Category Archives: Computer Repair

Computer Boot Key Chart

How do I start my computer from a USB device or a DVD? Most New Computers or Laptops are built to recognize such devices automatically, if not you can temporarily choose different start-up options by accessing the BIOS menu. We created a common version of the Boot Keys sequence. When a computer is starting up, the user can access the Boot Menu by pressing one of several keyboard keys.

Common keys for accessing the Boot Menu:

Brand Type Boot Key
Acer  Desktop, Laptop
Esc, F9 or F12
Asus Desktop/Laptop/NoteBook/NetBook F8/Esc/F8/Esc
Dell/eMachine Desktop/Laptop F12
HP Generic/Desktop Esc or F9/(Press Esc then F9)
HP Laptop/NoteBook/Tower Esc or Press Esc then F9
HP Laptop F9
Intel All F10
Lenovo Laptop/Netbook/NoteBook F8. F10, F12

F12 or Fn+F11 or Some models hit the Novo button next to the power button

Samsung Generic/NetBook/NoteBook F2, F12 or Esc
Samsung Ultrabook F2 or Esc
Sony All Assist Button, F11, Esc or F10
Toshiba All F12

Google Search Shortcuts

Tags : 

Google search helps us find answers just like an old library; you can get lost if you don’t know where to go to pull information. There are simple Google Serch shortcuts that can help you navigate through Google searches efficiently and find what you are looking for faster.

Use of ” Quotation Marks – when you use quotations you are telling Google that you would like to filter specific word or sentence, For Example: “Computer Repair in Wellington” or Computer Repair so by using this you just told Google to bring back only results for Computer Repair in Wellington and not to show you anything else.

Use of – Dashes Exclude Certain Words From Your Search Query, for Example, Computer Repair -Wellington, -Lake Worth, you are telling Google you would like to exclude those locations.

Find a Specific File – You can tell Google you would like to find specific files by using search quotes: “Virus Removal in Wellington” filetype: pdf so this will bring results only with PDF files that are related to the specific phrase you used in quotations.

To Search within Specific Site – If you would like to find specific information on a particular website, you can use: virus removal by using this you are telling google “I would like to search for Virus Removal page and information.”

  1. ” Quotation marks keep search term together
  2. – Dash removes the unwanted search term
  3. Site command finds everything within site you specify
  4. Filetype command finds everything related to the document you are looking for.

Computers Designed for business

Consumer or Business Class Computer

Tags : 

Consumer or Business Class Computer? When buying a computer, it is The computer to choose what fits the most for your daily computer use and very important if the machine will be used in the business environment.  Most Computer manufacturers offer the same computer make and model for both consumer and businesses, but they are not the same systems. Things to consider when buying a computer is usage requirements and question you should ask yourself, how will I use this computer?, What programs or applications will I run?, Do I need to join business networks? How many hours per day, I would use my term.

Here are the differences between consumer-based computers and business grade computers:

Computers Designed for business come preloaded with the Windows Professional that is generally more robust and has more security built in, comes with business features such as the ability to join corporate networks, disk encryption software and so on, but the consumer computers don’t. Business class hardware typically uses better quality parts and pass more testing and certifications. Cheap hardware is more likely to break and would cost your company money in loss of productivity and support time to fix the issue, so investing in a better quality machine would save you the cost. Business Computers comes with manufacturer warranties that have longer terms and provide quicker support service. Business class computer, over the long run, will offer more value than a consumer PC. Computer is going to be used 5-8 hours a day and needs business type applications, and it will be used for your business, then you need a Business Class Computer.

Computers designed for home base use usually come with Windows Home or Starter editions. Consumer grade PCs also tend to come with much more bloat-ware. Bloat-Ware is Software that usually installed in the trial mode in hopes user purchase the full version.  If you are planning on using your computer to check your email, to buy items on Amazon, use Facebook and do not need business applications than consumer PC will fit your needs.

Conclusion: Consumer or Business Class Computer? When buying a computer, it is very important to choose what fits the most for your daily computer use, also important to remember Parts used for consumer computers may be more generic or even cheap, while computers designed for professional use more often include higher grade materials and name-brand parts.

Overwhelmed with information and don’t know what do? Give us a call we are happy to guide you in the right direction. Contact Us for Details.


Tech Support Scams be Aware

Tags : 

fake calls from microsoftTech support scams are nothing new, but they are on the rise, as fraudsters become more cunning and savvy in their attempts to extort money from unsuspecting consumers.

Major Service Company’s DO NOT CALL:

The most common tactic technical support scammers use is calling potential victims and claiming to be representatives of reputable, well-known companies such as Microsoft, Google or Antivirus Companies.

Often they claim to have discovered a serious issue on your computer, such as a virus, and will use scare tactics to get you to allow them to access your system remotely. Scammers install bogus software to fix the non-existent issue and charge you for it, while others will use the remote access to gather your personal information.

Legitimate remote support companies will never contact you unless you’ve requested help.

There is no way for them to know if there is actually a problem with your computer, so you should always be suspicious of unsolicited calls.

If you think you might have been the victim of a technical support scam, take immediate action to minimize your losses and protect yourself. You should contact the local authorities to file a report, and file an official complaint on the Federal Trade Commission’s (FTC) website.

If you gave any payment information, contact your bank or credit card company immediately to report the transaction as fraudulent. It’s also a good idea to change all of the passwords on your computer, especially if you granted the alleged technician remote access to your system.

If you need an additional help give us a call at (561) 216-1061

Computer Virus CryptoLocker

Tags : 

CryptoLocker associating with the Trojan.Cryptolocker Trojan horse that encrypts files on the compromised computer and then prompts the user to purchase a password in order to decrypt them.

trojan cryptolockerHow is CryptoLocker Malware Installed

CryptoLocker uses social engineering techniques to trick the user into running it. More specifically, the victim receives an email with a password-protected ZIP file purporting to be from a logistics company.

The CryptoLocker Trojan runs when the user opens the attached ZIP file using password included in the message or attempts to open the PDF it contains. CryptoLocker takes advantage of Windows’ default behavior of hiding the extension from file names to disguise the real .EXE extension of the malicious file.

As soon as the Computer User runs infected file, the Trojan goes into memory resident on the computer and does the following actions:

Saves itself to a folder in the user’s profile
Adds a key to the registry to make sure it runs every time the computer starts up.
Spawns two processes of itself: One is the main process, whereas the other aims to protect the main process against termination.

File encryption

The Trojan generates a random symmetric key for each file it encrypts, and encrypts the file’s content with the AES algorithm, using that key. Then, it encrypts the random key using an asymmetric public-private key encryption algorithm (RSA) and keys of over 1024 bits (we’ve seen samples that used 2048-bit keys), and adds it to the encrypted file. This way, the Trojan makes sure that only the owner of the private RSA key can obtain the random key used to encrypt the file. Also, as the computer files are overwritten, it is impossible to retrieve them using forensic methods.

When the CryptoLocker Trojan finishes encrypting every file that meets the aforementioned conditions, it displays the following message asking the user to make a ransom payment, with a time limit to send the payment before the private key kept by the malware writer is destroyed.

How to avoid CryptoLocker

  • Being particularly wary of emails from senders you don’t know, especially those with attached files.
  • We’d like to remind you of the importance of having a backup system in place for your critical files. This will help mitigate the damage caused not only by malware infections, but hardware problems or any other incidents as well.
  • If you become infected and don’t have a backup copy of your files, our recommendation is not to pay the ransom. That’s NEVER a good solution, as it turns the malware into a highly profitable business model and will contribute to the flourishing of this type of attack.

Information Source: Panda Security