• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

Improve Startup

August 12, 2014 by Andy Thompson

Why settle for a computer that is slow?  Maybe we come to expect that our PC is just not as fast as it used to be – but why?  There are a number of reasons why you are getting poor performance.  We are going to narrow it down in this article to one area of concern: Startup time.  Typically, we download applications and they will by default run when you start your system.  Do you need these to be running every time you start the computer?  It is not likely.  There is no advantage to having them run prior to when you need them and software programs are designed to start very quickly on demand.  Software programs are designed to start very quickly.  So let’s use your available tools to trim this list of startup items.  If there is still an issue with performance we can try out a few other available tools.

Even Microsoft makes the point:

No matter how fast or shiny computers might be when they’re new, they all seem to get slower over time. That state-of-the-art PC you bought last year might not feel like such a screamer after you install a dozen programs, load it with antispyware and antivirus tools, and download untold amounts of junk from the Internet. The slowdown might happen so gradually that you hardly notice it, until one day you’re trying to open a program or file and wonder, “What happened to my poor PC?”[1]

Well… if your PC is suffering from too many installations it’s time for some startup management.  Keep in mind that with many applications you install today – especially free ones – there are most likely add-ons that come with the program.  Add-ons are bundled together with the application you want but you do not need to install the entire bundle.

Tip: Make sure when you install any program you take the time to carefully read every page that comes up during the installation.  We have seen programs include agreements to install software during the license stage where you typically just click “I Agree” without reading the fine print.  When you decline and choose not to install these add-on programs, the installation continues to the application you do want.

Let’s Get Started!

We are going to be using free functionality available in PC TuneUp Maestro.  The Startup Management feature provides access to the applications that launch when you boot your system so you can optimize your computer’s startup performance.  From the list that is provided you can enable or disable items and you can also choose to remove items from the list entirely.

The steps include: Opening the Startup Manager; reviewing the items in the list; and then Enable, Disable, or Remove.

1. Open Startup Management:

Begin by opening PCTuneUp Maestro and go to the “Optimize PC” page as seen in the screen below:

Next, click the StartUp Management link.

2. Review:

There is a list that is provided with all the applications that are launched during the startup process.  The items that appear in the list will look like this screenshot:

You can review any items in the list to make an informed decision about how to best manage each.  This is especially advisable with ones you are not familiar with.

To review a startup application in the list, click the blue link associated with the item.

3. Disable and Remove Options:

From the Startup list, you can check the status of any item in the Select column.  If it is marked as “Disable” then it does not launch when you start the computer – no need to worry.

  1. Disable:  If something in the list is marked as “Enable” you can click the drop down arrow next to it and select: Disable.  The item remains in the list and no longer starts when you boot your computer.
  2. Remove: You also have the option to remove the item altogether but you will see a warning dialog warning you that you cannot use the program to restore it.  This removes the item from the Startup list but does NOT delete or uninstall the application.
Tip: If you see something on this list that is completely unfamiliar and you do NOT plan on using, it is a good idea to uninstall it altogether.  You can use the Uninstaller tool from PC Clean Maestro – a free function of the program – to remove programs and all their components.

Other Troubleshooting Tips:

If you are still experiencing problems you may need to dig a little deeper.  There are other tools available with PC TuneUp Maestro that can improve the situation.  Here is what we suggest:

  1. System TuneUp:   Try the System TuneUp function provided from the Smart TuneUp section (top of the navigation bar).  Make sure the System TuneUp option is checked and then click Start.  There are items that may come up to improve not only the StartUp time but also ShutDown and system speed.
  2. Registry repair:  You can clean and defrag your registry as well.  This can often times result in performance gains.  The registry functions are also found in the Smart TuneUp section.  Make sure the “Registry Repair” and “Registry Defrag” options are checked and then click Start.
  3. Defragment the hard drive:  A poorly performing hard drive can also aggravate the situation with respect to the PC boot speed.  We suggest cleaning any junk files and performing a defragmentation.  Check out our article: How to defrag your hard drives.

In Summary:

We’ve looked at one aspect of PC performance – Startup Management.  This article comes at a good time as we get ready to roll out a new updated Startup Manager that will be released this fall.  The features include:

  • Providing time measurements for each startup program.
  • Categorizing startup applications, startup services, and processes.  The option to enable, disable, and remove applications from the startup process is provided as described in this article.
  • Providing safety ratings and assessments for startup programs.  Users are warned of dangerous or unwanted program that they should disable and remove from the Startup list.

We hope this article has helped gain some insight and offered you some effective strategies on cleaning your PC.  We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com


 

[1] http://windows.microsoft.com

Filed Under: Blog, improving performance, increasing speed, Newsletter, Windows tips

Cookie Time

July 9, 2014 by Andy Thompson

There is one type of cookie that the Cookie Monster would not find appealing – computer cookies. But what are they and what are we to do with them? We are going to expand on what is known as “web” or “browser” cookies that are stored on your PC as a result of online browsing. The benefit to keeping these on your system is minor and they can be used in ways we do not wish. As a result, we pass on instructions on how to safely get rid of them.

This article begins with information about cookies: what they are and what we recommend you do about them.  We will also be covering information related to using PC Clean Maestro.  In this way you are more informed about remaining secure and keeping your information private.

Cookie!

A cookie is a file that is sent from a website when you browse to that site.  Every time you visit the same site the Internet browser sends the cookie from your PC to a server to notify the website of the user’s previous activity.  In this way it is easier to login in to some sites that you have previously visited because your name is already present so you only have to add in your password.  Cookies also track information related to your browsing activities such as items in a shopping cart.  Microsoft states:

Think of a cookie as an identification card that’s uniquely yours. Its job is to notify the site when you’ve returned. While it is possible to misuse a cookie in cases where there is personal data in it, cookies by themselves are not malicious.[1]

Microsoft goes on to mention that they use cookies as they provide information as to how often you visit pages so they can determine what information interests you.  In this way, they provide more of the content you like and less of the content you don’t.  For some websites, you can read this as: providing marketing content in the form of advertisements.  In some cases it means keeping track of items you put into a shopping cart in previous sessions when you did not complete the purchase.

Tip: By knowing the function of a cookies you can have a better idea of what to expect when you remove them.  For example, it’s necessary for you to know your login credentials (user name and password) to the sites you visit beforehand so you can enter them in with each visit.  Or, you can choose to keep only the cookies from websites you trust!

As we mentioned, a cookie tells a web server that you have returned to a specific page.  If you personalize a web page, or you have registered for products or services, a cookie can recall your specific information.  For some people, they may appreciate that this is a simplified way to process your personal information, such as billing and shipping addresses, and so on.  The information you previously provided can be retrieved for you.

There are many reasons a given site would wish to use cookies. These range from the ability to personalize information (like on My Yahoo or Excite), or to help with on-line sales/services (like on Amazon Books or eBay), or simply for the purposes of collecting demographic information (like DoubleClick). Cookies also provide programmers with a quick and convenient means of keeping site content fresh and relevant to the user’s interests.[2]

What are the dangers? It is true – cookies are not malicious in and of themselves.  They cannot run programs that deliver viruses or malware to your PC.  Cookies cannot access your PC.  In terms of security and privacy there is a potential threat.  There are those that say that we commonly reveal our personal information in systems that are designed to provide convenience (frequent buyer cards, automatic payments from our banks, etc.).  These proponents of convenience also point out that in terms of privacy, grocery stores know what we eat, gas stations know what we spend on gas, and banks know what we spend each month.  However… the difference is, with cookies the information is on your PC along with access to your personal and financial data.  It is a vault that holds details you do not want to fall into the wrong hands.  Should someone gain access they could do considerable damage.  Some cookie to be cautious and aware of include:

Supercookies:  These are cookies with a higher level origin such as “.com” or “.co.uk”.  These present security holes and need to be blocked by browsers as they can be used to fake logins or change user information.

Zombie cookies:  These are automatically recreated after a user has deleted them; they remain persistent on your PC.

For a complete list of types of cookies and the known drawbacks see: http://en.wikipedia.org/wiki/HTTP_cookie

What are the options? You can both delete and prevent cookies from being stored on your PC.  Management of PC cookies is something each of us has to decide on.  You will need to examine the trade-offs and benefits.  The sad reality is disabling cookies may result in some web services not functioning correctly and it falls short in making you completely anonymous and web sites can still track your browsing habits.  However, if you have multiple users on your PC and you do a fair bit of online browsing, it is easy to get hundreds of cookies in very short order.  There are reports[3] of acquiring “30 or 40 in a single hour of browsing.”  While there may be some cookies that provide some useful functionality, most of these are for tracking your activities for marketing and advertisement purposes.

While there are options built into your browser (IE, Mozilla, Google Chrome), to disable all cookies from being stored on your PC, we recommend other alternatives.  You can go into your browser settings and list sites whose cookies are to be rejected.  This is a daunting task however compared to periodic removal of cookies.  By using PC Clean Maestro you can easily remove cookies and you can view the list of cookies and choose ones you want to keep – those from trusted sources!

Removing Cookies

Let’s begin.  We want to have the right tools – PC Clean Maestro for one and a good external hard drive for backup.  Safety first!

Best Practices:  #1. Backup Data

As we have stated in our previous article … backup your data!  This article deals with removal – permanent removal – of sensitive and private items.  It is good practice to make a copy of all files that are important to you and safer practice to keep these stored on an external hard drive.

The Steps:

There are three areas to scan and clean using the CompuClever Clean Tool.  We are staying focused on the privacy and security aspects of PC Clean Maestro.  The following instructions detail how to remove items that are a threat to personal security and privacy.

Step 1:  First you need to open the program.  The window will appear similar to as seen below.  We have expanded the Personal Security and Privacy sub-item sections to get a closer look at the items listed.

Step 2:  Select items to scan.  From the check boxes available you can review and clear items you want to not include in the clean process.

Note: You can refer to the help file for instructions on how to use the three-state check box system.

Step 3:  Initiate the scan using the “Start” button.

Step 4:  Review and Clean.  A summary of the scan is displayed including the number of detected items found in each category, the size that can be reclaimed, and a “Details” link.  The link will provide the complete list of items found and the location of each item.  You can clear any selected items before moving on to the next step.

Cookies you want to keep: This is where you can go through the list of cookies.  You can clear items you do not want removed.  These need to be items from known and trusted sources and you know will provide a useful service.

Step 5: Clean.  Click the “Clean” button to permanently delete the selected items.

Note: Once you begin the Clean process, PC Clean Maestro presents a warning dialog when certain privacy items are selected from the Scan results.  This is a preventive step, a safeguard measure, so as to not unintentionally remove items.  Refer to the help file for a description of the warning, the list of items, and recommendations about what you need to do before choosing an option.

Best Practices:  #2. Regular Use of PC Clean Maestro

Create an automated schedule.  Use the Options button in the Main window and select the Clean Scan Schedule.  From here you can configure when you want an automated scheduled scan to run.

Best Practices – Advanced:  #3. Configure Your Browser Privacy

You can configure your browser settings to better restrict the privacy controls.  Refer to your browser settings and look for “privacy” or “security” (or both).  By configuring these settings you choose what items to block or restrict including cookies and Private browsing or Do Not Track (DNT) browsing traffic.  In recent years all major browsers have included a Do Not Track (DNT) option.  This enables a user to choose to not have their online activities tracked.  This applies to Internet Explorer, Google Chrome, Mozilla Firefox, Safari, and Opera.  The one shortcoming of this: “The Do Not Track system is completely voluntary, and there are no legal or technological requirements for its use. As such, not all websites and advertisers will honor the request or may completely ignore it altogether.”[4]

In Summary:

By using PC Clean Maestro you can easily access personal data items automatically stored on your PC.  Any of these items on their own may not constitute a substantial threat.  However, these items together – personal addresses, passwords, account information, and more – can be used together to provide an intruder what they need to gain access to perform financial transactions or use your data unlawfully. Here is a summary of the items that PC Clean Maestro scans:

Personal Security

  • Personal Identity Information: IDs and passwords used for Windows and for Internet access
  • Saved Forms Entry Data: name, address, phone number, credit card information

Privacy

  • Chat & Instant Messaging History: Skype and Windows Messenger messaging content
  • Internet Browsing History: visited URLs, downloads, search history, cached images-Multimedia History: videos watched
  • Windows & Application History: Windows clipboard, document history, applications used
Note: For a complete list including sub items, see: http://support.compuclever.com/index.php?/Knowledgebase/Article/View/47/3/

We hope this article has helped gain some insight and offered you some effective strategies on cleaning your PC.  We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com



[1] http://www.microsoft.com/en-gb/security/resources/cookie-whatis.aspx
[2] http://www.cookiecentral.com/faq/#2.4
[3] http://surfthenetsafely.com/surfsafely5.htm
[4] http://en.wikipedia.org/wiki/Do_Not_Track#cite_note-11

Filed Under: Blog, Internet Explorer, Newsletter, online security, PC Cleaner, PC security, Protect online privacy

Spring PC Cleaning

June 6, 2014 by Andy Thompson

It’s spring time. What a wonderful time of the year. We tend to feel energized from a restful winter season and it’s time to take on chores that were neglected or “to do” items that set the stage for our busy endeavors ahead. One of these tasks is cleaning your PC so that it runs efficiently. Believe it or not this process does not have to be equivalent to tearing one’s hair out and it can be very fast using the right tools. In the end you may have two important chores accomplished – a better organization of personal files and dead weight that we can refer to as “clutter” is removed.

We’re going to start off with some information on clutter and how to assess how much free space you may have on your PC. Keep in mind that you may have plenty of free space and still have plenty of clutter on your PC. Assessing the situation can help in determining how your PC is performing and how well it responds to some clean up!

Clutter – Time to Clean

By “cleaning” we are not talking about throwing away things that may have some importance. We are referring to removing what can be considered clutter and organizing files we want to keep. By doing so we can not only improve the performance of the PC but make our lives a lot easier in terms of accessing the files and data we need.

Step 1: Assess

Assess space needs – how much free space do you have remaining. Most of us take pictures and movie files on our cameras and download them to our computer. These add up over time and need to be stored in a safe place (or at least duplicated to your external hard drive in the event you do have sufficient space).

To assess the file space needs you can do the following:

1. Open the Start menu and select Computer. (Some Windows OS systems label this “My Computer” and with Windows 8 you have to type: “this PC” when on the Start screen and select “This PC” from the search results.)

2. Locate your hard drive. This is Local Disk (C:) or Windows (C:) for most computers.

3. View the free space that is displayed for the drive. Tip: you can also right click on the drive and select Properties to see a pie chart of the used and free space.

For most computers there is typically a large amount of storage for your files and you may have a lot of free space available. If you still feel that it has been a while since you have removed unwanted files and, maybe, you feel that your PC is a bit sluggish in some ways.

Typical symptoms of poor PC performance include:
• Slow startup time.
• Slower times to open programs, save files, close programs, and perform regular operations.
• Computer freezes or locks up. This means that your PC does not respond or stalls as if waiting for you to do something. It can be more frequently experienced when more than one program is running at a time.
• Computer crashes or shuts down on its own.
• Redundant programs can lead to excessive action behind the scene (taking up PC processing).

If your feel any of this applies to you and you want to take advantage of a clean PC system, we highly recommended removing clutter from your PC.

Step 2: Backup

Begin by backing up and organizing files (media files especially) that need to be put on to an external hard drive. This article deals with removal – permanent removal – of unwanted items. The key is “unwanted”. We strongly recommend that you make a copy of all files that are important to you. The price of external hard drives makes this a no-brainer and hard drives available these days are often more space than what the average person needs – some are now terabyte in size (1,000 GBs). The added advantage of having a good backup and storage strategy is that you are working toward optimizing free space on your PC.

Recommendation: Try out Microsoft’s Sync Toy. This free tool makes synchronizing your files fast and easy. You can avoid duplication and feel assured that you haven’t missed backing up all your files.

Step 3: Deal With the Junk:

There are files that get onto your computer without us even knowing how they got there. Here’s how they likely got there:

  • Unwanted files get stored on your PC when you browse the Internet. Web browsers produce caches of files when you surf the net.
  • Unwanted files get stored on your PC during downloads. Programs create Temp folders and files to temporarily use during an installation.
  • Remnants remain when you uninstall. Items are not always removed when uninstalling programs. This can happen even after you have successfully completed the un-installation of a program. These are sometimes referred to as “orphan” strings and files which are left in the registry and on the hard drive.
  • Getting files in email attachments and installing applications from the Internet. Some of these become outdated or are not put into use.

These unwanted items build up from regular day-to-day activities.  The result of too many junk files and unnecessary programs is that these items take up disk space and can use available memory thereby resulting in PC slowdown and unexpected behaviours.  Maybe the real question though is: how do you best remove these especially when considering that it is a task that you need to do periodically – it’s not a one-time fix.

Use the Right Tool

We are looking at simplifying the process by using automated tools that do the job quickly and efficiently.  PC Clean Maestro is designed to clean and remove unwanted items such as recycle bin items, temporary Internet download files, items in the Windows Temp folder, and other cache and system files.  All of these items and more can be scanned and cleaned.  After performing a quick scan a complete summary is provided and the total size of the junk items is tallied up.  In some cases, this can add up to gigabytes of “junk” and can account for 5 -10% of your disk capacity.

With PC Clean Maestro (the free functionality of PC Clean Maestro) you can remove junk files and uninstall programs so as to free up space.  By doing so you clear up PC clutter which can bog down the system and lead to poor system performance.  Some best practices are provided so that your experience can be simplified and more trouble-free.

Note:  If it has been a while since you last opened your PC Clean Maestro you may have a message displayed asking you to update to the latest version.  Receiving free updates are part of what is offered with the registered version package and the update is fast!

The Instructions: There are three areas of cleaning that can take place using the Clean Tool.  We are staying focused on the free aspects of PC Clean Maestro.  The following instructions detail how to remove Junk files from your PC.

  1. First you need to open the program.  The window will appear as seen here:
  2. Select items to clean.  We are going to focus on Junk items only so clear the checkboxes for Personal Security and Privacy.  You can then review and select any of the items in the Junk section (Installer Files, Log Files, Temp Files, etc.).
    Note: You can refer to the help file for instructions on how to display all the individual items that are categorized.  You can also get information on the three state check box system.
  3. Initiate the scan using the “Start” button.
  4. Review and Clean.  A summary of the scan is displayed including the number of detected items found in each category, the size that can be reclaimed, and a “Details” link.  The link will provide the complete list of items found and the location of each item.  You can clear any selected items before moving on to the next step.
  5. Clean.  Click the “Clean” button to permanently delete these junk items.

Best Practices:

Create an automated schedule.  Use the Options button in the Main window and select the Clean Scan Schedule.  From here you can configure when you want an automated scheduled scan to run.

In Summary – Lean & Clean:

We’ve covered the basics of cleaning your PC and we’ve introduced one aspect of PC Clean Maestro.  It’s also great to know that anyone can use all the functionality presented here for free.  There are many other features relating to security and privacy that are available for registered users and we will provide steps and tips on how to use these in our articles.

We hope this article has helped gain some insight and offered you some effective strategies on cleaning your PC.  We will continue to provide story lines like this that benefit all of us and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com

Filed Under: improving performance, increasing speed, PC Clean Maestro, PC Cleaner, Uncategorized, Windows tips

Tech Support Fraud

April 9, 2014 by Andy Thompson

Have you ever played that “Whac-A-Mole” game?  It’s the one where moles pop up out of a hole and you bonk them on the head and down they go.  It doesn’t matter how many you bop on the head – they keep popping up.  That’s pretty much how it is with fraudulent phone call scams.  There have been some fines handed out to companies and individuals engaged in these scam activities, but they still keep popping up again and again.  If you have ever had one of these phone calls you would agree – the callers are convincing. 

We’re going to start off with a description of how this scam works followed by legal action taken against the scammers, and recent activity.  Following this we will offer advice in terms of what to do when getting called and what to do if you or someone you know has already had a call and been the victim of technical support fraud.

Description

A tech support scam involves a variety of “confidence tricks” that include part-truths, outright lies, and some aggressive sales pitches.  It typically involves someone calling you on the phone and posing as a computer support technician, quite often, from a well-known and reputable company.  For example, Microsoft’s name gets thrown in during the early going of the phone call.  Other times they pose as support technicians from security companies like Symantec or McAfee or from computer manufacturers such as Dell.  The next part of the call moves quickly, most likely to avoid you asking anything about their credentials. They begin to dupe you into believing your computer is infected by taking you on a wild goose chase on your PC.

Fundamentally, this is where many people who have not heard of this kind of scam will succumb as they feel that someone, that is technically capable of offering assistance, is here to improve their computer functioning in some manner.  Quite often what the caller will do is to guide you through opening up folders to a location on your computer where you can view a Windows log of errors.  Suffice it to say, all Windows operating systems record errors that are harmless and can be considered low-level errors that are not particularly harmful.

Now the sale pitch begins and the caller instructs you to download software or to allow them to remotely access the PC.  The con artists will charge for their “help” and have you pay them for useless software.  Often the software is not only worthless, it may include malicious software designed to steal online account information and passwords.

An Example: 

To see a video  example of a tech support scam in action we suggest checking out a video created by a  senior security technician, Jerome Segura, who gets a call and not only plays along with the scam but records it in action.[1] If you want a written description of a call that was stopped short in its tracks… read on.

What They Get

First, let’s take a look at what you get out of this exchange.   While you may think you get a better performing PC and some peace of mind, what is more likely is you haven’t gained much of anything or you have put yourself at risk.  It’s quite often the case that the software they downloaded to your computer is typically something that can be downloaded for free or they have created it but it does not remove malicious software at all.  In fact, there is a potential that the software is malicious.  It may be designed to provide remote access to your computer at any time and provide the scammers with the means to gain access to your personal and financial information.

No matter what the payoff is – the goal is to make money from the transaction in some manner.   So who is the target and for how much?

…tens of thousands of English-speaking consumers in the United States, as well as Australia, Canada, Ireland, New Zealand, and the United Kingdom, were conned by bogus technical support operations–largely based in India–into paying between $49 and $450 for fake services.[2]

Refund scams:  Another scam involves having paid for tech support services and getting a call about a refund.  In this scam the goal is to get your personal financial information, like your credit card or bank account number.  Sometimes it will be several months after the purchase before you get a call asking if you are pleased with the service.  When you state you are not, they offer you a refund.  Alternatively, the caller may start by saying that the company is going out of business and is providing refunds for warranties and other services.  No matter how it starts out, eventually you are asked for a bank or credit card account number or you are asked to create a Western Union account.  They might even offer to assist you by remotely accessing your computer to help you fill out the necessary forms.   Instead of putting money in your account, they withdraw funds.

Taking Action – FTC

The Federal Trade Commission, or FTC, is an independent US agency that works for consumers.  Its mission is consumer protection; to prevent fraudulent, deceptive, and unfair business practices.  The FTC also provides information to help spot, stop, and avoid fraudulent acts.  To this end the FTC has launched a major international crackdown on tech support scams.

At the request of the FTC, a U.S. District Court Judge has ordered a halt to six alleged tech support scams pending further hearings, and has frozen their assets.  “The FTC has been aggressive – and successful – in its pursuit of tech support scams,” said FTC Chairman Jon Leibowitz. [3]

The FTC chairman at the time went on to say that “tech support scam artists we are talking about today have taken scareware to a whole other level of virtual mayhem.”  In May 2013, fines were handed out to three of the alleged perpetrators.

Recent activity

To be clear – this scam goes back several years but it picked up speed around 2010 and continues to go strong despite FTC efforts to the contrary.  In fact, in 2011 Microsoft warned Windows users to be on guard and were instrumental in having the FTC file charges against the six scam operators mentioned above.  Despite the fines that were imparted, the scam persists and more operators are working the same scam.

More than a year after the U.S. Federal Trade Commission (FTC) heralded a major crackdown on fraudsters posing as Microsoft technical support personnel, consumers continue to receive calls from scammers.[4]

What are the Odds? You may ask: What are the chances that I will get one of these calls?  During the writing of this article this author had received a call with a phone display of: “Colorado 303-442-9287″ It wasn’t the first time receiving a fraudulent call and while wanting to “play along” like what Jerome Segura did in the example above, a different approach was taken.  The call went like something this:

Scam Caller (with a foreign accent): “Hello my name is ——— ———- and I’m calling from Microsoft Windows about a problem with your computer.  Are you near your computer?” 

Author: “Can I get your name and contact information… your phone number?”

<pause>

Author: “You know… it’s a coincidence that you are calling.  I am writing an article about tech support fraud.  And, I know this is a tech support fraud call.”

<no response>

Author: “What you are doing is unethical.  I know that this is a scam and it is unethical.”

Caller: “We sell software to remove malware.”

Author: “I work for companies that sell legitimate software and what you are doing is tricking people into buying software.  It’s unethical.”

<another pause>

Author: “Are you still there?”

Caller: “Yeah.”

Author: “For seniors and for people that do not know better… they are tricked into buying software and it is unethical and in some cases illegal.”

Caller: “Yeah.”

Author: “I have to go” <I was in the process of putting my one year old to bed> “I hope that you can find a better job and I wish you luck in doing so.”

Caller: “OK”

How to Spot the Scam:  In this case, the call display number seemed to be legitimate.  But, it is important that you do not rely on caller ID alone to authenticate a caller as criminals can spoof caller ID numbers.  That is to say, they may appear to be calling from a legitimate company or a local number, when they’re not even in the same country as you.  This explains why it sounds as though English is their second language.

Also, it is very rare for Microsoft and most legitimate businesses to make unsolicited phone calls.  In a statement provided by Microsoft they clearly state[5]:

Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes. 

There are some cases where Microsoft will work with your Internet service provider and call you to fix a malware-infected computer…  These calls will be made by someone with whom you can verify you already are a customer. You will never receive a legitimate call from Microsoft or our partners to charge you for computer fixes.

One of the best ways to detect that this is a scam call is how quickly they proceed.  Within the first minutes of the call they will instruct you to your computer and either provide directions or they will ask to control your PC remotely.

What to do…

To fight back, many people try to tie up the callers on the phone for as long as possible or even provide them with fake credit card numbers.  We would not recommend stirring the hornet’s nest.  We have heard payback stories such as having telemarketing phone calls re-directed to your phone number.  It’s far better to be prepared and to defend your ground.

1)    When getting a call:

  1. Who is it? This is the first defense against this scam attack.  According to the law, telemarketers must tell you it’s a sales call, the name of the seller and what they’re selling before they make their sales pitch.  If you don’t hear this information, say “no thanks,” and get off the phone.
  2. When are they calling? According to the law telemarketers can only call between 8 am and 9 pm.
  3. What’s the rush? Telemarketers and scam artists work with momentum.  There is no hurry on your part.  If you are dealing with a legitimate business they will give you time and can provide written information about an offer before asking you to commit to a purchase.
  4. Is it free? Make sure there are no costs.  Often they could be offering something for free but you have to pay for other costs such as support or services.   Some of these scams will go as far as instructing you to pay in order to redeem a prize or gift.
  5. Do I give out my billing information? In some cases the caller will be asking you to confirm the billing information they have on file for you.  Do NOT give out your billing information or your credit card information!  Don’t even confirm that the information they have is correct or they can claim that you approved of the charge.

To Prevent Getting These Calls:  Tell the caller you do NOT want them to call you again.  You can also enter your phone number on the FTC Do Not Call registry (https://donotcall.gov/).  If they call back, they’re breaking the law and you can register a complaint on the same site.

2)    Already had a scam call:

  1. Malware? If you feel that someone has downloaded software that is malicious, you need to take action to identify and delete the software using a legitimate security solution.  Get started by going here: http://www.consumer.ftc.gov/articles/0011-malware
  2. Passwords? If you gave out any passwords to your PC login system or for online banking – change these passwords immediately.
  3. Credit Card? If you used your credit card to pay for software, services, or for any shipping charges – call your credit card company and reverse the charges.  Check your statement or have the credit card provider check for any charges you did not make and ask to have those reversed as well.
  4. Identity Theft? This involves having your personal information stolen and used without your permission.  “It’s a serious crime that can wreak havoc with your finances, credit history, and reputation.”  Go to this site for more:  http://www.consumer.ftc.gov/features/feature-0014-identity-theft

File a Complaint:  The FTC offers a complaint assistance site here: https://www.ftccomplaintassistant.gov/#crnt&panel1-1

More “Do Not” Tips:
Here are some basic tips to help in all sales transactions where you feel pressured to pay – even if there is a free gift involved. 

  • Do not give into pressure – you do not have to make a decision right away.  Pretend you have a “phone-a-friend” lifeline and call a family member.  Or, ask the caller to email or send you mail about the details of the sale. You can also research offers (with the US consumer list[6] or the BBB[7]) before you agree to send money.
  • Do not give out your credit card, banking information, or social security number.  Do not even confirm any of this information if they have it and are asking for confirmation.
  • Do not send cash by money transfer, messenger, or overnight mail.  If you use cash or a money transfer you can lose your right to dispute fraudulent charges and the money will be gone.  Credit card companies offer some means of defense through a dispute process.

Who Can You Trust

There are companies that work hard to build an ongoing relationship with their clientele.  We at CompuClever count ourselves among these reputable businesses.  We recommend that you check out more about the companies you deal with by going to their “About Us” page on their website.  With CompuClever we accentuate the role of our support and service team for paid customers and we benefit from dealing with issues that come up on your PC system.  Take it from us when we say:

Our knowledgeable and friendly Support team is devoted to provide the utmost excellence in customer service. Simply put, we pride ourselves in serving your computing needs and bringing enjoyment to PC computing.

We hope this article has helped gain some insight and offered you some effective defense against these kinds of scams.  We will continue to investigate story lines like these that affect each of us on a daily basis and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com



[1]http://www.wired.co.uk/news/archive/2013-04/11/malwarebytes
[2]http://www.informationweek.com/security/risk-management/ftc-disconnects-tech-support-telemarketing-scams/d/d-id/1106662
[3]http://www.ftc.gov/news-events/press-releases/2012/10/ftc-halts-massive-tech-support-scams
[4]http://www.computerworld.com/s/article/9244207/Fake_Windows_tech_support_calls_continue_to_plague_consumers
[5]http://www.microsoft.com/security/online-privacy/avoid-phone-scams.aspx
[6]http://www.usa.gov/directory/stateconsumer/index.shtml
[7]https://www.bbb.org/

Filed Under: Newsletter, online security, PC security, Protect online privacy

Facebook Uncovered

March 12, 2014 by Andy Thompson

There is a real and strong allure to joining the crowd on Facebook. Its popularity and set of features makes email look like VHS in comparison to DVD. But… make no mistake – this is a sticky subject. There are many criticisms that have surfaced and we will attempt to sort through these. In doing so, we will avoid getting caught up with information overload.  Ultimately each person has to weigh out the pros and cons to make a decision for themselves.

We’re going to start off with a brief description of the history of Facebook and its popularity.  From there we present a like and dislike feature set – thumbs up and thumbs down.  After that we will offer some general recommendations and alternatives.

First Look

On February 2004, Mark Zuckerberg founded Facebook with his college roommates and fellow students at Harvard University.   At first it was limited to Harvard students, but expanded to include colleges in the Boston area and then gradually it included support for students at various other universities before being open to high-school students and then anyone aged 13 and over. When registering for a Facebook account, the user needs to claim being 13 years or older although proof of age is not a requirement.  A valid email is required however.  You can then proceed to create a “personal profile” – personal data and a profile image that identifies you to other users.

Once you are an active user you can begin to add “friends” who are also on Facebook and you can exchange messages. You also are able to join groups that you identify as sharing a common interest.  To date, Facebook has over one billion users although numbers are difficult to ascertain as some of these are considered fake.  We’ll cover that later in the article.  Suffice it to say:

Facebook is the top social network on the web. Nothing quite compares to it… With all the changes it has gone through over the years and the recent roll out of the Timeline profile, Facebook has always remained one step ahead of everything else on the web.[1]

With respect to its value, in January of this year its market capitalization rose to over $134 billion.  There are over 1.2 billion active users on the site every month and more than 75% of these are mobile device users.  As of February 3rd, the company celebrated its tenth anniversary.

On Top or Losing Ground?

While Facebook is the top social network at present, one study[2] has shown that teenagers are making the move to other social networking services.  While older users continue to saturate Facebook, younger users are making a shift.  This younger age group is not so concerned about whether the alternative services are on par or better, and they are not concerned about whether their personal information is being used commercially or as part of surveillance practices.  It would appear that the biggest motive is that youth of this age group are getting friend requests from their parents and are looking for more freedom to express themselves.

However, for those over 18 in the U.S., Facebook remains the king of social networking.  It is reported[3] that 71% of adults in the U.S. are using Facebook and among those that only use one networking site, 84% are choosing it as their sole social network.

Thumbs Up

With that many people onboard it’s got to be a good thing right?  Well let’s point out some of the positive aspects of social networking and Facebook.

Connected:  While many of the posts and newsfeeds are full of items that are specific to one person and speak to what they are having for dinner or some sporting event they are attending, there are news feeds that relate to current events, personal health tips, and social injustices that may not be covered by news media.  This form of passing news stories is gaining acceptance as even mainstream media reports on the particular social news items that go “viral” in terms of being shared by many people worldwide. Many of these items are posted in an attempt to gather as much “likes” as possible and to simply be shared perhaps in an attempt to be noticed.

Regardless of the content, it is a way of being connected to what over a billion people find interesting.  Some of the news items may not even be covered by top media broadcasting corporations.  The fact is, Facebook is a way of connecting:

On January 2014, during the week previous to the company’s tenth anniversary, chief operating officer of Facebook, Sheryl Sandberg, clarified: “He [Mark] always said Facebook was started not just to be a company, but to fulfill a vision of connecting the world”.[4]

Another benefit to Facebook users is being able to reconnect with friends you might not have seen since your early high school days.  For some, this may not be such a desired feature depending on who sends you a friend request.  However, it does provide the ability to do a search for long time friends you may have lost touch with.

Rights and Responsibilities:  Facebook clearly points out the agreement between you and them in a Statement of Rights and Responsibilities.[5] In this they state that your “privacy is very important” and they provide a link to the Data Use policy.  If you go down the rabbit hole you can get to the page: “Information we receive and how it used”.[6] It is a long page of information but you can get a full description of the data that you make available to Facebook and how you can choose to adjust your settings so that it is shared by the public or shared only among friends or some customized filter.  The real issue for some people is this one item:

For content that is covered by intellectual property rights, like photos and videos (IP content), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook (IP License). This IP License ends when you delete your IP content or your account unless your content has been shared with others, and they have not deleted it.

Two positive aspects can be stated here: for one, Facebook is very thorough in laying out these terms.  With some items such as safety, account security, and protection of other’s rights, Facebook points out that they cannot do it alone (for example, they cannot guarantee to keep Facebook safe).  They elicit the commitment of their users to not bully, to not post content that is hate speech, pornographic, or is violent.  They ask that upload material is free of multi-level marketing, viruses, and malicious code.  They also emphasize that you will not post other’s personal identification or sensitive financial data.  The list of these items is a lengthy one and, while there is some policing of what is displayed, to a large part the ethical participation of its users is required.  Secondly, these terms can, and have, been subject to change based on user feedback.

Creation of Groups:  Say you have a group of people you want to connect with – family, friends, a social group of some kind.  You can easily create a group and invite them to join.  Once everyone is all aboard you can have a central place to swap stories, post links, and share photos and video.  This is so much easier than trying to get messages to a group by email.  The down side… everyone needs a Facebook account and not everyone wants to join up for one reason or another.

With this in mind… we look at the aspects of Facebook that are not favorable.

Thumbs Down

There are a few items that stand out as being difficult to some people when signing on and getting tangled in the Facebook network and these need to be understood.

Backing out:  While there are a few hoops you have to jump through to get a Facebook account started, we find opting out to be even a greater challenge.  When you want to deactivate your account your profile and “Timeline” disappear and people will not be able to search for you.  However, there is some information that remains including messages you have sent and Facebook saves your information including friends, photos, interests, and the like.  They do this in case you change your mind and want to come back.  To permanently delete your account “with no option for recovery” you have to log in and contact them.  What users have found is that they need to manually delete the content that they have posted and shared.  As pointed out by Wikipedia[7]:

In the lifespan of its service, Facebook has made many changes that directly impact its users, and their changes often result in criticism. Of particular note are the new user interface format launched in 2008, and the changes in Facebook’s Terms of Use, which removed the clause detailing automatic expiry of deleted content. Facebook has also been sued several times.

Zeus:  A report last year[8] pointed out how a somewhat nasty malware called Zeus, was being used from Facebook.  Zeus is a Trojan horse that stays dormant on your computer until you log into a bank site and then it steals passwords and empties the bank account.  Facebook was notified of this but according to the report their response was not sufficient.

Fake Accounts:  There are many reports about fraudulent Facebook accounts.[9] In these situations, an imposter uses another person’s profile such as name, photo, and personal information in an attempt to access the victim’s friend list.  The reasons for doing this can include attempting to data mine you or even to attempt an emergency scam with your friends and family. For example, “This is Joanne. I’m in Cancun and I just got mugged and need some money sent to me right away”).  If this happens you need to report it to Facebook (https://www.facebook.com/help/167722253287296/) right away.

Fake Likes: One other area of criticism is how Facebook’s revenue is based on false likes.  There are those that may want to promote their Facebook page so that more people can view it.  Pages can be created by businesses or individual creators.  The creators of these pages post items and these posts can appear on other Facebook member’s news feed.  However, they can also be filtered out based on what you have previously disliked and liked.  This means that your posts that you create to share with your online community could be going out to only a small subsection of your overall friend’s network.  Posts about baby’s and weddings get the most likes and comments.  Facebook offers the option to pay for greater exposure but critics[10] claim that these “likes” are coming from developing nations and there isn’t a real interest in the page.  While filtering is necessary so that you do not see 1500 posts each day, some suggest that the algorithm logic for this filtering does not provide diversity and a random selection of items.

The Rest of the List:  A list of criticisms is sited in Wikipedia, several of which have been from concerns raised in previous years of operation.  The list includes the following:

  • Widening exposure of member information.
  • Cooperation with government search requests  (Facebook participated in the NSA Prism project).
  • The possibility of data mining and surveillance.
  • Facebook addiction.
  • Psychological effects such as bullying.
  • Identity theft (it is very easy to create an account and impersonate another individual).
  • Security issues such as a trick referred to as “likejacking”.

It would take considerable research and follow up to see what steps Facebook has undertaken to improve these issues.  As stated they do respond to feedback and we can only hope that they continue to do so.  Ongoing research looks to gain deeper insight into the social effects of Facebook.  From the same wiki page:

Many studies have attempted to discover whether Facebook has a positive or negative effect on children’s and teenagers’ social lives, and many of them have come to the conclusion that there are distinct social problems that arise with Facebook usage.

Ownership and Use of Content:  There have been many who have stated their disapproval of Facebook because what they believe to be a loss of ownership of data when posting or sharing.  It should be clear that Facebook states in their Statement of Rights and Responsibilities, that users retain ownership of posted content.  What needs to be clear is that users grant Facebook the following: “you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook”.  This is why deletion of content is so important to those who want to delete their account and remove all personal information.

Alternatives

There are alternatives to Facebook.  Here is a short list (and we do mean short list – these networking sites pop up very frequently).

Google+: This is a fairly good alternative to Facebook with similar features and it is the second largest social network in the world.

Pintrest : Create and share visual “bookmarks” for planning trips, sharing recipes, organize events and more.

MySpace: Owned by Justin Timberlake this site has a strong music emphasis.

Reddit : Participants submit links and posts that are voted on to determine the position of the post on the site’s page.

Twitter: Good for texting messages limited to 140 characters.

LinkedIn: A social network for professionals.

Keep in mind that alternatives to Facebook will take time to get used to if you are accustomed to Facebook.  Also, you may not get the same level of friends that you can connect with.  This is likely why there are those that are signed up on more than one.

The Final Chapter:

Social media tools such as Facebook offer such potential in terms of correspondence, staying informed, and participation in online community.  The challenge is to take part in shaping it as it evolves.  The information that is particular to each of us personally and to the members of our families needs to be regarded with reverence and handled with privacy.  We can shape these tools to meet our needs with ongoing feedback.

Considering the time and effort a person can dedicate to these and to staying connected to others via mobile devices… is it any wonder there is growing concern about levels of real, face-to-face social interaction?  Is it any wonder this is generating considerable research?  Is there any wonder that some people question how meaningful online friendships are when having up to, or over, 1000 friends is the norm?  And is it any wonder that there is some doubt as to how well we are able to function without the steady influx of digital information?  Likely the best we can do is to get onboard but to give ourselves real and meaningful breaks from the pull of networking on a massive scale.

We hope this article has helped gain some insight about a rather all-encompassing and dichotomous subject.  We will continue to investigate these kinds of story lines that affect each of us on a daily basis in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com

 


 

[1] http://webtrends.about.com

[2] http://www.theguardian.com

[3] http://techcrunch.com

[4] http://en.wikipedia.org/wiki/Facebook

[5] https://www.facebook.com/legal/terms

[6] https://www.facebook.com/about/privacy/your-info

[7] http://en.wikipedia.org/wiki/Criticism_of_Facebook

[8] http://bits.blogs.nytimes.com

[9] http://www.bbb.org/blog/2013/07/

[10] https://www.youtube.com/watch?v=oVfHeWTKjag#t=198

Filed Under: Blog, Newsletter, online security, Online Share

  • « Previous Page
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • …
  • 30
  • Next Page »

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.