computer logo Computer Tamers
& Woman to Woman Computing

QR code Facebook logo
Facebook
Latest Info!
Twitter
@SCBrownCA
Linked In
LinkedIn

AboutContact usServicesNewsAnti-virus InformationHelpful InformationLinksHome

Internet Security Summary

Anti-virus | Spyware | RansomWare | Firewall | Web browser | Mac computers | Windows 10 (& 8, 7 or Vista) | Windows Updates | Android for Tablets and Phones

Latest news info on our Facebook page!

  • "Home internet users top targets of online criminals"- CBC News
    Internet users at home are increasingly becoming the targets of online criminal activity because they tend to lack the security measures that protect businesses and other more sophisticated users, a new report says. (Read more)
  • Executive director, National Cyber Security Alliance, Ron Teixeira:"There is a major perception gap: Even though most consumers think they are protected, this study shows the opposite. Far too many people still lack the three fundamental protections they need to stay safe online — current anti-virus software, spyware protection, and a secure firewall."
PLEASE NOTE: We recommend the website www.filehippo.com to download software, but BE CAREFUL to not download "Release Candidate" or "Beta" versions unless you are very experienced, and have everything backed up.
You can pick the version to download on the right side of the program page, and then when at the version you wish, click ONLY on either "Download latest version" or "Download this version" on the upper right.
DO NOT click on any ads promoting other software.

Below you will find information to help improve your computing experience.
Contact us at (613) 721-2082 to make it even easier!

Anti-virus - Information & Programs

  • Please protect your own computer and those of your friends and acquaintances by using antivirus and antispyware programs on your computer, and keeping it updated. New "malware" (viruses, spyware, adware, etc.) appear quickly, and spread through unprotected computers, usually without the knowledge of the computer owner.

  • Recent versions forge the "from" line to one of the addresses in the infected computer, so it appears to be coming from someone else's computer or even yours. It might also appear to be a "bounced" message from a postmaster, saying you sent it out, and it couldn't be delivered. It could also appear to be a message from your Internet Service Provider, saying there is a problem with your account or your email.

  • Many message sent "from" financial institutions are an attempt to get your login and password. DO NOT click on links in these emails. Instead, type the email address of your bank's website into your browser. These messages are often referred to as "phishing". Few banks actually email their clients, instead they have messages on their websites both before login (general) and after (personalized).

  • We recommend NEVER opening an attachment unless you have specifically asked for a file, unless you know what it is and why you are receiving it. Much of the malware these days spread through the virus sending copies of itself to everyone in your address book, and are especially directed at attacking through Outlook or other Microsoft mail programs, as well as some other email providers, such as Yahoo and AOL. Most people affected have no idea that their computer is spreading the infections to their friends, who think it's safe to open an attachment or a link coming from someone they know.

  • Please note that few people are aware that spyware is as much a danger to your computer as viruses. Please see below for information on controlling spyware.
Top

Programs

  • Update your anti-virus program at least daily, and always before opening your email program, to give you the best protection.
  • We recommend the use of an excellent anti-virus program, Avast. This free (for personal use) program is available from Avast at www.avast.com/eng/download-avast-home.html - please note that it requires a registration, which is free, but is required each year (look for "Register here" on that page to register and/or renew).
  • If you wish to use a second program, we recommend the use of the free AVG antivirus or Antivir by Avira. The AVG program is available at www.filehippo.com/download_avg_antivirus and Antivir is at www.filehippo.com/download_antivir
Top

Malware Detectors - "Pest control" for your computer

  • "Malware" is used as a catch-all term for many kinds of malicious software. Adware programs pop up ads in your face, sometimes even when you don't have a browser open and may also watch your online activities, profiling you for targeted advertising or more sinister purposes. Literal spyware gathers information about you and what you do with the computer, possibly enabling identity theft. Keyloggers are the ultimate spies, recording everything you type (including passwords). All of these are lumped under the term spyware.
  • Many people don't realize all the extra "stuff" that ends up on their computers just by visiting websites. In addition to the Temporary Internet Files (which should be cleaned out regularly), many websites place "cookies" on the computer, _most_ of which are harmless, and they also can put "spyware" programs into your computer as well.
  • You can remove the Temporary Internet Files in Internet Explorer by going to "Tools", then "Internet Options", then on "Delete Files" to clear what is stored already. Then click on the "Advanced" tab at the top, and scroll down to the "Security" section at the bottom of the popup window. Click to put a check mark beside "Empty Temporary Internet Files folder when browser is closed".
  • Beware emails promoting programs that will "clean" your spyware - these are often programs that remove other companies' spyware, replacing it with their own!
  • Check for problems weekly with MalwareBytes Anti-Malware by double clicking on the desktop shortcut, first checking for updates. If it tells you to restart the computer after cleaning, let it do it right away.
  • You may also wish to add SuperAntiSpyware. I run both in my computers, and always run Malwarebytes first, then SuperAntiSpyware.
  • In both cases, install them, update them, and click "Quick scan" and wait. It will prompt you on the steps at the end to remove if it finds anything to clean, and when the computer is restarted, it should be fine.
Top

CryptoPrevent to help prevent "RansomWare"!

  • CryptoLocker, once named the worst malware of all time when it appeared, has been joined by many variants of "ransomware". Wannacry is the May/17 version.
  • They encrypt all your files, & charge you a ransom (hundreds of dollars) to - possibly - get them back.
  • CryptoPrevent is a wonderful, free, tool to help prevent ransomware from getting into your computer
  • We are providing you with a link to the CryptoPrevent program on our website. Download CryptoPrevent here
  • After installation, be sure to update for protection against later versions, and check it at least weekly for updates, to keep your protection current. You normally have to restart the computer after installation to put it into effect.
  • See more information: Worldwide cyberattack described as ‘unprecedented’ affects more than 150 countries
  • In May, 2017, Microsoft announced older computer system updates are available, despite cancelling updates for those systems in the past, to block a "hole" in Windows that allows ransomware makers access. Update your Windows systems to get even more protection.
Top

Firewalls - The "keys" to your computer

  • Computers connected to the Internet are at risk of attack from unscrupulous hackers, especially those connected via high speed connections (cable or DSL). Hackers may attempt to take control of your computer for their own use. In the worst case, this could include the placing of child porn on your computer for distribution without your knowledge.
  • We recommend the use of the free ZoneAlarm firewall program, available at www.filehippo.com/download_zonealarm_free or Comodo Internet Security, also available at www.filehippo.com
  • During installation, it can pre-configure your computer for Internet access, but you will have to give permission for each program outside the standard connection. If it is a program you know (your email program or web browser or antivirus programs), click on "Remember this setting" so you won't be asked again for that program.
  • If you have given permission for a program you don't want, or denied access to a program you do want, double click on the ZA in the task bar, then when it opens ZoneAlarm, click on Program Control on the left, then on Programs - it will show you a list of those allowed (green check mark) and denied (red x). Blue question marks mean the program asks each time. To change a setting, just click on either the check mark, x or question mark, then change to what you want.
Top

Windows 10 computers & tablets (applies also to Vista, 7 and 8/8.1)

  • Windows 10 is just another / the newest version of Windows NT, and all the main software works in it, just as it does in XP, Vista, 7 and 8/8.1.
  • I recommend turning off the "User Account Control", as it's just a nuisance that is not necessary, at least for the prime computer user (running the Administrator account).
  • Then install, as a minimum, ERUNT, Avast, Malwarebytes, and SuperAntispyware (see above)
  • One important item to add is the Classic Shell Start Menu (works in 10) for Windows 8/8.1 and 10.
  • Most of your existing software will be fine, but contact us if you encounter problems, or need help.
Top

Windows Updates

  • Microsoft has occasionally announced older computer system updates are available, despite cancelling updates for those systems in the past, to block a "hole" in Windows that allows ransomware makers access. Update your Windows systems to get even more protection.
  • We advise that you do NOT do Windows automatic updates, but instead wait several days for Microsoft to fix any errors. Errors in updates have "broken" Windows software for years! Try and set your computer to notify you of any updates, and then choose when to install them.
Top

Android for Tablets & Phones

  • Android tablets and phones are wonderful - I use an Android phone/tablet, as well as a 7" Android tablet every day.
  • However, these wonderful "mini computers" that we can carry around need protection from many of the same things that are bad for computers.
  • I highly recommend that owners of Android systems download from the Google PlayStore: Avast for antivirus, Lookout for antimalware and phone backup and locating if lost/stolen, and Advanced Task Killer to free up memory on your phone or tablet and keep it running better.
  • Please do not download software "apps" from non-Google PlayStore sites.
  • A quick tip - if you want to check things out on a larger computer, just email yourself the link to anything you want to download on your Android tablet or phone, and it will make it much easier to check it out.
Top

Get a better web browser!

  • As well, our advice is to get a better browser! Unfortunately, most people use Internet Explorer, which is not safe to use in its standard format - experts advise either turn off some Internet Explorer features by setting all security zones to "high" or switch to another browser as the best immediate fix.
  • It is our opinion that Mozilla's Firefox and Google's Chrome are much better, faster, and safer web browsers, and are updated far more often.
  • Try it - you'll like them! www.mozilla.comand www.filehippo.com/download_google_chrome
Top

Mac (Apple) computers

Top
Facebook logo
Facebook



Twitter
@SCBrownCA

Computer Tamers
We'll tame your computer!

1568 Merivale Road, Suite 304
Ottawa, Ontario
K2G 5Y7

Tel (613) 721-2082
Cell (613) 720-0430
Fax (613) 226-7451

Email training@computertamers.ca

A Division of Woman to Woman Computing


Member:
Beta Sigma Phi
LinkedIn
Former Member:
BNI Millennium Chapter, Ottawa
eWomen Network
Ottawa Chamber of Commerce
POWE, Ottawa West
Serving Seniors
Silver Service Network
WEBB

Privacy Policy: Woman to Woman Computing and Computer Tamers work to ensure the accuracy, confidentiality and integrity of your personal information. We do not sell, share, nor distribute our client information in any way. All consultants must adhere to this policy.

Website & Design S.C. Brown
© 1998-present (applies to entire website)
Feb/21

About  Contact  Services  News  Security  Helpful Info  Links  Home
Top