All posts by Computers Made Simple

10 Ways to Stay Safe Online

Today’s post could be titled ‘The Ten Commandments of Staying Safe Online’ but we didn’t want to confuse people who were googling for the real ten commandments. Staying safe online is based on common sense, there’s no rocket science about it. Use your head and you’ll be safe. If something happens, we’re always ready to help.

Photo of Safe Online
Ten Safety Tips

 

 

 

 

 

 

 

1. Don’t click on email attachments. 

We dealt with attachments earlier this week, explaining what they are and how to avoid getting tricked by a malicious one. Even if the email is from someone you know, double check with them before opening anything that’s attached to an email.

2. Don’t click on links in the body of unknown or suspicious emails. 

Credit card companies and banks DO NOT send emails with links in the body of the email, at least not the ones that we deal with. If you get regular mailings from companies who are sending you updates on merchandise or sales they are having, fine. If you don’t deal with the company that sent the email, don’t click on anything inside it. Even if the email is from a friend, be suspicious. Some friends send or forward all kinds of things, right? Laugh at this, chuckle at that, you know the type. What are you going to miss if you don’t click on the link? Nothing. We can’t think of any reason why you should click on a link anyway. It’s not worth the risk.

3. Use and maintain a good anti-virus program. 

We told you about several free AV programs this week so make sure you’re protected. Lack of money is no excuse. If you’re go online without the protection of AV software, you’re pretty much begging for trouble.

4. Use Google Chrome. 

Not only is Chrome fast, it also updates itself every time you start it and it has a built-in protection from malware sites. If you use Internet Explorer from Microsoft, well, you’re on your own there.

5. Don’t think the Macs are safe from viruses and malware. 

They aren’t. Apple is just as big of a target as Microsoft. Thousands of people around the world are busy 100% of the time trying to find holes in Windows. iOS and all of the software that goes with them.

6. Don’t use torrents to download movies or software. 

Not only is it illegal but it’s also dangerous. Unless your AV software is completely up-to-date, a virus attached to a file that you’ve downloaded can wreck your computer and/or your identity in seconds. Steer clear of torrents!

7. Only download software from trusted sites.

This applies to apps that you get for your mobile devices, too. The software that we mention here is almost always free and we provide direct links to the home page of the people who create the apps. Tucows, a site that’s been around for years, is safe while sourceforge, a site that’s also been around for years, isn’t safe. Sourceforge now adds other software during the installation process while Tucows doesn’t. The added software is usually some kind of toolbar or adware that changes your browser settings completely. If in doubt, ask us first.

8. Don’t share flash drives. If you do, make sure you scan the drive with your AV software before you transfer any files. 

Flash drives are wonderfully handy, aren’t they? If you use them on your own computers, you’re probably quite safe. If you lend them out to your kids or friends, scan the drive before you use any of the files on it. If your children have used a drive on a computer at their school, double and triple check it with your AV software. You’ve been warned.

9. Don’t sign in to your email, Facebook or other social media account just because something asks you to do so. 

If you type in ‘facebook.com’ and then sign in to your account, that’s one thing. Typing your email and password into a pop-up window is something else. There is a good chance that something has hijacked your browser if you get these kind of pop-ups. Don’t be tricked. Always enter the website address yourself. If you happen to accidentally sign in using a pop-up window, close the window, close your browser, open it again and type in the site url yourself. Sign in and immediately change your password.

10. Don’t upgrade your flash player from any website that tells you to. 

That’s why we advise you to use Chrome. Chrome updates its flash component automatically, you cannot do it yourself. If you are on a video site, other than Youtube we mean, and something pops up to tell you that your ‘flash player’ is out of date, don’t believe it. Chrome can play any video from any site on the Internet. You do not need anything else on any site that we’ve seen yet. If you’re using Chrome, your flash player/software is always up to date.

There are many more tips and tricks for keeping safe online but if you remember these ten, you’re well on your way to smooth cruising on the Internet. For more tips and tricks, Like us on Facebook. Here’s the link:

Computers Made Simple on Facebook

Thanks for reading!

Viruses, Malware and Worms, Oh My! – Part 4

Part four in our virus and malware series will deal with free tools to protect your computer from all things nasty. These are our recommendations. If you have some of your own, please let us know in a comment.

Trendnet Housecall

Housecall is an excellent free online virus scan. Sometimes your own anti-virus can be compromised or shut down completely by malware. Head to the site linked above and Housecall will check your computer for free. Download and install a small app then let it run. Once the verdict comes through, you can choose to get rid of anything that Housecall finds. Full instructions are on the site.

Photo of Trendnet Housecall
Free online virus scan. Can’t get much better than that.

 

 

 

 

 

 

 

 

 

 

Microsoft Security Essentials

Microsoft puts out a free package of security products that will watch over your computer as you work, updating itself when it needs to do so. MSE is part of Windows 8 but you have to download it and install it yourself if you’re using other versions of Windows. Click the link above and get it. We use it on several of our computers and recommend it highly.

Photo of Microsoft Security Essentials
MSE is included with Windows 8. If you use Windows 7, download it and install it yourself.

 

 

 

 

 

 

 

 

 

AVG Free

On some of our other machines, we use AVG Free AntiVirus. AVG is fast when it scans and protects any computer it’s on, even Macs. You have to update it every year, as in a whole new version, but that’s a good thing. AVG has pay versions too but that’s up to you. We like free.

Photo of AVG Free
AVG has a version for Macs, too.

 

 

 

 

 

 

 

Malware Bytes

If your problem isn’t from a virus, and it probably isn’t, check out Malware Bytes. The term malware is all-inclusive, including adware, cookies, viruses and many other things that can slow your computer down. If you’ve installed a bit of software and things keep popping up on your screen when you’re surfing, chances are that Malware Bytes will get rid of it. These bad things almost always come with helper apps, things such as toolbars that pretend to speed up your searching or assist you with downloads. No worries. Malware Bytes will find them. Malware Bytes doesn’t work in the background, you have to initiate a scan whenever you think you should. We’d advise that you do this about once a week, maybe once every two weeks but, again, that’s up to you.

Photo of Malware Bytes
Good free protection from malware that’s been installed on your computer.

 

 

 

 

 

 

 

 

That’s a quick rundown on some free bits and pieces that can keep your computer safe from harm. Windows already has a built-in firewall but, unless you are running Windows 8, you must always install anti-virus software.

TIP: You don’t need to pay for this protection. New computers come with trial versions of Norton or McAfee AV products. Here at Computers Made Simple, we delete those products right off the bat. Why? First, they really slow your computer down and, second, they don’t work any better than the free AV software.

Thanks for reading!

 

Viruses, Malware and Worms, Oh My! – Part 3

If you’re confused about what virus, malware, adware, and Trojans, etc. are, here are some definitions for you:

Photo of Trojans Virus and Worms
The big three.

1. Virus 

This is an all -encompassing term but, fortunately, it’s a type of malware that we don’t see to often these days. A virus in a computer performs pretty much the same as it does in a human; it takes over completely, preventing other systems from working. A bad virus in either host can sometimes destroy that host completely. Many viruses were written to simply show the awesome skill of the person who wrote the script. Read that with heavy sarcasm. Some script kiddies , as they are sometimes called, don’t even write their own stuff. They copy scripts from more knowledgeable coders and claim them as their own, often signing their names somewhere in the virus code. These days, this type of individual would rather leave their work unseen and unnoticed by the users that they try to infect, in order to extract as much information as possible from them. A virus seeks to attach itself to as many files as it can on the host computer. This is the activity that your AV software should pick up. It’s the speed of the replication that makes them so very dangerous.

2. Malware

Anything that does damage, extracts private information or uses someone’s computer for purposes unknown to that user could be termed malware. There are many different kinds but, basically, things that do bad stuff to computers are designated as malware.

3. Adware

Adware is not nearly as bad as malware but it is aggravating and frustrating all the same. Most adware is installed with those seemingly helpful toolbars which many companies install with their software. Adware wants you to use a certain page for your homepage, a specific search engine, etc. Adware pretends to help you but, in reality, it only helps the company that installed it on your computer. One of the main problems with adware is that it frequently is missed by your anti-virus software. It’s not really harming your computer and it doesn’t act like malware so your AV program will likely not even notice that it’s running or pick it up on a scan. There are specific programs that seek out and destroy adware and we’ll get into these in a future post.

4. Trojan 

These are things that pretend to be other things, just as the original Trojan Horse pretended to be a gift way back in history. The computer user expects a file to be a certain thing, let’s say a Word document or PDF, but that file is actually the installer for a piece of malware. The unwitting computer user won’t know what’s going on behind the scenes when they click on the infected file. While everything may seem normal and the software may do exactly what the user expects it to do, it has also infected the computer with any one of dozens of kinds of malware. It’s not only hackers that do this. Governments use Trojans to manipulate computers and machinery in countries that may be a threat to them. If you’ve ever heard the term ‘backdoor’ in discussions of malware, this is what a Trojan seeks to install on the host computer. Once the backdoor is up and running, the infected computer can be manipulated without its owner knowing about it.

5. Worms

Probably the most famous computer worm is known as the ‘Stuxnet’ worm, designed expressly to infect Iran’s nuclear engineering projects. A worm is a virus but isn’t quite as bent on destruction as a simple virus is. Worms can do many things but their aim is to sit unnoticed, all the while feeding information out to the installer and, in some cases, preventing devices from performing as they should. If one country wants to eliminate a perceived threat, let’s say from a missile installation, it is possible to have those missiles misfire or go off-course through the use of a computer worm. If you’re familiar with the TV series Battlestar Gallactica from about ten years ago, you’ll remember that the Gallactica, which was not networked,  was the only spaceship which was not infected with the virus that destroyed the defence capabilities of every other networked military ship. Worms work their way from computer to computer though networks, often through updates. Some worms are designed specifically to target certain types of mechanical systems.

Photo of Stuxnet Explained
An explanation of how the Stuxnet worm travelled.

 

 

 

 

 

 

 

 

 

 

 

 

Those are the basics. In our next few posts, we’ll show you how to immunize you and your family from these threats. While dangers do not lurk in every corner of the Internet, there are enough of them out there to make knowing this stuff very important. Tell your friends!

Thanks for reading!