels of privacy that this mode of browsing offers is necessary if you are concerned about how private and secure your online activities are</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/">Going Incognito &#8211; Browse Web in Privacy Mode</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><b>Incognito</b>, <a href="https://en.wikipedia.org/wiki/Incognito" target="_blank" rel="noopener noreferrer">according to Wikipedia</a>, from the Latin <i>incognitus</i>, refers to a person who wants to remain anonymous to the world and others, in hiding or shut off from humanity.</p>
<p>Web surfers have the option to enable privacy mode or “Incognito” mode on their browser.  Each of the main browser type offers some level of private browsing.  It is known as Private Browsing, InPrivate Browsing, and Incognito depending on the type of browser used.</p>
<p>Basically &#8211; this is a privacy feature that quite simply provides some privacy on your local computing device but, DOES NOT provide hidden detection or stealth beyond that.  Your ISP (Internet Service Provider) and other agencies connected on the Internet can detect your activities via your unique IP address on the web servers.</p>
<p>Disabling functions such as the web cache and browsing history make this a relatively private way of browsing the web.  Cookies, the data holders sent by web sites to recognize or track your online activity, are also disabled.</p>
<h2>Items Deleted or Not Saved:</h2>
<p>The list  of items that are deleted or not saved when you browse during Incognito or Privacy  mode are:</p>
<ul>
<li>Website history.</li>
<li>The cache of files stored during your browse session.</li>
<li>History of files downloaded.</li>
<li>Search history stored by the browser.</li>
<li>Cookies from browsed sites.</li>
<li>Data on forms you have filled out.</li>
</ul>
<h2>Items That Are NOT Private:</h2>
<p>There are items that are not deleted and the ways you remain exposed to detection:</p>
<ul>
<li>Search histories stored from search providers like Google are not deleted.</li>
<li>Websites can identify you and keep a record of your visit.</li>
<li>Your ISP can detect your network traffic and identify your IP address.</li>
<li>Any malware on your PC or device can track your activities.</li>
</ul>
<p>Also, it is important that you keep in mind the browser does not likely perform a secure delete and items from your browsing session can be recovered.  Until that data is overwritten with other data it can be undeleted using special recovery software.</p>
<h1>Pros and Cons?</h1>
<p>So why would you want to use Incognito?  It doesn’t seem entirely private after all.</p>
<h2>Pros</h2>
<p>The reasons for using this more of browsing include:</p>
<ol>
<li>Reducing the history, browsing, and personal data stored on your PC or device.</li>
<li>You can prevent storage of sensitive data such as log-in credentials.</li>
<li>You can also use multiple accounts simultaneously using several tabs at once.<br />
<i>Tip</i>: You can let a friend check their email or log onto Facebook without you having to log out.  Just start up a new Incognito window.</li>
<li>You can perform searches that are not influenced by any prior browsing history.</li>
<li>Browser extensions are disabled so that Facebook and Google and other services can’t track you.</li>
</ol>
<p>One of the main reasons however is to hide your online interactions on the computing device you are using from those sharing the same device.</p>
<p>In a busy household full of people… using Incognito mode can prevent others from seeing potentially embarrassing items.  It also prevents others from revealing your search history or the cache of browsed files.</p>
<h2>Cons</h2>
<p>We’ll, conversely, you may want to monitor online activities on your PC or device.  You may be concerned that someone will incur a malware infection or that they are browsing to websites that could be considered risky, unethical, or harmful. This is when you would want to disable Privacy / Incognito functionality as described below.</p>
<p>Also, having a false sense of protection can lead to consequences.  ISPs pass data to copyright holders (such as music, videos, books, or games), who are cracking down on the downloading of copyright materials.  The ISP is required to forward notices from the copyright holder alleging infringement of that work.</p>
<p>And, as we have pointed out, you are not completely stealthy.</p>
<h1>How to Go Incognito</h1>
<p>So now that you have a better idea of what the limits and benefits of this mode of browsing are, you can follow the easy steps outlined below to activate it.  Of course it will depend on which browser you are using.</p>
<ul>
<li><strong>Chrome</strong>: Click on the ellipsis menu (<strong>…</strong>) at the right end of the menu bar, and select: “New Incognito Window”.</li>
<li><strong>Firefox</strong>: Click on the icon with three horizontal lines near the top right corner of the browser, and select: “New Private Window”.</li>
<li><strong>Internet Explorer</strong>: To change to an “InPrivate” session in Internet Explorer you would hold down Ctrl+Shift and press P (Ctrl+Shift+P).</li>
<li><strong>Microsoft Edge</strong>: Click the button with three dots (<strong>…</strong>), called the “More” button, and select: “New InPrivate Windows”.</li>
</ul>
<h2>Disabling It</h2>
<p>As we mentioned above, you may want to disable this function so that you can detect for yourself the online activities of others in your household. Click the links below to take you to the specific directions for your browser type.</p>
<ul>
<li><a href="https://community.spiceworks.com/how_to/75544-how-to-disable-incognito-mode-in-google-chrome" target="_blank" rel="noopener noreferrer">Chrome</a></li>
<li><a href="http://www.thewindowsclub.com/disable-private-browsing-internet-explorer-chrome-firefox" target="_blank" rel="noopener noreferrer">IE / Firefox / and a freeware tool for Chrome</a></li>
<li><a href="http://mywindowshub.com/enable-disable-microsoft-edge-inprivate-browsing-windows-10/" target="_blank" rel="noopener noreferrer">Microsoft Edge</a></li>
</ul>
<p><em>Warning</em>: most of these procedures require a change to the registry.  We recommend you do a backup beforehand and proceed with caution.</p>
<h2>For Parents:</h2>
<p>If you’re a parent worried about your kids and their private online activities (for example, pornography or social networking sites), then you can first try to disable the functionality as mentioned above.  That way you can check the search and browsing history items.</p>
<p>You can also take the next step and look at filtering software such as <a href="https://www.netnanny.com/" target="_blank" rel="noopener noreferrer">NetNanny</a> that will block porn and whatever else you want to filter even when the browser is in Incognito mode.  They have it for computers and mobile devices.  It&#8217;s not free but could be worth the peace of mind.</p>
<h1>Last Note</h1>
<p>We’re in favor of providing information that in the right hands is used with good intent.  To reach a higher level of stealth you would need to look at using a VPN solution.  A VPN masks your physical location and IP address so the website you’re visiting doesn’t really know who or where you are.</p>
<p>We hope this information has been of help to you and enhances your web browsing experiences.  For more information on this topic see our past posts:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/privacy-dont-give-it-away/" target="_blank" rel="noopener noreferrer">Privacy – Don’t Give It Away</a></li>
<li><a href="https://www.compuclever.com/posts/vpn-need-one/" target="_blank" rel="noopener noreferrer">What Is a VPN, and Why Do You Need One?</a></li>
</ul>
<p>Feel free to contact us with any questions or comments on this and other subjects.  Simply send us an email at: newsletter@compuclever.com</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/">Going Incognito &#8211; Browse Web in Privacy Mode</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don&#8217;t be Held at Ransomeware</title>
		<link>https://www.compuclever.com/posts/held-at-ransomeware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=held-at-ransomeware</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 14 Jul 2017 17:23:49 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows 8]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[PC Security]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomeware]]></category>
		<category><![CDATA[Wannacry]]></category>
		<category><![CDATA[Windows Update]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3718</guid>

					<description><![CDATA[<p>Ever get the feeling that computers have come a long way, yet… why are we still susceptible to PC virus attacks?  Recently there were two major worldwide attacks known as “ransomware”.  We’re going to offer information about these attacks and how you can be prepared to fend off a ransomware infection.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>With two prominent malware attacks occurring back-to-back during the past two months, you&#8217;re likely familiar with the term  &#8211; &#8220;Ransomware&#8221; &#8211; a cyber-crime gaining worldwide attention. In this article we explore ransomware in depth and offer recommendations and instructions to prevent it from happening and to protect your PC.</p>
<h1>Ransomware defined:</h1>
<p>You can think of ransomware as &#8220;data kidnapping&#8221;. It is the result of a malware attack that blocks access to a user&#8217;s PC data. Once infected, the attackers try to force you into paying money so you can regain access. In some cases there is a threat to publish or delete the data unless the ransom is paid. Data and access is blocked by using strong file encryption.</p>
<p>Computers can be infected whether at home or in the work environment. This includes PCs on an enterprise network or government agency servers.</p>
<p>Some ways of infecting your PC include:</p>
<ul>
<li>Surfing to unsafe or fake websites.</li>
<li>Opening emails and email attachments from unknown sources.</li>
<li>Opening malicious links in emails, Facebook, Twitter, and from online chat apps such as Skype.</li>
</ul>
<p>The two main types of ransomware are: Lockscreen and Encryption.</p>
<ol>
<li>Lockscreen ransomware prevents you from accessing your PC or files and instead displays a full-screen message saying you have to pay a ransom to regain access.</li>
<li>Encryption ransomware prevents you from opening your files by encrypting them. The encryption is very strong (uses an AES-256 &#8220;military grade&#8221; cipher algorithm), and would take an estimated 3&#215;10<sup>51</sup> years to crack. Also, a unique encryption key is generated for each infected computer so you can&#8217;t just get someone else&#8217;s key.</li>
</ol>
<p>Note: There are older versions of ransomware that display false messages such as claiming you have performed an illegal activity with your PC. They then state you are being fined by a police force or government agency. We want to stress that these claims are false and can be considered a scare tactic designed to extort money from you.</p>
<h1>What is the result of the attack?</h1>
<p>While there are various forms of ransomware, all of them prevent you from performing normal PC functions. This includes:</p>
<ul>
<li>Getting locked out! Preventing you from accessing your operating system.</li>
<li>Blocked access to files! Files are now encrypted and you can&#8217;t access them.</li>
<li>Disabled apps! Certain programs (like your web browser), are no longer able to run.</li>
</ul>
<h1>What about the ransom?</h1>
<p>Some ransomware attacks involve the victim having to pay money while some make you complete a survey. Payment of money is performed online and sometimes involves the victim having to pay in Internet currency Bitcoins. Due to the nature of those that commit these cybercrimes &#8211; there is no guarantee that your data or PC will return to the pre-attack state.</p>
<h1>How much do they extort?</h1>
<p>Symantec gained access to a malware server in 2012. This provided them first hand insight of the ransoms that were paid out. In a single day 5,700 computers were infected and 2.9% paid the ransom. This comes out to approximately $33,600 for one day.</p>
<p>&#8220;Given the number of different gangs operating ransomware scams, a conservative estimate is that over $5 million dollars a year is being extorted from victims. The real number is, however, likely much higher.&#8221;<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<h1>Recent Ransomware attacks&#8230;</h1>
<h2>WannaCrypt; May 12, 2017:</h2>
<p>Many users around the world were victims of the malicious &#8220;WannaCrypt&#8221; software attack which has been considered one of the worst and most widespread cyber-attacks. More than 230,000 computers in over 150 countries were affected. All files on infected PCs were locked and the demanded ransom was 300 dollars in bitcoins.</p>
<p>Interestingly, people running Windows 10 were not targeted by the attack. Despite this, this attack was serious as evidenced in the steps Microsoft took. They took a highly unusual step in providing a security update for all customers to protect even the Windows platforms that are in custom support only. This includes Windows XP, Windows 8, and Windows Server 2003.</p>
<p>Supported versions of the operating system (Vista, Windows 7, 8.1, 10, etc.), have access to the security update MS17-010. If users have automatic updates enabled or have installed the update, they are protected. Microsoft states<a href="#_ftn2" name="_ftnref2">[2]</a>: &#8220;For those organizations who have not yet applied the security update, we suggest you immediately deploy <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx" target="_blank" rel="noopener noreferrer">Microsoft Security Bulletin MS17-010</a><u></u><em>&#8220;. </em>They go on to state that this attack may evolve over time and additional defense strategies are warranted.</p>
<h2>Petya; June 27, 2017:</h2>
<p>Companies across Europe and the US were affected by the &#8216;Petya&#8217; ransomware attacks. Infected computers displayed a message demanding a Bitcoin ransom of $300. Victims were unable to unlock their computers even if they paid the ransom.<a href="#_ftn3" name="_ftnref3">[3]</a> The instructions included sending confirmation of payment to an email address. However, that email address was shut down by the email provider and there was no way to contact the attacker for a decryption key to unlock their computer.</p>
<p>This ransomware attack exploited the same Microsoft exploit as WannaCry &#8211; the vulnerability known as EternalBlue. Even with the patch, this cyber-attack has two other ways to spread within an organization focusing on the network administrator&#8217;s tools. Experts believe the initial infection is suspected to have been delivered through email (as with WannaCry).</p>
<h1>If Infected With Ransomware:</h1>
<p>You are a victim of a ransomware infection once you see some form of ransom demand appearing in a dialog window, an app, or a full-screen message. Unfortunately, this demand is displayed after encrypting your files or disabling some part of your PC.</p>
<p>Before you try to recover your files, Microsoft suggests trying to fully clean your PC with <a href="https://support.microsoft.com/en-us/help/17466" target="_blank" rel="noopener noreferrer">Windows Defender Offline</a>. After this you can try to <a href="https://support.microsoft.com/en-us/instantanswers/62ed802d-7c8d-35d9-9b82-6cace4b08185/backup-and-restore-in-windows-10" target="_blank" rel="noopener noreferrer">Backup and Restore in Windows</a>.</p>
<p>We fully agree with Microsoft: &#8220;Do not pay any money to recover your files. Even if you were to pay the ransom, there is no guarantee that you will regain access to your PC or files.&#8221;</p>
<h1>If You Already Paid:</h1>
<p>If you paid the ransom, contact your bank and local authorities immediately. Your bank may be able to block the transaction and return your funds if you paid with a credit card. Inform your bank if you did submit credit card details to the cyber thieves.</p>
<p>We suggest you also contact the following government agencies that deal with fraud and scam reporting:</p>
<ul>
<li>In the United States, go to: <a href="http://www.onguardonline.gov/" target="_blank" rel="noopener noreferrer">On Guard Online</a>.</li>
<li>In Canada, go to: <a href="http://www.antifraudcentre-centreantifraude.ca/" target="_blank" rel="noopener noreferrer">Canadian Anti-Fraud Centre</a>.</li>
<li>For other countries: go to this <a href="https://support.microsoft.com/en-us/help/4013550/windows-protect-your-pc-from-ransomware" target="_blank" rel="noopener noreferrer">Microsoft site</a>.</li>
</ul>
<h1>Prevention:</h1>
<p>There are safe measures you can take to lessen the impact of attacks and failures and there are ways to prevent malicious attacks from crippling your PC and network.</p>
<ol>
<li>Keep a current back up of your data files (images, video, documents and music).</li>
<li>Keep your Windows install up-to-date with the latest Windows security updates.</li>
<li>Keep your antivirus program up-to-date. We highly recommend a reputable AV program with active subscription (one that keeps up to recent malicious attacks). We invite you to check out the performance and protection offered by <a href="https://www.compuclever.com/products/antivirus/" target="_blank" rel="noopener noreferrer">CompuClever Antivirus PLUS</a>.</li>
<li>Do not open email links or files from a sender you do not recognize. In many cases you can recognize a fake email and webpage because they have bad spelling or look unusual.</li>
<li>Be careful where you surf on the internet especially with less reputable sites. There is a greater chance of contracting a malware virus. Quite often unsafe sites can look convincing and have only subtle differences.</li>
</ol>
<p>Microsoft states<a href="#_ftn4" name="_ftnref4">[4]</a>: &#8220;Look out for strange spellings of company names (like &#8220;PayePal&#8221; instead of &#8220;PayPal&#8221;) or unusual spaces, symbols, or punctuation (like &#8220;iTunesCustomer Service&#8221; instead of &#8220;iTunes Customer Service&#8221;).&#8221;</p>
<h1>Stay Safe:</h1>
<p>Hundreds of millions of emails that include a ransomware attachment are being sent out every month. Many of these are being blocked and software vendors are working hard to shrink security holes and fix this ongoing cyber-crime.</p>
<p>As can be seen with the information provided here, staying informed, taking precautions, and using safe practices can help prevent you from getting an infection that could save you time and your data. If you require further information on this subject we recommend Microsoft&#8217;s <a href="https://www.microsoft.com/en-us/wdsi/threats/ransomware" target="_blank" rel="noopener noreferrer">Ransomware FAQ</a> page.</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf" target="_blank" rel="noopener noreferrer">http://www.symantec.com</a><br />
<a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/" target="_blank" rel="noopener noreferrer">https://blogs.technet.microsoft.com</a><br />
<a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe" target="_blank" rel="noopener noreferrer">https://www.theguardian.com</a><br />
<a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx" target="_blank" rel="noopener noreferrer">General information on ransomware</a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/held-at-ransomeware/">Don&#8217;t be Held at Ransomeware</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Is a VPN, and Why Do You Need One?</title>
		<link>https://www.compuclever.com/posts/vpn-need-one/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vpn-need-one</link>
		
		<dc:creator><![CDATA[Charles Edward]]></dc:creator>
		<pubDate>Fri, 28 Apr 2017 19:29:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3586</guid>

					<description><![CDATA[<p>In March 2017, the US Congress voted to allow internet service providers (ISPs) to sell customer data. Anyone in the United States who connects to the Internet must rely on an ISP. This means your ISP now has knowledge of all of your browsing habits. While ISPs claim they will use your Internet history to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/vpn-need-one/">What Is a VPN, and Why Do You Need One?</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In March 2017, the US Congress voted to allow internet service providers (ISPs) to sell customer data. Anyone in the United States who connects to the Internet must rely on an ISP. This means <a href="https://www.usatoday.com/story/tech/news/2017/04/04/isps-can-now-collect-and-sell-your-data-what-know-internet-privacy/100015356/" target="_blank" rel="noopener noreferrer">your ISP now has knowledge of all of your browsing habits</a>.</p>
<p>While ISPs claim they will use your Internet history<a href="https://www.wired.com/2017/03/big-cables-case-selling-data-doesnt-hold/" target="_blank" rel="noopener noreferrer"> to help sell you more relevant ads</a>, the decision by Congress has made many people deeply uncomfortable.</p>
<h3>WiFi Hotspots Are Also A Risk?</h3>
<p>It&#8217;s not just ISPs who are after your browsing data and personal information. For example, whenever you login to a WiFi hotspot in a coffee shop or at the airport you are potentially putting yourself at risk. WiFi hotspots may not protect your data as it is transmitted to and from your device. Even worse, some WiFi hotspots may want to steal your data, such as browsing history or even passwords and credit card information.</p>
<p>Luckily, something called a virtual private network (VPN) may help protect you from ISPs and anyone else who wants to snoop on your Internet habits.</p>
<h2>What Is a VPN?</h2>
<p>A VPN is essentially an online service that allows you to create a secure Internet connection. All of your browsing is encrypted, meaning that no one, including your ISP or even the government can determine what you are doing on the Internet.</p>
<h3>How Does It Work?</h3>
<p>When you connect to a VPN, you usually launch a VPN client on your computer (or click a link on a special website), log in with your credentials, and your computer exchanges trusted keys with a far away server. Once both computers have verified each other as authentic, all of your internet communication is encrypted and secured from eavesdropping.</p>
<p>There are two main advantages to using a VPN:</p>
<h2>Advantage #1: Browse Privately and Safely</h2>
<p>As mentioned, all of your browsing information is encrypted. This means that your ISP cannot sell your data to a third-party for advertising. VPNs also ensure that your passwords and banking information are kept safe, too.</p>
<p>For example, many journalists and businesspeople traveling abroad <a href="https://ssd.eff.org/en/glossary/vpn" target="_blank" rel="noopener noreferrer">use VPNs</a> to protect their privacy.</p>
<h2>Advantage #2: Browse Everywhere</h2>
<p>Businesspeople and journalists may also use VPNs just to be able to communicate. For example, the <a href="https://en.wikipedia.org/wiki/Great_Firewall" target="_blank" rel="noopener noreferrer">Great Firewall of China</a> prevents Internet users from accessing many useful websites from outside of China. Many people rely on VPNs to access indispensable online services for their jobs.</p>
<p>On the other hand, VPNs are also useful because they allow you to browse as though you were in any country. Many online content providers such as Netflix, Hulu and the BBC restrict access to content based on your country. You can use a VPN to get around these rules.</p>
<h2>What to Look For In a VPN</h2>
<p>Not all VPNs are created equally, so it&#8217;s important to look for the right one before making a choice.</p>
<p>Look for:</p>
<h3>Speed</h3>
<p>If you want to use a VPN in order to watch online content such as Netflix, make sure it has enough bandwidth to do so. Generally speaking, this bandwidth is a result of investments in server capacity and other technology. Some VPNs have more than others.</p>
<h3>Your Data Must Be Kept Safe</h3>
<p>Almost anyone with a little technical know-how can setup a VPN service and then sell it to consumers. The problem for you is: how do you know they&#8217;re going to protect your data?</p>
<p>Look for a VPN with a professional website and an active and responsive social media presence. And, if you&#8217;re really concerned with privacy, look for a VPN that has its servers in a country with strong data privacy laws. In countries such as the United States and the United Kingdom, <a href="http://www.theverge.com/2016/11/23/13718768/uk-surveillance-laws-explained-investigatory-powers-bill" target="_blank" rel="noopener noreferrer">government now has broad powers to access your data</a>.</p>
<p>Countries such as Canada, Germany and Switzerland have much stronger rules prohibiting government collection of personal data, so look for a VPN headquartered in one of those countries first.</p>
<h2>When Can a VPN Not Protect Your Privacy?</h2>
<p>Even if a VPN does not share your personal information, there are others who can. For example, Google and Facebook both use your profile data, which includes browsing history, to sell advertising. A VPN is not designed to prevent this from happening–protecting yourself from Facebook and Google&#8217;s efforts to collect data is best done using browser-based ad blocking tools.</p>
<p>Also, keep in mind that you typically choose to use Google and Facebook because you agree to trade some privacy for the convenience of their services.</p>
<p>However, since you pay ISPs directly, you should expect that your privacy be respected. But since ISPs and others are not respecting your privacy, it may be a good time to use a VPN.</p>
<p><a href="http://link.safecart.com/2hfmh3" target="_blank" rel="noopener noreferrer"><img decoding="async" class="aligncenter" style="width: 100%; height: auto;" src="https://www.compuclever.com/posts/wp-content/uploads/securevpn-banner.png" alt="" /></a></p>
<h2>What We Recommend: SecureVPN</h2>
<p><a href="http://link.safecart.com/2hfmh3" target="_blank" rel="noopener noreferrer">SecureVPN allows you to surf the web anonymously</a>, unlock websites, unlock VoIP services, secure any wifi hotspot, and protect your data &amp; privacy.</p>
<p>SecureVPN operates a self-managed VPN network with at least 750 servers in 141 countries, with plans to add more.</p>
<p>Since there are so many local servers, this means SecureVPN promises the fastest speed possible. SecureVPN also owns its own network–there are no third-parties that gather data, and SecureVPN keeps no logs of your activities.</p>
<h3>Why choosing SecureVPN?</h3>
<p><a href="http://link.safecart.com/2hfmh3" target="_blank" rel="noopener noreferrer">SecureVPN offers a variety of features</a>, including:</p>
<ul>
<li><strong>No 3rd Parties for Your Data</strong>: SecureVPN has a self-managed network. Your data is handled by SecureVPN only, without the intervention or interference of any third-parties.</li>
<li><strong>Military-grade Encryption</strong>: SecureVPN employs top-of-the-line military-grade up to 256-bit encryption to protect and safeguard user’s data from falling into the wrong hands.</li>
<li><strong>750+ Servers in 141 Countries</strong>: SecureVPN has servers in 141 Countries. So, no matter where you are or where you travel to, SecureVPN will connect you to your favorite content.</li>
<li><strong>99.99% Uptime</strong>: SecureVPN has its own network of servers and a team of highly professional experts who manage and host the network to guarantee 99.9% uptime.</li>
<li><strong>Powerful Software and Apps</strong>: SecureVPN wrote its own code for its proprietary software and apps for every major platform including Windows, Mac, iOS, Android, and Linux.</li>
<li><strong>Unlimited Data Transfer</strong>: Download, browse, stream or share, SecureVPN users are free to do whatever they want, how much they want since there is no bandwidth or data limit.</li>
</ul>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/vpn-need-one/">What Is a VPN, and Why Do You Need One?</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Breaking News – Yahoo Admits Breach of 500 Million Accounts</title>
		<link>https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=yahoo-admitted-500-million-accounts-have-been-breached</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 22 Sep 2016 23:29:36 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3004</guid>

					<description><![CDATA[<p>Yahoo confirmed today that data "associated with at least 500 million user accounts" has been stolen in what may be one of the largest cyber-security breaches ever.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My heart dropped when I was <a href="http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/">alerted by CNN</a> that Yahoo admitted today that 500 million user accounts have been compromised. As a seasoned IT professional who has been involved with the security industry for the past decade, this is probably THE worse security breach that’s occurred since the inception of the Internet.</p>
<p>Here are the key facts that you should be aware of regarding this breach:</p>
<ul>
<li>In August 2016, a person codenamed “Peace” attempted to sell what he claimed to be 200 million Yahoo user information.</li>
<li>Back then, Yahoo only said they were investigating the legitimacy of the claim.</li>
<li>On Sept. 22<sup>nd </sup>2016, Yahoo issued a statement acknowledging the legitimacy of the claim. Furthermore, Yahoo confirmed the scale of the breach is actually 500 million accounts.</li>
<li>Yahoo also confirmed that the information stolen contains name, username, lightly encrypted passwords, date of birth, and for some accounts, security questions and answers.</li>
</ul>
<p>Nevertheless, till this moment, Yahoo hasn’t issued a notice to all of its users advising them to reset their passwords.</p>
<p>Here at CompuClever, we felt it is necessary to inform you about this event because there is a high possibility that either you or someone you know might be impacted by this incident.</p>
<p>Yahoo is currently working with law enforcement agencies, including the FBI, to deal with this breach. Nevertheless, we recommend you immediately take the following measures to protect your online security and personal privacy:</p>
<ul>
<li>Immediately change your Yahoo email password.</li>
<li>If you happen to be using the same combination of username and password across multiple (non-Yahoo) online accounts, change all of the passwords. Make sure that you use a different password for every account.</li>
<li>Ensure you have a legit and reputable antivirus protection with active subscription to protect your PC from any forms of cyberattack.</li>
</ul>
<p>Further readings:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/how-to-protect-yourself-in-a-post-password-world/" target="_blank">How to protect yourself in a post-password world</a></li>
<li><a href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification/" target="_blank">How to create a good password</a></li>
<li><a href="https://www.compuclever.com/posts/safe-guard-your-online-banking/" target="_blank">Safe guard your online banking</a></li>
<li><a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">Stay safely connected</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Antivirus Software – 7 Myths Debunked</title>
		<link>https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=antivirus-software-7-myths-debunked</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 08 Jun 2016 19:27:59 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2666</guid>

					<description><![CDATA[<p>Here are 7 myths about antivirus software that CompuClever get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/">Antivirus Software – 7 Myths Debunked</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Making use of an Antivirus application is commonly understood to be a prerequisite of operating your computer in a connected, online world. Generally speaking, it is unthinkable that one would run a PC without being actively protected by legitimate AV software with a valid subscription, whether paid or free. Nevertheless, there are some common myths about antivirus applications. Some of these myths prevent users from providing themselves with adequate protection while other myths perpetuate untruths and misinformation.</div>
</div>
<p>Here are 7 myths about antivirus software that we get from interacting with users when dealing with security related support cases.  Let’s debunk the myths related to AV applications.</p>
<h1>The Top 7:</h1>
<p>Here are the myths that we cover in this article along with the real truths about each.</p>
<h2>1. Authentication and encryption offers me all the protection I need.</h2>
<p>It’s true that authentication and encryption can make it challenging for a criminal to get to your confidential information but not impossible.  Some authentication systems use a One Time Passcode (OTP) and send a Simple Messaging System (SMS) or computer generated call back system.</p>
<p>Unfortunately, cyber criminals have already found ways to circumvent multi-factor authentication which was supposed to radically reduce online criminal activity.  New malware versions are now able to intercept authentication codes that are sent to your phone, so criminals can still get access to your OTP without you knowing about it.</p>
<p>Encryption scrambles your information to render it useless and requires you to use an encryption key to unlock the data.  However, it does not fully protect you from key-logging malware that can read your password used to access the encryption key.</p>
<p>While both of these technologies are useful in protecting sensitive data on your PC, they do not protect your PC from contracting malicious software.  In other words, your system can be hacked and be held hostage – you can fall victim to <a href="https://www.compuclever.com/posts/protect-computer-from-ransomware/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">ransomware</a> and other debilitating viruses.</p>
<h2>2. I don’t download files so I am safe from virus attacks.</h2>
<p>You don’t have to actively download files to be the victim of virus attacks.  Browser based attacks are now much more common.  In fact, some of the most popular websites, including Yahoo, New York Times, Huffington Post, and CNN.com, have fallen prey to malware attacks that are integrated in display ads.  This is known as “malvertising”.</p>
<p>Malvertising is a common online criminal tactic which can easily spread among popular websites for maximum gain.  There are two types of malvertising attacks.  One is when a user clicks an ad and the malware infects their system.  The other type is not even triggered by user interaction as it uses embedded malware code within iframes that results in the ability to manipulate the browser to grab files from other malicious sources.  Simply browsing to a site can result in falling victim to malware attacks.</p>
<p>There are also attacks, referred to as “Man in the Middle” where an “…attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other”.<sup><a href="#_footnotes">[1]</a></sup> For example, the Man-in-the-Browser (MITB) attack utilizes a Trojan horse virus.</p>
<p>Online banking is very susceptible to the MITB attack.  In these cases the infected web browser uses altered web pages and content without the user knowing it.  The information is exchanged between the user and the host bank and the confirmation screens are all the same.  However, in the background, the criminal can be altering the data so as to change the transaction destination and the amount.</p>
<p>These examples illustrate that files do not have to be downloaded in order for you to be compromised.  Fortunately, Trojan viruses can be detected and removed by effective AV engines.</p>
<h2>3. Firewalls protect me from malicious activities.</h2>
<div class="quick_facts">A Firewall… is a network security feature that   can allow or deny incoming and outgoing PC communications based on a   predetermined set of rules.  The firewall rules are a standard preset   configuration or can be modified by you or your administrator.  The Windows firewall is by default   configured to block incoming threats – you need to change the settings to   deal with outgoing threats.</div>
<p>Firewalls block certain nefarious traffic but they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not designed to scan for infected files – you need an AV engine specific to this purpose.</p>
<p>It is crucial to eliminate potential security holes.  Port scanning can be problematic as criminals look for ways to openly connect with your PC.  A properly configured firewall can minimize this risk and new Windows operating systems come with firewall functionality.  While this is the first line of defense… it is not sufficient in blocking the myriad of virus and malware threats that are out there.</p>
<p>A firewall can be configured to block outbound traffic as well.  However, malware writers have been able to disable a firewall so traffic can escape from your system.  AV vendors have already created mechanisms to minimize this problem, but cyber criminals have proven themselves to be very clever in being able to hide the information within normal http traffic so as to disguise the data as innocent web requests.</p>
<h2>4. Viruses and malware are written by AV companies.</h2>
<p>There is no shortage of conspiracy theories.  So… is there any truth to AV companies creating malware?</p>
<p>There is an old technique that Firefighters use known as back burning.  Firemen create a controlled fire to burn up all of the debris that can fuel a fire which leaves a black zone. This method reduces the chance of a wildfire from jumping across the black line of defense.  This is similar to a strategy that Antivirus companies employ with viral attacks.  They use existing malware or create viruses to test their AV engine so they can understand the limits of their program, improve their software, and eliminate the vulnerability associated with such attacks that are known and encountered in the real world.</p>
<p>The real and full truth here is that there have been billions of dollars in loss suffered by companies and private individuals as a result of cyber criminals utilizing malware for profit.  There are in fact real criminals that focus their energies and skill on a variety of heinous activities such as stealing money, selling stolen credit card information, hiring other malicious code writers, selling malware to other cyber criminals, <a href="https://www.compuclever.com/posts/protect-computer-from-ransomware/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=newsletter" target="_blank">holding an infected PC ransom</a>, and more.  Cyber crime is a billion dollar industry and it will continue to grow as long as criminals see an opportunity to make money.</p>
<h2>5. You can get good protection from free AV programs.</h2>
<p>There are free antivirus programs that provide a basic level of protection, like Microsoft Windows Defender.  However, many of these lack key security features to reduce exposure to attacks, some have slower scanning speeds, others do not provide technical support, several do not respond quickly to emergencies, and some do not detect new threat categories effectively.</p>
<p>Free AV programs generally do not provide web protection.  This fundamental security feature is designed to block malicious links, prevent phishing attempts, and stop fraudulent links from compromising your system.  As we stated previously, online criminals want to make money and they will target personal or financial information.</p>
<p>Some free antivirus products offer a personal firewall that can block unauthorized communication.  You will need to verify your AV solution is equipped with this and activate it during the enrollment process.  And keep in mind, if your PC is already infected, cyber criminals could be actively stealing your information.</p>
<p>Choosing a free or paid antivirus program can be a difficult challenge as you need to weigh out your own privacy concerns along with getting full protection.  Third party publications can help narrow down your choices so we recommend that you review articles from publications such as: PC Magazine, Cnet, AV-Test, AV Comparatives, or Virus Bulletin.</p>
<div class="quick_facts">We are pleased that CompuClever AV PLUS has been   certified by Virus Bulletin (VB100).  You   can find the review on this <a href="https://www.virusbulletin.com/virusbulletin/2015/08/comparative-review-windows-7-pro-64-bit/" target="_blank">virus bulletin site</a> (search   for “CompuClever”).  More on this   later…</div>
<h2>6. AV applications are not equipped to deal with APT attacks.</h2>
<p>Advanced Persistent Threat (APT) is a recently used term spoken in such a way as to conjure up dark and scary creatures that we can speak of when gathering around a campfire at night.  In reality, APT is not dramatically different from malware that was launched ten years ago.  It’s quite common for cyber criminals to use similar tactics in new ways when launching their latest PC threats.</p>
<div class="quick_facts">APT   attacks are generally designed to target and penetrate companies, government   agencies, or even political organizations.  If you want additional insights about APTs,   please read the article: <a href="http://oemhub.bitdefender.com/what-is-an-advanced-persistent-threat" target="_blank">Setting   the Record Straight: What’s an Advanced Persistent Threat?</a></div>
<p>Malware writers are very innovative as they quickly change their attack methods while still leveraging criminal underground networks and strategies all the while remaining focused at absconding funds or making their mark.  Case in point: <a href="https://www.compuclever.com/posts/signs-of-a-pc-attack/" target="_blank">Ashley Madison hackers</a> were motivated as a result of outrage due to the activities of the targeted website.</p>
<p>AV companies have evolved by using a combination of malware signatures, heuristics, and behavior techniques to capture new and unknown threats.  They will not however detect all malware attacks.  Some AV companies detect unknown threats better and more consistently than others.</p>
<p>Let’s turn our focus on third party testing companies that specifically test for unknown and zero-day malware threats.  Companies that specialize in preventing APT attacks generate a lot of revenue, but it is surprising to see that these vendors have not submitted their products for testing by a third party organization.  Why is that?</p>
<p>For most users, the most affordable and best option is a reputable AV program along with using common sense.  It also helps to get recent and frequent software updates.</p>
<h2>7. I can get good information about AV app comparisons from the AV vendor.</h2>
<p>The simple answer to this is: make sure you get independent reviews.</p>
<p>Often times, AV test reports sponsored by a company range from being biased to blatantly skewed.  These reports typically highlight specific detection techniques and compare a limited number of vendors.  On the other hand, third party, non-profit malware testing organizations publicly provide their testing methodology to be scrutinized by all participating vendors.</p>
<p>All AV vendors are allowed to participate in third party tests and reviews, compared to being selected and tested by a vendor who is paying for the report.  There are different testing scenarios to help understand efficacy characteristics.</p>
<p>One test, involves capturing malware for a specific period of time and preventing the update mechanism from fetching the latest files from the AV vendor.  This particular test determines whether the AV engine can proactively prevent new or unknown threats from infecting a PC without file updates.<sup><a href="#_footnotes">[2]</a></sup> Another test involves speed performance tests which measure the impact of the AV program on the performance of a computer system.</p>
<h1>An Independent Review: CompuClever Antivirus PLUS</h1>
<p>We are pleased to report that we were tested and received a glowing review by VB100, “…a world-renowned independent testing and certification body, active in testing, reviewing and benchmarking security solutions for over 20 years.”<sup><a href="#_footnotes">[3]</a></sup></p>
<div class="quick_facts">
<p><strong>VB100 had   this to say about CompuClever Antivirus PLUS:</strong></p>
<p>“The   design is slick and attractive, with a good range of options available and   intuitive deployment of controls.”</p>
<p>“Stability   was perfect throughout testing, with not the slightest shake even under heavy   stress. Performance impact was decent too, with RAM use perhaps a little   above average but CPU usage and impact on our set of tasks both pretty low.”</p>
<p>“Detection   was as excellent as one would expect, with good scores everywhere. The   WildList and clean sets were handled with pinpoint accuracy, earning <em>CompuClever</em> its first VB100 award on its debut.”</p>
<p>Check out the <a href="https://www.virusbulletin.com/testing/results/test_from/2015-08/vb100-antimalware" target="_target">virus bulletin full review</a>.</p>
</div>
<p>For more information about CompuClever AV PLUS click here: <a href="https://www.compuclever.com/posts/are-you-well-protected/" target="_blank">Are You Well Protected?</a></p>
<h1>Summary:</h1>
<p>With the information provided in this article we feel you now have a much clearer understanding of AV applications and virus attacks.  We strongly recommend that you protect your PC from viral dangers that are prevalent in our daily computing world.</p>
<p>We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p><a id="_footnotes"></a></p>
<hr size="1" />
<p>&nbsp;</p>
<p>[1] <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank">https://en.wikipedia.org/wiki/Man-in-the-middle_attack</a><br />
[2] <a href="http://oemhub.bitdefender.com/how-to-properly-evaluate-an-advanced-persistent-threat-security-solution" target="_blank">How to Properly Evaluate an APT Security Solution</a><br />
[3] <a href="https://www.virusbulletin.com/testing/" target="_blank">https://www.virusbulletin.com/testing/</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/antivirus-software-7-myths-debunked/">Antivirus Software – 7 Myths Debunked</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>My New PC Arrival</title>
		<link>https://www.compuclever.com/posts/my-new-pc-arrival/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=my-new-pc-arrival</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Tue, 09 Feb 2016 01:23:01 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[computer fixes]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[PC Backup]]></category>
		<category><![CDATA[PC Clean Maestro]]></category>
		<category><![CDATA[PC hardware]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[PC TuneUp Maestro]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2335</guid>

					<description><![CDATA[<p>We have come up with a list of items that we feel constitute the “necessities” of first running you brand new PC.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/my-new-pc-arrival/">My New PC Arrival</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">What can compare to the feeling of getting a new PC?  It’s like watching Tom Hanks in the movie “Big” when he spends a day in the toy department!  While reasons for purchasing a new computer will differ from person to person, what remains constant is a level of excitement and anticipation that comes with getting it set up and putting it to use.  With any level of excitement comes taking a few moments to take care of certain little necessities before rushing headlong into the fun.  Ahhh adulthood!</div>
</div>
<h1>Stages</h1>
<p>We have come up with a list of items that we feel constitute the “necessities” of first running you brand new PC.  In an attempt to make it easier for you we have broken these items into stages – that way it doesn’t seem overwhelming and tedious.  We have also included an approximate time of completion.  These may vary based on many factors but it is intended to give you an idea of what to expect.  By having this information available you can determine how many items you can take on based on your schedule.  If you want to bite the bullet and complete the tasks on the same day… go for it!</p>
<p>Let’s get started.</p>
<h2>Stage1</h2>
<p><strong>Warranty and Registration Cards </strong>(Time to Complete: Approximately 5 minutes)<br />
Fill warranty and registration cards in right away.  Required information such as serial numbers can usually be found on the back of printers and computers.  So before you connect the cables and set the device into its location, get the information written down while it is still easy to read.  Once the system is up and running, you can then send in the cards to be registered.  While most retailers will act on your behalf for warranty concerns if the store closes its doors, the computer maker will require that you provide proof that it is their device and it was purchased within the warranty period.  Save yourself the frustration and do this early.</p>
<div class="indent_left"><strong>Precaution:</strong> In some cases warranty and registry cards can ask for too much information.  As a rule, “…a sales receipt should suffice if you need to file a warranty claim”<sup><a href="#_footnotes">[1]</a></sup>.   We’ll let you be the judge of whether too much is being asked of you in terms of potential harvesting of personal data to marketers and whether you keep your receipts secure, safe, and available if you need to make a warranty claim.</div>
<p><strong>Restore Disks </strong>(Time to Complete: No more than 10 minutes)<br />
Your new system most likely comes with Windows 10 preinstalled.  That’s great – that saves some work!  You need to realize though this likely means you do not have CD’s to reinstall Windows if the need arises.  So, to be on the safe side, you will need to create restore disks.  Use <a href="http://answers.microsoft.com/en-us/windows/wiki/windows_10-win_upgrade/how-to-create-a-recovery-drive-for-reinstalling/58df9c7d-84de-4652-9952-8bac34abc6c5" target="_blank">this Microsoft link</a> and follow the directions.</p>
<p><strong>Windows Live Account </strong>(Time to Complete: 2 – 3 minutes)<br />
When you first start your computer, Windows will ask you to either sign on to your Windows Live email account or to create an account with Microsoft.  This is not necessary but it does add some functions to using Windows across multiple units such as those between your desktop, laptop, tablet, or Windows phone.  If you do not have any of these other items, ignore the offer to create an account.  If you have logon credentials with MSN or Outlook.com then that login is your Windows account.  For more information follow <a href="http://windows.microsoft.com/en-ca/windows-live/mail-email-windows-live-id-why-faq" target="_blank">this Microsoft FAQ link</a>.</p>
<p><strong>Set the System Restore </strong>(Time to Complete: 2 – 3 minutes)<br />
System Restore, by default, is not enabled.  You need to set this up to keep the system as safe as possible.  Information on how to enable the system restore can be found by following <a href="http://windows.microsoft.com/en-us/windows-10/create-a-system-restore-point" target="_blank">this Microsoft link</a>.</p>
<p><strong>Backup Admin Account </strong>(Time to Complete: 5 – 10 minutes)<br />
Create a Backup Admin account.  Many problems can arise should you have one admin account and it gets damaged.  If you create a backup admin account you can simply work around the issue rather than working through hours of trying to undo whatever created the issue.  Save yourself the time and unpleasantness by setting up a second one right away.</p>
<div class="indent_left"><strong>Note:</strong> The big time saver when doing something like this is reading through the instructions first – even if you feel they were written in a foreign language or in complete tech talk.  It does help to have some idea of what commands are used.  This should take 5 -10 minutes going at an easy pace.</div>
<p>You can use <a href="http://www.groovypost.com/howto/create-local-account-windows-10/" target="_blank">this helpful site</a> with easy to use instructions.</p>
<h2>Stage 2</h2>
<p><strong>Beware Freeware </strong>(Time to Complete: Up to 30 minutes)<br />
Check the “All Programs” list in <a href="https://www.compuclever.com/products/pc-clean-maestro/" target="_blank">PC Clean Maestro</a>.  Open the program, click the Uninstaller tab and review the items in the list provided.  Many new systems include a list of freeware and trialware programs.</p>
<p>If you have already purchased an antivirus program and are going to install it, do not leave a free antivirus on the system as you could experience interference and compatibility issues.  Stay with the programs you know and save yourself the frustration of programs popping up on the screen.</p>
<div class="indent_left"><strong>Note: </strong>The time to complete will vary from retailer to retailer, but give yourself lots of time to do this as you do not want to rush.  Give yourself 30 minutes to look through the list, research the programs and make a decision about if you really want the program or not.</div>
<div class="quick_facts">If you are in need of an AV app… this would be a good opportunity to install and run <a href="https://www.compuclever.com/products/antivirus/" target="_blank">CompuClever AntiVirus PLUS </a>on your system. It&#8217;s designed to deliver the best performance for your PC and it’s built on the most advanced antivirus technology available today.</div>
<p><strong>Remove Remnants </strong>(Time to Complete: Up to 3 minutes)<br />
After installing your programs remember to clear up the install remnants so the drive is clear of unwanted files.  Open <a href="https://www.compuclever.com/products/pc-clean-maestro/" target="_blank">PC Clean Maestro</a> and from the “Clean” page, confirm that the items you want to scan and clean are checked.  Next, click the Start button.  The scan will be quick and you can easily review items before removing them.  It will take more time to review the findings then to scan or clean them.</p>
<p><strong>Registry Scan and Fix </strong>(Time to Complete: Up to 3 minutes)<br />
Now that you have removed unnecessary and unwanted files, it’s time to clear the registry as there may be remnants that have not been removed.  To scan and clean your registry open <a href="https://www.compuclever.com/products/pc-tuneup-maestro/" target="_blank">PC TuneUp Maestro</a> and click the “Optimize PC” page in the left panel.  Click the Registry Defrag option and perform the Express Scan.</p>
<div class="indent_left"><strong>Note: </strong> If you want to do a Deep Scan be prepared to have the scan take longer.  Using a new PC with decent speed, we have experienced even the Deep scan to take less than a minute.<br />
When the scan is complete, review the results and click the Defrag button.</div>
<p><strong>HD Defrag </strong>(Time to Complete: Up to 30 minutes)<br />
After removing items from your computer it’s time to address sorting – defragmenting – the hard drive for best performance.</p>
<div class="indent_left"><strong>Important: </strong>Before we begin, you need to make sure that your hard drive is NOT a Solid State Drive (SSD).  You do not need to defrag a SSD due to the fact they use a different storage technology.  Check your product information and if you PC is using a SSD, move on to the next task which can be found in Stage 3.</div>
<p>If your new PC uses the traditional spinning platter hard drive (HDD), we recommend using good PC habits right from the start and defragmenting it.  Good practice is to defrag your HD when you remove items of significant size (applications, media files, etc.).  To defrag your drive, Open <a href="https://www.compuclever.com/products/pc-tuneup-maestro/" target="_blank">PC TuneUp Maestro</a> and click the “Optimize PC” page in the left panel.  Click the Disk Defrag option at the top of the list and follow the instructions.</p>
<h2>Stage 3</h2>
<p><strong>Power Bar </strong>(Time to Complete: Varies)<br />
Is the light on the power bar flashing or flickering?  If so… replace it.  This is the least expensive insurance policy you can buy for your new computer.  That flashing or flickering light means it needs to be replaced.</p>
<div class="indent_left"><strong>Note: </strong> The time to complete this depends greatly on when you can get to a store and purchase a new power bar.</div>
<p><strong>Windows Updates </strong>(Time to Complete: 10 – 30 minutes)<br />
Check for updates from Windows.  Windows 10 supplies driver updates for all your devices (video cards, printers, etc.), so it is possible that when Windows was installed the devices were not connected.  To be certain everything has the correct drivers you need to run an update: use <a href="http://windows.microsoft.com/en-us/windows-10/getstarted-choose-how-updates-are-installed" target="_blank">this Microsoft site</a> for details.  Please note Windows 10 could start performing updates before you choose to do so.  If it does let the process complete itself as trying to stop it could lead to Windows having problems before you get to use your computer.</p>
<div class="indent_left"><strong>Note: </strong>Time to complete depends on the amount of updates needed.  This depends on how long ago the retailer created the image for installing Windows 10, the speed of your Internet connection, and the speed of your CPU.</div>
<h1>Conclusions:</h1>
<p>Now that you have completed the steps – there is no reason why your PC shouldn’t be performing at top speeds.  You should notice fast startup times as well as exceptional file access and program startup performance.  We hope this article has helped you to feel less intimidated with your new and somewhat unfamiliar PC acquisition.  Taking the right steps right from the get go is critical and we think these tips will support you well in that regard.</p>
<p>Feel free to visit our Support Center at: <a href="https://www.compuclever.com/support/" target="_blank">https://www.compuclever.com/support/</a> If you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: <a href="mailto:newsletter@compuclever.com" target="_blank">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p><a id="_footnotes"></a></p>
<hr size="1" />
<p>[1] <a href="http://www.consumerreports.org/cro/2013/12/do-you-need-to-register-new-products-you-buy/index.htm" target="_blank">www.consumerreports.org</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/my-new-pc-arrival/">My New PC Arrival</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Personal Encounter with Ashley Madison</title>
		<link>https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-personal-encounter-with-ashley-madison</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 01 Oct 2015 16:54:44 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[Windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2186</guid>

					<description><![CDATA[<p>What are the consequences to piracy that involves millions of users and personal information?  We look at both the overall effect of the greatest hack in modern day as well as how it came to our attention through someone seeking our support and professional guidance.  We offer here testimony and strategy. </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/">A Personal Encounter with Ashley Madison</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">What are the consequences to piracy that involves millions of users and personal information?  We look at both the overall effect of the greatest hack in modern day as well as how it came to our attention through someone seeking our support and professional guidance.  We offer here testimony and strategy.</div>
</div>
<p>Unless you have been living under a rock for the past few months, you must have heard about the Ashley Madison account hack.  This was where hackers released the entire user database of names, email addresses, billing information, and account details of 38 million users tied to the site.  Some described the historical hack episode as an extinction-level event for privacy.</p>
<div class="quick_facts">Jeff Yang, a columnist for The Wall Street Journal, asked this simple but stern question in his CNN-syndicated commentary &#8211; Ashley Madison hack: privacy becomes extinct.  Comparing the incident to the prehistoric planet-wide catastrophe that wiped out the Jurassic World, Yang declared that the data hack of the Toronto-based infidelity website was “an extinction-level event for privacy”.</div>
<h1>Attack Aftermath</h1>
<p>We were shocked when we first learned that hackers managed to steal close to 40 million users’ records from Ashley Madison, which made claims shortly after the incident that its members remained anonymous.  However, in early August 2015 it was clear that this was not the case as hackers released details of millions of email addresses, billing information, and account details tied to the site<sup><a href="#_footnote">[1]</a></sup>.</p>
<p>As a group of seasoned IT professionals who have been actively involved with security R&amp;D for a number of years, we can tell this hack event was different from all previous data leakages that impacted large corporations and national-level government agencies.  This time, the privacy of many ordinary people – with repercussions to job, relationships, family life, marriage, and personal life – was exploited, ripped apart, and taken away.</p>
<p>What was the impact to this?  Heartless spammers sent extortion emails to people demanding ransom in return of “wiping records clean”<sup><a href="#_footnote">[2]</a></sup>.  Adding salt to the wound, class action lawsuit experts and divorce lawyers are circling victims smelling hefty legal fees in the air.  The rippling effect of the biggest privacy invasion in human history will be felt for a long time to come.  Sadly, we CANNOT be fooled by those spamming extortionists; data leakage is just like waste water leakage &#8211; there is no way to retract or wipe absolutely clean what’s already there.</p>
<h1>A Personal Encounter</h1>
<p>Just a few weeks ago, the core group here at CompuClever was caught in a “personal” encounter with the Ashley Madison aftermath.  A seemly normal support email came from a user requesting help with opening a very large (approximately 10 GB), compressed file.  The technical support specialist who was dealing with the ticket noticed something abnormal – the origin of the file resides on “The Pirate Bay”, a controversial pirate website usually referred to as part of the “darker side of the web”.  Due to the security concern, this case was quickly escalated to our co-founder and Chief Product Officer Yida Mao, who is also our in-house security expert.</p>
<p>Using an isolated environment, Yida led our security analysts to identify the contents of the large compressed file which actually contained the entire dataset of the Ashley Madison user account database.  Due to security pre-cautions and with suspicion of possible computer virus contamination within the compressed file, we immediately notified the user to delete and quarantine the file without her having to opening it.  We were told by this user that she had strong feelings that her partner had been active on the Ashley Madison site and wanted confirmation. We utilized alternative and safe methods to fulfill her queries and she was grateful.</p>
<p>When global-scale security breaches like that of Ashley Madison happen, we always have mixed feelings of horror and sympathy, along with a sense of responsibility.  The magnitude of the hack, for both the number of people involved and the level of impact is HUGE.  Can you imagine if the privacy and secrecy of the entire nation of Canada (approximately 36 million) was hacked, exposed, and ripped apart?  Meanwhile, as IT professionals who are actively involved with R&amp;D in the realm of PC security and optimization, we also feel deeply compelled to reach out to our families, friends, and to our users and readers in order to awake their sense of online security.  Cyber security breach and privacy invasion is no longer something you only read about in cold war novels or watch in Jason Bourne movies, it is happening to people around us or may have already impacted you and your family.</p>
<p style="text-align: center;"><a href="https://www.compuclever.com/products/antivirus/" target="_blank"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus - Best Protection. Best Performance." src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows10-general.jpg" alt="" width="650" height="363" /></a></p>
<h1>Recommendations</h1>
<p>So what can you do instead of just being paranoid?  “Be vigilant and aware of your digital surroundings, just as you should be aware of your physical surroundings” says Yida Mao who has managed multiple R&amp;D teams in the cyber security field and published research findings at several international software consortiums.  He offers three core principles for protecting your cyber security and privacy:</p>
<div class="indent_left">
<ul>
<li><strong>Be aware of what’s already on your PC</strong>:  Your PC has a lot of information to tell about you, including your personal data, financial records, photos, tax filings, family tree information, and more.  Anything that physically reside on your PC can be stolen and exposed.  Read more about <a href="https://www.compuclever.com/posts/cookie-time/" target="_blank">how to safely remove sensitive information from your PC…</a></li>
<li><strong>Be aware of what’s getting stored on your PC</strong>:  Unless your PC is never connected to the Internet, you always face the risk of cyber-attacks or privacy intrusions.  Your PC is not designed to battle any of these attacks alone and neither should you.  <a href="https://www.compuclever.com/posts/surf-with-confidence/" target="_blank">Get comprehensive security software like CompuClever Antivirus PLUS to fend off cyber-attacks</a>.</li>
<li><strong>Be aware of what’s being sent from your PC</strong>:  Frequently you, or your PC, will send out sensitive information or data without your full permission or intent.  Do you have a data filtering mechanism to prevent information like your credit card numbers or social security numbers from being leaked out?  If not, you should use something equivalent to the <a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">Data Protection function in CompuClever Antivirus PLUS</a> to safeguard your personal data.</li>
</ul>
</div>
<p>We urge you to take time and assess what protective measures you have put in place to safeguard your information and your privacy, regardless what software or tools you choose to use.  Do not delay or procrastinate, cyberattacks do not wait for you – instead, they catch you off-guard.</p>
<h1>In Summary</h1>
<p>We are excited to be able to provide an AV product that can equip you with tools designed to safeguard you from cyber attacks.  Together with our prior technologies such as PC Clean Maestro you can be more proactive in protecting your privacy and securing your personal information in order to safely enjoy your PC computing practices.  We plan to continue covering this theme of protection and security in upcoming articles and welcome your feedback.</p>
<p>Please keep in mind… if you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: <a href="mailto:newsletter@compuclever.co" target="_blank">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p><a id="_footnote"></a></p>
<hr size="1" />
<p>&nbsp;</p>
<p>[1] <a href="http://money.cnn.com/2015/08/19/technology/ashley-madison-search/index.html">CNN: Hackers released details of hacked Ashley Madison accounts.</a><br />
[2] <a href="http://money.cnn.com/2015/08/21/technology/ashley-madison-users-extorted/">CNN: Spammers sent extortion emails to Ashley Madison users.</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/">A Personal Encounter with Ashley Madison</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vigilance and Silence</title>
		<link>https://www.compuclever.com/posts/silence-and-vigilance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=silence-and-vigilance</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 10 Sep 2015 17:40:27 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2128</guid>

					<description><![CDATA[<p>Learn how CompuClever Antivirus PLUS' Autopilot and Profiles feature delivers the best security protection in absolute silence. Better yet, with Real-Time Optimization, it even makes your PC faster.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/silence-and-vigilance/">Vigilance and Silence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">In a previous article discussing <a href="https://www.compuclever.com/posts/protection-vs-speed/" target="_blank">whether we really need to compromise PC performance in exchange for security</a>, we presented the CompuClever Photon technology – an innovative feature that adapts security protection to the uniqueness of your PC. Photon makes CompuClever Antivirus light and fast, imposing almost no overhead to system resources. But how should an antivirus react to a true threat when it detects an intrusion? We are often presented with popups and reminders, like the one shown below, that most of us, even including those who work in the IT industry, don’t know how to respond to, which may result in taking the wrong action.</div>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence">CompuClever Antivirus PLUS</a> works differently and better than this. It is essentially a silent security solution that only communicates useful information in language you can understand, keeping you informed and, keeping you in the driver seat. This is achieved through the combination of two features: Autopilot and Profiles.</p>
<h1>Introducing Autopilot and Profiles</h1>
<p>What makes CompuClever Antivirus’ user-centric approach possible is the Autopilot and Profiles features, which work hand-in-hand to deliver silent security 24/7.</p>
<h2>Autopilot</h2>
<p>Autopilot makes the best security decisions for users, without user interaction, while eliminating notifications and popups. When Autopilot is switched on and CompuClever Antivirus detects any type of threats, it will automatically block it. Users do NOT need to define their protection levels or what actions to take whenever a threat is detected. It is automatically enabled and can be simply disabled.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 650px;" title="CompuClever Antivirus Autopilot" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-autopilot.png" alt="" width="760" height="198" /></a></p>
<p>The “secret sauce” of Autopilot is another cool technology: CompuClever Profiles – an intelligent technology that determines what you are doing with your PC and makes the right decisions for PC security! Additionally, with Profiles, CompuClever Antivirus not only works silently but also optimizes your PC for its best performance.</p>
<h2>Profiles</h2>
<p>The Profiles technology is designed to automatically detect when users work, play, or watch movies, and it prevents other apps from slowing down the system. Beside the standard profile, there are three profiles that fit most of our day-to-day PC usage patterns: “Work”, “Game”, or “Movie”. CompuClever Antivirus PLUS will identify whenever the user is engaged in one of these activities and will maximize PC performance by directing more of the system resources to those particular applications. In addition, Profiles offers users an uninterrupted experience by postponing resource-consuming operations such as scheduled scans, automatic product updates, system maintenance tasks, Windows updates, and other third-party operations. It also suspends unnecessary background programs, eliminates pop-ups, and adjusts visual effects according to activities users are currently engaged in. Here are some behavioral description of each profile:</p>
<div class="indent_left">
<ul>
<li><strong>Work</strong>: postpone scheduled scans, initiate automatic product and signature updates every two hours, activate the anti-spam module, deactivate Search Advisor, and block product notifications.</li>
<li><strong>Game</strong>: postpone scheduled scans, initiate automatic product and signature updates every twelve hours, deactivate Search Advisor, and block product notifications.</li>
<li><strong>Movie</strong>: perform the same operations as the Game profile, but start product and signature updates every eight hours.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 650px;" title="CompuClever Antivirus Profiles" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-profiles.png" alt="" width="759" height="514" /></a></p>
<p>You can manually set your PC to one of these profiles or let Autopilot take over the control and make the best decision for you. Either way, CompuClever Antivirus PLUS ensures you are completely protected while you enjoy the best of what your PC is designed to deliver.</p>
<h2>Real-Time Optimization</h2>
<p>CompuClever Antivirus PLUS Real-Time Optimization is a plugin that improves your system performance silently in the background, making sure that you are not interrupted while you are in a Profile mode. Depending on the CPU load, the plugin monitors all processes, focuses on those that take up a higher load, and adjusts them to your needs.</p>
<p>The system is optimized by increasing the Profile’s application performance, postponing system updates and Windows automatic updates, suspending unnecessary background programs, and eliminating popups in order to provide the best movie or game experience.</p>
<h2>Security Report</h2>
<p>Although CompuClever Antivirus is considered completely silent, it still reports to you once a week by delivering an easy-to-understand Security Report.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 650px;" title="Security Report" src="https://www.compuclever.com/posts/wp-content/uploads/security-report.png" alt="" width="1209" height="1040" /></a></p>
<p>The Security Report presents the security status for the past week including scans, disinfections, an events timeline, and feature recommendations. These tips are important in managing the overall protection and users can easily see actions to be taken on their PC. The overall security score is calculated based on the critical protection used previously and other conditions that might represent a security risk. The Security Report uses an issue tracking system to detect and inform users about issues that may have impacted the security of the system and the data on it.</p>
<h1>Conclusion</h1>
<p>To learn more about the features and benefits covered in this article:</p>
<div class="indent_left">
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/start.get.autopilot.html" target="_blank">CompuClever Autopilot</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/optimization.profiles.html" target="_blank">CompuClever Profiles</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/optimization.profiles.real_time.html" target="_blank">Real-Time Optimization</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/start.gui.report.html" target="_blank">Security Report</a></li>
</ul>
</div>
<div class="bottom_p">
<p>Be still and know you are in control of your PC security with the help of CompuClever Antivirus PLUS!</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=v_and_silence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" alt="" /></a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/silence-and-vigilance/">Vigilance and Silence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protection vs. Speed</title>
		<link>https://www.compuclever.com/posts/protection-vs-speed/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protection-vs-speed</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Sun, 06 Sep 2015 07:33:00 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[PC security]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2111</guid>

					<description><![CDATA[<p>Does antivirus software slow down PCs? The answer is a definite Yes; but, a conditional one depending on which security software you’ve chosen to run on your PC. According to an extensive endurance test, performed by AV-Test.org, the evidence of PC performance impacted by antivirus software was more than convincing. An antivirus solution that does a mediocre job on reducing its impact on PC performance slows down your PC by taking too much resource like CPU, hard disc, and RAM. As a result, you were forced to make a compromise for speed in exchange for security.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protection-vs-speed/">Protection vs. Speed</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Does antivirus software slow down PCs? The answer is a definite Yes; but, a conditional one depending on which security software you’ve chosen to run on your PC. According to <a href="http://www.av-test.org/en/news/news-single-view/endurance-test-does-antivirus-software-slow-down-pcs/" target="_blank">an extensive endurance test</a>, performed by AV-Test.org, the evidence of PC performance impacted by antivirus software was more than convincing. An antivirus solution that does a mediocre job on reducing its impact on PC performance slows down your PC by taking too much resource like CPU, hard disc, and RAM. As a result, you were forced to make a compromise for speed in exchange for security.</div>
</div>
<p>But, is it really necessary to choose between protection and speed? A well designed antivirus program should impose minimum or no impact to PC performance while still delivering the best protection against malware and online threats. This is how CompuClever Antivirus was designed and made. Let’s dive into some details.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&#038;utm_medium=email&#038;utm_campaign=protection_vs_speed"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>CompuClever Photon technology</h1>
<p>The core technology is called “Photon” and it makes CompuClever Antivirus the lightest antivirus ever. It is an innovative antivirus technology that takes the weight of the system and accelerates scanning speed by gradually adapting to each user’s PC.</p>
<h1>How it works</h1>
<p>Built with the same type of artificial intelligence technology used by the robotic industry, Photon goes through the following cycle to adapt to your PC:</p>
<figure id="attachment_2114" aria-describedby="caption-attachment-2114" style="width: 250px" class="wp-caption aligncenter"><a href="https://www.compuclever.com/posts/wp-content/uploads/photon.png"><img decoding="async" loading="lazy" class="size-medium wp-image-2114 " title="CompuClever Photon" src="https://www.compuclever.com/posts/wp-content/uploads/photon-250x300.png" alt="" width="250" height="300" srcset="https://www.compuclever.com/posts/wp-content/uploads/photon-250x300.png 250w, https://www.compuclever.com/posts/wp-content/uploads/photon.png 823w" sizes="(max-width: 250px) 100vw, 250px" /></a><figcaption id="caption-attachment-2114" class="wp-caption-text">Click to see a larger diagram: How Photon works</figcaption></figure>
<div class="indent_left">
<ol>
<li><em>Fingerprinting</em>: performed early in the installation a unique “fingerprint” was built for your system.</li>
<li>Pre-training: a scanning pattern based on the fingerprint is then formed by querying the reputation of each application and system process from Cloud intelligence, maintaining a precise list of everything loaded in the system based on reputation.</li>
<li><em>Active monitoring</em>: whenever your system “fingerprint” changes, Photon immediately checks the reputation list and alerts the antivirus engine to take prompt and appropriate action.</li>
<li><em>Continued training</em>: when new “intel” is added to the Cloud intelligence, the reputation list will be instantly updated as it pertains to the relevancy of your system’s unique “fingerprint”.</li>
<li><em>Adaptive scanning</em>: Photon directs the antivirus engine to pay more attention to suspicious applications rather than trusted ones.</li>
</ol>
</div>
<h1>The result</h1>
<p>Photon technology enables <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=protection_vs_speed" target="_blank">CompuClever Antivirus</a> to reduce its footprint by minimizing the requirement of computing resource like CPU power, hard drive access, and memory usage. The result is obvious:</p>
<div class="indent_left">
<ul>
<li>The antivirus is quiet and non-intrusive.</li>
<li>It brings low or no impact on system performance.</li>
<li>Your PC enjoys faster boot time.</li>
<li>Your applications runs smoothly.</li>
</ul>
</div>
<p style="text-align: center;"><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&#038;utm_medium=email&#038;utm_campaign=protection_vs_speed" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2059" title="Best Protection Against Viruses" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection.png" alt="" width="371" height="238" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection.png 371w, https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection-300x192.png 300w" sizes="(max-width: 371px) 100vw, 371px" /></a><a href="https://www.compuclever.com/products/antivirus/newsletter-early-launch/" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2060" title="Lowest Impact on Performance" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact.png" alt="" width="371" height="238" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact.png 371w, https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact-300x192.png 300w" sizes="(max-width: 371px) 100vw, 371px" /></a></p>
<p>Better yet, there is nothing you need to do or configure in order to enjoy the benefit of Photon – it’s built-in and pre-configured and self-adapting. Just relax and enjoy, knowing that you are both well protected and your PC is still as fast as it was before installing the program.</p>
<h1>Recommendation</h1>
<p>If your PC is sluggish, we recommend the following actions:</p>
<div class="indent_left">
<ul>
<li>Follow <a href="https://www.compuclever.com/products/antivirus/optimize/" target="_blank">this step-by-step optimization guide</a> to tune and optimize your PC</li>
<li>Consider replacing your existing antivirus solution with <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=protection_vs_speed" target="_blank">CompuClever Antivirus PLUS</a></li>
</ul>
</div>
<p>Remember, an effective security protection doesn’t have to come at the price of degraded PC performance.</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=protection_vs_speed"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg"/></a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/protection-vs-speed/">Protection vs. Speed</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stay Safely Connected</title>
		<link>https://www.compuclever.com/posts/stay-safely-connected/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=stay-safely-connected</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 03 Sep 2015 18:27:18 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2087</guid>

					<description><![CDATA[<p>Email and social networking are two primary means of communicating and stay connected with family and friends. Through social network sites and emails, you share updates, post photos, and reveal things that are sometimes very personal about you.  Examples include where you live, which company you work for, whom you are related to, when and where you are going on holiday, what food you like, what music you listen to, whom you have just met, etc. By piecing these bits of information together, it becomes easy for anyone to learn more about you. And that’s also how cyber criminals find out information they want from you. Personal identity theft and online scams are two primary threats that target email and social networking users.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/stay-safely-connected/">Stay Safely Connected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Email and social networking are two primary means of communicating and stay connected with family and friends. Through social network sites and emails, you share updates, post photos, and reveal things that are sometimes very personal about you.  Examples include where you live, which company you work for, whom you are related to, when and where you are going on holiday, what food you like, what music you listen to, whom you have just met, etc. By piecing these bits of information together, it becomes easy for anyone to learn more about you. And that’s also how cyber criminals find out information they want from you. <strong>Personal identity theft and online scams are two primary threats that target email and social networking users</strong>.</div>
<h1>Identity theft</h1>
<p>A recent study conducted by Bitdefender, a leading European security technology provider, discovered that more than a quarter of a million email addresses, usernames, and passwords can be found easily through social networking platforms like Facebook, Twitter, personal blog postings, chat forums, and download sites. Surprisingly, 87% of these compromised credentials still provided valid access to personal email and social networking accounts. What’s more astonishing was that 75% of the people in this study use the same password for all their accounts. Hackers really didn’t have to look too hard to gain access to your identity and private information.</p>
<h1>Online scams</h1>
<p>Users of the social networking site Facebook are informed through a notification system and by e-mail that they have been made administrators of an unknown page and are directed to click on a link that takes them to a fake Facebook page. Once a user has landed on the fake Facebook page, they are re-directed to a different, malicious site where they are asked to provide their e-mail and shipping address in order to take part in a test session of the new Apple iPad. The scam states that Apple is giving away a total of 10,000 iPad2s for review. Making it even more believable, some of the notifications came from emails and posts sent by family members or friends whose PCs were also compromised. You trust your friends, but can you trust their computers as well?</p>
<h1>Stay connected safely</h1>
<p>Security experts recommend the following guidelines so that you can avoid security risks while staying connected online:</p>
<div class="indent_left">
<ul>
<li>Avoid publishing any information that can be used to identify you, such as phone numbers; your home, school, or work address; your birthday; and your social security number.</li>
<li>Use different sets of username and passwords for email and social networking sites.</li>
<li>Avoid posting holiday dates, locations, or even pictures while you are away. Otherwise, you leave perfect “bread crumbs” for burglars to follow.</li>
<li>Never include bank or credit card information in emails or posts.</li>
<li>Install and deploy an effective and updated antivirus / anti-spyware solution that features a strong anti-phishing mechanism.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>Introducing &#8211; Data Protection</h1>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected">CompuClever Antivirus PLUS</a> features an ironclad information safety mechanism called <strong>Data Protection</strong>. Data Protection prevents sensitive data leaks when you are online. Based on the rules you create, Data Protection scans the web, e-mail, and instant messaging traffic sent by your computer.  It looks for specific character strings, for example, your credit card number. If there is a match, the respective web page, e-mail, or instant message is blocked.</p>
<p>You can create rules to protect any piece of information you might consider personal or confidential, from your phone number or e-mail address to your bank account information. Multi-user support is provided so that more than one person can log on to Windows using different user accounts and can configure their own rules. If your Windows account is an administrator account, the rules you create can be configured to also apply when other users of the computer are logged on to their Windows accounts.</p>
<p style="text-align: center;">Define what data you want to protect</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 737px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-data-protection-rule.png" /></a></p>
<p style="text-align: center;">Define how you want the data be protected</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 737px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-data-protection-apply.png" /></a></p>
<h1>Extra peace of mind</h1>
<p>Rest assured, personal information provided to the Data Protection tool is encrypted and cannot be used by anyone else but you. Also for extra safety, you can just enter part of the information that you like to protect. For instance, if you want to prevent leakage of your credit card number, you can just enter the last four digits of the card number so that any web traffic leaving your computer with the same combination of digits will be blocked. It’s a smart way of safeguarding data without any compromise.</p>
<div class="bottom_p">
<h1>Recommendation</h1>
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/identity.html" target="_blank">Learn more about Data Protection</a></li>
<li>Try Data Protection by <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected" target="_blank">CompuClever Antivirus PLUS</a></li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" /></a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/stay-safely-connected/">Stay Safely Connected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
