Computer / Internet Tips & News – exclusively for Computer Techs clients
Support for Windows | macOS | iOS | Android
Welcome to the Computer Techs Computer / Internet Tips & News blog. This purpose of this site is meant to provide a service to our valued customers, by keeping you informed with the latest news and tips related to your computer and the internet. Consider using the search box on the left side of the website to help you find a specific topic or article, or scroll through articles below to learn something new.
If you’re happy with our service, please consider recommending Computer Techs to a friend or relative. If we service their computer, you get $25 Off your next service call.
The details: Please have your friend or relative mention your name during the appointment, or after the appointment contact Mark Cobb with the name of the person that you recommended/referred. The referred person must be a new Computer Techs customer and not reside in the same household as the referrer.
Scammers are becoming increasingly clever. Every month we hear from clients who have been scammed by letting someone take control of their computer and coerce them into paying for support for non-existent computer or account-related problems. With a little bit of knowledge of how these scams work, you won’t become a victim yourself.
Scams typically start with a website pop-up, email, phone call or text message from a well-known company such as Amazon, Windows/Microsoft, Apple, or Netflix. You are notified about a large purchase that has been or will be charged to your account – or there’s a problem with your account or device/computer. You’re told to call, click a link or talk to a fraud/account representative to confirm the purchase or account information. No matter how legitimate it sounds – It’s a scam! Read on about some of the most common scams we’ve encountered recently:
“Someone just charged an item to your Amazon account. I’m calling to confirm the purchase or refund your money.”
“This is the FBI and we’ve detected pornographic images on your computer. You must pay a fine right away!”
“This is your friend Bob. Can you please buy a gift card for me so I can give to my niece – I’ll pay you back.”
“Grandma, this is your grandson – I’m in trouble and you need to bail me out. Please don’t tell mom!”
“Your credit card number has expired. I’m calling to get your new number or your service will be cancelled right away!”
“I’ve hacked into your email account – I can prove it because your password is xxxxxx. I’ve got embarrassing pictures of you that I captured with your webcam. If you don’t pay up, I’ll release the the pictures to all of your contacts.”
“Your computer protection has expired. If you don’t call right away we’re charging $399 to your account to renew the protection.”
WHAT YOU SHOULD DO:Ignore the pop-up, email, call or SMS. If you answer an unexpected phone call, don’t answer or engage with the scammer – hang up. Most likely there is no problem at all. Unfortunately you can’t trust unknown or unsolicited callers to be who they say they are, nor can you trust the name or number on Caller ID – scammers frequently used forged numbers. Never, everallow someone you don’t know coerce you into letting them view your computer screen or allow remote access. You wouldn’t allow someone knocking on your door to come in – the same should be true for an unsolicited phone call or message.
If in doubt, log into your account normally (not via a link in an email or telephone number provided in a recording) to check for any unrecognized activity. Or you can call the company using the phone number listed on their official website, or printed on a card you have from the company.
If you’ve already gone too far and realize that you’ve engaged in a conversation with a scammer – below are some examples of how you can quickly get out of the situation.
“My attorney/caregiver handles all of my affairs. Contact him/her.”
“Send me an official correspondence in the mail – you should already have my mailing address.”
Often times scammers tell you that you must act fast – so that you don’t have time to think about it, contact a trusted tech-savvy friend, family member or computer technician. Stick to your better judgement, remain in control of the conversation – or just hang up.
If you have a free Yahoo or AT&T/Yahoo email account and use the forwarding feature to send your email to another email address (i.e. email@example.com), you may have noticed that forwarding stopped in January 2021.
Are you looking for the perfect gift for someone who needs computer help or service? Consider giving the gift of computer help or service with the purchase of a Computer Techs eGift Card. eGift Cards can be used towards payment of remote support or on-site services. Click the link picture below for more details, or to purchase now.
Internet Explorer is the web browser that Microsoft included with the Windows operating system through Windows 8.1. Beginning with Windows 10, Microsoft Edge is the new browser that’s included with the operating system and is continually being optimized with performance, feature and security updates. That leaves Internet Explorer 11 – released in late-2013 – as the last major version of Internet Explorer.
With other browsers being continually updated – such as Edge version 41, Firefox version 57 and Chrome version 62 (as of November 2017) , some websites have stopped supporting the use of Internet Explorer. One of those websites is Yahoo – which includes the popular Yahoo web portal, Yahoo Mail and Yahoo Finance.
An advantage of using a newer browser such as Chrome includes faster web browsing, improved security and upcoming features that will help stop fake warning messages that are often caused by webpage redirects and misleading advertisements.
If you need help switching away from Internet Explorer and transferring your Favorites and settings to a new web browser, please contact us.
Even though you may have a password system, you still should keep a record of your passwords. Some people put their passwords in a notebook, Rolodex, on their mobile device or online password manager. Which is the best option for you? How to safely manage your passwords
Over the years many of our clients have asked for a way to keep their computers secure and up-to-date, and not have to worry about the seemingly constant barrage of updates. With websites getting hacked on a daily basis, and the increasing chance of your personal information being compromised, it’s more important than ever to keep your computer up-to-date and maintained.
With the Computer Techs Maintenance Plan, we will maintain, update and check the security on your computer on a convenient quarterly schedule. Service will be performed via a Remote Support session which takes about an hour. Services include:
Install security updates for browser add-ons, program updates, available router updates, critical computer firmware and Windows updates
Remove adware/toolbars/homepage hijackers
Remove or disable unused or unnecessary apps that cause security or performance issues
Check internet connection settings and remove any malicious scripts, DNS or proxy settings
Check hard drive health and used space
Check back-up and restore settings
Defragment hard drive files
Check browser settings and remove unnecessary extensions
Delete unnecessary temporary, log and update cache files to free up drive space
Check Wi-Fi settings and adjust if interference or performance issues exist
Apply computer manufacturer’s urgent and recommended software and hardware updates if needed
Check for print jobs stuck in the queue
Check for frequent app crashes or system “blue screen” errors that could lead to more serious problems
Additional benefits of being on our quarterly Computer Maintenance Plan include:
Priority callbacks and email replies with simple or easy-to-resolve issues or questions under 5 minutes at no charge.
When you sign up for the Computer Techs Computer Maintenance Plan, you’ll get all of the services above for less than the price of a house call – quarterly remote service for one computer is just $80 payable at the time of each quarterly service. Additional computers maintained during the same appointment time are just $20 each. Semi-annual remote appointments are also available for $89 and $30 for additional computers. On-site service is also available at regular hourly rates. To sign-up for your initial quarterly remote service, schedule your appointment – or contact us for semi-annual and/or on-site service.
Please Print This Article this article for future reference on how to close a fake warning web page if it locks your browser.
The screenshots in this article all have one thing in common. They are all trying to convince you that there are problems with your computer or device, and that you need to call the number displayed in order to fix the problems. However, if you call the number you will be connected to a scammer who will use scare tactics to convince you that there are more serious problems with your computer, and that paying several hundred dollars for them to “fix” the problems is your only recourse. This scam has tricked thousands of people into paying millions of dollars for non-existent problems.
Never respond to a pop-up on your computer or smartphone screen that urges you to call a number for help. If the Window will not close normally by clicking the red “X” on the upper-right corner of the window, try the one of the following in 3 suggestions (listed in order of difficulty):
1. If present, at the bottom of the front window click the checkbox to “Don’t let this page create more messages” or “Prevent this page from creating additional dialogs” then press “OK”. You should then be able to close your browser normally using the red “X”.
2. Turn off or restart your computer using your normal method via the Start button icon on the bottom left taskbar, then Shut down or Restart. If the fake warning website covers your full screen where you cannot see the Start button icon, press the Windows key ( or located near the bottom left corner of your keyboard) which should bring the Start menu to the foreground.
3. If neither of the above methods work, press and HOLD the power button on your computer until it turns off.
After turning your computer back on and/or opening your browser, don’t go back to the website or email that you had visited immediately prior to seeing the pop-up.
Over the years we’ve written various articles about AT&T/Yahoo email being plagued by account security issues, bothersome ads in their webmail interface, forced password resets, spam messages sent to user’s contacts and more. The revelation that over 500 million Yahoo accounts have been compromised in recent years leads us to once again advise people to stop using AT&T/Yahoo Mail, and switch to using a more secure and reliable email provider such as Gmail.
In May 2020 AT&T once again changed their login procedure, and began blocking use of the website if you use an ad blocker.
An important security option for online accounts is 2-step verification – neither AT&T/Yahoo or Charter/Spectrum email accounts offer the option. Therefore we recommend that you ditch your internet provider’s email service and switch to Google’s Gmail or Microsoft’s Outlook Mail.
If you’ve got an Android smartphone, you should already have a Gmail address associated with the Google account required for your phone. If you don’t already have Gmail, it’s easy to get a free address and setup your account – and we can help.
Switching email providers can be a hassle. But we can setup the initial change for you, and give follow-up guidance on how to systematically inform business correspondence of the change over time. We’ve got a step-by-step procedure that includes (but not limited to):
Over the years many clients have reported to us that their Yahoo, Hotmail or AOL email account has been hacked. They first notice the problem when they are alerted by their email contacts claiming that they are receiving spam emails with links to prescription drug or work-at-home websites, or a plea for money after losing their passport while traveling overseas.
When attempting to login to their email some will discover that their password has been changed and they are unable to access their account. Others have reported some or all of the following changes:
All contacts have been deleted
“Reply-to” address changed
All email being forwarded to a different address
Email signature added or changed
The language changed to Spanish or Arabic
If your Yahoo or AT&T/Yahoo account has been compromised, below are some helpful links:
If you’re happy with our service, please let others know by recommending us to your friends and family, and/or by writing a review about our service. If you personally recommend us to a friend or relative and we help them, you get $25 off your next service call.
Why trust someone who “knows” computers and works on them in their spare time? Why trust someone who you called from a pop-up ad on your computer? You shouldn’t! Computer Techs is a local business that works with computers and related devices on a daily basis and has been doing so since 2003. When you need help with your computing devices, you can trust Computer Techs to be there when you need us, and stand behind our service.
When people search for Computer Support or Repair Services on the internet, they often search Google, YellowPages.com or Yahoo Local. Please consider letting others know about our service by posting a review at one or more of the following web sites:
All major web browsers have the option to save the login and password for the websites that you visit so it’s easier to login the next time you visit a site. If you don’t already have a password system to create secure and memorable passwords, or a password manager to store your logins and other secure information – your browser’s password manager can securely store logins for you and will suggest a strong and unique password for new websites that don’t have a saved password yet.
If you don’t want your logins visible to anyone looking at your computer, make sure your computer is password protected. Here’s where you’ll find the password manager for the most popular web browsers:
Google Chrome: In Settings > Passwords, you will find your Saved Passwords, and the ability to view, edit or remove passwords individually. There’s also an option to use Google’s Password Checkup to “Check Passwords” to keep your passwords safe from data breaches and other security issues.
Microsoft Edge: In Settings > Passwords, you will find your Saved Passwords, and the ability to view, edit or remove passwords individually. There’s also an option to “Show alerts when passwords are found in an online leak”.
Mozilla Firefox: In Settings > Logins and Passwords, Firefox Lockwise will display your logins with the ability to view, edit or remove passwords individually. There’s an also a default option to “Show alerts about passwords for breached websites”.
Safari: In Preferences > Passwords, you will find your Saved Passwords, and the ability to view, edit or remove passwords individually. There’s also a default option to “Detect passwords compromised by known data leaks.”
iOS/iPadOS: In Settings > Passwords you will find your saved passwords that are used in conjunction with the Safari browser. Also check out the “Security Recommendations” to “Detect Compromised Passwords”.
Android: Open the Chrome App > More > Settings > Passwords.
You can also find out more about information leaked in data breaches and check to see if your email address has been exposed at Have I Been Pwned and Firefox Monitor.
If you’re used to calling your neighbor or doctor by just dialing their 7-digit phone number – things are about to change. Beginning October 24, 2021 you must dial 10-digits to reach any number in the 775 area code – and most area codes in the United States.
The change is so that callers may reach the National Suicide Prevention Lifeline by dialing the 3-digit number “988” – similar to dialing “911” for local emergencies.
Beginning October 24, 2021 if you dial only 7-digits you will be instructed to hang-up and re-dial using the 10-digit phone number.
Now is the time to start updating the phone numbers stored in your cell phone to the full 10-digit number.
Some web pages – particularly articles on news and informational websites – have become nearly unreadable and full of distractions over the years with flashing and inline ads, videos, and unreadable fonts. Reader Mode can make many web pages easier to read – and it’s as easy as toggling it on or off. In this article I give instructions on how to enable reader mode (if necessary) in today’s most popular web browsers – and how to toggle it on or off for many web pages.
To use Reader Mode on Chrome it must first be enabled in a special settings area:
1. Type this into the address bar: chrome://flags/
2. Search for “Reader Mode” to show the Enable Reader Mode settings shown below. Click on the dropdown box and click on Enable.
3. After you relaunch your browser, Reader Mode will be available to toggle on/off on many websites via an icon near the right-end of the address bar – as highlighted above by the magenta circle.
Reader view is built into the Firefox browser. If the page has a Reader View, you will see an icon near the right-end of the address bar.
Click on the icon, and the browser will reload the page in Reader View.
Firefox offers some options for its reader mode that allow you to change font, size, and background color.
Reader View on Edge can be toggled on/off on available websites by clicking on the greyed-out book icon next to the favorites star.
When you click it, it will turn blue, and the Reader View of the page will load.
In Safari on macOS and iOS, “Show Reader View” can be accessed by clicking the left-side of the address bar, then “Show Reader View”.
The FBI’s Internet Crime Complaint Center has released its annual report. The 2020 Internet Crime Report includes information from 791,790 complaints of suspected internet crime—an increase of more than 300,000 complaints from 2019—and reported losses exceeding $4.2 billion.
Topping the list of types of reported internet crimes was phishing, which more than doubled last year. People over 60 were the most common victims according to the report. Nevada had the 8th most complaints of the states and territories included in the report – yet it is the 32nd most populous.
The phishing category also includes vishing, smishing and pharming – all techniques via email, voicemail, text messaging or via fraudulent websites that attempt to trick victims into divulging personal information such as passwords or credit card numbers.
People over 60 were the most common victim – likely due to the age group growing up in a more trusting society and their less understanding of technology.
Perhaps most surprising is that Nevadans reported the most complaints per thousand people than any other state.
In summary, become educated on how to spot internet crimes so that you or someone you know doesn’t become the next victim.
If you’ve been a victim of identity theft, the Federal Trade Commission’s IdentityTheft.gov is the federal government’s one-stop resource for identity theft victims. The site provides streamlined checklists and sample letters to guide you through the recovery process.
If you haven’t been a victim, read these tips to help keep your identity from being stolen or compromised in the first place: Prevent Identity Theft.
Cell phones operating on the T-Mobile and AT&T networks will stop working soon (as early as January 2021) if they don’t support the 4G/LTE calling standard VoLTE (Voice over LTE). Cell phones without VoLTE support on the Verizon network stopped working in 2020.
If you have an older non-compatible phone hopefully you’ve already been contacted by your carrier to arrange for a replacement. But if you only turn on your cell phone occasionally for emergency use, chances are that you may not know about the impending inability to make phone calls. If the last sentence describes your phone usage, now is the time to check with your wireless phone service provider.
Adobe Flash Player – not to be confused with Adobe (PDF) Reader – in the last decade had been the most common method of viewing video and animation files in the web browser. But the latest web coding standards includes the ability to play videos and animations natively – without the need for a browser extension or add-on.
In July 2017 Adobe announced it would no longer support Flash Player at the end of 2020, and recently all major web browsers have blocked or completely removed the ability to play Flash content. Around that time many security vulnerabilities plagued the software and it became a common vector for spreading malware through the computer browser.
What can you do if the web content you are trying to view says it requires Flash Player? Nothing – it’s up to the website developer to reprogram the site with modern standards that doesn’t require Flash Player.
A massive government and business computer hack was discovered early this month (December 2020), but the long term effects likely won’t be known for months or years as more knowledge is obtained about what companies were affected and what data may have been (or will be) breached.
Early details of the hack are explained in these comprehensive articles from CNN and CNET. The hack was spread to thousands of computer systems, altogether likely containing the private data of a majority of US citizens. That data may be compromised and leaked to miscreants if the data on those computer systems was not securely stored or encrypted. Hackers may be holding onto such data for months or years to come.
Make sure all of your devices are up to date: By default Windows and MacOS computers update automatically. But other internet connected software and hardware usually require manual updates – such as iOS, iPadOS, Android, internet routers, video doorbells and cameras, streaming media players, etc. If you need help making sure all of your internet connected devices have the latest security patches, please contact us.
Be suspicious of every email, phone call, SMS or browser pop-up: Initially do not trust any unsolicited email, phone call, SMS or pop-up in your web browser – particularly if it’s asking you to do something. Treat everything as “guilty until proven innocent”. See how to recognize scams and phishing attempts, and for more information review all of our security articles.