27363681109850116521312867

COMPUBC INFORMATION TECHNOLOGY SERVICES LTD. MANAGED IT SERVICES FOR BUSINESS & RESIDENTIAL. PC & MAC.
  • CompuBC Services
    • Residential
    • Business
    • Managed IT Services
    • Canadian Based File Sharing & Syncing
    • Cloud Computing
    • Business continuity & disaster recovery
    • Data Recovery
    • Network Infrastructure & VoIP
    • Office IT Relocation
  • Service Request
  • Service Cost
    • Business Service Cost
    • Managed Services Cost
    • Residential Service Cost
    • Data Recovery Service Cost
  • Remote Support
    • PC Remote Support
    • Mac Remote Support
    • Any Other Platform
    • Google Duo Android
    • Google Duo iPhone
  • Self Service area
  • Social & Blog
    • Facebook posts
    • Blog
  • Terms and Conditions
  • About Us
  • Reviews

How USB Drives Can Be a Danger to Your Computer

6/3/2022

0 Comments

 
Picture
Did you find a random USB stick, perhaps at your school or in a parking lot? You may be tempted to plug it into your PC, but you could leave yourself open to attack or, worse still, permanently damage your machine. Here’s why.
USB Sticks Can Spread Malware​

Probably the most common threat posed by a USB drive is malware.
Infection via this method can be intentional and unintentional, depending on the malware in question.
USB drives can also disseminate other security threats like remote access trojans (RATs), which give a potential attacker direct control of the target, keyloggers that monitor keystrokes to steal credentials, and ransomware that demands money in exchange for access to your operating system or data.
Picture
Ransomware is an increasing problem, and USB-based attacks aren’t uncommon.
​In early 2022 the FBI released details about a group called FIN7 who were mailing USB drives to US companies. The group attempted to impersonate the US Department of Health and Human Services by including the USB devices with letters referencing COVID-19 guidelines and sent some infected drives out in Amazon-branded gift boxes with thank you notes and counterfeit gift cards.
In this attack, the USB drives presented themselves to the target computer like keyboards, sending keystrokes that executed PowerShell commands. In addition to installing ransomware like BlackMatter and Ravil, the FBI reported that the group could obtain administrative access to target machines.
​In addition to USB drives being used to deliver a payload, dreams can just as quickly become infected by being placed into compromised computers. These newly infected USB devices are then used as vectors to infect more machines, like your own. This is how it’s possible to pick up malware from public machines, like those you might find in a public library.
Picture
“USB Killers” Can Fry Your Computer
While malicious software delivered by USB poses a real threat to your computer and data, there is a potentially even greater significant out there in the form of “USB killers” that can physically damage your computer. These devices created quite the splash in the mid-2010s, with the most famous being the USBKill which is (at the time of writing) on its fourth iteration.
​This device (and others like it) discharges power into whatever it is plugged into, causing permanent damage. Unlike a software attack, a “USB killer” is designed to damage the target device at a hardware level. Data recovery from drives may be possible, but components like the USB controller and motherboard will probably not survive the attack. USBKill claims that 95% of devices are vulnerable to such an attack.
These devices don’t only affect your computer via USB drives. Still, they can also deliver a powerful shock to other ports, including smartphones that use proprietary ports (like Apple’s Lightning connector), smart TVs and monitors (even over DisplayPort), and network devices. While early versions of the USBKill “pentesting device” repurposed the power supplied by the target computer, newer versions contain internal batteries that can be used even against devices that aren’t powered on.
The USBKill V4 is a branded security tool used by private companies, defense firms, and law enforcement worldwide. We found similar unbranded devices for less than $9 on AliExpress, which look like standard flash drives. These are the thumb drives you are far more likely to encounter in the wild, with no real tell-tale signs of the damage they can cause.
Picture
How to Deal With Potentially Dangerous USB Devices
The simplest way of keeping your devices safe from harm is to scrutinize every device you connect. If you don’t know where a drive came from, don’t touch it. Stick to brand-new drives that you own and purchased yourself, and keep them exclusive to devices that you trust. This means not using them with public computers that could be compromised
While USB killers could cost you hundreds or thousands of dollars in hardware damage, you’re probably not likely to encounter one unless someone targets explicitly you.
Malware can ruin your whole day or week, and some ransomware will take your money and then destroy your data and operating system anyway. Some malware is designed to encrypt your data to make it unrecoverable, and the best defense against any type of data loss is to always have a solid backup solution. Ideally, you should have at least one local and one remote backup.
If sharing drives are unavoidable, make sure other parties are aware of the dangers and take steps to protect themselves (and you, by extension). Running anti-malware software is a good start, mainly if you’re using Windows.
Take Care
For most people, malware delivered by USB poses little threat because cloud storage has replaced physical devices. “USB killers” are scary-sounding devices, but you probably won’t encounter one. However, by taking simple precautions like not putting random USB drives into your computer, you can eliminate almost all risks.
However, it would be naive to assume that attacks of this nature do occur. Sometimes they target individuals by name, delivered in the post. Other times they’re state-sanctioned cyberattacks that damage infrastructure on a massive scale. Stick to a few general security rules and be safe online and offline.
Picture
On a personal note
"Your problem is our problem." don't be the weakest link; think before clicking, opening, inserting, and executing.
Once you introduce any type of risk into a network, it will become a greater risk to us all.

0 Comments

8 Bad Habits That Are Destroying Your PC

10/20/2021

0 Comments

 
We all want our computers to last forever, but if yours seem to die before its time, your habits could be to blame. Here's some behavior that you should avoid.
Picture
Nothing lasts forever—especially tech—but your computer can last you quite a few years if you treat it well. If your laptop tends to break down earlier than you feel it should, there's a chance you're helping it along to an early demise with some especially bad habits. Here are some of the worst things you can do to a PC without even realizing you're doing anything wrong.
Disregarding Overheating Problems
Picture
Heat is your computer's mortal enemy. If your computer gets too hot, the processor may slow down, throttling itself to keep temperatures reasonable, or even shutting down completely. Running at high temperatures for extended periods can also reduce the lifespan of your processor, fans, and battery—not to mention make your computer loud and sizzling to touch.

For desktop computers, the solution is pretty simple: make sure your case has adequate airflow, with enough vents and fans to keep cool air moving through the components. Keep it out of tight cabinets and other spaces that trap heat. You probably want to clean out the dust once in a while with an electric duster (more on that below).

Laptops, on the other hand, require a bit more care. Their portability leads to a lot of bad habits, like putting it on a blanket or other plush surface. This blocks airflow under the laptop, and potentially through the laptop (if the blanket covers the fan vents).
When possible, use your laptop on a flat surface (where the rubber feet usually raise it up off a desk), or at least make sure your lap is free of blankets and other things that can block airflow. Lap desks are a good way to ensure things stay cool. 
​
Other than that, the same rules apply to laptops as desktops: Don't leave it in hot places (like a car on a sunny day) and blow out the dust once in a while. If you’re overclocking, take extra care to watch those voltages and temps. It's also always a good idea to monitor CPU temperature just in case.
​Letting Dirt, Dust, and Liquids Run Wild
Picture
All computers accumulate some dust over time, heating up the components and making those fans work harder. While cleaning it regularly can help, you also want to prevent stuff from getting into your computer in the first place.

For example, cigarette smoke and pet fur will exacerbate those problems, and putting your desktop PC on the floor will ensure more of that dust, hair, and debris will get sucked into the intake. And if you have carpet on your floor, you’re probably blocking the power supply’s intake fan. Keep your computer on a desk or other riser, if at all possible, and make sure there are filters on your intake fans.
​
Secondly, don’t eat or drink near your PC, or at least take some care when you do. Getting crumbs in your keyboard is not only disgusting, but it can damage the switches or make certain keys harder to press. And I’m sure you’ve heard enough horror stories about people spilling coffee on their laptops, which can straight up destroy it.

Even well-intentioned moves, like cleaning your screen with Windex, can introduce liquid where it shouldn’t be (also, Windex is too harsh for your monitor). Spray your gentle screen cleaner on a microfiber cloth, not on the screen, and don’t go crazy—a little goes a long way.
Handling Your Laptop Carelessly
Picture
While desktops have the luxury of sitting comfortably in your office, laptops are subject to all sorts of abuse. And the more you abuse it, the more likely you are to damage something.
I've seen people pick up laptops by its display, open the hinge from one side with way too much force, and toss their PC onto the couch from the other side of the room. (Sure, a couch is rather soft, but one day, you're going to miss, and you'll be sorry.) I've even seen people use closed laptops as a coaster for their drink! This kind of treatment could leave you with a worn-out laptop hinge or a crack in the casing.
But if your laptop has a traditional spinning hard drive instead of an SSD, tossing or shaking the computer—especially if the drive is active at the time—can cause its head to dislocate or touch the surface of the disk. It isn't common, but if that happens, you're going to have a bad day, especially if you haven't backed up your data.
Your laptop is an expensive piece of property, so it's important that you treat it as such.
​Mismanaging Your Old Battery
Picture
ust because your laptop's battery starts with "eight hours of battery life" doesn't mean it'll stay that way forever. Batteries degrade over time—you may get eight hours on a full charge when you first buy it, but after a few years, that may degrade to six or seven hours.
​
There's no escaping this decline, but you may be degrading it faster than necessary if you always run your laptop down to 0%. Follow our tips for better battery management, and check out the battery health report in Windows to keep track of your battery's charge history.

To prolong your battery's long-term health, it's best to perform shallow discharges, and recharge it frequently. Don't over-stress about this—if you're on a plane and need to work, an occasional discharge won't kill your battery—but over time, it's best to err on the side of charging regularly than running it down to empty.

You should, however, stress out if your battery is swollen. If your battery is bulging so much that it’s pushing against the case of your laptop, creating a gap between the panels, you need to stop using your computer now and (safely) replace the battery, lest you encounter an explosive failure. (Here's more on that.)

When you replace the battery, don’t buy a cheap knockoff from eBay; buy it from the manufacturer or a respected third-party store. Low-quality batteries will, at best, not hold a charge very well, and at worst, can be dangerous. The same goes for third-party chargers—just stick to the manufacturer’s official offering or, in the case of laptops that charge over USB-C, a certified USB-PD charger.
Disregarding Electrical Safety
Picture
Your PC draws a sizable amount of power, and it's susceptible to damage from power surges—small, temporary increases in voltage coming through the power line. These can happen after power outages, from turning on another high-power device in your home, or because of an unreliable power grid in your city.

The power supply inside your PC includes some basic surge protection, but you'll get longer-lasting protection from a dedicated surge protector. Note that this is different from a power strip, which provides multiple outlets without the protection from surges.

Be sure to replace it every three to five years, since that protection wears out over time—if yours is old, there's a good chance it's offering zero protection. Keep in mind that surge protectors won't protect against high-voltage spikes (like lightning), but it can protect you from smaller surges and extend the life of your PC. 

If you have a few more dollars to spend, you might even want to get an uninterruptible power supply (UPS). This device contains a battery backup that prevents your PC from losing data during a sudden power outage.
​
Laptops require a bit more care due to their portability. While a desktop's power cable sits stationary for years at a time, your laptop cable goes with you everywhere, subject to kinking, hard yanks out of the wall, and other mishandling. This can not only make the cable unreliable, it can pose a fire hazard, so always pull the charger out of the wall from the plug, not the cable.
Stressing the Cables and Ports
Picture
While damaging a USB port or cable isn’t as dangerous as mishandling the power adapter, it can still cause avoidable damage to your computer. This may seem obvious, but don’t force cables into ports if they aren’t sliding in properly (I once knew someone who forced a USB cable into a FireWire port and broke both).

Similarly, if you leave something plugged in, take care not to bend it. If you have a flash drive in your laptop’s USB port, using your laptop cross-legged may bend the flash drive, damaging either the drive, the port, or both. And with USB ports at such a premium on today’s laptops, you definitely don’t want to ruin one of them.
​
The same goes for your cables. If you constantly make sharp bends back and forth, you’re more likely to break the connection inside, which can render the cable finicky or useless. Keep them away from hungry children and pets who might chew through the plastic, and when you coil them up, avoid wrapping them too tightly. Thankfully, a damaged cable is cheap to replace compared to your PC, but why waste money when you don’t have to?
Wasting Time on Unnecessary Maintenance
Picture
Back in the days of Windows XP, when hardware was limited and computers were slow, PC maintenance may have made a difference. But these days, deleting unused and temporary files is unlikely to give you a noticeable speed boost. Many "PC Cleaning" utilities are scams meant to scare you into buying their product—and the free, less scammy ones are still unnecessary most of the time.
Furthermore, certain types of "maintenance" may actually be harmful. Registry cleaners provide almost no benefit, but if they delete a registry entry you need, they can actually cause problems. Similarly, these new "privacy" apps that claim to stop Windows 10 from "spying" on you can break certain features without you knowing why. The internet is full of people confused about why something stopped working, only to find that it's the fault of one of these tools. You're better off going to Windows 10's settings, learning what they do, and tweaking them yourself.
If you want to clean up your hard drive, use Windows' built-in Disk Cleanup utility and delete any movies, music, and other files you aren't using. And if your computer is running unbearably slow, try removing startup programs or refreshing your PC—if that doesn't work, it's probably time to upgrade your hardware.
​Browsing the Web Unprotected
Picture
Contrary to popular belief, "common sense," while very valuable, should not be your only malware protection. Even legitimate sites can become infected with malware, passing those problems on to you, so browsing carefully won't always save you. Instead, you need to use antivirus on your computer.

Thankfully, Microsoft's built-in Windows Defender feature has gotten quite good, after a few years of sub-par ratings. Just leave it on and let it do its job. If you want extra protection, a managed Antivirus/Malware like Emsisoft, Bitdefender, and Webroot will do the work

The free version is good if you just want to run an occasional scan, but the paid version includes always-running anti-exploit features that block potentially harmful sites before they make it to your screen. When used in conjunction with a traditional antivirus like Windows Defender, you'll be pretty well set on protection.

On top of that, other basic security practices still apply: keep your software up to date (both Windows and the programs you use), use a good password manager (instead of using the same password on every site), and learn how to spot phishing scams. Don’t pirate software (which often contains malware) and keep your home Wi-Fi secure with a WPA2 password.

It may seem trivial, but a bad piece of malware or ransomware can cause you a world of hurt.
Thanks: Zoran Milic, PCMAG.
0 Comments

Google or Gmail storage full? Easy ways to quickly free up space

8/9/2021

0 Comments

 
Picture

3 ways to clear space in your Google account

​Finding and deleting attachments is step one. Doing this task manually isn't going to cut it. That would take forever. Here's a simple, fast way to track down big files. 
  • Open your Gmail account in a browser. In the Search box, type has attachment larger:10M and hit enter. You can sub in whatever size you prefer.
  • You can filter further using the buttons under the search bar.
  • Open each email individually, or mark the checkboxes next to each email you want to trash, then hit the trash can icon.
You can open up even more space by permanently deleting emails sitting in your spam folder. To do so:
  • In the left-hand menu, click Spam. If you don’t see Spam, click More.
  • At the top, click Delete all spam messages now. You can also open an individual email, then click Delete forever.
What about Google Drive? If you have years of docs, spreadsheets and other files saved, give those a cleanup as well.
Picture
5 BURIED GOOGLE SETTINGS OTHER THAN PRIVACY TO SAVE TIME NOW
  • Open your Google Drive by going to drive.google.com on a computer.
  • In the left-hand menu, click Storage.
  • This will bring up a list of all your files, sorted largest to smallest. If the smallest appear at the top, hit Storage used to filter.
  • To remove a file, right click and choose Remove.
  • Tip: Be sure to download or make a backup elsewhere if this is a file you might need down the road.
Within 24 hours, deleted items will show in the available space in your Google Drive account.
0 Comments

Why you should move from Windows Home 10 / 11 to Windows Pro

7/9/2021

0 Comments

 
Picture
What's the difference between Windows 10 / 11 Home and Pro? When you're building or buying a PC.

Microsoft has offered a Pro version of Windows since the XP days, bringing with it additional features for power users that Home doesn’t offer. While many of the extra features of Windows 10 Pro are clearly designed for business use, like group policy management and domain binding, there are other features that an enthusiast might not be able to live without. Here's a breakdown of the most useful features that you get with Windows 10 Pro, as well as free alternatives, when applicable.
Picture
Remote Desktop
With Windows 10 Home, you're still able to start Remote Desktop Protocol (RDP) sessions, but you can't remotely control your PC from another device on your network natively. Fortunately, there are many free options like TigerVNC and TeamViewer that offer the same functionality and even some additional features that RDP doesn’t offer. You could also try RDP Wrapper as a free alternative. 

Bitlocker
If you’re concerned about security and want to protect your data from intruders, Bitlocker provides full disk encryption so you can keep your data safe from hackers. The latest iteration of Bitlocker also allows for the encryption of individual files for more flexibility than the all-or-nothing approach of previous versions. Again, other software can accomplish similar encryption, but it's not built into the OS. Be sure to get an SSD (or HDD even) that supports the necessary hardware acceleration for Bitlocker if you don't want to lose performance.

Trusted Boot
Trusted Boot protects your PC from rootkits and works in conjunction with Secure Boot to help keep your system malware free and in your control by checking every component of the startup process before loading it. While it may provide peace of mind to any user, it’s another feature aimed at businesses where security is a top priority.

Windows Sandbox
Normally, we'd just say don't run any suspicious files, but some people are curious. Does that anonymous download that claims to fix performance actually work? Or is it malware masquerading as a useful program? You could install a virtualization solution and run the program in a sandbox so it won't actually cause harm, or if you have Windows Pro you get that feature as part of the OS.

Hyper-V
Hyper-V is a Windows-only hypervisor used for running virtual machines on CPUs that support virtualization. If you plan on running VMs, this feature might be worth the cost of Pro, but if virtualization is all you need, there are free products like Virtualbox that offer more features and work with multiple operating systems. While Hyper-V is included with your Windows 10 Pro license, it needs to be downloaded and installed separately.

Memory Limits and Business Features
Aside from the above features, there are some other differences between the two versions of Windows. Windows 10 Home supports a maximum of 128GB of RAM, while Pro supports a whopping 2TB.

The Managed Services angle

Picture
Other features like group policy management, Assigned Access, and the ability to join a domain are unlikely to be very useful outside of the workplace. Assigned Access allows an admin to lock down Windows and allow access to only one app under a specified user account. Group Policy meanwhile allows you to restrict access to any number of Windows features and configure any setting within the operating system. While this is great from an admin perspective and a good way to set a co-worker's wallpaper to something fun remotely, it’s very useful if you will use Managed Services environment from an IT company.
Windows Update for Business allows an admin to control and force when a system is updated and defer updates that may cause incompatibilities with legacy software or impact the business in some other way.

​FYI: Windows 11 Home Will Require a Microsoft Account For Initial Setup

Picture
When you first install Windows 11 Home, you’ll be asked to sign in with a Microsoft account during the initial setup process. The installation won’t proceed unless you’re connected to the internet and you link a Microsoft account with Windows 11. Presumably, you’ll also have the option to create a new Microsoft account in case you don’t already have one.

Unlike with Windows 10 Home, you won’t be able to get around this requirement by disconnecting from the Internet before running the setup on your computer.

Microsoft makes more money if you use a Microsoft account. That account is your passport to buying apps in the Microsoft store, purchasing Microsoft 365 subscriptions, subscribing to cloud services such as OneDrive, and much more. Also, Microsoft gains valuable information by tracking your behavior across various Microsoft services.

Of course, this policy isn’t ideal for some people because having your every activity and purchase tracked and linked to a single account has deep privacy implications. Thankfully, it looks like Microsoft will be providing a few ways to get around this requirement.
You’ll still be able to create a local user account after getting through the initial install process with a Microsoft account.
0 Comments
<<Previous

    Archives

    June 2022
    October 2021
    August 2021
    July 2021
    May 2021
    April 2021
    March 2021
    January 2021
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    May 2020
    March 2020
    November 2019
    August 2019
    July 2019
    June 2019
    May 2019
    March 2019
    November 2018
    July 2018
    June 2018
    May 2018
    April 2018
    February 2018
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017

Picture
Avner Coopman
Owner
2951 Britannia cres
Port Coquitlam BC, V3B 4V5

Phone 778-776-6222

Hours of operation
Mon - Fri 9:00 AM - 7 PM
Sat 11:00 AM - 5:00 PM
Sunday - Closed
​
Your privacy is important to us you deserve our full attention
Please schedule an appointment
Picture
Use  your cellphone camera for digital business card
Click for the BBB Business Review of this Computer Business Services in Port Coquitlam BC
Best Computer repair in Port Coquitlam
Picture
Business Number 778569517BC0001
© Copyright CompuBC, All Rights Reserved.
Icons for this website made by Freepik, xnimrodx, Smashicons, itim2101, photo3idea_studio, and prettycons from Flat Icons.
  • CompuBC Services
    • Residential
    • Business
    • Managed IT Services
    • Canadian Based File Sharing & Syncing
    • Cloud Computing
    • Business continuity & disaster recovery
    • Data Recovery
    • Network Infrastructure & VoIP
    • Office IT Relocation
  • Service Request
  • Service Cost
    • Business Service Cost
    • Managed Services Cost
    • Residential Service Cost
    • Data Recovery Service Cost
  • Remote Support
    • PC Remote Support
    • Mac Remote Support
    • Any Other Platform
    • Google Duo Android
    • Google Duo iPhone
  • Self Service area
  • Social & Blog
    • Facebook posts
    • Blog
  • Terms and Conditions
  • About Us
  • Reviews