Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Creating Users

May 12, 2014 by The T By D Team Leave a Comment

imageDear Geek,
I bought a new computer for home. I sometimes take some work home, but mostly I want to write some Star Trek poems-from Spock’s perspective. My Mom says because it’s in her house, she has partial ownership too. I don’t want her messing up my poems while looking for new spaghetti sauce recipes, which by the way mom, the last one is still good.
Is there a way to keep her stuff separate from mine?
Sincerely,
SpockLovezSpaghetti

Dear SpockLovesPoetry,

The best way to do this would be to make her a user on your computer. This way, she has her own place for her recipes, and she can’t mess around with your stuff unless she really tries.

This can be done pretty easily. First, you open the Windows control panel. Then click on “add or remove user accounts”. It will then ask you what you’d like the user account to be named, so something like “Mom” would work. It will also ask you what sort of account you’d like this account to be. Most people stick with making additional accounts as “standard users”. This is so the additional accounts cannot make a bunch of administrator changes to the system. Last step is to click “create account”.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

Phone calls from Microsoft

May 5, 2014 by The T By D Team Leave a Comment

imageDear Geek,
I got a phone call from Microsoft Support. They told me I have a virus! They were going to help me remove it, but I told them I didn’t have time. They said they would call back. Is there a way to get this virus off without them tonight?
Sincerely,
Support

 

Dear Scammed

Microsoft Support, Facebook, Windows Support, Norton, Dell, ect, will NOT call you. This is a phishing scam, hoping to take over your computer and or get some of your important information.

They will give you a website to “allow them to have remote access to your computer so they can remove the virus”. When you go to this website, it will either download a virus or malware to your computer, give them remote access to your system, or lead to a landing page asking for information such as credit card numbers or usernames and passwords. All three can be bad for your information.

In downloading a virus, the hacker do things such as open back doors to allow access to your system at any time and log your keystrokes (getting them all the information you type in). Remote access to your system can allow them to get this onto your system as well. Some fake error messages may pop up on your computer, having nothing to do with what they are actually doing.

You may have a virus, but it has nothing to do with what they are telling you, guaranteed. Best thing to do is to run virus scans regularly, or have a company such as Technology by Design monitor your system for viruses.

Got a question for the Geek?  Email:  geek@tbyd.ca

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

 

Filed Under: FAQ, Featured

ALERT: CryptorBit

April 30, 2014 by The T By D Team Leave a Comment

Lock-icon

ALERT:  CryptoBit

 

CrypoLocker and CrytoDefense were making enough trouble for users, and now there is a third strain of Ransomware?

 

This strain is called CryptorBit, or HowDecrypt, and it follows a similar attack to CryptoLocker, but instead of corrupting certain types of files, this malware corrupts the first 512 or 1024 bytes of any data files it finds. It also seems to be able to bypass Group Policy settings that were put in place to defend against this kind of Ransomware injection.

This strain of Ransomware also installs a “cryptocoin miner” software which uses the victim’s computer to mine digital coin such as BitCoin, which then gets deposited into the malware developer’s digital wallet, earning them even more money.

Once the CryptoBit malware has had a chance to infect your files, it asks for a ransom of about $500 in BitCoin in order to decrypt the files. If the ransom is not paid, the files on your computer will remain corrupted and unusable.

Technology by Design recommends regular backups in order to ensure your files are saved in the event of a Ransomware attack. If a backup was made before the files were corrupted, it might be possible to save yourself $500+ dollars! Ask Technology by Design about how scheduled backups can help you, and how you can protect yourself from Ransomware!

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: XP Vulnerability

April 29, 2014 by The T By D Team Leave a Comment

xp

ALERT:  XP Vulnerability

If you are reluctant to change the OS (Operating System) that is running on your computer(s), take note!
Holes in security are already starting to show…

There are already some issues with XP that are a result of the ending of support to the operating system. The biggest issue with XP so far is a bug found in Internet Explorer dubbed “Operation Clandestine Fox.”. This bug in the browser allows hackers to access your system and view, alter, or delete files.  It also allows them to download malicious programs, and make users so they have full access to your computer.

Microsoft said that there will be a security update to ensure that this bug is fixed, but only for Windows 7 and 8.  It will not cover Microsoft XP.  Any future security updates will not apply to Microsoft XP as well. This means any more problems in the future will be taken care of for Windows 7 & 8 only.  Microsoft XP will not have access to these updates, and any computer system that is running Windows XP (and its data/information) will be left open to attackers.

If you would like some more information on the ending of XP support, we can help you make a smooth transition to an up-to-date (ie supported) OS.  For more information, call 204-800-3166, or email helpdesk@tbyd.ca

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS

Checking Your Version of Windows

April 28, 2014 by The T By D Team Leave a Comment

Want to know what version of Windows you are running to ensure that your data is not at risk? The Geek shows us how to check the current version of Windows- through video!

Filed Under: Featured, How To Videos

How to Password Protect Your Computer

April 28, 2014 by The T By D Team Leave a Comment

Have annoying coworkers or family members who change your background to My Little Pony or the Beibs every second day? Want to lock them out? Us too. The Geek will show you how.

Filed Under: How To Videos

Stuck on XP

April 28, 2014 by The T By D Team Leave a Comment

imageDear geek,
I know Microsoft XP has ended, but I really don’t want to spend money for a new operating system. There hasn’t been any issues with XP yet, has there? Is it really necessary to switch?
Sincerely,
Still reluctant

Dear (soon to be) hacked,

Yes, and yes. There are already some issues with XP that are a result of the ending of support to the operating system. The biggest issue with XP so far is a bug found in Internet Explorer dubbed “Operation Clandestine Fox.”. This bug in the browser allows hackers to access your system and view, alter, or delete files.  It also allows them to download malicious programs, and make users so they have full access to your computer.

Microsoft said that there will be a security update to ensure that this bug is fixed, but only for Windows 7 and 8.  It will not cover Microsoft XP.  Any future security updates will not apply to Microsoft XP as well. This means any more problems in the future will be taken care of for Windows 7 & 8 only.  Microsoft XP will not have access to these updates, and any computer system that is running Windows XP (and its data/information) will be left open to attackers.

If you would like some more information on the ending of XP support, give us a call, and we can help make the change an easier transition.

Got a question for The Geek?  Email:  geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

Leaving computers on

April 21, 2014 by The T By D Team Leave a Comment

computer power buttonDear geek,
I turn my computer off every time I leave it for more than 10 minutes. A coworker noticed when I went on lunch that I had turned it off, and asked why I don’t just leave it on. Is there really a benefit to turning it off all the time? Won’t leaving it on all day, everyday break it?Sincerely,
Powered off

Dear powerhouse,

Prior to about 1993, there was an issue with the power switch with some computer manufacturers if you left the computer on for too long, so many people would insist that you turn your computer off if you were going to be away from it for more than a few minutes. Today, this is not an issue.

With the issue of potential damage no longer an issue, the only other issue is power conservation. If you are leaving a computer on overnight in order to run a virus scan or backup once in a while, it should have very little impact on your electricity bill.  However, in an office with a hundred or more computers, leaving every computer on overnight could result in a higher electricity bill.

Computer virus scans and backups both tend to run at night. This means that if your computer is turned off, it will not scan or backup properly, which is not a good thing. If you are turning your computer off at night, it is important to schedule these things to run at another time- like on your lunch break.

 If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

ALERT: Heartbleed Bug

April 10, 2014 by The T By D Team Leave a Comment

Heartbleed Bug

ALERT:  Heartbleed Bug

Internet security experts are scrambling to patch an alarming encryption vulnerability that has exposed millions of passwords and personal information, including credit card numbers, email accounts, and a wide range of online commerce.

 

Some reports as many as two-thirds of sites on the internet are using OpenSSL – the encryption code that we now know is flawed and vulnerable to so-called ‘Heartbleed’ attacks.

What Sites You Should Be Worried About:

The Canada Revenue Agency website is shut down, and not expected to be open again until at least the weekend.  The CRA says this move was precautionary, because there is no evidence of a breach.

Canadian Banks, airlines, and online retailers such as Amazon.ca, Walmart, and Indigo Books all said they were NOT affected by the bug.

The online new site Mashable has an extensive list  of other affected sites.  

They suggest you should immediately change your password if you use any of the following:
  • Facebook
  • Gmail (or other Google services)
  • Tumblr
  • Yahoo mail
  • GoDaddy
  • Intuit (TurboTax)
  • Dropbox
  • LastPass
  • OkCupid
  • Soundcloud

Wondering about a site not on the list?  The Web developer resource Github has been testing sites, here’s a working list of the vulverable, not vulnerable and no SSL sites:  Heartbleed-Masstest.  The caveat for this information is that there is no central “is my internet broken” government agency that can verify these checks; Githrub’s community of volunteers appears to be our best resource, but maybe think of it more like Wikipedia than a peer-reviewed journal.

There are also a few services, such as filippo.io/Heartbleed, that let you test a website yourself.  We recommend doing this for any lesser-known site you use regularly.

As Toronto-based password-managing site 1Password says “The time to change passwords is after sites patch vulnerability *and* update certificates.”

How Do You Make Your Passwords Safer?

The smartest thing to do at this point is diversify your passwords, so that if someone hacks your OKCupid account they can’t get into Google with the same password.  My rule of thumb is that no site that connects to my credit card shares a password with any other site that I use.

Most people use terrible passwords.  There are a number of reasons for this.  One is the sheer variety of password-enabled devices we have to deal with every day (how many of you will admit to still having the default “1234” as the password on their vehicle’s Bluetooth connection…?).  Another is the fault of certain products and websites that either don’t care what sort of password you choose, or force you to jump through a bunch of hoops that result in the creation of a convoluted password you end up forgetting a week later.  The most important determinant of password strength is entropy.  Basically, the more stuff there is to guess, the better the password.  So choose a long password.  And if you don’t think you can remember multiple passwords and don’t want to use a password manager, at least memorize a strong password and use it exclusively for your most important digital transaction.  The last thing you want is your banking login compromised because someone hacked into a gaming forum you frequent and stole your password.

Is This A Virus?

No.  A virus is a piece of malicious code that seeks to infect your computer systems.  Heartbleed appears to be a mistake, a flaw in the encryption code that many websites use to protect passwords they ask you to use to log in, as well as other information.

How Long Has This Been Going On, And Whose Fault Is This?

According to researchers that found the problem (and let’s be clear, this is a gaping hole that words like “flaw, bug, and vulnerability barely describe), the bad code was introduced two years ago.  To quote Codenomicon (who found and named Heartbleed): The affected code is called OpenSSL and “is the most popular open source cyptographic library and TLS (transport layer security) implementation used to encrypt traffic on the Internet.”

The OpenSSL Software Foundation and the developers who maintain this code are having a lot of pointed finger wagging at them.  According to the Wall Street Journal, there are only 4 staffers to maintain the open-source libraries…and only 1 is full-time.

“There is no question more effectively applied manpower would be a good thing,” said Stever Marquess, President of the foundation.  “Formal code audits would be a good thing.”  Really…

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

 

 

Filed Under: ALERTS, Featured

Photo Backups

April 7, 2014 by The T By D Team Leave a Comment

imageDear Geek,
I’m always worried about my home computer. If something were to happen to it, all my family photos would be gone, and I wouldn’t be able to get those all back. Is there some way to ensure that my photos will be safe if some
Sincerely,
Photo historian

Dear historian,
Often when someone has a computer disaster, the first thing they are worried and we are asked about, is their pictures. Most times we can recover these, but unfortunately sometimes we can’t or the cost of such recovery runs into the thousands of dollars. For this reason, I offer some of the best ways to backup your photos for free, or at a low cost.

1. MyShoeBox
http://shoeboxapp.com
Cost – Free (At Screen Resolution) or $5/month for original resolution
Service – Unlimited backup of pictures

2. Dropbox
https://www.dropbox.com/
Cost – 2GB Free, or per month fee for additional storage
Service – drop anything you want into your cloud storage

3. Google Drive
http://drive.google.com
Cost – Free 15GB of storage
Service – 15GB Free, but there is no security or file locations

4. Crashplan
http://crashplan.com
Cost – $10/month
Service – unlimited computer backups

Need someone to help setup a solution for you? Give us a call – 204-800-3166. We also offer managed cloud backups and local backups of your workstation.

Got a question for The Geek?  Email:  geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

Filed Under: FAQ, Featured

  • « Previous Page
  • 1
  • …
  • 25
  • 26
  • 27
  • 28
  • 29
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in