Onsite_PC_Solution_Unwanted_Toolbar

Do others use your computer or laptop at home or in the office? If so you are probably worried about them installing questionable programs in Windows when you are not around.  Here’s how you can prevent software from being installed in Windows.

In Windows 7 or Vista, from the Start menu type gpedit.msc in the search box.

w7_gpedit

In Windows 8, swipe the right side of the screen, click the search icon, and type gpedit.msc

w8_gpedit.

This will open the group policy editor.

Go to Computer Configurations > Administrative templates > Windows Components > Windows Installer. In the right pane double-click on Disable windows installer

disable-windows-installer

 

Make sure Enable is selected

Onsite_PC_Solution_Enable_Policy

Selecting Always disables the Windows installer.

The default setting is Never. This allows users to install and upgrade software.

Selecting For non-managed apps only permits users to install only programs that a system administrator assigns.

Please note that this only affects Windows Installer. It doesn’t prevent users from using other methods to install or upgrade programs.  Also, when you are ready to install an application you will need to change this setting back manually.

For more tips on computer security, contact your local IT professionals.

 

Read More


Ever needed to share computer instructions or steps with another person? Maybe you’re the only person in the office that knows the special Excel formula trick. The Problem Steps Recorder allows you to record the steps you took to complete a Windows task for future reference or to share it with others.

To open the PSR (Problem Steps Recorder), click the Start button and type ‘psr’ in the search box. On the list of results, click ‘psr’.

psr_start_menu

When performing a Windows task whose steps you want to save, click ‘Start Record’ on the ‘Problem Steps Recorder’ console. The PSR has a pause button you can click to pause recording.

psr_console

Click ‘Stop Record’ to finish recording. In the ‘Save As’ dialog box, save the recording as a zip file to a desired location.

open_file

To view the recording, open the zip file by double clicking it. Next, double click the recording, which will open in the default web browser.

play_in_browser

The saved zip file containing the recording can be sent by email by clicking the help down arrow and by selecting ‘Send to E- mail recipient’.

send_to_email_recipient

The default email client will open with the last recorded file attached to it.

Please note that the file must be saved first. The steps of a problem can be annotated by clicking the ‘Add Comment’ button.

add_comment

Use the mouse to highlight the part of the screen you want to comment on.

annotate

Type in the ‘Highlight Problem and Comment’ box, and click ‘OK’.

highlight_problem_and_comment

 

For more tips and tricks on your PC, contact your local IT professionals.

Read More


Typical Chrome New Tab page

Typical Chrome New Tab page

If your browser cannot leave a new tab page such as the Chrome one shown above and cannot navigate to another web page, here are a few possible remedies.

First, check if the keyboard or mouse is the issue.

Check if the backspace or other key is stuck. If that is the case, try to raise the key. Failing that, unplug the mouse and keyboard and see if the problem persists. Perhaps a key or short cut is being repeatedly triggered without the user’s knowledge. This can be confirmed by using a different keyboard or mouse.

Second, if it’s an issue with the browser

Other than Internet Explorer, you should save bookmarks into an html file then uninstall the browser thoroughly with an uninstaller tool such as Revo or from the Windows Control Panel. Reinstall the browser and see if the browser still freezes on the new tab page.

Internet Explorer is integrated with the Windows installation and cannot be simply uninstalled. For IE, after backing up desired new settings, configurations, and files, perform a system restore. Restore Windows to the last remembered time that the browser did not experience the new tab persistence problem.

For more tips or advice on troubleshooting common software issues, contact your local IT professionals.

Read More


 

The original Windows XP Background location taken in Sonoma Valley, California

The original Windows XP Background location taken in Sonoma Valley, California

Windows XP has officially been retired by Microsoft but does that mean you can safely continue running it at home or at the office?  A report put out by security firm F-Secure has recently highlighted some ways to stay somewhat safe while continuing to run the expired Operating System, while emphasizing that an exploit could be ready any day now:

1. Install the final updates for Windows XP from Microsoft

2. Make sure Microsoft Office is fully patched

3. Update all third party software

4. Run a firewall and antimalware protection

5. Run Micrososft’s EMET (Enhanced Migration Experience Toolkit)

Although these steps can help delay a system compromise, once Windows XP has been infected it is considerably more difficult to clean than other operating systems.  Virus and malware writers will now be able to look at the updates released for Windows 7 or 8 and know exactly where to attack Windows XP since the operating systems share some similar code.  The report also goes on to mention that an exploit on Windows XP will occur soon.

 

The latest F-Secure report highlights risks of continuing to run Windows XP

The latest F-Secure report highlights risks of continuing to run Windows XP

According to the report, web based attacks and infections doubled in the second half of 2013.  It is important to note that modern virus writers and criminals often do not want to damage a computer system.  It is much more lucrative to hold the system ransom for money or to steal sensitive information such as bank logins, email accounts and credit card information.

For more guidance on moving away from Windows XP or securing your home or office, contact your local IT professionals.

Read More


bitcoin-miner

You don’t need dynamites to find Bitcoins, just enough knowledge and computer hardware.

Malware not only steals your personal data, but can also hijack your system and network resources to work on things you don’t approve of.

Bitcoin and other forms of cryptocurrencies have skyrocketed in popularity in recent months.  The cryptocurrency craze isn’t reserved just for investors as virtually anyone can get their hands on these lucrative digital coins—given they have the necessary resources.  What we’re talking about is: if you don’t have money to invest in Bitcoin, you can mine the Bitcoins.  Mining these coins, however, will require some computer know-how and hardware.

Stealing Without Physically Taking

When it comes to knowledge of how hardware works and where digital information flows, cybercriminals and hackers are ahead of the game.  What they lack is the hardware, but why do they need to purchase their own hardware when they can steal your processing power?  All they have to do is run malicious code on your computer to hijack the computer’s resources remotely and us it to mine Bitcoins for themselves.

Beginning late last year, a slew of malware aimed at hijacking computers for mining Bitcoins began infecting unsuspecting victims.  Where and how these tools make their way onto people’s computer can vary, but it is especially troubling if the source is a popular website like Yahoo.

Yahoo admitted in January that its advertising platform was utilized by cybercriminals to distribute hijacking malware and viruses.  Fox IT, a cybersecurity firm, estimates that as many as 2 million Yahoo users were affected by the exploit.  Yahoo, however, has not given an estimate how many of its users clicked the scam ads.

Must Click the Ad That’s Slick!

While most of us will try to ignore any type of ads that appear on a website, savvy marketers will always find a way to deploy attractive and mind boggling banners that will trick us into clicking.  Criminals are also marketers in a sense, and so it is likely that they used these marketing tactics to lure people into clicking their ads on Yahoo.

task manager

If you’re not running any resource intensive tasks, the task manager should display low CPU and memory usage.

If you’re a Yahoo user, and notice that your computer is running unusually slow as of late, check your computer’s resource monitor to see which process is taking up abnormally large amount of bandwidth, memory and CPU usage.  Any process or application that is hogging up too much system resources could potentially be one of these Bitcoin mining malwares.

If you’re having a hard time navigating and figuring out whether or not you’re a victim of the Bitcoin malware, please contact our IT professionals and we’ll be more than happy to give you a hand!

Read More