Welcome to MAD Computer Solutions Ltd...

CryptoLocker virus storms the internet

Posted By on June 20, 2014

avatar

What is CryptoLocker?

CryptoLocker is the most destructive windows virus ever created in a series of ransomware Trojans. The combination of its high demand for money and the short space of time given to pay make it far more threatening than other similar viruses.

Hackers have managed to create a programme called ‘CryptoLocker’, a virus that encrypts your files and demands a ransom of $300. So let’s say you’re happily working on your computer and all of a sudden without realising, all of your personal files are quickly being encrypted without your knowledge. Suddenly you will no longer be able to access your files, and an alert will appears on your screen telling you that you have approximately 4 days to either pay $300 to get an encryption key, or have all of your personal files encrypted permanently. You are against the clock as you see it ticking before your eyes, counting down to the inevitability of your end decision. With CryptoLocker, there is no way of getting out of it other than paying the ransom which is so horribly charged. Removing the software from your computer only makes the potential of the encryption key being deleted, therefore getting your files back an impossibility.

How to prevent an infection

The CryptoLocker virus is being spread mainly as attachments on emails, usually hidden as an invoice, with the message that “your invoice is attached”. Be wary of emails from unknown sources, especially with an attachment. If in doubt delete it.

Most preventions of the infection would need to be done before you are actually infected in order for them to work. You can back-up your personal files onto USB sticks, CD’s, Hard drives and even online onto the cloud, which means that if you are unlucky to be struck by the CryptoLocker virus, then even though you may have your files encrypted on your computer, then a backup of them will be safe and sound on a device or online, un-touched and ready to be used.
It is always worth having anti-virus software such as AVG, McAfee or Sophos, in order to ensure the safety of your computer against most viruses, and to scan your computer regularly to make sure that there are no existing viruses that may be of threat to your computer.

If you manage to get CryptoLocker on your computer, it is advised to turn your computer off right away as this will prevent the spread of infection across your files. If you have backed up your files and have anti-virus then you are safe to remove it as your files will already be backed up and the virus will not be able to do anything once it is removed.

What if I have not backed up my files?

Unfortunately if your files aren’t backed up after you get the virus then there isn’t much more you can do other than pay the ransom, it has been reported by some victims that paying the ransom does work and is your best hope for getting the encrypted files back.
We need to make the internet aware of this virus as it is spreading like wildfire, make sure your employees, your friends and your family know that this virus is out there to ensure their computers are safe.

Free AVG anti-virus




How to make Windows 8 more User Friendly

Posted By on May 13, 2013

avatar

If you’ve upgraded your PC recently to Windows 8 you may find that you’re completely baffled with even some of the smallest tasks. Even to the point that shutting down the computer is a complex task compared to what users have been used to in previous versions of Windows.

The main reason why Windows 8 can be so confusing for new users is due to its lack of a start bar, which has been present in every version of Windows since Windows 95.

There is one simple step that you can take in order to make Windows 8 more user friendly and look more like the Windows of old, and that step is to install a start menu for Windows 8. There are several different sources and versions of start bars for Windows 8, however after testing a few different variations the best one we’ve found is provided by IObit. You can download and install the IObit start menu for Windows 8 for free from the link below.

IObit Windows 8 Start Menu

Once installed, you can also set Windows 8 to start in the Desktop view mode rather than in the metro theme, so every time you turn on the PC you will be in the familiar desktop mode.




Official Support for Windows XP and Office 2003 to Cease in 2014

Posted By on March 22, 2013

avatar

In 2002 Microsoft introduced its Support Life-cycle policy based on customer feedback to have more transparency and predictability of support for Microsoft products. As per this policy, Microsoft Business and Developer products, including Windows and Office products, receive a minimum of 10 years of support. Support for Windows XP and Office 2003 will cease on April 8, 2014.

This means if your business is currently using Windows XP or Office 2003 then you should be planning on upgrading your systems before April 2014. After April 8, 2014, there will be no new windows updates for both XP and Office 2003, which means that there will be no new security patches or any kind of support for these products whatsoever. Running Windows XP SP3 and Office 2003 in your environment after April 2014 will mean that your system will be highly exposed to any new security threats that hackers can find and exploit in XP and Office 2003, below are just some of the issues you will likely experience:

  • Software: Just as is the case for Windows 98 and Windows 2000 now, driver releases for new hardware that comes out will start to become non-existent for XP around or slightly after the April 2014 timeline.
  • Hardware: Customers who purchase new hardware even for otherwise fully capable systems may start to run into compatibility issues.
  • Security & Compliance Risks: Unsupported and unpatched environments are vulnerable to security risks.

As a Microsoft Certified Partner Mad Computer Solutions can help you understand the best options to meet your personal and business needs. There are many options for small and medium businesses considering moving to a modern Operating System or PC with the latest productivity and collaboration tools.

If you are currently running Windows XP or Office 2003 in your business and you haven’t given any thought of upgrading your systems yet, I would suggest you start piecing together a plan as soon as possible, as whatever size business you are, you will need to ensure that you have budgeted for such an upgrade to your business infrastructure.

As always, if you require any advice, help or support in planning or implementing such an upgrade, please feel free to give us a call on 0845 272 2373 and see how we can help you and your business.




Safeguarding Your Business Data

Posted By on March 22, 2013

avatar

Data is at the heart of businesses, it’s crucial for you to protect it. To protect your organization’s data, you need to implement a data backup and recovery plan. Backing up files can protect against accidental loss of user data, database corruption and hardware failures.

Imagine that you are using your computer at work when suddenly all of the lights go out and the computer shuts down. After a few minutes the power is restored. You reboot your computer only to find that an error message appears. It tells you that a fatal error occurred, and that some important data, let’s say your accounts for example has been either lost or corrupted. Situations such as this happen all too often, the good news is that there are key safeguards, one of which is data backup which will protect from such circumstances.

The reasons of data loss can fall into these main categories;

  • Human error – deleting information from a PC by mistake, the misplacement of DVDs, CDs or media, and errors in administrating databases.
  • Intentional Crimes – acking, H  Hacking, viruses, data theft and espionage.
  • Natural Causes – Power failures, hardware failures, software failures, software bugs and also any kind of disaster such as a fire or flood.

With a little preparation, individuals and businesses can rest easy that if catastrophe strikes, they can be well prepared to recover and be back up and running in as little time as possible.

Mad Computer Solutions can provide you and your business with professional cloud online backup services in order to ensure that your company’s data is secure and can be recovered in the event of hardware failures, natural disasters or any other kind of problem.

Backup is just one part of ensuring the safety of your business when something goes wrong. If you want to ensure that your business is completely protected and capable of recovering from any kind of ‘disaster’ then why not have a look at our disaster recovery planning service.




Peak Time Internet

Posted By on July 26, 2012

avatar

Did you know that the time of the day can dramatically affect your download and upload speeds for the internet?

Many Internet Services Providers conveniently ignore this factor when advertising their download speeds and also their tests are sometimes from right next to the exchange. This distance will falsify the speeds obtained if you live further away as distance matters.

A graph obtained from the BBC using uSwitch’s information is shown below.
A graph showing how broadband speed is affected by time of day. Graph from BBC who obtained information from uSwitch.
“Not many internet users enjoy the maximum headline broadband speeds offered by providers, and certainly not during the working week,”

-uSwitch’s technology expert Ernest Doku.

The graph quite clearly shows a difference in 35%, The speed has been proven differ from an average of 35% up to 70% when comparing the early hours of the morning to peak time.

Almost half of broadband users are now on packages with advertised speeds above 10Mbps but the average broadband speed is 6.8Mbps according to Ofcom.

So in conclusion, when checking what deals are available for your internet packages, make sure the package you opt for will give you the speeds they advertise during peak time. Otherwise you could be paying for a service you won’t receive.




Microsoft/Alien Touch Telephone Scams

Posted By on July 25, 2012

avatar

Telephone scams and fraud are commonplace at the moment with many cake companies pretending to be legitimate official companies such as microsoft or apple in an attempt to get money from you. Recently there has been a wave of scams that have been targeting PC users. They will claim to be from Microsoft and will phone you up telling you that your have errors or a virus on your computer which needs to be checked.

After this they would attempt to convince you to install software to allow them access to your computer, from here they would show you your log files and say that all of the errors are serious. The event viewer which they would use records all the computers logs, it’s natural that it has all the errors recorded, even from web pages not being displayed.

Once they have access to your computer they will then install malicious software onto your computer which can then track your keyboard inputs so that they can easily acquire your bank details or failing this they might invoice you for the fake work that they have done and request your bank details.

We at Mad Computer Solutions highly recommend that your inform those you know about the scams as we are well aware that numerous businesses and individuals have fallen for it already.

If you have let them onto your computer unknowingly it’s also a good idea to keep a track on your bank account finances over the next few months in the event that your bank security is compromised. Additionally we can offer a service to remove any potentially unwanted software which they may have installed onto your computer.

Remember: Microsoft Microsoft will never ask you to provide your user name, password, date of birth, country, credit card number, or any other personal information. Additionally Microsoft do not perform unsolicited phone calls to help fix your computer.

If on the unfortunate chance your or a friend or relative has been caught out by one of these scams and you think your PC may have likely been compromised, then please feel free to contact us using our Contact Form. We will perform a thorough check up on your computer to ensure that there is no residual software on your computer that may harm or steal your data.

Update – These calls do not only impersonate Microsoft, they have also been caught impersonating a company called Alien Touch.




How to Check & Update Internet Browser version

Posted By on July 23, 2012

avatar

It’s always a good idea to keep web browsers up to date as flaws are fixed and new features to improve your web experience are added. Outdated browsers can pose security risks such as the numerous exploits that are out there for Internet Explorer 6.

Internet Explorer:

Help -> About Internet Explorer
The best way to check for Internet Explorer updates is to check via the windows update tool.

Firefox:

Help -> About Mozilla Firefox
A nice feature that’s in Firefox is that when you go to check the version, it will automatically search for an update for you.

Google Chrome:

Click the Spanner in the top right corner -> About Google Chrome.
A nice feature that’s in Chrome is that when you go to check the version, it will automatically search for an update for you.

Opera:

Help -> About Opera
If you want to update Opera the update feature is in Help -> Check for Updates

If you find that you can’t find the help menu, press the alt key while in your browser and it should unveil a toolbar.

List of latest versions as of (July 23, 2012)

Internet Explorer – 9.0.8112.16421
Firefox – 14.0.1
Google Chrome – 20.0.1132.57
Opera – 12.00
Safari5.1.7

Want to find out more about how to check versions or update a browser that’s not featured here? Feel free to request it through our Contact Form.




Help and Advice

Posted By on May 30, 2011

avatar

Computer Help and Advice

10 Tips to protect your PC and data.

Every computer attached to the internet is open to attack from a virus, spyware, hoax emails and phishing. These attacks may damage or delete your important data, or install malicious software which may steal your passwords, credit card details or use your PC to attack other systems over the internet. According to Symantec, an unprotected, unpatched computer system is attacked within 20 minutes of connecting to the internet. The following 10 tips below will assist in protecting a Windows XP computer from such attacks, and help to protect your important data.

  1. Administrator Account. DO NOT use an account with administrator privileges for everyday use, as this could allow viruses and spyware the ability to self install on your PC. Always create a limited account for everyday use. If you need to install anything you can login as administrator or use Run As (shift and right click the file) to install without logging off.To create a limited account:
    Start>Settings>Control Panel>User Accounts
    Select Create a new account, give it a name, and select Limited as the account type.
  2. Security Updates. Always ensure that all critical security updates are installed on your computer. These are released by Microsoft each month, and fix known security issues that have been discovered.
  3. Passwords. Always use a password; the longer the better. Make sure it is not something that someone could easily guess i.e. a child’s name. Use a mixture of numbers, upper-case and lower-case letters, and symbols. Do not write the password down, or let others know what it is.
  4. Firewalls. Microsoft Windows XP Service pack 2 provides you with a free personal firewall. Make sure that it is activated by going to Start>Settings>Control Panel>Windows Firewall.
    Alternatively you can download ZoneAlarm, a free personal firewall for individual use from www.zonelabs.com.If you have a broadband router with built in firewall, ensure that it is active. Details will be in the manual supplied with the router. Only install one software, and one hardware firewall, or you may not be able to connect to the internet.
  5. Anti-virus Software. To protect yourself from viruses, you will need to install an anti-virus software package. There are many commercial packages available, offering complete protection, including firewall, spyware protection, and spam filtering for your email. These packages provided by suppliers such as Mcafee and Symantec will normally have a yearly subscription charge and provide updates for your software as new threats appear. For those on a tight budget there are a many free anti-virus products available, such as Antivir (www.free-av.com), Avast! (www.avast.com) and AVG (www.free.grisoft.com).As mentioned, updates are released for these packages frequently, so you will need to check the settings of your installed anti-virus software to ensure that it is scheduled to automatically install new updates. It is also advisable to set a scheduled time for the software to check your files automatically.
  6. Anti-spyware & Malware. Spyware and Malware are programs that once installed onto your PC will collect personal information, install other programs and take over your web browser. They will redirect you to other malicious web sites, pop up offensive or irritating advertisements, and also slow down your computer.There are many anti-spyware packages available, including many that are free. Free anti-spyware packages include Microsoft Defender (www.microsoft.com), though the most popular is Ad-aware (www.lavasoft.com), and Search & Destroy (www.spybot.com). Remember to install any updates to ensure full protection from the latest threats.
  7. Install the Latest Web Browser. Install Microsoft Internet Explorer 10 from (www.microsoft.com) or Firefox from (www.mozilla.com). The latest browsers will provide increased security against phishing (Spoof websites that steal account details). The recent updates will also give you enhancements, such as tabbed browsing, live web feeds (RSS) and pop-up blocking.
  8. Shared Files and Folders. Check that your important files and folders are not shared. Click on ‘My Computer’, right click your ‘C: Drive’ and select ‘Properties’. Select the ‘Sharing Tab’ and select ‘Do not share this folder’. Click ‘OK’
  9. Backing up Your Files. Always prepare for the worst. A virus could infect your computer, or a component such as the hard disk may fail. keeping a recent copy of your files and storing them elsewhere could save you hours of work in an emergency. Start getting into the habit of routinely saving all your important files to either a CD, USB flash or external drive. Alternatively back up those files to an online data storage website such as www.humyo.com. It is free to use, has unlimited storage space, and is flexible enough to allow you to share files with friends, and access your data on your mobile phone.
  10. User Awareness. The final and most important security tip is user awareness. All the extra protection installed will be useless if you install software that has Malware built in. Many file sharing software packages are guilty of this.Do not open email attachments from someone you do not know, or with a suspicious subject. If you need to view them, save the attachment first and check it with your virus software. Do not pass on chain e-mails as these are considered spam.If you have children, make sure that you can see which sites they visit, and make sure they are logged in with a limited account. Install content software similar to net nanny which will restrict malicious or adult web sites.



Remote IT support for your home computers

Posted By on February 3, 2011

avatar

Welcome to the MAD world of computer support.
Remote IT Support PackFor both small business and home computer users, finding reliable support for your computer problems is time consuming and often expensive. Many local stores will require you to take your computer to their workshops for repair, leaving you without a computer for days, sometimes weeks.

With our Remote computer support subscription MAD computers help you with your everyday PC problems from virus and spyware removal, to friendly help and advice about your IT systems. 90% of computer problems are able to be resolved remotely, with no visit to your home or office required.

Telephone our Remote Computer Support helpdesk today on 0843 2893818 to find out how MAD Computer Solutions may help you.




Computer Support and Repair In Rubery : Frankley : Northfield : Longbridge : Bromsgrove : Quinton : Worcester : Selly Oak : Barnt Green : Kings Heath : Birmingham : Halesowen : Harborne : Kings Norton : Rednal : Solihull : Maypole : Lickey : Bournville : Stourbridge : Oldbury : Catshill : Droitwich : Edgbaston : Redditch : Kidderminster : Hagley : Dudley : Walsall : Wolverhampton : Sandwell : Sutton Coldfield : Stourport : Server Support : Virus Removal : Web Design : Privacy Policy : Contact Us