RSSCategory: Uncategorized

Which is Better for Internet: Comcast vs CenturyLink

| January 3, 2014 | 3 Comments

This blog is very old and probably outdated!

 

It’s not surprising that I take a lot of calls from folks having issues with their internet. Many of those calling complain about Comcast and CenturyLink. The biggest complaints across the board are regarding the frustration clients feel when they have to call these companies to get a problem fixed. Both companies are so huge that the clients experience a never-ending phone queue issue of being transferred or constantly being put on hold.

 

 

I myself have used both companies for internet over the years for both business and residential purposes. I had the most problems with CenturyLink, which ended with them giving me many months of free service. Outside of the technical snags, if I had to call the support center, I cringed every time because CenturyLink had changed its call center to what appeared to be all new employees —who were very unhelpful. (Remember the old phone companies–Qwest, USWest, AT&T, Northwestern Bell–that had great customer service comparably?)

 

On the bright side, as of March 2013, Comcast took the initiative to increase the download speed of their services in Minneapolis. They realized that most residential units had multiple devices using the same internet services and the need for fast internet would continue to grow. Although Comcast’s internet speed was already faster than CenturyLink’s services, they almost doubled their amount of megabits per second. Technically speaking, Comcast is now more than two times faster than CenturyLink.

 

So back to the question: what company is the best? If I were to open an office right now in Minneapolis, I would go with Comcast—solely because of the speed. CenturyLink’s DSL is nothing compared to what Comcast can deliver. Both have pretty bad call centers and the pricing is about the same from what I remember. Many users say that CenturyLink is a bit cheaper, but only while their promotion is available. Once it is no longer valid, CenturyLink’s prices are comparable to that of Comcast’s. However, their speed is not.

Top 5 Most Destructive Computer Viruses

| December 31, 2013 | 0 Comments

Computer Virus Removal ServicesA computer virus, just like a virus we can contract, is annoying, stressful, bothersome, and reduces productivity. We try to avoid them but the cards aren’t always in our favor. Today’s fast-moving society makes it imperative that our electronic devices function properly. But, what happens when things begin to seem out-of-whack? Increased delays, strange messages, and unexpected application crashes could signify a problem. We fear the dreaded moment of realizing that our once trustworthy computer, has been suddenly attacked—but are we truly aware of the immense damage these viruses can have on us and our business?

 

1.    Ransomware

Beware! The use of ransomware has arrived and it’s taking computers by storm. Belgian, CryptoLocker and FBI MoneyPak, are the frontrunners in the ransomware war. They are independent of each other, but they share a common objective. Ransomware can spread through spam emails and hacked web pages. They will lock your computer, receive remote access, and command you to pay them ransom in order for your computer to be unlocked. If you do as the cybercriminals wish, will they really surrender their hold? We’re not entirely sure.

Belgian, specifically, requests you pay them $300 in 100 hours. If you do not meet their demand, they will wipe your entire computer. Scary! Check out our previous blog on CryptoLocker to learn more.

 

2.    Trojans

Trojan advancements have skyrocketed this year, with Neverquest and Android trojans taking the lead. Neverquest is a banking trojan that’s spread via social media and email accounts. It has the ability to recognize hundreds of banking and financial websites and will obtain the user’s credentials upon logging in. It sends the information to its command center, which stores the information and uses it to drain money out of the victim’s account.

Unfortunately, trojans don’t stop with computers. Android trojans have infected millions of cellular devices this year. These trojans are capable of sending and deleting SMS messages, acquiring banking information, and downloading other malware. Worst yet—often times it cannot be detected and thus, cannot be removed!

 

3.    Worms

Nidma and MyDoom have played significant roles in the history of malware. Nidma began in 2001, just following 9/11. It was spread via email, websites, and server vulnerabilities and became the most widespread worm in only 22 minutes. Due to its close timing to 9/11, some people speculated that it was implemented by Al-Qaeda. No evidence has proven this assumption to be true.

MyDoom was first sighted in 2004 and also spread like wildfire via email. When opened, MyDoom was able to record everything being typed (credit card information, passwords, etc…) by the usage of a “keystroke” program.

 

Computer Virus4.    “Ratters”

“Ratters” are people who have maneuvered their ways through computer systems by using Remote Access Tools (RATs) to spy on their victims through webcams. It’s a complete invasion of privacy, as the victim is unaware and never gave consent. Could somebody be watching you right now? It’s hard to know. When you’re not using your camera, it’s wise to cover the lens. When your computer is not in use, be sure to shut it down.

 

  5.  Data & Security Breaches

Recently, Target has been a victim of the largest data and security breach in history. Although this attack didn’t affect our personal devices, it’s an extremely eye-opening situation for all businesspeople to learn from. Somehow, Target’s payment system was infected with malicious software, which allowed the cybercriminal(s) to steal money from 40 million people. It’s crucial to make sure your computer systems are properly protected, no matter how large or small your company may be. A small glitch in your system’s protection could lead to incredible repercussions.

Don’t fall victim to today’s technologically advanced and discreet computer viruses. Without proper prevention and maintenance, you may find yourself overwhelmed with the consequences that will undoubtedly follow. Take a look at our blog, 6 Ways to Protect Yourself From Viruses, to learn how to keep your computer—and your business—safe.

If you have a virus and need help now, please call 612-865-4475 or schedule an appt here.

 

 

 

 

Warning about calls from India and “Windows Team”

| December 2, 2013 | 0 Comments

windows teamFolks, I am getting an average of 3 calls per week from clients stating they got calls from a “Guy from India” working for the Windows team. Some get trapped into the calls and eventually allow the “tech” to remote into their computer, some hang up and call me and insure they did the right thing. Same story, it’s a scam.

They show you event logs of warnings and tell you that you have tons of viruses, or your system is in need of repairing. They are now also installing a software tool and that runs, and shows you many errors (that may be common for your computer to have) and that you must hire them at $99 or their “unlimited support” package at $149 to $300.

Friendly reminders…Microsoft will never call you to tell you that your computer has viruses, hang up on anyone immediately that wants access to your computer, call me next if you feel you might have a virus either way.

Full Hard Drive Image Software and Restore Disk Information

| November 10, 2013 | 0 Comments

acronisNever fear a virus or computer crash again when you use the Acronis True Image Software. You will need an empty external hard drive equal to the size of the C:/ drive on  your computer  and a flash drive.

To get going, click on the image to the right here –>

Trial and test or buy now.

Install the software, it’s not hard to configure yourself. If you need my help, please call and book an appt. 612-865-4475

Once installed, you will see that your product allows you to do many different functions with your computer and backing up. Cloning your current hard drive to another hard drive is a great idea if you have a spare one or want one ready for just in case purposes. (Tools and utilities)

Now, to use the Windows software for making a system image and a system repair disk, go to your Control Panel and open “Backup and Restore” (in Windows 8, it’s there as Windows File Recovery)

Then you will need a flash drive for each or a DVD is fine too. They are quick wizards that do everything for you. You should have a 4 gig flash drive for this and only use the flash drive for this purpose.

What Acronis can do for you

  • Backup and restore a complete disk image—not just your files, but the exact configuration of your PC including your operating system, applications, and settings
  • Backup a full disk image to Acronis Cloud Storage
  • Keep a copy of your critical files offsite in our secure online datacenter
  • Access your files from any device, anytime
  • Share files securely by sending links to your content in the cloud
  • Use Acronis Cloud Storage with up to 5 devices (desktops, notebooks, tablets, smartphones, etc.)
  • Synchronize files across all your devices
  • Migrate or restore to a new PC
  • Restore your full disk image, including your operating system, applications, files, and settings, to a different make or model PC
  • Migrate everything from one Windows system to another, including a new PC
  • Restore your whole system configuration to a Windows Pre-Installation Environment (WinPE)
  • Backup dynamic volumes from Windows Dynamic Disks
  • Restore dynamic volumes onto bare-metal hard disks or previously configured Dynamic Disks
  • Backup your pictures, videos, music, documents, and other files
  • Set backups to run automatically whenever you want, even when you aren’t using your computer
  • Backup to any storage device, including USB keys, external hard drives, network-attached storage, and Acronis Cloud Storage

CryptoLocker virus attacks and holds your computer ransom

| October 22, 2013 | 0 Comments

Right now folks…it’s here and it’s bad. It’s so bad that technicians have been scrambling to figure out ways to fix this issue, the most easy and affordably for our clients…but sadly, this may not be the case.

cryptolockerHere is what is happening and what’s going on. An executable file is being sent through email and the recipients are opening them, opening a file and it’s taking over your computer, encrypting all of your files and locking you out. And this is no joke, if you pay the “ransom”, you can get your files back (or maybe not). Or you can call a technician and they can try to get your files back for you, but honestly…the time may be as much as the ransom is for the decryption of your files. This is horrifying to our industry. Have a client pay ransom or have us spend hours on your computers to get your computer back up and running.

What I will be doing today in this blog, is explaining many ways for you to protect your computer from this ransomware. (what is ransomware? software that takes your computer hostage via log in screens or destructs your computer in a manner you can’t use it).

1.) If you are backing up with an external hard drive, insure you are backing up (many people think they are, but are not) and eject the external hard drive from the computer when you are not backing up. Do not risk the external hard drive getting encrypted.

2.) Better choice, back up online. I can help you with this service, we can back up not only one computer, but as many as you want.

3.) We are finding that virus and malware detection products will not stop this attack, but having something is better than nothing in my opinion as it “might help” because the virus and malware companies by now are aware of the attacks and hopefully adding to their updates.

4.) Backup your entire computer and data files with a “image backup” and if something goes wrong, we can bring your computer back to the state it was at prior to the attack (or any virus attack or operating system crash) for just $49 per computer and some labor fee’s for setting it up.

If you have a computer that is already encrypted and need help, contact us.

If you want to protect your computer in case this happens, contact us.

612-865-4475 or email info@callthatgirl.biz

Internet Browser Toolbar Redirect & Virus Removal Sale

| October 17, 2013 | 0 Comments

With the increasing internet browser toolbar software redirect calls we are getting, we have now created a special deal for just these types of requests.

A bit about these types of issues. These are usually not viruses, but more software downloads that happened by accident (you didn’t know you were installing it) or intentionally, (you meant to install one piece of software and downloaded a fake program). What this means, is that your antivirus & malware products will probably not catch these downloads as they are not infected.

Sale!

We can remove the redirects and uninstall the software for just $49 from Oct 17 to Nov 17th.

After Nov 17th, the price will go up to $69

What if you do have a virus? Our virus removal prices are $129, so if you do have us to the $49 clean up and we find a virus, we will recommend moving to a virus removal and this special price is $99.

If your computer is slow and sluggish, it’s doubtful that the toolbar removal will make your computer faster (but it will make your internet faster probably), at that point, you can upgrade to a tune up for just $79 during this special.

Do you need online backup? Add on $49 (regular price $79)

Do you need a better antivirus and malware protection package? Ours is regularly $59, during this sale it’s just $39

Want everything? Dang! Get online backup installed, a tune up and our malware & antivirus installed for just $129.

We only book these appointments during the hours of 3:30 pm and 8:00pm or on a weekends. This sale is not available during the typical workday.

 

To schedule an appointment, email Info@callthatgirl.biz or call 612-865-4475