• Tag Archives computer repair
  • John McAfee ‘grateful’ Intel is dropping his name from ‘worst software on the planet’

    John McAfee

    John McAfee is glad that Intel is dropping his name from McAfee’s antivirus software. 

    The UpTake: Intel is dropping the McAfee name from the antivirus software brand. It’s infamous founder, John McAfee, couldn’t be happier.

    John McAfee is finally glad to be rid of his embarrassing association with McAfee antivirus software.

    Intel, which acquired McAfee Inc. in 2011, is dropping the McAfee brand in favor of Intel Security. McAfee founded the eponymous global software security firm in 1987, but left the company in 1994. When we last checked in with the gonzo antivirus pioneer, he was being evicted from his luxury Portland apartment and employing biker bodyguards.

    His response to Intel’s rebranding was pure McAfee: “I am now everlastingly grateful to Intel for freeing me from this terrible association with the worst software on the planet,” he told the BBC. “These are not my words, but the words of millions of irate users. My elation at Intel’s decision is beyond words.”

    Intel CEO Brian Krzanich announced the name change at the International Consumer Electronics Show this week. It’s not clear that McAfee’s shenanigans had anything to do with the re-branding.

    McAfee’s disdain for the product bearing his name is well known.

    “Although I’ve had nothing to do with this company for over 15 years, I still get volumes of mail asking how do I uninstall this software,” McAfee said in a salty parody video released in June called “How to Uninstall McAfee Antivirus Software.” Warning: the video, embedded below, contains mature themes and John McAfee.

    Visit or our Repair section and services, or Call 754-234-5598 to repair your computer online for a small fee

    www.ccrepairservices.com


  • NEW VIRUS – Windows Safety Master Virus Windows PC Computers

    Windows Safety Master is a rogue anti-spyware program from the Rogue.FakeVimes family of computer infections. This program is considered scareware because it displays fake scan results, fake security warnings, and does not allow you to run programs on your computer. Windows Safety Master is distributed through web sites that display a fake online virus scanner that states your computer is infected and then prompts you to download the installation file. This infection is also promoted by hacked web sites that contain exploit code that tries to install the infection on your computer without your permission or knowledge.

    When Windows Safety Master is installed it will be configured to automatically start when you login to Windows. Once started, it will pretend to scan your computer and then states that there are numerous infections present. If you attempt to remove any of these supposed infections, the program will state that you first need to purchase a license before being allowed to do so. As all of the scan results are false, please ignore any prompts to purchase the program.

    Windows Safety Master screen shot

     

    To protect itself from being removed, Windows Safety Master will also block you from running any legitimate application on your computer. It does this to prevent you from running legitimate security software that may detect it as an infection and remove it. The message that you will see when you attempt to run a program is:

    Firewall has blocked a program from accessing the Internet
    C:\Program Files\Internet Explorer\iexplore.exe
    is suspected to have infected your PC.
    This type of virus intercepts entered data and transmits them
    to a remote server.

    When you see this message please ignore it as your programs are not infected and will work normally after this infection is removed.

    While Windows Safety Master is running it will also display fake security alerts that are designed to make you think your computer has a severe security problem. Some of these warnings include:

    Error
    Trojan activity detected. System integrity at risk.
    Full system scan is highly recommended.

    Error
    System data security is at risk!
    To prevent potential PC errors, run a full system scan.

    Warning! Identity theft attempt detected
    Hidden connection IP: xx.xxx.xxx.xxx
    Target: Microsoft Corporation keys
    Your IP: 127.0.0.1

    Just like the scan results, these warnings are fake and can be ignored.

    As you can see, this infection was created for the sole reason of scaring you into purchasing it. It goes without saying that you should definitely not purchase Windows Safety Master, and if you already have, please contact your credit card company and dispute the charges stating that the program is a scam and a computer virus. To remove Windows Safety Master and other related malware, PLEASE VISIT OUR WEBSITE

    CALL – COMPUTER REPAIR at 754-234-5598 if you are infected by any of these viruses.

    www.ccrepairservices.com


  • Apple MAC OSX Tricks and Tips

    Startup Shortcuts

      • Hold the ‘x’ key during startup. This will force the Mac to boot from OS X, no matter which disk is specified as the startup disk.

     

      • Hold the ‘c’ key during startup to boot from a bootable CD or DVD.
      • Hold the ‘n’ key during startup to boot from a networked computer that has a NetBoot volume.
      • Hold the ‘t’ key during startup to boot in FireWire Target Disk Mode. This mode lets you use any Mac with a FireWire port as the source for your bootup system.
      • Hold the ‘d’ key during startup. If the Apple Hardware Test DVD is in the optical drive, the Apple Hardware Test will begin.
      • Hold the option key during startup. The OS X startup manager will appear, allowing you to select a disk to boot from.
      • Hold the shift key during startup. This will boot your computer in Safe Mode. Safe Mode disables login items and non-essential kernel extensions from starting up.
      • Hold the command + r keys during startup. This will cause your Mac to use the Recovery HD partition, which will allow you to restore OS X Lion or later.
      • Hold Command + ‘v’ during startup The command key is the key with the cloverleaf symbol. This shortcut will boot your Mac in Verbose Mode, with descriptive text sent to the display during the startup process.
      • Hold Command + ‘s’ during startup. This shortcut will boot your Mac in Single-User Mode, a special mode used for troubleshooting and repairing complex hard drive issues.
      • Hold down the mouse’s primary key during startup. On a two- or three-button mouse, the primary key is usually the left button. This shortcut will eject a CD or DVD from the optical drive.
    • Hold Command + Option + ‘p’ + ‘r’ during startup. This zaps the PRAM (Parameter RAM), an option that long-time Mac users will remember. Press and hold the key combination until you hear the second set of chimes. Zapping the PRAM returns it to its default configuration for display and video settings, time and date settings, speaker volume, and DVD region settings.

    In all cases, you should use the keyboard shortcut combinations immediately after pressing the Mac’s power switch, or, if you used the Restart command, after the Mac’s power light goes out.

     

    Visit our Repair section and services, or Call 754-234-5598 to repair your computer online for a small fee

    www.ccrepairservices.com


  • LiveSupport Un-wanted Program

    The LiveSupport program is a small program that displays contact information for a remote support company and suggests that you download a variety of security programs to protect your computer. This program is commonly bundled with free programs that you can download off of the Internet. These free programs bundle adware programs like LiveSupport in order to generate revenue even though the program you wanted is free. Once installed, Live Support will automatically start when you login to Windows and display an icon of a remote-support person’s head on the title bar of the active Window. When you click on this head icon, you will be shown a screen that offers a remote support number, which is currently 1-855-544-6024, as well as a tab that pretends to perform a system check and recommends two of four programs. The programs it promotes are Driver Pro, Optimizer Pro, Driver Updater, and System Performance Optimizer.

     


    LiveSupport screen shot

     

    It is important to note that even though some may find this program to be misleading and annoying, it is not an actual computer infection. Rather this program is installed by free programs that did not adequately disclose that other software would be installed along with it. Therefore, it is important that you pay attention to the license agreements and installation screens when installing anything off of the Internet. If an installation screen offers you Custom or Advanced installation options, it is a good idea to select these as they will typically disclose what other 3rd party software will also be installed. Furthermore, If the license agreement or installation screens state that they are going to install a toolbar or other unwanted adware, it is advised that you cancel the install and not use the free software.

    This program does contain an uninstall entry within the Add or Remove Programs or Uninstall Programs control panel. Unfortunately, there have been many cases where the program did not fully remove itself when using the control panel or it encountered errors. For this reason you may contact Complete Computer Repair Services at 754-234-5598 or Visit our Online Website www.ccrepairservices.com


  • Oracle to issue huge security patch addressing 36 Java vulnerabilities

    ENTERPRISE VENDOR Oracle will issue its first patch update of 2014 on Tuesday and it just so happens that it’ll be one of its biggest ever that includes a slew of security patches, many of which address vulnerabilities in Java.

    The Critical Patch Update will address 144 flaws in hundreds of Oracle products, 36 of which apply to vulnerabilities in Java SE, including 34 that are bugs that can be exploited remotely by an attacker without requiring authentication.

    “Some of the vulnerabilities addressed in this Critical Patch Update affect multiple products”, Oracle said in its pre-release announcement. “Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update fixes as soon as possible.”

    Five of the security fixes will apply to Oracle Database Server. One of these vulnerabilities might be remotely exploitable without authentication, meaning it could be exploited over a network without the need for a username and password.

    The patch update will be released on 14 January for Oracle products and components including JavaFX, versions 2.2.45 and earlier, Java JDK and JRE, versions 5.0u55, 6u65, 7u45 and earlier, and Java SE Embedded, versions 7u45 and earlier.

    The highest CVSS 2.0 Base Score for vulnerabilities in Oracle’s Critical Patch Update is 10.0 for Java SE, Java SE Embedded, and JRockit of Oracle Java SE, MySQL Enterprise Monitor of Oracle MySQL, Oracle FLEXCUBE Private Banking of Oracle Financial Services Software and Oracle WebCenter Sites of Oracle Fusion Middleware.

    Security firm Qualys’ CTO Wolfgang Kandek warned that plug-ins like Java are one of the main threat vectors as more companies are being infected through web based attacks.

    “One needs to pay attention to the browser plug-ins, and in that class, the most important is Oracle’s Java,” Kandek said. “Java just suffered a widely published attack during the Yahoo Ad-based attacks from [December to January 2014], where the Magnitude exploit kit was used to deliver malware to users that were running an outdated version of Java.”

    He added that Oracle’s critical patch update will “further tighten its security parameters”.

    ONLINE COMPUTER REPAIR SERVICES AND NEWS AT

    www.ccrepairservices.com

     


  • Prison Locker Virus Upcoming in 2014

    Ransomware is one of the most blatant and obvious criminal’s money making schemes out there. Ransomware malware was mostly known by the people when Cryptolocker comes into play. At the time when readers were getting aware of ransomware, Cryptolocker threat had touched the peak and other money motivated cyber criminals have started developing their own Cryptolocker versions.

    Two hackers going by the name of ‘gyx’ and ‘Porphyry’ (admin of maldev.net hacking forum) are advertizing a new ramsomware malware tool-kit called “Prison Locker” on various hacking forums with tutorials.

    They have developed the Prison Locker a.k.a Power Locker ramsomware toolkit in C/C++ programming language, proving a GUI version with customizable features for customers.

    The Ransomware is using BlowFish encryption to encrypt all available files on the victim’s hard disk and shared drives except .exe, .dll, .sys, other system files.

    During encryption it will generate unique BlowFish key for each file and then encrypts the keys further with RSA-2048 encryption and will send victim’s system information back to the command-and-control center of the attacker.

    As the developer mention in a Pastebin post, the Command-and-control center allows an attacker to set the ramsomware warning time duration, ransom amount, payment mode and also allow decrypting the files on the victim system after payment received.

    The addition features added to Prison Locker:

    • The malware is able to detect Virtual Machine, Sandbox mode, and debugging environments.
    • It Will disable Windows key & Escape key to prevent unwanted user actions.
    • Malware can startup in both regular boot mode and safe boot under HKCU.
    • Kills taskmgr, regedit, cmd, explorer, and msconfig. processes to prevent unwanted user actions.

    If you get infected with this virus call Computer Repair Services at 754-234-5598

    www.ccrepairservices.com


  • Apple Mac OS X Flashback Trojan Is still Alive, Recently Infected 22,000 Machines

    The Flashback Trojan, the most sophisticated piece of malware that infected over 600,000 Apple’s Macs systems back in April, 2012 is still alive and has infected about 22,000 machines recently, according to the researchers from Intego.

    For a refresh, Flashback Trojan was first discovered in September 2011, basically a trojan horse that uses a social engineering to trick users into installing a malicious Flash player package.

    Once installed, the Flashback malware injects a code into that web browser and other applications like Skype to harvest passwords and other information from those program’s users. The Trojan targets a known vulnerability in Java on Mac OS X systems.

    The system gets infected after the user redirects to a compromised website, where a malicious javascript code to load the exploit with Java applets. Then an executable file is saved on the local machine, which is used to download and run malicious code from a remote location.

    It took Apple months to recognize the severity of this Mac malware threat, which first appeared in the Fall of 2011. However, Apple released the patch and updated the specific introduction about the operating system,“It doesn’t get PC viruses” to “It’s built to be safe.” on the Apple website. Intego said:

    “The Apple Product Security Response team took serious actions in 2012 to mitigate the threat using XProtect and other security updates (including a Malware Removal Tool), however, the botnet count was only divided by six according to our sinkhole.

    Now in 2014, Intego researcher Abbati claims that Flashback botnet is still alive and is silently “adrift.”

    “Intego purchased some of the command and control (C&C) server domain names to monitor the Flashback threat that infected hundreds of thousands of Macs. Beginning January 2, we studied those domains and our sinkhole servers recorded all connections from Macs where Flashback is still active and trying to contact the C&C servers.

     

    Flashback botnet On April 2012, the Mac world was stunned to learn that the Flashback Trojan had infected millions of machines. The Flashback Ad-clicking the component tool that caused infected Macs to view sponsored links that had the potential to generate millions of dollars in fraudulent ad revenue. In addition, it has the capability to do much more, including sending spam, engaging in denial-of-service attacks, or logging passwords.

    To protect your computer from contracting the virus now, Call Online Complete Computer Repair Services 754-234-5598

    www.ccrepairservices.com

     


  • Hackers behind TARGET data breach are looking for crackers to decrypt Credit card PINs

    I think you haven’t forgotten the massive data breach occurred at TARGET, the third-largest U.S. Retailer during last Christmas Holidays. People shop during Black Friday sales in which over 40 million Credit & Debit cards were stolen, used to pay for purchases at its 1500 stores nationwide in the U.S.

    TARGET officially confirmed that the encrypted PINs (personal identification numbers) of payment cards were stolen in the breach, since the stolen pin data were in encrypted form so they were confident that the information was “Safe and Secure”, because PIN cannot be decrypted without the right key.

    The Breach was caused by a malware attack, that allowed the criminals to manipulate Point of Sale (PoS) systems without raising red flags and the card numbers compromised in the breach are now flooding underground forums for sale.

    Possibly a group of Eastern European cyber criminals who specializes in attacks on merchants and Point-of-Sale terminals either attached a physical device to the PoS system to collect card data or they infected the PoS system with malware which sniffed the card data as it passes through a PoS system.

    However, the hackers have all 40 Million payment card details, but the PINs are encrypted with Triple-DES (Data Encryption Standard), which is a highly secure encryption standard used broadly throughout the U.S.

    Recently, The Cyber Intelligence firm IntelCrawler noticed that a group of individuals are discussing in underground hacking forums, attempting to decrypt a 50GB dump of Triple DES (3DES) encrypted PIN numbers believed that it belongs to TARGET breach. They asked for a ‘pro hacker’ to decrypt the information at a fee of $10 per line.

    IntelCrawler also claims that cracking the Triple-DES may be a slow process, but not impossible and vulnerable to brute-force attack using cracking tools i.e. John the Ripper.

    Security researcher, Robert Graham writes a blog post, suggested that hackers can get PINs without decrypting them, because two identical PINs decrypt to the same value.

    For example, let’s say that the hacker shopped at Target before stealing the database. The hacker’s own debit card information will be in the system. Let’s say the hacker’s PIN was 8473. Let’s say that these encrypts to 98hasdHOUa. The hacker now knows that everyone with the encrypted PIN of “98hasdHOUa” has the same pin number as him/her, or “8473”. Since there is only 10,000 combination of PIN numbers, the hacker has now cracked 1000 PIN numbers out of 10 million debit cards stolen. He recommended that TARGET should at least salt the encryption, to make it more difficult for crackers.

    ONLINE COMPUTER REPAIR SERVICES AND NEWS AT

    www.ccrepairservices.com


  • ⫸Computer Screen Laptop Repair – Virus Removal +More

    WE CAN FIX ANY COMPUTER PROBLEM
    VIRUS AND SPYWARE REMOVAL
    TOTAL COMPUTER REPAIR SERVICE
    DC POWER JACK REPAIR OR REPLACEMENT
    LCD LED OR CCFL BACKLIGHT SCREEN REPAIR
    HARD DRIVE BACKUP & RECOVERY AFTER TOTAL SHUTDOWN OR FAILUREDell Sony Acer Hp Compaq Ibm Lenovo Asus Thinkpad Toshiba Samsung Mini Apple Mac Netbook Notebook Laptop or Desktop Computer

    CALL  754-234-5598   www.ccrepairservices.com


  • COMPUTER REPAIRS by Complete Computer and Laptop Repair Service

    Computer Repairs Virus removal and Protection against Spyware

    Service Repair for Pc Laptop or Desktop Computers

    We can remove Viruses, Trojan Horses, Spyware, Adaware, Rootkits, Worms, Keyloggers and More

    We can help you  keep your privacy and protect you againts such attacks.  Replacement of Laptop Screens & Lcd Monitor screen

    DC Jack – Motherboard – Keyboard – Dvd Cd Rom Disc Drive – Webcam – Mouse pad – Speaker – Memory Ram –  Hard Drive Sale & Repair

    All type of computer repairs done Onsite in your Home Office or business. All PC Computer Laptop repairs are guarranteed

    Call us for all your Computer or Laptop repair, All services & Repairs not listed. If is broken we can repair it, So call today. 

    SERVICING ALL MANUFACTURER BELOW

    Acer – TravelMate, Extensa, Ferrari, Aspire
    Apple – MacBook, MacBook Air, MacBook Pro
    ASUS – Asus Eee, Lamborghini
    Dell – Inspiron, Latitude, Precision, Studio, Vostro, XPS, Studio XPS, Alienware Mini Legacy System Adamo
    Fujitsu – LifeBook, Stylistic
    Hewlett-Packard – HP Pavilion, HP Omnibook Envy EliteBook ProBook
    Lenovo – ThinkPad, IdeaPad, 3000
    Micro-Star International (MSI) – Megabook, Wind
    Samsung Electronics – Sens
    Sony – VAIO Series
    eMachines  – Gateway – Solo – Series Compaq
    Toshiba -dynabook, Portege, Tecra, Satellite, Qosmio, Libretto

    ==================================================

    20+Years Experience Tech: ERNESTO

    SAME DAY SERVICE –  754-234-5598

    www.ccrepairservices.com


  • PASSWORD REMOVAL Unlock your Laptop or Computer

    Is your Laptop or desktop computer locked? Does it have a password which you forgot?

    Password removal and unlock service for all type of computers & Laptops Pc & Mac.

    BIOS HARD DRIVE MAC OSX OR WINDOWS PASSWORD REVOVAL AND UNLOCK SERVICE

    Please check other services offered below

    Screen Replacements
    Windows Wont Install
    Windows 7 Upgrades
    Data Transfer
    Virus Removal
    Data Recovery
    Password Recovery
    Blue Screen Of Death

    Black Screen

    LCD LED OR CCFL Screen Repair Sale Installation & Replacement-Plus Many more services

    Dell Sony Acer Hp Compaq Ibm Lenovo Asus Thinkpad Toshiba Samsung Mini Apple Mac Netbook Notebook Macbook

     CALL  – 754-234-5598    

    www.ccrepairservices.com/Password Help


  • VIRUS REMOVAL – SPYWARE REMOVAL & LAPTOP

    Computer Virus or Spyware Removal, Memory Upgrade, Data Recovery? We repair computers, and other small electronics. Screen replacements, water damage and repairs, other small electronic repairs. We buy broken laptops

    Located in Miramar & Fort Lauderdale  Serving all of broward county Hallandale, Davie, Hollywood, Pembroke Pines and more

    SUPER FAST SERVICE 754-234-5598

    www.ccrepairservices.com