Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Ghost Mouse

June 2, 2014 by The T By D Team Leave a Comment

ghost-in-computerDear Geek,
I think my laptop is haunted by the ghost of a nerd. Who else would be haunting my laptop? Even when I am not touching my touchpad, my mouse moves. Should I be calling Ghostbusters?
Sincerely,
GHOSTBUSTERS!

 

Dear computer user watching too many horror movies,

Ghostbusters should not be necessary for this. There are a few reasons this could be happening.

Check where your hands are on the keyboard. Because the touchpad is so close to where the palms of your hands and your thumbs rest, it could be possible that you are touching the touchpad without realizing it. Take your hands off the keyboard completely, and see if it continues to move by itself.

Is your touchpad dirty? Oils, lotions, and other substances from your fingers can cause the touchpad to not work properly. Try cleaning the touchpad by dampening a cotton cloth with water and wipe the surface of the touchpad.

Do you have any external devices plugged in? If you have a device plugged in such as an external mouse, graphics tablet, or keypad, unplug them and see if this may be your issue. Something on your desk may be nudging these devices causing your mouse to move.

Do you have all the proper drivers? Drivers control how the touchpad, and everything else, works. If the driver contains issues, it may cause some issues, such as the mouse moving improperly. Check your laptop manufacturer website to check if you have the correct driver.

If you have done all this, and you are still convinced a ghost nerd is controlling your mouse, there may be a physical hardware issue with either the touchpad or the interface connected to the touchpad.

Technology by Design can help diagnose your touchpad issues, and fix it, even if it is a hardware issue! If you are being haunted by a ghostly nerd who enjoys moving your mouse, who are you going to call?

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

Clean keyboards

May 26, 2014 by The T By D Team Leave a Comment

imageDear Geek,
I got really excited about the new Spider-Man movie, that I spilled some pop all over my keyboard. By “some”, I mean a whole bottle of coke. I tried cleaning it out, but it’s been a few days since, and my keyboard is still so sticky that it’s almost unusable. I saw on a forum that a few people had put their keyboards through the dishwasher, can you actually do that?
Sincerely,
Your friendly neighbourhood Spider-Man
Dear Peter Parker,

Yes, some people have put their keyboards through the dishwasher, but there are some risks with that. When you do this, there is a chance that you may completely ruin your keyboard, and no manufacturer actually recommends you use this method. If you have warranty on your keyboard, this will completely void it. Also, your keyboard will be out of commission for about a week. It should also be said that this method of cleaning does not work for laptop keyboards, just standard, desktop keyboards.

Here’s some information if this is the road you’d like to take:
– Make sure you’ve got a spare keyboard. You must wait at least 7 days before the keyboard can be used again after it’s been washed, so unless you do not plan on using your computer for a week you’ll need a spare.
– Do not use any dish soap.
If your dishwasher has multiple settings, make sure it’s a rinse only. Do not use a heavy wash, pots, and pan setting, or any heated drying settings. Any extensive heat will destroy the keyboard.
– Wash the keyboard on the top rack only.
– Do not put anything else in the dishwasher except the keyboard.
– Only try this if your computer keyboard is plastic.
If you want a more extensive clean under the keys remove each of the keys and wash just the keyboard.

After the keyboard has been washed, shake the keyboard to allow excessive amounts of water to drain out, lay the keyboard upside down so it is laying on the keys, and let the keyboard dry for seven days.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

ALERT: CryptoLocker, and More!

May 21, 2014 by The T By D Team Leave a Comment

Unknown

ALERT:  CryptoLocker, and More!

 

CryptoLocker is attempting to gain strength after the CryptoBit and CryptoDefence ransomware have been developed and attacking.

 

The latest strain of CryptoLocker is being sent by email to companies that have job postings on websites like CraigsList. CyberCriminals are looking for job postings and sending resumes with the CryptoLocker malware attached. The moment these resumes are opened, the ransomware kicks in, and begins to encrypt the computer. The computers that are being used to open these resumes are usually some of the most important in the company, like that of the owner, the CEO, HR, or department heads.

Another kind of ransomware is also becoming more popular. This kind uses shock in order to get people to pay. This kind of ransomware first displays child pornography, before copying it to the victim’s hard drive, encrypting the system, and holding it hostage.

Major losses and downtime can be avoided with proper backups. Regular scheduled backups help restore any kind of data that is lost or encrypted.
Proper backups would have prevented the need to pay paying hundreds, even thousands of dollars for an encryption code.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

Time Travelers

May 20, 2014 by The T By D Team Leave a Comment

time-travel-clockDear Geek,
I’m not sure what happened, but the date and time is off on my computer. Could it be that I have finally found a way to time travel?
Sincerely,
The Doctor

 

Dear ‘Who’ fan,

The chances are that you have not found a way to time travel. Your settings are probably off.

To change the time and date on Windows 7, you click on the date and time in the notification area, which is most commonly on the bottom right-hand corner of the screen. When you click on this, a small window will appear with a small calendar and some different time zones. Under this, there should be an option to “change date and time settings”.

In Windows 8, there are a few ways to open up the settings. First way is to look for the “settings” tab in the Charms start menu (aka the screen that looks like a tablet). To open this up, you go to the start menu, and go to start screen. The other option is to simply press the Windows key + I.

From here, click on the “Desktop” option, then More PC Settings. The General tab is where the date and time can be changed.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

ALERT: Mobile scams!

May 14, 2014 by The T By D Team Leave a Comment

CeBIT 2011

ALERT:

Mobile Scams

 

Heads-up to mobile device users! There are two mobile scams that have just begun to make themselves known.

 

CyberCriminals are trying to trick people into clicking on links, often exploiting trust in order to do so. If they are successful in making you believe the message is from a trusted source, chances are that you will click on it. CyberCriminals use email, instant messaging, social networks, and even SMS text messages to try to trick you into becoming a victim.

One way CyberCriminals use to create more victims, is using messages from “trusted” mobile apps to install malware onto PCs. The bad guys will duplicate the look of a mobile app, and make it seem as though that app is trying to get ahold of you through email. This email will contain a link or file that is completely infected with malware, which could then be transferred to your PC. It is important, even when on your mobile device to watch what you are clicking on; both online and in emails.

A second way CyberCriminals try to get victims is the first type of mobile ransomware (like the CryptoLocker) for Android. Although it is not as malicious as the PC version (so far), it scrambles your phone, and asks for about $500 as a ransom for the files. This sort of ransomware is actually manually downloaded through a type of software claiming to be a video player from a website other than the Google Play store. The way to avoid this kind of mobile ransomware is to only purchase apps from the Google Play store, and even then to be aware of what you are downloading. Check the reviews, people will often try to warn each other about slow apps, apps that do not work, or apps that cause problems.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

 

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

May TechTips Newsletter

May 14, 2014 by The T By D Team Leave a Comment

May TechTips Newsletter

The mystery of “Go”.
The April Fools Prank that (temporarily) shut down a school.
Why some American National Parks are banning drones with cameras.
How the FBI is becoming more and more like a high-tech spy movie!

All this and more!

**************************************************************************
Check out our blog for “Ask The Geek” where our resident Geek answers your questions, AND translates them from Geek-lish to English!
If you have a question for our resident Geek, email it to: geek@tbyd.ca!
Visit our website for access to past issues, security alerts, free ebooks, and more!
Like us on Facebook at: facebook.com/TechnologybyDesign

Follow us on Twitter: @techbyd

Filed Under: Featured, TechTips Newsletter

Creating Users

May 12, 2014 by The T By D Team Leave a Comment

imageDear Geek,
I bought a new computer for home. I sometimes take some work home, but mostly I want to write some Star Trek poems-from Spock’s perspective. My Mom says because it’s in her house, she has partial ownership too. I don’t want her messing up my poems while looking for new spaghetti sauce recipes, which by the way mom, the last one is still good.
Is there a way to keep her stuff separate from mine?
Sincerely,
SpockLovezSpaghetti

Dear SpockLovesPoetry,

The best way to do this would be to make her a user on your computer. This way, she has her own place for her recipes, and she can’t mess around with your stuff unless she really tries.

This can be done pretty easily. First, you open the Windows control panel. Then click on “add or remove user accounts”. It will then ask you what you’d like the user account to be named, so something like “Mom” would work. It will also ask you what sort of account you’d like this account to be. Most people stick with making additional accounts as “standard users”. This is so the additional accounts cannot make a bunch of administrator changes to the system. Last step is to click “create account”.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

Phone calls from Microsoft

May 5, 2014 by The T By D Team Leave a Comment

imageDear Geek,
I got a phone call from Microsoft Support. They told me I have a virus! They were going to help me remove it, but I told them I didn’t have time. They said they would call back. Is there a way to get this virus off without them tonight?
Sincerely,
Support

 

Dear Scammed

Microsoft Support, Facebook, Windows Support, Norton, Dell, ect, will NOT call you. This is a phishing scam, hoping to take over your computer and or get some of your important information.

They will give you a website to “allow them to have remote access to your computer so they can remove the virus”. When you go to this website, it will either download a virus or malware to your computer, give them remote access to your system, or lead to a landing page asking for information such as credit card numbers or usernames and passwords. All three can be bad for your information.

In downloading a virus, the hacker do things such as open back doors to allow access to your system at any time and log your keystrokes (getting them all the information you type in). Remote access to your system can allow them to get this onto your system as well. Some fake error messages may pop up on your computer, having nothing to do with what they are actually doing.

You may have a virus, but it has nothing to do with what they are telling you, guaranteed. Best thing to do is to run virus scans regularly, or have a company such as Technology by Design monitor your system for viruses.

Got a question for the Geek?  Email:  geek@tbyd.ca

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

 

Filed Under: FAQ, Featured

ALERT: CryptorBit

April 30, 2014 by The T By D Team Leave a Comment

Lock-icon

ALERT:  CryptoBit

 

CrypoLocker and CrytoDefense were making enough trouble for users, and now there is a third strain of Ransomware?

 

This strain is called CryptorBit, or HowDecrypt, and it follows a similar attack to CryptoLocker, but instead of corrupting certain types of files, this malware corrupts the first 512 or 1024 bytes of any data files it finds. It also seems to be able to bypass Group Policy settings that were put in place to defend against this kind of Ransomware injection.

This strain of Ransomware also installs a “cryptocoin miner” software which uses the victim’s computer to mine digital coin such as BitCoin, which then gets deposited into the malware developer’s digital wallet, earning them even more money.

Once the CryptoBit malware has had a chance to infect your files, it asks for a ransom of about $500 in BitCoin in order to decrypt the files. If the ransom is not paid, the files on your computer will remain corrupted and unusable.

Technology by Design recommends regular backups in order to ensure your files are saved in the event of a Ransomware attack. If a backup was made before the files were corrupted, it might be possible to save yourself $500+ dollars! Ask Technology by Design about how scheduled backups can help you, and how you can protect yourself from Ransomware!

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

Checking Your Version of Windows

April 28, 2014 by The T By D Team Leave a Comment

Want to know what version of Windows you are running to ensure that your data is not at risk? The Geek shows us how to check the current version of Windows- through video!

Filed Under: Featured, How To Videos

  • « Previous Page
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • …
  • 24
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in