<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Protect online privacy Archives - CompuClever</title>
	<atom:link href="https://www.compuclever.com/posts/category/blog/protect-online-privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.compuclever.com/posts/category/blog/protect-online-privacy/</link>
	<description></description>
	<lastBuildDate>Fri, 04 Aug 2017 21:30:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://www.compuclever.com/posts/wp-content/uploads/cropped-compuclever_128-1-32x32.png</url>
	<title>Protect online privacy Archives - CompuClever</title>
	<link>https://www.compuclever.com/posts/category/blog/protect-online-privacy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Going Incognito &#8211; Browse Web in Privacy Mode</title>
		<link>https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=going-incognito-browse-web-privacy-mode</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 04 Aug 2017 16:44:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[Windows tips]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Icognito mode]]></category>
		<category><![CDATA[microsoft edge]]></category>
		<category><![CDATA[privacy mode]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3746</guid>

					<description><![CDATA[<p>Who uses Incognito or Private browsing and why?  Do they have something to hide or are they being safe in terms of sensitive data such as login credentials?<br />
One thing is certain - surfing the web using Incognito or Private browsing DOES NOT keep you completely anonymous and stealthy.  Knowing the levels of privacy that this mode of browsing offers is necessary if you are concerned about how private and secure your online activities are</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/">Going Incognito &#8211; Browse Web in Privacy Mode</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><b>Incognito</b>, <a href="https://en.wikipedia.org/wiki/Incognito" target="_blank" rel="noopener noreferrer">according to Wikipedia</a>, from the Latin <i>incognitus</i>, refers to a person who wants to remain anonymous to the world and others, in hiding or shut off from humanity.</p>
<p>Web surfers have the option to enable privacy mode or “Incognito” mode on their browser.  Each of the main browser type offers some level of private browsing.  It is known as Private Browsing, InPrivate Browsing, and Incognito depending on the type of browser used.</p>
<p>Basically &#8211; this is a privacy feature that quite simply provides some privacy on your local computing device but, DOES NOT provide hidden detection or stealth beyond that.  Your ISP (Internet Service Provider) and other agencies connected on the Internet can detect your activities via your unique IP address on the web servers.</p>
<p>Disabling functions such as the web cache and browsing history make this a relatively private way of browsing the web.  Cookies, the data holders sent by web sites to recognize or track your online activity, are also disabled.</p>
<h2>Items Deleted or Not Saved:</h2>
<p>The list  of items that are deleted or not saved when you browse during Incognito or Privacy  mode are:</p>
<ul>
<li>Website history.</li>
<li>The cache of files stored during your browse session.</li>
<li>History of files downloaded.</li>
<li>Search history stored by the browser.</li>
<li>Cookies from browsed sites.</li>
<li>Data on forms you have filled out.</li>
</ul>
<h2>Items That Are NOT Private:</h2>
<p>There are items that are not deleted and the ways you remain exposed to detection:</p>
<ul>
<li>Search histories stored from search providers like Google are not deleted.</li>
<li>Websites can identify you and keep a record of your visit.</li>
<li>Your ISP can detect your network traffic and identify your IP address.</li>
<li>Any malware on your PC or device can track your activities.</li>
</ul>
<p>Also, it is important that you keep in mind the browser does not likely perform a secure delete and items from your browsing session can be recovered.  Until that data is overwritten with other data it can be undeleted using special recovery software.</p>
<h1>Pros and Cons?</h1>
<p>So why would you want to use Incognito?  It doesn’t seem entirely private after all.</p>
<h2>Pros</h2>
<p>The reasons for using this more of browsing include:</p>
<ol>
<li>Reducing the history, browsing, and personal data stored on your PC or device.</li>
<li>You can prevent storage of sensitive data such as log-in credentials.</li>
<li>You can also use multiple accounts simultaneously using several tabs at once.<br />
<i>Tip</i>: You can let a friend check their email or log onto Facebook without you having to log out.  Just start up a new Incognito window.</li>
<li>You can perform searches that are not influenced by any prior browsing history.</li>
<li>Browser extensions are disabled so that Facebook and Google and other services can’t track you.</li>
</ol>
<p>One of the main reasons however is to hide your online interactions on the computing device you are using from those sharing the same device.</p>
<p>In a busy household full of people… using Incognito mode can prevent others from seeing potentially embarrassing items.  It also prevents others from revealing your search history or the cache of browsed files.</p>
<h2>Cons</h2>
<p>We’ll, conversely, you may want to monitor online activities on your PC or device.  You may be concerned that someone will incur a malware infection or that they are browsing to websites that could be considered risky, unethical, or harmful. This is when you would want to disable Privacy / Incognito functionality as described below.</p>
<p>Also, having a false sense of protection can lead to consequences.  ISPs pass data to copyright holders (such as music, videos, books, or games), who are cracking down on the downloading of copyright materials.  The ISP is required to forward notices from the copyright holder alleging infringement of that work.</p>
<p>And, as we have pointed out, you are not completely stealthy.</p>
<h1>How to Go Incognito</h1>
<p>So now that you have a better idea of what the limits and benefits of this mode of browsing are, you can follow the easy steps outlined below to activate it.  Of course it will depend on which browser you are using.</p>
<ul>
<li><strong>Chrome</strong>: Click on the ellipsis menu (<strong>…</strong>) at the right end of the menu bar, and select: “New Incognito Window”.</li>
<li><strong>Firefox</strong>: Click on the icon with three horizontal lines near the top right corner of the browser, and select: “New Private Window”.</li>
<li><strong>Internet Explorer</strong>: To change to an “InPrivate” session in Internet Explorer you would hold down Ctrl+Shift and press P (Ctrl+Shift+P).</li>
<li><strong>Microsoft Edge</strong>: Click the button with three dots (<strong>…</strong>), called the “More” button, and select: “New InPrivate Windows”.</li>
</ul>
<h2>Disabling It</h2>
<p>As we mentioned above, you may want to disable this function so that you can detect for yourself the online activities of others in your household. Click the links below to take you to the specific directions for your browser type.</p>
<ul>
<li><a href="https://community.spiceworks.com/how_to/75544-how-to-disable-incognito-mode-in-google-chrome" target="_blank" rel="noopener noreferrer">Chrome</a></li>
<li><a href="http://www.thewindowsclub.com/disable-private-browsing-internet-explorer-chrome-firefox" target="_blank" rel="noopener noreferrer">IE / Firefox / and a freeware tool for Chrome</a></li>
<li><a href="http://mywindowshub.com/enable-disable-microsoft-edge-inprivate-browsing-windows-10/" target="_blank" rel="noopener noreferrer">Microsoft Edge</a></li>
</ul>
<p><em>Warning</em>: most of these procedures require a change to the registry.  We recommend you do a backup beforehand and proceed with caution.</p>
<h2>For Parents:</h2>
<p>If you’re a parent worried about your kids and their private online activities (for example, pornography or social networking sites), then you can first try to disable the functionality as mentioned above.  That way you can check the search and browsing history items.</p>
<p>You can also take the next step and look at filtering software such as <a href="https://www.netnanny.com/" target="_blank" rel="noopener noreferrer">NetNanny</a> that will block porn and whatever else you want to filter even when the browser is in Incognito mode.  They have it for computers and mobile devices.  It&#8217;s not free but could be worth the peace of mind.</p>
<h1>Last Note</h1>
<p>We’re in favor of providing information that in the right hands is used with good intent.  To reach a higher level of stealth you would need to look at using a VPN solution.  A VPN masks your physical location and IP address so the website you’re visiting doesn’t really know who or where you are.</p>
<p>We hope this information has been of help to you and enhances your web browsing experiences.  For more information on this topic see our past posts:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/privacy-dont-give-it-away/" target="_blank" rel="noopener noreferrer">Privacy – Don’t Give It Away</a></li>
<li><a href="https://www.compuclever.com/posts/vpn-need-one/" target="_blank" rel="noopener noreferrer">What Is a VPN, and Why Do You Need One?</a></li>
</ul>
<p>Feel free to contact us with any questions or comments on this and other subjects.  Simply send us an email at: newsletter@compuclever.com</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/going-incognito-browse-web-privacy-mode/">Going Incognito &#8211; Browse Web in Privacy Mode</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CompuClever Antivirus PLUS &#8211; VB100 Award!</title>
		<link>https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification-explained/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=compuclever-antivirus-plus-vb100-certification-explained</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Tue, 31 Jan 2017 19:17:10 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[pc performance]]></category>
		<category><![CDATA[VB100]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3256</guid>

					<description><![CDATA[<p>CompuClever is pleased to release the latest VB100 test results for CompuClever Antivirus PLUS.  We will present these results and help you to understand them as part of our ongoing testimony to the effectiveness of our AV product.  As is evident with these results… CompuClever Antivirus PLUS offers outstanding protection without slowing down your PC</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification-explained/">CompuClever Antivirus PLUS &#8211; VB100 Award!</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;<br />
CompuClever is pleased to release the latest VB100 test results for <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=vb100" target="_blank">CompuClever Antivirus PLUS</a>.  We will present these results and help you to understand them as part of our ongoing testimony to the effectiveness of our AV product.  As is evident with these results… CompuClever Antivirus PLUS offers outstanding protection without slowing down your PC!</p>
<h3>The Test Results</h3>
<p>We’ve had four positive test results from the VB100 test lab, one of the few independently operated testing facilities focused on providing comprehensive examination of security software and solutions.  Let’s start with an overview of these four tests that are available for <a href="https://www.virusbulletin.com/testing/results/recent/vb100-antimalware/compuclever-avplus" target="_blank">online viewing</a>.  These tests were conducted between August 2015 and October 2016 on various Windows platforms.</p>
<p><a href="https://www.virusbulletin.com/testing/results/recent/vb100-antimalware/compuclever-avplus" target="_blank"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="Click to view tests results..." src="https://www.compuclever.com/posts/wp-content/uploads/compuclever-vb-test-snapshot-1024x679.png" alt="" /></a></p>
<h3>Overview &amp; Breakdown</h3>
<p>The specific results of each test are based on test markers which you can get an idea of when you mouse over the column title (RAP Score, Performance impact %, etc.)  We define them here:</p>
<ul>
<li><strong>Platform</strong>:  This is the selected operating system that VB100 performs its test on. VB100 tries to cover a spectrum of the most popular Windows OS with their tests focusing on one version at a time.  Note:  CompuClever Antivirus PLUS supports Windows 10, Windows 8, 7, Vista, &amp; XP.</li>
<li><strong>Result</strong>:  This is the overall result; simply put, it reveals if the antivirus software passed or failed the test.</li>
<li><strong>RAP Overview</strong>:  “Chart shows RAP scores with weighted average overlaid.” Note: The difference in scores is explained below.</li>
<li><strong>RAP Score</strong>:  “Weighted average detection rate over recent malware samples, including retrospective coverage of new malware (Reactive and Proactive).”  Basically, this means the ability for the AV product to detect and react to malware threats.  This is the most important measure of how effective any AV product is; the higher the score, the more effective the product.</li>
<li><strong>Performance impact (%)</strong>:  “Increase in time taken to complete a set of common tasks.”  This is the impact to system performance by the AV product when in operation. A lower score is better here.</li>
<li><strong>Stability Rating</strong>:  “Rated on a five-level scale from Solid (no problems) to Flaky (severe issues).”  This is the rating given by VB100 based on the test results. This tells you the quality of the AV software apart from the previously mentioned effectiveness or performance impact measurements.</li>
</ul>
<p>What is evident in these results is a consistent pattern of high RAP Score – detection of AV threats – and a low performance impact.  Once again this means that CompuClever antivirus PLUS works to protect your PC from online malware threats all the while operating in the background.</p>
<p>In this way, you won’t notice it and it won’t have an impact to overall system performance – something CompuClever dedicates itself to accomplishing!</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=vb100" target="_blank"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h3>Overall Conclusions</h3>
<p>Based on analysis of detailed test data, we are very pleased with the results of the tests. These results are in line with our original goals:</p>
<ul>
<li>Total protection against any form of online threats: CompuClever Antivirus’s high RAP score is among the list of top security solution providers, like ESET, Kaspersky, Bitdefender, and AVG.</li>
<li>Minimum impact to PC performance: CompuClever Antivirus’s extremely low % in Performance Impact to PC performance outperforms most of our top competitors.</li>
<li>A solid and well-built antivirus product: It is easy to install without reboot, has an intuitive user interface, and is extremely intelligent and quiet. CompuClever Antivirus is regarded as a “solid” antivirus solution.</li>
</ul>
<p>This is what VB100 lab says about us in one of its test remarks:</p>
<div class="quick_facts">
<p><a href="#_ftn1" name="_ftnref1"></a>The design is slick and attractive, with a good range of options available and intuitive deployment of controls.</p>
<p>Stability was perfect throughout testing, with not the slightest shake even under heavy stress. Performance impact was decent too&#8230;</p>
<p>Detection was as excellent as one would expect, with good scores everywhere.<sup><a href="#_footnote">[1]</a></sup></p>
</div>
<h3>Check Your AV Product</h3>
<p>We invite you to examine the results for your AV product.  You can trust VB100 as it a free service that performs regular independent reviews of malware solutions and provides <a href="https://www.virusbulletin.com/testing/dates/vb100-antimalware" target="_blank">test results</a> for AV software that handle both known (reactive) and unknown (proactive) virus samples. You can see <a href="https://www.virusbulletin.com/testing/dates/vb100-antimalware" target="_blank">the latest test results</a> for any product or you can use the Search field to quickly find test results.</p>
<h3>CompuClever Antivirus PLUS</h3>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=vb100">CompuClever Antivirus PLUS</a> offers unparalleled security technology against malware threats. It is designed to deliver the best performance for your PC and it is built on the most advanced antivirus technology available today. Exceptional in its ease of use, it allows you to handle security with a single click. The intuitive technology also guards your online privacy and digital identity with specific protection when doing online banking and online shopping.</p>
<p>Browse the following topics to learn more about Antivirus PLUS:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/protection-vs-speed/" target="_blank">Do you have to sacrifice PC speed for protection?</a></li>
<li><a href="https://www.compuclever.com/posts/safe-guard-your-online-banking/" target="_blank">How to safeguard online banking</a></li>
<li><a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">How to protect your personal identity</a></li>
<li><a href="https://www.compuclever.com/posts/silence-and-vigilance/" target="_blank">Does your antivirus bark all the time?</a></li>
<li><a href="https://www.compuclever.com/posts/surf-with-confidence/" target="_blank">How to surf the web safely</a></li>
</ul>
<div class="bottom_p">
<p>&nbsp;</p>
<hr size="1" />
<p>[1]<a href="https://www.virusbulletin.com/virusbulletin/2015/08/comparative-review-windows-7-pro-64-bit" target="_blank">https://www.virusbulletin.com/</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification-explained/">CompuClever Antivirus PLUS &#8211; VB100 Award!</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Breaking News – Yahoo Admits Breach of 500 Million Accounts</title>
		<link>https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=yahoo-admitted-500-million-accounts-have-been-breached</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 22 Sep 2016 23:29:36 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=3004</guid>

					<description><![CDATA[<p>Yahoo confirmed today that data "associated with at least 500 million user accounts" has been stolen in what may be one of the largest cyber-security breaches ever.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My heart dropped when I was <a href="http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/">alerted by CNN</a> that Yahoo admitted today that 500 million user accounts have been compromised. As a seasoned IT professional who has been involved with the security industry for the past decade, this is probably THE worse security breach that’s occurred since the inception of the Internet.</p>
<p>Here are the key facts that you should be aware of regarding this breach:</p>
<ul>
<li>In August 2016, a person codenamed “Peace” attempted to sell what he claimed to be 200 million Yahoo user information.</li>
<li>Back then, Yahoo only said they were investigating the legitimacy of the claim.</li>
<li>On Sept. 22<sup>nd </sup>2016, Yahoo issued a statement acknowledging the legitimacy of the claim. Furthermore, Yahoo confirmed the scale of the breach is actually 500 million accounts.</li>
<li>Yahoo also confirmed that the information stolen contains name, username, lightly encrypted passwords, date of birth, and for some accounts, security questions and answers.</li>
</ul>
<p>Nevertheless, till this moment, Yahoo hasn’t issued a notice to all of its users advising them to reset their passwords.</p>
<p>Here at CompuClever, we felt it is necessary to inform you about this event because there is a high possibility that either you or someone you know might be impacted by this incident.</p>
<p>Yahoo is currently working with law enforcement agencies, including the FBI, to deal with this breach. Nevertheless, we recommend you immediately take the following measures to protect your online security and personal privacy:</p>
<ul>
<li>Immediately change your Yahoo email password.</li>
<li>If you happen to be using the same combination of username and password across multiple (non-Yahoo) online accounts, change all of the passwords. Make sure that you use a different password for every account.</li>
<li>Ensure you have a legit and reputable antivirus protection with active subscription to protect your PC from any forms of cyberattack.</li>
</ul>
<p>Further readings:</p>
<ul>
<li><a href="https://www.compuclever.com/posts/how-to-protect-yourself-in-a-post-password-world/" target="_blank">How to protect yourself in a post-password world</a></li>
<li><a href="https://www.compuclever.com/posts/compuclever-antivirus-plus-vb100-certification/" target="_blank">How to create a good password</a></li>
<li><a href="https://www.compuclever.com/posts/safe-guard-your-online-banking/" target="_blank">Safe guard your online banking</a></li>
<li><a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">Stay safely connected</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/yahoo-admitted-500-million-accounts-have-been-breached/">Breaking News – Yahoo Admits Breach of 500 Million Accounts</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Personal Encounter with Ashley Madison</title>
		<link>https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-personal-encounter-with-ashley-madison</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 01 Oct 2015 16:54:44 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[Windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2186</guid>

					<description><![CDATA[<p>What are the consequences to piracy that involves millions of users and personal information?  We look at both the overall effect of the greatest hack in modern day as well as how it came to our attention through someone seeking our support and professional guidance.  We offer here testimony and strategy. </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/">A Personal Encounter with Ashley Madison</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">What are the consequences to piracy that involves millions of users and personal information?  We look at both the overall effect of the greatest hack in modern day as well as how it came to our attention through someone seeking our support and professional guidance.  We offer here testimony and strategy.</div>
</div>
<p>Unless you have been living under a rock for the past few months, you must have heard about the Ashley Madison account hack.  This was where hackers released the entire user database of names, email addresses, billing information, and account details of 38 million users tied to the site.  Some described the historical hack episode as an extinction-level event for privacy.</p>
<div class="quick_facts">Jeff Yang, a columnist for The Wall Street Journal, asked this simple but stern question in his CNN-syndicated commentary &#8211; Ashley Madison hack: privacy becomes extinct.  Comparing the incident to the prehistoric planet-wide catastrophe that wiped out the Jurassic World, Yang declared that the data hack of the Toronto-based infidelity website was “an extinction-level event for privacy”.</div>
<h1>Attack Aftermath</h1>
<p>We were shocked when we first learned that hackers managed to steal close to 40 million users’ records from Ashley Madison, which made claims shortly after the incident that its members remained anonymous.  However, in early August 2015 it was clear that this was not the case as hackers released details of millions of email addresses, billing information, and account details tied to the site<sup><a href="#_footnote">[1]</a></sup>.</p>
<p>As a group of seasoned IT professionals who have been actively involved with security R&amp;D for a number of years, we can tell this hack event was different from all previous data leakages that impacted large corporations and national-level government agencies.  This time, the privacy of many ordinary people – with repercussions to job, relationships, family life, marriage, and personal life – was exploited, ripped apart, and taken away.</p>
<p>What was the impact to this?  Heartless spammers sent extortion emails to people demanding ransom in return of “wiping records clean”<sup><a href="#_footnote">[2]</a></sup>.  Adding salt to the wound, class action lawsuit experts and divorce lawyers are circling victims smelling hefty legal fees in the air.  The rippling effect of the biggest privacy invasion in human history will be felt for a long time to come.  Sadly, we CANNOT be fooled by those spamming extortionists; data leakage is just like waste water leakage &#8211; there is no way to retract or wipe absolutely clean what’s already there.</p>
<h1>A Personal Encounter</h1>
<p>Just a few weeks ago, the core group here at CompuClever was caught in a “personal” encounter with the Ashley Madison aftermath.  A seemly normal support email came from a user requesting help with opening a very large (approximately 10 GB), compressed file.  The technical support specialist who was dealing with the ticket noticed something abnormal – the origin of the file resides on “The Pirate Bay”, a controversial pirate website usually referred to as part of the “darker side of the web”.  Due to the security concern, this case was quickly escalated to our co-founder and Chief Product Officer Yida Mao, who is also our in-house security expert.</p>
<p>Using an isolated environment, Yida led our security analysts to identify the contents of the large compressed file which actually contained the entire dataset of the Ashley Madison user account database.  Due to security pre-cautions and with suspicion of possible computer virus contamination within the compressed file, we immediately notified the user to delete and quarantine the file without her having to opening it.  We were told by this user that she had strong feelings that her partner had been active on the Ashley Madison site and wanted confirmation. We utilized alternative and safe methods to fulfill her queries and she was grateful.</p>
<p>When global-scale security breaches like that of Ashley Madison happen, we always have mixed feelings of horror and sympathy, along with a sense of responsibility.  The magnitude of the hack, for both the number of people involved and the level of impact is HUGE.  Can you imagine if the privacy and secrecy of the entire nation of Canada (approximately 36 million) was hacked, exposed, and ripped apart?  Meanwhile, as IT professionals who are actively involved with R&amp;D in the realm of PC security and optimization, we also feel deeply compelled to reach out to our families, friends, and to our users and readers in order to awake their sense of online security.  Cyber security breach and privacy invasion is no longer something you only read about in cold war novels or watch in Jason Bourne movies, it is happening to people around us or may have already impacted you and your family.</p>
<p style="text-align: center;"><a href="https://www.compuclever.com/products/antivirus/" target="_blank"><img decoding="async" loading="lazy" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus - Best Protection. Best Performance." src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows10-general.jpg" alt="" width="650" height="363" /></a></p>
<h1>Recommendations</h1>
<p>So what can you do instead of just being paranoid?  “Be vigilant and aware of your digital surroundings, just as you should be aware of your physical surroundings” says Yida Mao who has managed multiple R&amp;D teams in the cyber security field and published research findings at several international software consortiums.  He offers three core principles for protecting your cyber security and privacy:</p>
<div class="indent_left">
<ul>
<li><strong>Be aware of what’s already on your PC</strong>:  Your PC has a lot of information to tell about you, including your personal data, financial records, photos, tax filings, family tree information, and more.  Anything that physically reside on your PC can be stolen and exposed.  Read more about <a href="https://www.compuclever.com/posts/cookie-time/" target="_blank">how to safely remove sensitive information from your PC…</a></li>
<li><strong>Be aware of what’s getting stored on your PC</strong>:  Unless your PC is never connected to the Internet, you always face the risk of cyber-attacks or privacy intrusions.  Your PC is not designed to battle any of these attacks alone and neither should you.  <a href="https://www.compuclever.com/posts/surf-with-confidence/" target="_blank">Get comprehensive security software like CompuClever Antivirus PLUS to fend off cyber-attacks</a>.</li>
<li><strong>Be aware of what’s being sent from your PC</strong>:  Frequently you, or your PC, will send out sensitive information or data without your full permission or intent.  Do you have a data filtering mechanism to prevent information like your credit card numbers or social security numbers from being leaked out?  If not, you should use something equivalent to the <a href="https://www.compuclever.com/posts/stay-safely-connected/" target="_blank">Data Protection function in CompuClever Antivirus PLUS</a> to safeguard your personal data.</li>
</ul>
</div>
<p>We urge you to take time and assess what protective measures you have put in place to safeguard your information and your privacy, regardless what software or tools you choose to use.  Do not delay or procrastinate, cyberattacks do not wait for you – instead, they catch you off-guard.</p>
<h1>In Summary</h1>
<p>We are excited to be able to provide an AV product that can equip you with tools designed to safeguard you from cyber attacks.  Together with our prior technologies such as PC Clean Maestro you can be more proactive in protecting your privacy and securing your personal information in order to safely enjoy your PC computing practices.  We plan to continue covering this theme of protection and security in upcoming articles and welcome your feedback.</p>
<p>Please keep in mind… if you have some ideas of topics you would like us to cover or have other feedback to offer, email us at: <a href="mailto:newsletter@compuclever.co" target="_blank">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<p><a id="_footnote"></a></p>
<hr size="1" />
<p>&nbsp;</p>
<p>[1] <a href="http://money.cnn.com/2015/08/19/technology/ashley-madison-search/index.html">CNN: Hackers released details of hacked Ashley Madison accounts.</a><br />
[2] <a href="http://money.cnn.com/2015/08/21/technology/ashley-madison-users-extorted/">CNN: Spammers sent extortion emails to Ashley Madison users.</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/a-personal-encounter-with-ashley-madison/">A Personal Encounter with Ashley Madison</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stay Safely Connected</title>
		<link>https://www.compuclever.com/posts/stay-safely-connected/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=stay-safely-connected</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 03 Sep 2015 18:27:18 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2087</guid>

					<description><![CDATA[<p>Email and social networking are two primary means of communicating and stay connected with family and friends. Through social network sites and emails, you share updates, post photos, and reveal things that are sometimes very personal about you.  Examples include where you live, which company you work for, whom you are related to, when and where you are going on holiday, what food you like, what music you listen to, whom you have just met, etc. By piecing these bits of information together, it becomes easy for anyone to learn more about you. And that’s also how cyber criminals find out information they want from you. Personal identity theft and online scams are two primary threats that target email and social networking users.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/stay-safely-connected/">Stay Safely Connected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Email and social networking are two primary means of communicating and stay connected with family and friends. Through social network sites and emails, you share updates, post photos, and reveal things that are sometimes very personal about you.  Examples include where you live, which company you work for, whom you are related to, when and where you are going on holiday, what food you like, what music you listen to, whom you have just met, etc. By piecing these bits of information together, it becomes easy for anyone to learn more about you. And that’s also how cyber criminals find out information they want from you. <strong>Personal identity theft and online scams are two primary threats that target email and social networking users</strong>.</div>
<h1>Identity theft</h1>
<p>A recent study conducted by Bitdefender, a leading European security technology provider, discovered that more than a quarter of a million email addresses, usernames, and passwords can be found easily through social networking platforms like Facebook, Twitter, personal blog postings, chat forums, and download sites. Surprisingly, 87% of these compromised credentials still provided valid access to personal email and social networking accounts. What’s more astonishing was that 75% of the people in this study use the same password for all their accounts. Hackers really didn’t have to look too hard to gain access to your identity and private information.</p>
<h1>Online scams</h1>
<p>Users of the social networking site Facebook are informed through a notification system and by e-mail that they have been made administrators of an unknown page and are directed to click on a link that takes them to a fake Facebook page. Once a user has landed on the fake Facebook page, they are re-directed to a different, malicious site where they are asked to provide their e-mail and shipping address in order to take part in a test session of the new Apple iPad. The scam states that Apple is giving away a total of 10,000 iPad2s for review. Making it even more believable, some of the notifications came from emails and posts sent by family members or friends whose PCs were also compromised. You trust your friends, but can you trust their computers as well?</p>
<h1>Stay connected safely</h1>
<p>Security experts recommend the following guidelines so that you can avoid security risks while staying connected online:</p>
<div class="indent_left">
<ul>
<li>Avoid publishing any information that can be used to identify you, such as phone numbers; your home, school, or work address; your birthday; and your social security number.</li>
<li>Use different sets of username and passwords for email and social networking sites.</li>
<li>Avoid posting holiday dates, locations, or even pictures while you are away. Otherwise, you leave perfect “bread crumbs” for burglars to follow.</li>
<li>Never include bank or credit card information in emails or posts.</li>
<li>Install and deploy an effective and updated antivirus / anti-spyware solution that features a strong anti-phishing mechanism.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>Introducing &#8211; Data Protection</h1>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected">CompuClever Antivirus PLUS</a> features an ironclad information safety mechanism called <strong>Data Protection</strong>. Data Protection prevents sensitive data leaks when you are online. Based on the rules you create, Data Protection scans the web, e-mail, and instant messaging traffic sent by your computer.  It looks for specific character strings, for example, your credit card number. If there is a match, the respective web page, e-mail, or instant message is blocked.</p>
<p>You can create rules to protect any piece of information you might consider personal or confidential, from your phone number or e-mail address to your bank account information. Multi-user support is provided so that more than one person can log on to Windows using different user accounts and can configure their own rules. If your Windows account is an administrator account, the rules you create can be configured to also apply when other users of the computer are logged on to their Windows accounts.</p>
<p style="text-align: center;">Define what data you want to protect</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 737px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-data-protection-rule.png" /></a></p>
<p style="text-align: center;">Define how you want the data be protected</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 737px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-data-protection-apply.png" /></a></p>
<h1>Extra peace of mind</h1>
<p>Rest assured, personal information provided to the Data Protection tool is encrypted and cannot be used by anyone else but you. Also for extra safety, you can just enter part of the information that you like to protect. For instance, if you want to prevent leakage of your credit card number, you can just enter the last four digits of the card number so that any web traffic leaving your computer with the same combination of digits will be blocked. It’s a smart way of safeguarding data without any compromise.</p>
<div class="bottom_p">
<h1>Recommendation</h1>
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/identity.html" target="_blank">Learn more about Data Protection</a></li>
<li>Try Data Protection by <a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected" target="_blank">CompuClever Antivirus PLUS</a></li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=safely_connected"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" /></a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/stay-safely-connected/">Stay Safely Connected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Surf with Confidence</title>
		<link>https://www.compuclever.com/posts/surf-with-confidence/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=surf-with-confidence</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Wed, 02 Sep 2015 17:55:07 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2074</guid>

					<description><![CDATA[<p>nlike shark attacks, cyber-attacks are numerous, sophisticated, and ever-changing. Many cyber criminals who have managed to evade law enforcement are not only resourceful but also considered experts. To a certain extent they are even innovative. Compelled by the sinister desire of luring more victims while remaining undetected, hackers diligently invent new techniques and schemes to exploit systems of users who are even security-conscious.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/surf-with-confidence/">Surf with Confidence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Unlike shark attacks, cyber-attacks are numerous, sophisticated, and ever-changing. Many cyber criminals who have managed to evade law enforcement are not only resourceful but also considered experts. To a certain extent they are even innovative. Compelled by the sinister desire of luring more victims while remaining undetected, hackers diligently invent new techniques and schemes to exploit systems of users who are even security-conscious.</div>
</div>
<h1>Jaw-dropping</h1>
<p>The cases presented below are a couple of example of classical cyber-attacks that are conniving, stealthy, and almost ingenious.</p>
<div class="indent_left">
<ul>
<li>Case 1: While surfing the web at home, the user of a hacked PC was prompted to create new accounts in order to use her own Wireless Access Points (WAP). Not knowing what was happening behind the scenes, the victim would use a common username or email address along with a password that was used for several other online accounts.  The result: the hackers gained complete and unblocked access to her email, Facebook, Twitter, Pinterest, or even online banking site.</li>
<li>Case 2: On the premises of a Starbucks coffee shop, hackers positioned a Wi-Fi hotspot and disguise it so that it appears to belong to Starbucks. Attackers then redirect victims to frequently used websites that were actually modified or fake to capture login credentials or deploy keylogging malware to harvest personal identity information. This type of cyber-attack even has a code name: <em>waterholes</em>.</li>
</ul>
</div>
<p>Would you believe that the waterholes scheme was so effective it even captured victims from cafeterias inside high-tech companies such as Apple, Facebook, and Microsoft? More than likely, those techies have some sort of antivirus solution on their laptops. But the reality is harsher – a bare bones antivirus software without proper web protection is not going to cut it.</p>
<h1>Proper web protection</h1>
<p>So what types of web protection can help fend off and defy cyber-attacks? You need exactly two types of protection:</p>
<div class="indent_left">
<ol>
<li><strong>Anti-phishing protection</strong> that alerts you of potential phishing websites. This prevents you from falling prey to the “honey traps” set up by hackers.</li>
<li><strong>Real-time web protection</strong> against malicious code or downloads embedded in the web. This prevents your computer from being infected or even controlled.</li>
</ol>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; max-width: 275px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x480-1.png" alt="" /></a></p>
<h1>Web protection in CompuClever Antivirus PLUS</h1>
<p>CompuClever Antivirus PLUS Web protection ensures a safe browsing experience by alerting you about potential phishing web pages. It provides real-time web protection for popular web browsers including:</p>
<div class="indent_left">
<ul>
<li>Internet Explorer</li>
<li>Firefox</li>
<li>Google Chrome</li>
</ul>
</div>
<p>The web protection feature provides two functions:</p>
<div class="indent_left">
<ul>
<li><strong>Web Toolbar</strong>, which automatically blocks you from accidentally visiting a phishing or compromised website.
<p style="text-align: center;">Web toolbar blocking a suspicious site</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 703px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-web-toolbar.png" /></a></li>
<li><strong>Search Adviser</strong>, a component that rates the results of search engine queries and links posted on social networking websites by placing an icon next to every result.  Working like a traffic light, the Search Advisor tells you if a site, as recommended by a search engine, is safe, suspicious, or dangerous.
<p style="text-align: center;">Search Advisor</p>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%; max-width: 773px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-search-advisor.png" /></a></li>
</ul>
</div>
<p>The web protection feature is seamlessly embedded with your default web browser. It is always at your side protecting your web surfing experience without being in the way.</p>
<p>Check out the detailed information about CompuClever Antivirus PLUS Web Protection:</p>
<div class="indent_left">
<ul>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/web_protection.toolbar.html" target="_blank">Web Protection in web browsers</a></li>
<li><a href="https://www.compuclever.com/support/antivirus/help-file/html/web_protection.html" target="_blank">Search Advisor</a></li>
</ul>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence" target="_blank">Click here to learn more about CompuClever Antivirus PLUS</a>.</p>
</div>
<p>If your antivirus solution doesn’t provide web protection specifically, you should still follow these best-practices to protect yourself against cyber attacks:</p>
<div class="indent_left">
<ul>
<li>Do not provide your personal information via e-mail.</li>
<li>Do not click any links you receive from senders you do not know.</li>
<li>Do not download attachments from unknown senders.</li>
<li>Download files only from trusted websites.</li>
<li>Check if the final price is the same with the price displayed at the start of a transaction.</li>
<li>Keep your antivirus solution updated. If you are not using an antivirus solution, we recommend you install one as soon as possible.</li>
<li>Do not log in to your financial account from unknown networks.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/nm/sp/?utm_source=mailchimp&amp;utm_medium=email&amp;utm_campaign=surf_confidence"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; width: 100%;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" /></a></p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/surf-with-confidence/">Surf with Confidence</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are you well protected</title>
		<link>https://www.compuclever.com/posts/are-you-well-protected/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-well-protected</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Thu, 27 Aug 2015 22:18:05 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[CompuClever Antivirus PLUS]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=2031</guid>

					<description><![CDATA[<p>No two security products are created equal and there are similarities and important differences among antivirus software when it comes to evaluating the level of sufficiency and effectiveness of protection. This article shows you what to look for and how to tell if your antivirus software provides you enough protection.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/are-you-well-protected/">Are you well protected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">&#8220;Am I well protected by the antivirus product that I just chose?” This is the most common question that lingers in the mind of almost every security-cautious PC user when first installing an antivirus solution, whether it’s free or purchased. Almost every commercially available antivirus program today boasts that it will protect you from any and all malware.  However, the reality is no two security products are created equal and there are similarities and important differences among antivirus software when it comes to evaluating the level of sufficiency and effectiveness of protection. This article shows you what to look for and how to tell if your antivirus software provides you enough protection.</div>
</div>
<h1>Known or Unknown</h1>
<p>There two types of malware: <em>Known</em> and <em>Unknown</em>.</p>
<div class="indent_left">
<ul>
<li>A <em>Known virus</em> is a piece of widespread and prevalent malware discovered in the past four weeks. Detection of known viruses is relatively trivial because for the past decade or so, the antivirus industry has evolved into a “coopetition” landscape (in other words, a coexistence of cooperation and competition), through which security researchers and solution providers proactively and voluntarily share discovery of new virus samples with absolutely secure measures.</li>
<li>An <em>Unknown virus,</em> better known as a <em>zero-day attack,</em> is a threat that exploits an unknown computer security vulnerability. Zero-day exploits are often put up by renowned hacker groups. Typically, the zero-day attack exploits a bug that neither security solution providers nor users, know about.</li>
</ul>
</div>
<p>Using a medical analogy, Hepatitis A virus (HAV) is a known virus and there has been vaccine available to rid the virus; meanwhile Ebola, first discovered in 1976 but unknown to most of us until the outbreak in March of 2014, was as a virus that typifies a zero-day attack. When it comes to encountering computer viruses, you want to be protected from both known and unknown malware.</p>
<h1>The important difference</h1>
<p>It now boils down to getting an answer to the key question: how well does your antivirus handle both known and unknown viruses?</p>
<p>In theory, a legitimate antivirus program should detect, immunize, and remove any known malware where signature, behavior, and characters are known. There is really no excuse for a security application not to proactively handle a known virus, either by detection or by removal. This is the expected similarity across mainstream antiviruses; although one would be surprised to learn that a couple of very popular antivirus programs are actually not that effective in terms of dealing with known viruses.</p>
<p>The most important difference that sets the best breed of antiviruses apart from their less-competitive counterpart is how well it handles unknown viruses. It is indeed very tough to detect and neutralize a malware threat that nobody has identified. But the reality is harsh. Everyday there are hundreds of thousands of new malicious files being detected. Kaspersky Labs, a leading security solution provider, alone reported that they were detecting 325,000 new malicious files a day in 2014 – 125,000 more than what was detected in 2012<sup><a href="#foot_notes">[1]</a></sup>.</p>
<h1>How to evaluate your own antivirus</h1>
<p>So the key question of AV effectiveness really zeros in on: how well does your antivirus handle unknown malware? It is very relevant and pertains to your day-to-day computing especially if your PC is connected online.</p>
<p>As we have presented the key metrics through which we can evaluate the effectiveness and efficiency of antivirus software, now let’s look at how you can put it into use for evaluating your own antivirus program. Thanks to a few independent IT-security testing organizations like Virus Bulletin and AV-Test, who conduct tests evaluating mainstream antivirus software on a quarterly basis using objective methods, we can make good use of the evaluation comparison reports that are publicly available. You can browse through the most recent test reports and look for your own antivirus software and read about it:</p>
<div class="indent_left">
<ul>
<li>AV-Test report: provides <a href="https://www.av-test.org/en/antivirus/home-windows/windows-7/april-2015/" target="_blank">an intuitive chart</a> in terms of Protection, Performance, and Usability. Pay attention to the Protection column first. You can also click on a product of your interest and examine detailed test scores on how it deals with known and unknown virus samples.</li>
<li>VB100: is a regular independent review of malware solutions and it provides test results for AV software that handle both known (reactive) and unknown (proactive) virus samples. You can see <a href="https://www.virusbulletin.com/testing/results/latest/vb100-antimalware" target="_blank">the latest test results for any product</a> or use the Search filed to quickly find test results.</li>
</ul>
</div>
<p>We have to point out to those readers who rely on default antivirus solutions by Microsoft, whether it is Windows Defender or Microsoft Security Essential, you may want to double check the testing results as we are concerned about the lack of protection you may have.  The reality is Microsoft doesn’t even handle known viruses effectively.</p>
<p style="text-align: center;"><a href="https://www.compuclever.com/products/antivirus/" target="_blank"><img decoding="async" loading="lazy" class="aligncenter wp-image-2003 size-full" style="margin-top: 10px;" title="CompuClever Antivirus PLUS" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x4801.png" alt="Click to learn more..." width="275" height="377" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x4801.png 275w, https://www.compuclever.com/posts/wp-content/uploads/ccav-box-left-640x4801-218x300.png 218w" sizes="(max-width: 275px) 100vw, 275px" /></a></p>
<h1>What about CompuClever Antivirus PLUS?</h1>
<p>Keen readers may find that our own CompuClever Antivirus PLUS is not presented in either of these two reports because the product has just been released when this article was written. We have submitted our product to VB100 for evaluation and the official result won’t be ready until later this year. But here are some facts about how CompuClever Antivirus PLUS:</p>
<div class="indent_left">
<ul>
<li>CompuClever Antivirus utilizes the same intelligent and robust antivirus engine that powers top-tier security solution providers like Bitdefender. This technology is protecting, and trusted by, over 500 million users around the world.</li>
<li>CompuClever Antivirus deploys a cutting-edge security technology called <em>Active Virus Control</em> (AVC). It is an innovative proactive detection technology which uses advanced heuristic methods to detect new potential threats in real time.</li>
<li><em>Active Virus Control</em> continuously monitors the applications running on the computer looking for malware-like actions. Each of these actions is scored and an overall score is computed for each process. When the overall score for a process reaches a given threshold, the process is considered to be harmful and it is blocked automatically.</li>
</ul>
</div>
<figure id="attachment_2054" aria-describedby="caption-attachment-2054" style="width: 300px" class="wp-caption aligncenter"><a href="https://www.compuclever.com/posts/wp-content/uploads/ccav-av-control.png"><img decoding="async" loading="lazy" class="size-medium wp-image-2054" title="Active Virus Control" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-av-control-300x203.png" alt="Active Virus Control" width="300" height="203" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-av-control-300x203.png 300w, https://www.compuclever.com/posts/wp-content/uploads/ccav-av-control.png 762w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-2054" class="wp-caption-text">Active Virus Control &#8211; CompuClever Antivirus PLUS</figcaption></figure>
<p>In a nutshell, you can expect CompuClever Antivirus to deliver 100% protection against both known and unknown viruses, comparable to any first-tier antivirus software like Norton, Kaspersky, Bitdefender, and MacAfee. As a matter of fact, an independent third-party lab test revealed that our antivirus product not only delivers a high level of protection, it also creates a very low impact to PC performance.</p>
<p><a href="https://www.compuclever.com/products/antivirus/newsletter-early-launch/"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2059" title="Best Protection Against Viruses" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection.png" alt="" width="371" height="238" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection.png 371w, https://www.compuclever.com/posts/wp-content/uploads/ccav-best-protection-300x192.png 300w" sizes="(max-width: 371px) 100vw, 371px" /></a><a href="https://www.compuclever.com/products/antivirus/newsletter-early-launch/"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-2060" title="Lowest Impact on Performance" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact.png" alt="" width="371" height="238" srcset="https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact.png 371w, https://www.compuclever.com/posts/wp-content/uploads/ccav-lowest-impact-300x192.png 300w" sizes="(max-width: 371px) 100vw, 371px" /></a></p>
<p>If you feel that your current antivirus software is either ineffective or you suspect that your PC is slowing down as a result of running an antivirus program, you should <a href="https://www.compuclever.com/products/antivirus/newsletter-early-launch/" target="_blank">check out CompuClever Antivirus PLUS</a>. Just so you know, we will also be talking about the importance of antivirus and PC performance in future articles.</p>
<h1>Our recommendation</h1>
<div class="indent_left">
<ul>
<li>Familiarize yourself with the concept of known and unknown antivirus threats.</li>
<li>Check out the aforementioned comparative evaluation reports about your own antivirus product. For VB100 tests, you can compare the test results to CompuClever Antivirus PLUS.</li>
<li>Don’t settle for a free antivirus unless it is proven to be effective in dealing with both known and unknown threats.</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/products/antivirus/"><img decoding="async" class="emailImage aligncenter" style="height: auto; min-width: 300px; max-width: 650px; width: 100%;" title="windows-10-compatible" src="https://www.compuclever.com/posts/wp-content/uploads/ccav-windows-10-compatible.jpg" alt="" /></a></p>
<div class="bottom_p">
<p>&nbsp;</p>
<hr size="1" />
<p>[1] <a href="http://www.kaspersky.com/about/news/virus/2014/Kaspersky-Lab-is-Detecting-325000-New-Malicious-Files-Every-Day">www.kaspersky.com</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/are-you-well-protected/">Are you well protected</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New Year&#8217;s PC Resolution</title>
		<link>https://www.compuclever.com/posts/new-years-pc-resolution/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-years-pc-resolution</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 16 Jan 2015 16:46:57 +0000</pubDate>
				<category><![CDATA[computer fixes]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC Clean Maestro]]></category>
		<category><![CDATA[PC Cleaner]]></category>
		<category><![CDATA[PC hardware]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=1730</guid>

					<description><![CDATA[<p>This article reviews the previous articles from 2014 that focus on PC performance and how you can take action to better improve PC sluggishness, accumulation of clutter, and unwanted actions or items.  Here is your chance to pinpoint any issue that is within your ability to resolve.  It’s time for some PC resolution!  </p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/new-years-pc-resolution/">New Year&#8217;s PC Resolution</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">This past year we introduced topics and subject matter related to PC enhancement.  We intend to highlight the best of these as they apply to providing you the tools needed to enhance your PC performance and take action against unwanted behavior.  It is our hope that you can take a look at our year in review and pick what you need to carry out your PC goals for the upcoming year.  It’s likely that there are items in your computing world that need attention and here’s your chance to fast track to those areas that have been neglected.</div>
</div>
<p>We have chosen six of the most popular articles from 2014. Here is an overview of these articles in three categories:</p>
<p><strong>Privacy / Security:</strong><br />
&#8211; <a href="#article_1"> Identify and Clean Cookies</a> (July)<br />
&#8211; <a href="#article_4">Virus vs PUP and How to Remove Both</a> (Sept)</p>
<p><strong>TuneUp / Clean Up:</strong><br />
&#8211; <a href="#article_5">Improve Startup</a> (Aug)<br />
&#8211; <a href="#article_6">Spring PC Cleaning</a> (June)</p>
<p><strong>Support:</strong><br />
&#8211; <a href="#article_3">CompuClever Free Functionality</a> (Oct)<br />
&#8211; <a href="#article_2">DIY vs. Repair Shop</a> (Nov)</p>
<p>Here are the PC enhancement articles for 2014.<br />
<a name="article_1"></a></p>
<h2>Identify and Clean Cookies</h2>
<p><strong>About</strong>: Not all cookies are created equal.  Cookies are created when browsing to particular web pages.  While most are safe – especially when coming from a trusted source – not all are.  While cookies cannot infect your PC, there can be potential dangers related to security and privacy.</p>
<p><strong>Action</strong>:  You can prevent cookies from being stored and you can delete existing ones.  We focus on removal beginning with backing up your data.  When you data is secure… PC Clean Maestro is well equipped to scan, display, and clean cookies and other items that are security or privacy risks.  We also include information on how to set up your browser for DNT – Do Not Track mode.<br />
<a href=" https://www.compuclever.com/posts/cookie-time/" target="_blank"> Read the entire article here&#8230;</a></p>
<p><a name="article_2"></a></p>
<h2>DIY vs. Repair Shop</h2>
<p><strong>About</strong>: In this article we give warning to anyone who blindly takes their PC to a repair shop.  We highlight one case where a particular gentleman had been ripped off by a technician who blamed the cause of his PC troubles on a computer cookie planted by CompuClever!  This brings up the question – who can you trust?  Checking credentials is paramount.  For example, CompuClever applications have approved Microsoft and Intel certification.</p>
<p><strong>Action</strong>:  This article assists the reader in determining if the cause of their issues is from unwanted software or from a virus.  We empower the reader to take the right steps before putting trust in someone who claims to be an expert.</p>
<div class="indent_left">Step 1:  DIY – Do It Yourself – when possible.  Check for available free solutions.<br />
Step 2:  Use free available support.  CompuClever has one-on-one support for direct PC tune up.<br />
Step 3:  If it is a virus… get the right information from a repair technician before you hand over your PC.</div>
<p><a href="https://www.compuclever.com/posts/diy-vs-repair-shop/" target="_blank">Read the entire article here&#8230;</a></p>
<p><a name="article_3"></a></p>
<h2>CompuClever Free Functionality</h2>
<p><strong>About</strong>: We’re very familiar with the notion of “free” but… with strings attached.  We see this whenever we download a free application and it includes around three or more extra bits of software that you have to carefully remove during the installation process.  We took the opportunity to introduce our applications and show how anyone can use some of their functionality for free indefinitely.</p>
<p><strong>Action</strong>:  If you have purchased one of the CompuClever applications and you like what you see… here’s your chance to try out one of the others for free.  If you want the full program you can upgrade at any time of your choosing.  Here are some examples of the free functionality available:</p>
<div class="indent_left">
<ul>
<li><em>PC TuneUp Maestro</em>: includes free scans (registry, fragmentation, system tune up, and Internet tune up), system backup capabilities, and many other free tools to explore.</li>
<li> <em>PC Clean Maestro</em>: includes free scans (privacy, security and junk file accumulation), removal of junk files, plus the use of the Uninstaller tool.</li>
<li> <em>Ultra File Opener</em>: includes free Open &amp; View, Manage File Associations, Submit Files for Analysis, and more.</li>
<li> <em>Ultra eBook Reader</em>: enables you to open eBook files, manage file associations, bookmarks, find tool for free.  And that’s the short list!</li>
</ul>
</div>
<p><a href="https://www.compuclever.com/posts/compuclever-free-functionality/" target="_blank">Read the entire article here&#8230;</a></p>
<p><a name="article_4"></a></p>
<h2>Virus vs PUP and How to Remove Both</h2>
<p><strong>About</strong>: This subject matter is complex and involved.  We focus on simplifying it as best we can to define virus and PUP – Potentially Unwanted Programs.  We find that users often feel that the occurrence of PUPs can mean they have a virus.  This is not necessarily true and we want to empower our readers to take action.</p>
<p><strong>Action</strong>:  It makes sense to work on the symptoms first.  If you have unwanted behaviours coming from an unknown source, you can begin by identifying the source.  PC Clean Maestro comes with a newly upgraded Uninstaller tool that can assist you to examine what is a trusted application so you can remove what is not.  As for viruses, there are free tools available and there are paid applications.  We recommend the best place to start is with trusted free tools from Microsoft.</p>
<div class="quick_facts">Note:  One important last note we stress in our article and here… be very cautious when downloading anything.  Take care during the installation of a program to make sure it doesn’t come with extra programs and functionality.  Clear the check box of unwanted items and choose only the program you want!</div>
<p><a href="https://www.compuclever.com/posts/virus-vs-potentially-unwanted-programs/" target="_blank">Read the article here&#8230;</a></p>
<p><a name="article_5"></a></p>
<h2>Improve Startup</h2>
<p><strong>About</strong>: We focus on one area of poor performance which can be very annoying – the startup time of your PC.  Although we can’t expect that our PC will run as fast as when we first purchased it, we can adjust what programs first get started when powering up.</p>
<p><strong>Action</strong>:  You are instructed on how to use PC TuneUp Maestro’s Optimize PC tool.  You will find it easy to review all the programs displayed in the list.  Once you have done so you can customize how they perform at startup by disabling or enabling any item in the list.<br />
<a href="https://www.compuclever.com/posts/improve-startup/" target="_blank"> Read the entire article here&#8230;</a></p>
<p><a name="article_6"></a></p>
<h2>Spring PC Cleaning</h2>
<p><strong>About</strong>: This article is one of our favorites as it appeals to our instinct to clean and organize and we have used very easy and straightforward steps.  In terms of “clean” we refer to removing clutter and backing up files we want to keep.  By doing so we improve the performance of the PC and make our lives a lot easier in terms of accessing the files and data we need.</p>
<p><strong>Action</strong>:  If you are getting the feeling you have a lot of files on your PC and space may eventually be an issue… here is your chance to follow some easy steps.  They include:</p>
<div class="indent_left">
Step 1:  Assess your space needs in terms of free space.<br />
Step 2:  Backup your files.  – Not as tedious and challenging as we think –<br />
Step 3:  Deal with the junk using PC Clean Maestro.  From scan to clean this is a fast and simple process.</div>
<p>By managing your files you are actively preventing performance degradation and you can take comfort in the fact that the files you value highly are safe!<br />
<a href="https://www.compuclever.com/posts/spring-pc-cleaning/" target="_blank"> Read the entire article here&#8230;</a></p>
<div class="bottom_p">
<h2>Here’s to 2015…</h2>
<p>We thank you for taking interest in our articles this past year.  May you rediscover the joy of using PC in 2015.  Welcome to the New Year!</p>
<p>We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com</p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/new-years-pc-resolution/">New Year&#8217;s PC Resolution</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Browsing for browsers</title>
		<link>https://www.compuclever.com/posts/browsing-for-browsers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=browsing-for-browsers</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 12 Dec 2014 19:04:51 +0000</pubDate>
				<category><![CDATA[computer fixes]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[PC Clean Maestro]]></category>
		<category><![CDATA[PC Cleaner]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=1705</guid>

					<description><![CDATA[<p>There are two main themes to present – choice and browser clean up.  As for choice… not all browsers are created equal.  Most all of us start off with what comes with our PC – Internet Explorer.  For some people, this is the only choice they know.  While all browsers have the ability to access your favorite sites and create bookmarks, there are very real differences between the top most widely used browsers.  This could be the time for you to look into the options.  As for browser clean up, we have new functionality to roll out with our PC Clean Maestro application.  As we are well aware, browsers start out with the basics and then, through the installation of extensions, they can get bogged down or in some cases are altered without our approval – most frequently, our homepage or search engine changes.  It’s time to take charge and have your browser function as you would have it.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/browsing-for-browsers/">Browsing for browsers</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">There are two main themes to present – choice and browser clean up.  As for choice… not all browsers are created equal.  Most all of us start off with what comes with our PC – Internet Explorer.  For some people, this is the only choice they know.  While all browsers have the ability to access your favorite sites and create bookmarks, there are very real differences between the top most widely used browsers.  This could be the time for you to look into the options.  As for browser clean up, we have new functionality to roll out with our PC Clean Maestro application.  As we are well aware, browsers start out with the basics and then, through the installation of extensions, they can get bogged down or in some cases are altered without our approval – most frequently, our homepage or search engine changes.  It’s time to take charge and have your browser function as you would have it.</div>
</div>
<p>&nbsp;</p>
<p>Here is what we will cover:</p>
<div class="indent_left">
<ol>
<li><strong>Components</strong>:  We’ll start with a breakdown of the components.</li>
<li><strong>Top Picks</strong>:  We’ll look at the top three browser candidates.</li>
<li><strong>Our App</strong>:  We’ll describe how you can make full use of our latest release of PC Clean Maestro.</li>
</ol>
</div>
<p>Without getting into too many of the details and specifics of this technology we will point out some basics.</p>
<h1>Components</h1>
<p>We will focus on components related to what we see when we bring up our web browser, namely the user interface.  We will also talk about the items that are referred to as “extensions” that can be added to a browser after you have installed it.</p>
<p>Typically the user interface (UI) consists of three areas:</p>
<div class="indent_left">
<ul>
<li>The toolbar area at the top.</li>
<li>Main viewing area sometimes referred to as the viewport.</li>
<li>The status bar at the bottom.</li>
</ul>
</div>
<p>The toolbar is used for navigational purposes as it has buttons such as back, forward, refresh, stop, and home (to get you back to your homepage).  It also has an address bar so you can type in a web address and you likely have a search bar to enter in words that can bring up a list of applicable web pages to the subject you are interested.</p>
<p><strong>Two Most Frequently Altered Areas of the Browser: </strong>We get a lot of feedback and reports of how alterations have been made to the Search engine and the homepage.  The Search engine is designed to search for information and content on the Internet.  Examples include Google, Bing, Ask, Yahoo! Search and the like.  These are sophisticated programs that crawl the web and quickly provide results of your inquiry.  A homepage is the page you first see and want to access when you open your browser.</p>
<p>All users want to make a choice of a Search engine and homepage that they are both familiar with and meet their needs.  It becomes all that more frustrating when installing something that modifies these areas of your browser without consent.  We will show you how to return your browser to its default settings in a later section of the article.</p>
<p><strong>Extensions</strong>: Components that can be added to the browser to increase functionality are referred to as extensions.  These can be in the form of toolbars and other add-ons or plug-ins.  Examples include toolbar extensions to provide some specific functionality such as web searching using a specific search engine, better access to installed applications, or providing convenient links or categorizations of media sites.  In some cases they can provide extra functionality as with Ad blockers that block ads on the sites you visit and terminate items that collect and send your data.  The challenge with all extensions is identifying what each of these are, making absolutely sure they are from trusted sources, and knowing that they are not bogging down your browsing experience.</p>
<h1>Top Picks:</h1>
<p>Google Chrome came into the browser fray in 2008 and this brought about new advances in browser technology in terms of speed, standards, and design which forced the other players to catch up.  And catch up they did.  One review by PCMag put the independent open source Mozilla Firefox at the top of their list for best browser:</p>
<div class="indent_left">With a beautifully redesigned interface, excellent performance, thrifty memory use, helpful browsing tools, and leading customizability… <sup><a href="#footnotes">[1]</a></sup></div>
<p>But the “best” is a matter of preference and to a large extent will depend on your needs. The three most commonly used browsers are: Google Chrome, Mozilla Firefox, and Microsoft IE.  These take top honors and we can focus our attention on them.</p>
<p><strong>Most Popular</strong>:  In terms of popularity, at this time Google Chrome ranks number one, with Mozilla Firefox second and IE in third place.<sup><a href="#footnotes">[2]</a></sup></p>
<p><strong>Speed</strong>: Most reports<sup><a href="#footnotes">[3,4]</a></sup> related to speed (startup and web page load times), put Chrome at the top followed by Firefox and then IE.  It is important to note, no browser reviewed here is in any way sluggish and there are trade-offs for speed as described below.  Based on our experience of browsers, we concur with these findings.</p>
<p><strong>Operating System (OS)</strong>: Finding the right browser can depend to a great extent on what OS you are running on your PC.</p>
<div class="indent_left">
<ul>
<li>Windows 8: If you use touch screen technology then IE is the best choice.  However, both Firefox and Chrome are better in terms of being expandable and offering device synchronization of program settings.</li>
<li>Windows 7: IE has some advantages (easy to use), but both Firefox and Chrome are better in terms of expandable functionality.</li>
<li>Windows XP:  The best choice is Google Chrome based on how far back it supports early versions of XP. IE is not supported on Windows XP.</li>
</ul>
</div>
<p><strong>Privacy</strong>: The three browsers each have private browsing modes.  Firefox and Chrome lead the way in this arena.  <strong>Note</strong>: browser privacy means not saving cookies or browsing history but does not protect you from websites that can collect or share information about you.  To take it to the next level you need to look into extensions, such as HTTPS Everywhere, Disconnect, or AdBlock Plus.</p>
<p><strong>Extensions</strong>:  Firefox takes top place with a combination of add-ons, pin tabs, web apps and more.  Next in line is Chrome which taps into Chrome desktop apps and Google Now notifications.</p>
<div class="quick_facts"><strong>Google Chrome</strong>:<br />
+ fast and reliable<br />
+ good customization with exclusive access to the Google store extensions<br />
&#8211; fast but uses up considerable computer         memory; sluggish on older PC’s<br />
&#8211; some operations are not very intuitive<br />
&#8211; compatibility   issues on some sites (especially if using the 32-bit version)&nbsp;</p>
<p><strong>Mozilla Firefox</strong>:<br />
+ open-source means available to all developers; transparent and   trustworthy<br />
+ good   set of available extensions for customization and functionality<br />
+ intuitive in terms of creating bookmarks and changing options<br />
&#8211; slower   than Chrome for starting up and for loading web pages<br />
&#8211; requires   considerable memory; sluggish for older PC’s<br />
&#8211; compatibility   issues with some sites; you sometimes have to install add-ons</p>
<p><strong>Internet Explorer (IE)</strong>:<br />
+ easiest   browser to use in terms of functionality<br />
+ fewest   compatibility issues<br />
+ fully compatible with Windows 8 and has access to Windows store   add-ons<br />
&#8211; not   as customizable and less extended functionality<br />
&#8211; it has a history of being exploited and plagued by security issues<br />
&#8211; slower   than Chrome and Firefox by some reports<br />
&#8211; also requires considerable PC resources</p>
</div>
<p><strong>Price</strong>:  When making your choice you will want to know what the costs are and what it takes to try out a new browser.  Internet Explorer is included with Windows operating systems and can be downloaded for free.  All browsers are free to download and run and you simply have to go to the website (such as Mozilla.org or Google.com).  This makes it possible to pick and choose one – or more than one – without worrying about the price tag.</p>
<h1>Browser Clean Up with PC Clean Maestro</h1>
<p>:<br />
Making a decision about which browser to use could depend largely on how well you can customize it and take advantage of extended functionality.  However, some things have a way of taking on a life of their own.  You can start off small – with the basics – and soon you have more than you bargained for.  This can happen all too easily with browser extensions.  At times these little program tidbits can get installed without our expressed knowledge or consent.  Situations occur where your homepage or our favorite search engine is modified.  In the worst case scenario, rogue or malicious software can make alterations we do not want.</p>
<p>The most recent version of PC Clean Maestro now comes with new functionality to provide you the ability to examine browser extensions and disable them.  Once you open the program you can click on the “Browsers” tab in the left pane and you will see the following:</p>
<p><a href="https://www.compuclever.com/products/pc-clean-maestro/" target="_blank"><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-1716" title="PC Clean Maestro" src="https://www.compuclever.com/posts/wp-content/uploads/pccm-home_resize.png" alt="" width="650" height="426" srcset="https://www.compuclever.com/posts/wp-content/uploads/pccm-home_resize.png 650w, https://www.compuclever.com/posts/wp-content/uploads/pccm-home_resize-300x196.png 300w" sizes="(max-width: 650px) 100vw, 650px" /></a>Now the steps are easy…</p>
<div class="indent_left">
<ol>
<li>Review the list and select an item.  Note: you can also search for an item by typing the name in the Search box and then make a selection.</li>
<li>Click the applicable action button: Disable or Enable.</li>
</ol>
</div>
<p>You’ll note with the example above that extensions are organized in categories specific to the type of browser you are using.  Also, as in this case, more than one browser can be installed to your system and you can examine these one at a time using the tabs at the top (for example, “Chrome” or “Firefox”).</p>
<p><strong>Restoring Settings</strong>:  You can easily restore the browser settings that you had by default when first using your browser.  This is especially useful if they have been altered without your consent.  Frequently, new software installations like to make changes to your search engine or your homepage to direct your web surfing.  To restore your settings do the following:</p>
<div class="indent_left">
<ol>
<li>At the top of the Browsers page, select the browser tab (“Chrome”, “Firefox”, or “IE”).</li>
<li>Click the Restore button located at the top right.</li>
</ol>
<p>Note:  If you have customized your settings you will have to repeat the process by opening up the Browser settings and choosing the homepage and search engine of your choice.</p>
</div>
<h1>In Summary:</h1>
<p>Being able to pick a winner from the top three most popular browsers is a personal decision for most of us but one that needs to be based on PC capabilities and individual needs.  We appreciate that there are these choices available to us and that the competition spurs on better technology.  We promote good ethics when it comes to PC technology.  Browser extensions need to be installed with our knowledge and consent and from trusted sources.  PC Clean Maestro offers the ability to have you turn off add-ons that are unwanted.</p>
<p>We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<hr size="1" />
<p><a id="footnotes"></a><br />
[1] <a href="http://www.pcmag.com/article2/0,2817,2365692,00.asp" target="_blank">http://www.pcmag.com/article2/0,2817,2365692,00.asp</a><br />
[2] <a href="http://www.w3schools.com/browsers/browsers_stats.asp" target="_blank">http://www.w3schools.com/browsers/browsers_stats.asp</a><br />
[3] <a href="http://shirleycomputerservices.co.uk/blog/pros-and-cons-of-browsers/" target="_blank">http://shirleycomputerservices.co.uk/blog/pros-and-cons-of-browsers/</a><br />
[4] <a href="http://www.pcworld.com/article/2605933/browser-comparison-how-the-five-leaders-stack-up-in-speed-ease-of-use-and-more.html" target="_blank">http://www.pcworld.com/article/2605933/browser-comparison-how-the-five-leaders-stack-up-in-speed-ease-of-use-and-more.html</a></p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/browsing-for-browsers/">Browsing for browsers</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DIY vs. Repair Shop</title>
		<link>https://www.compuclever.com/posts/diy-vs-repair-shop/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=diy-vs-repair-shop</link>
		
		<dc:creator><![CDATA[Andy Thompson]]></dc:creator>
		<pubDate>Fri, 14 Nov 2014 19:36:20 +0000</pubDate>
				<category><![CDATA[computer fixes]]></category>
		<category><![CDATA[improving performance]]></category>
		<category><![CDATA[increasing speed]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[PC Cleaner]]></category>
		<category><![CDATA[PC hardware]]></category>
		<category><![CDATA[PC security]]></category>
		<category><![CDATA[Protect online privacy]]></category>
		<category><![CDATA[Windows tips]]></category>
		<guid isPermaLink="false">http://www.compuclever.com/posts/?p=1684</guid>

					<description><![CDATA[<p>Why is it that asking for help can be an overwhelming obstacle?  The reality is… there is a certain shame that comes from seeking help when we don’t know something.  No one wants to admit to being lost and needing directions and no one wants to feel like they are not smart enough.  Plus, we all want to join the ranks of DIY – Do It Yourself.  To be real, this takes assessing the situation and knowing if the issues are outside our expertise.  When we are simply spinning our wheels, it’s time to take it to the professionals.  The next task is to get good and reliable service that will lead to a real solution.  This article segues from some of our recent articles that focus on assessment of PC problems.  We’ll cover this in brief and provide links.  The main impetus for this article is to shine some light on PC repair technicians that are not trustworthy and to strongly emphasize how our users can benefit from available tools and services including those offered by our CompuClever support team.</p>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/diy-vs-repair-shop/">DIY vs. Repair Shop</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="top_p">
<div class="quick_facts">Why is it that asking for help can be an overwhelming obstacle?  The reality is… there is a certain shame that comes from seeking help when we don’t know something.  No one wants to admit to being lost and needing directions and no one wants to feel like they are not smart enough.  Plus, we all want to join the ranks of DIY – Do It Yourself.  To be real, this takes assessing the situation and knowing if the issues are outside our expertise.  When we are simply spinning our wheels, it’s time to take it to the professionals.  The next task is to get good and reliable service that will lead to a real solution.  This article segues from some of our recent articles that focus on assessment of PC problems.  We’ll cover this in brief and provide links.  The main impetus for this article is to shine some light on PC repair technicians that are not trustworthy and to strongly emphasize how our users can benefit from available tools and services including those offered by our CompuClever support team.</div>
</div>
<p>Here is the article menu du jour:</p>
<ul>
<li><strong>Background</strong>:  We’ll start with the background story of one man’s experience with a not-so-honest repair shop.</li>
<li> <strong>Assessment</strong>:  How to assess what’s up with your PC.</li>
<li> <strong>What to Do</strong>:  Get the right tools and utilize the services that are available.</li>
<li> <strong>Repair Shop Pointers</strong>:  When all else fails and you need to take your PC to a paid professional.</li>
</ul>
<h1>Background</h1>
<p>In today’s world, certain buzz words can cause a great deal of stress and concern such as “terrorism” and “virus” (in this case PC virus or “malware”).  We all look on those responsible for the creation of these as being deplorable.  And then there are those that reap a reward by taking advantage of the fear generated from these malevolent and disruptive acts.  In our example we highlight a true case that came directly to us when a PC repair shop accused our software of infecting a user’s PC.  Let’s start with the details.</p>
<p>In the spring of 2013 we received correspondence from a Consumer Protection agency on behalf of a private individual who had been charged a fee for services incurred by a PC repair shop (name withheld).  The specifics begin with a frustrated man who was unable to get an online connection and decided to take his computer to a repair shop.  The technician there said he needed a new hard drive in order to back up his data and that they would need to reinstall his operating system.  This was all done to the excessive tune of $340.</p>
<p>What strikes us as interesting up to this point, and we will put aside how purchasing an external HD can be done fairly cheaply and how it was likely unnecessary to reinstall the OS… what really is of concern is that it could have simply been something related to configuring his online connection.  What is the most outlandish aspect of this story, and how it specifically came to our attention, was that the repair technician had stated that CompuClever Systems had purposefully placed malware on his computer by planting a cookie without the user’s knowledge or consent while he was online.  There was also an accusation that CompuClever software was on his system by means of a silent install.  In the end, this individual put his trust in the repair shop technician, made all these changes to his system and paid a fee far in advance of what was required.</p>
<h1>Assessment:</h1>
<p>Let’s just say upfront – there are grey areas when determining causes of PC issues.  When it comes to examining symptoms it is a challenge to determine if the culprit is a virus or something else.  Certain conditions such as a slow performing computer, popup messages, applications slow to open, are common to both malware related causes or items referred to as PUP – Potentially Unwanted Programs.  The best thing to do is to retrace your steps and find what the most recent changes were leading up to the issue.  If you can identify some software that was installed on your system you can then begin to examine it more closely – was it from a trusted source or is it a known virus?</p>
<p><strong>Trusted Source:</strong> If you have done an examination and find that there are PC cookies on your system be advised – this is not an indication of a virus or malicious program.  As our readership is aware from <a href="https://www.compuclever.com/posts/cookie-time/" target="_blank">our previous article</a> on this matter, it is not possible to infect a computer using PC “cookies” – they cannot run programs that deliver viruses or malware to your PC and they cannot access your PC.  We recommend removal of cookies from unknown sources and keeping those from trusted sources.</p>
<p>A definite way to tell the source is a trusted one is to check credentials.  For example, CompuClever Systems is certified as a Microsoft Partner and an Intel Software Partner.  As such explicit user consent is required to install software certified through Microsoft and Intel.  In order to get this kind of Microsoft and Intel certification the software must not contain any virus, malware, or other forms of destructive code.  This means the software undergoes rigorous and thorough review.  Not only does this level of software require user consent to install, all certified software must completely uninstall at the request of the user and at his/her sole discretion without any confusion or any complications.  So&#8230; if the disgruntled user in our background story was in the least bit uncertain about CompuClever software he could simply uninstall it.  Or, he could have contacted us and we could assist him in uninstalling it.  What other software companies can uphold this level of support and service?</p>
<p>It is vital to use proper discretion when installing items to your PC.  As we have pointed out in <a href="https://www.compuclever.com/posts/foistware-messing-up-your-pc-experience/" target="_blank">previous articles</a> there are cases where you want to install one program and you end up getting a bundle of apps some of which include annoying popup messages.  Reading the fine print as you go from one page to the next during the install process is critical.  In most cases you have the option of selecting only the program you want to install.</p>
<p><strong>Virus / Malware: </strong>Without going into too much detail we will revisit this area briefly and encourage you to look more deeply into the differences between virus/malware and other PC annoyances and unwanted programs.   For more information on this see our article: <a href="https://www.compuclever.com/posts/virus-vs-potentially-unwanted-programs/" target="_blank">Virus vs PUP</a>. We also have covered “foistware” – the annoying software that has been forced onto your PC.  See this <a href="https://www.compuclever.com/posts/foistware-messing-up-your-pc-experience/" target="_blank">article</a> for more information.</p>
<p>Basically, a virus is a type of malware (malicious software program), that is installed on your system without consent and will replicate itself in whole or in part.  It behaves in a manner that can be thought of as an infection by targeting one or more areas of your PC.  You can often expect to experience harmful activities or negative impacts such as monopolizing system resources (disk space and CPU), gaining access to private data, sending out spam content, corrupting data on the system, and displaying messages on the screen (popups).</p>
<p>The following are definite and true characteristics of a virus/malware infection:</p>
<div class="indent_left">
<ul>
<li>Inability to remove cookies or software from a computer system.</li>
<li>PC security software and/or firewall become disabled.</li>
<li>Computer starts acting on its own.</li>
</ul>
</div>
<p>If something has gotten onto your system without your knowledge or consent you have some options available to you: find a solution online, try out a trusted virus removal product, get available technical support (by phone), or… take your PC to a repair shop.</p>
<h1>What to Do:</h1>
<p><strong>Free Solutions</strong>:  Do you have anti-virus protection for your PC and is it active?  Recent Windows operating systems provide anti-virus protection (see article: <a href="https://www.compuclever.com/posts/virus-vs-potentially-unwanted-programs/#free-microsoft-av" target="_blank">Virus vs. PUP</a>).  There are also other third-party anti-virus tools available and some are even free.  We encourage you to go online and research this by using customer reviews and finding out whether there is a solution that meets your needs.  We are confident that in the very least anti-virus tools will not steer you in the wrong direction by placing the blame on legitimate software.  The shortcoming here is that they may not get the job done that is specific to your problem.  If so, you can take it to the next level… get some support that is available to you.</p>
<p><strong>Available Support</strong>:  CompuClever offers a TuneUp Service for performance related issues as an alternative to taking your PC to the repair shop.  What you get is a one-on-one direct PC tuneup service through phone and remote desktop connection.  With remote desktop connection we are able to view and run your desktop environment from our offices to assist with your issues.</p>
<div class="quick_facts"><strong>Note</strong>: This   is a free service offered to our full license users.  We will also be offering this to any and   all PC users for a fee so as to assist with solutions related to PC   performance.   We emphasize here that   our service is focused on PC’s that perform poorly and require optimization –   at this time we do not repair PC’s suffering from virus/malware infections.</div>
<p>This service is conducted by our senior technical support specialists and our aim is to solve your PC performance issues and enrich your experience and knowledge of our software solutions with our assistance.  The list of symptoms and issues we address include the following:</p>
<div class="indent_left">
<ul>
<li> <strong>Uninstall unwanted programs:</strong><br />
Review installed applications with you the customer.  Research and remove unwanted or suspicious applications.</li>
<li> <strong>Remove junk:</strong><br />
Use PC Clean Maestro’s scan to remove files considered junk that clog your PC.</li>
<li> <strong>Optimize startup and shutdown:</strong><br />
Review the StartUp Manager and disable unnecessary or unwanted startup apps.  Use “System TuneUp” from PC TuneUp Maestro to optimize both StartUp and Shutdown speed.</li>
<li> <strong>Remove browser add-ons:</strong><br />
Review the add-on list(s) for the default browser and disable unnecessary or unwanted add-ons.  This could result in the removal of annoying popup messages.</li>
<li> <strong>Reset and optimize browser settings:</strong><br />
Reset your browser to factory default settings.</li>
<li> <strong>Registry cleaning:</strong><br />
Use PC TuneUp Maestro’s registry cleaning function to clean and optimize the registry.</li>
<li> <strong>Registry defrag:</strong><br />
Defrag and optimize the registry using PC TuneUp Maestro’s registry defrag feature.</li>
<li> <strong>Hard Drive defrag:</strong><br />
Perform a deep defrag on your hard drive using PC TuneUp Maestro to free up space and improve PC performance.</li>
<li> <strong>Privacy and security scan/clean:</strong><br />
Use PC Clean Maestro to clean privacy and security items.</li>
<li> <strong>System and Internet optimization:</strong><br />
Use PC TuneUp Maestro’s System &amp; Internet Optimization functionality.</li>
<li> <strong>Check and ensure Windows Update is turned on:</strong><br />
Check to ensure that the mechanism is turned on so you receive Windows updates.</li>
</ul>
</div>
<p>If your PC issues are outside our scope of items listed here we will give you our recommendation of taking your PC to a computer shop for hands on repair.  We would also give advice on options related to necessity of repair service and whether the cost of repair is reasonable versus purchasing new.</p>
<h1>PC Repair Shop:</h1>
<p>Be aware – PC repair shops can rip you off!  An easy way to make a quick buck as with our example in this article is to take advantage of a situation where it is difficult to know the root cause of an issue as well as the actual repair effort that went into the fix.  As with any professional that gives you advice and offers their service, you have to ask the right questions up front before any work starts.  Here are the questions you need to ask:</p>
<div class="indent_left">
<ul>
<li>How much do you charge per hour?</li>
<li> How many hours do you estimate this will take to fix?</li>
<li> Do you guarantee your service?</li>
<li> If you run into difficulties can you call me ahead of time to get my approval?</li>
<li> Can you save my data?</li>
</ul>
</div>
<p>What you should expect to get in terms of answers are:</p>
<div class="indent_left">
<ul>
<li>Cost per hour: somewhere in the range of $50 &#8211; 100 per hour.</li>
<li> Time it takes: somewhere within 2-3 hours.  They may need to actually see your PC beforehand but they should give you some estimate of time.  If not – do not employ their services.  If they do need more time for repairs then agreed upon, make sure they contact you ahead of time and get your approval.</li>
<li> Guarantee of service: Yes.  Somewhere in the range of 30 – 90 days.</li>
<li> Call for approval when faced with situations that are beyond the agreed estimate: Yes.</li>
<li> Save data: Yes.  In extreme situations where the PC cannot be salvaged and the files can be accessed, they can be saved to external storage.</li>
</ul>
</div>
<p>Other tips:</p>
<p>Keep in mind that you may have to pay a minimum fee – usually the first hour – just for them to look at your PC.  It’s worthwhile to check into this as well.  Also, check to see what the reputation of the company is beforehand.  AND, as with any professional services – get a second quote for purposes of comparison.</p>
<div class="quick_facts"><strong>Note</strong>: After   you get an estimate take a step back and think.  How long have you had your PC/laptop?  What are the advantages of repairing this   versus buying a new one?  Keep in mind   that entry level PC’s and laptops are becoming lower than $500.  And with entry level computers we are   talking about specifications that exceed what was offered three years ago!</div>
<h1>In Summary:</h1>
<p>At CompuClever we are committed to creating PC utility software that improves the performance of your PC and we also offer support designed to address PC issues related to performance.  You can save yourself time, money, and headaches by looking for solutions that address your PC issues rather than getting stuck with a bill from a disreputable PC repair shop.</p>
<p>We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: <a href="mailto:newsletter@compuclever.co">newsletter@compuclever.com</a></p>
<div class="bottom_p">
<hr size="1" />
<p>&nbsp;</p>
</div>
<p>The post <a rel="nofollow" href="https://www.compuclever.com/posts/diy-vs-repair-shop/">DIY vs. Repair Shop</a> appeared first on <a rel="nofollow" href="https://www.compuclever.com/posts">CompuClever</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
