AVG Free Antivirus is a great, free antivirus solution made by AVG Technologies. Many people use AVG, and I have come across a few clients that have accidentally upgraded their Free version to the Paid 30 day Trial version, causing headaches.
The problem occurs when updating AVG Free, and clicking ‘Next’ through a series of screens. On the “Select your product” screen, AVG have pre-selected the “Internet Security Trial/Full Protection” option, which will upgrade you to the paid trial version of AVG.
To avoid this situation, you need to select the “Anti-virus Free/Basic Protection” button, before clicking ‘Next’.
Clients regularly ask if it possible to downgrade AVG back to the Free version.
Yes, if you have accidentally upgraded your AVG Free to the AVG Paid Trial, you can downgrade AVG back to the free edition by starting to uninstall AVG. During the uninstallation process, you will be given the option to downgrade AVG back to the free version.
- Open Start – Control Panel, and then click Programs and Features.
- In the list of installed products select AVG, and then click Uninstall.
- Click the option Switch to AVG AntiVirus FREE.
An AVG installer will run, and downgrade AVG to the FREE version. Wait for the installation to finish, and then restart your computer.
In this hot weather we know to keep ourselves, our children and our pets cool, but its also a good time to check on your PC’s health – perhaps its an overheating pc
Computers will shutdown when they are too hot, in an attempt to protect themselves from excessive heat damage, but permanent damage can still occur.
How do you check the PC’s temperatures ?
The majority of PC’s show their temperatures in the BIOS screen, but this requires a reboot to access it. It’s much easier to view the PC’s temperatures by downloading and installing SpeedFan v4.49, a FREE tool available from the Tailormade IT Solutions website:
“SpeedFan is a program that monitors voltages, fan speeds and temperatures in computers with hardware monitor chips.” Source: http://www.almico.com/speedfan.php
If you do notice high temperatures, or are experiencing strange shutdowns and outages, this can result in permanent damage to your PC, and reduce its life span.
Thermal Paste being applied to a CPU
Tailormade IT Solutions recommends and provides PC maintenance services that investigate and resolve overheating PC issues, including:
Dust Removal – Dust is a great insulator, and cleaning out that build up of dust inside the PC will help it breathe better and run cooler.
Fan Checks – Ensuring your internal PC fans are not damaged, and are working correctly and effectively removing heat from the PC.
CPU Thermal Paste – The PC’s brain, or CPU, generates a lot of heat. Checking and reapplying the Thermal Paste on the CPU can assist heat removal from this important component.
Additional Cooling – Installing upgraded or additional heatsinks and fans, including water cooling for extreme desktop PCs. Laptop owners can also purchase laptop cooler pads.
Please note that the following method of cooling your PC is NOT recommended.
BitTorrent Labs has just released a new tool called BitTorrent Sync, which is used to sync files/folders from one PC directly to another. It works differently to cloud based products like Dropbox, Google Drive, and Microsoft Skydrive.
With a variety of backup options now available, its surprising that many users don’t consider backing up important data until its too late.
In this post, Tailormade IT Solutions discusses backup options and some of their pros and cons, including their ease of use, safety, security and suitability.
Tailormade IT Solutions can configure a backup routine that ensures your data is safe.
Copy Files Locally
I’ve met users who simply plug in a USB drive and copy data from their computer manually. For example, copying the My Documents folder to a USB drive, CD or DVD.
- User has to remember to backup regularly;
- backup data is held on-site and susceptible to physical loss.
Automated Backup – Locally
The next step would be an automated backup solution. Data is a lot safer if the backup routine is automated and regular. These backup routines typically work at a certain time, and copy information to a USB drive. Users should disconnect the backup drive when not in use.
- Set and forget peace of mind.
- Data held on-site.
Automated Backup/Sync over Network
If you have multiple computers, your can set one aside as a backup PC, and configure all other computers to backup at a certain time to that location. This can work locally or through the internet, using the new BitTorrent Sync tool.
- Set and forget peace of mind.
- Data held on-site.
Automated Backup/Sync to Cloud
Using cloud storage providers (such as DropBox, SkyDrive or Google Drive) to syncing folders has become very popular. These services allow you to automatically sync a folder from your computer to a internet server. With your login details, the server can be accessed from any computer in the world.
Cloud storage providers offer varying levels of service and security, but they also retain ownership of your data in the fine print, and commonly limit the sizes of files you can upload, and/or total server size.
- Data is held off site, and accessible from anywhere in the world.
- Data held by cloud providers is owned by cloud providers.
If you need an IT professional to configure a backup routine for you, contact Tailormade IT Solutions
What is ransomware?
Ransomware defines a category of malicious computer software that encrypts the users data, demanding a ransom be paid to the software creators.
Recently, ransomware has become more common, and means your backup routine is more important than ever.
Is ransomware common?
Dozens of victim businesses have gone public detailing how thousands of dollars had been lost paying ransoms to unlock encrypted data — or in lost productivity by choosing to cut losses.
In the last 6 months, many Australian businesses have had their data held to ransom:
- September 2012: NT based TDC Refrigeration and Electrical had vital financial records encrypted, forcing it to pay a $3000 ransom.
- November 2012: Deanes Buslines was similarly confronted with a $3000 ransom after having its critical data locked down.
- December 2012: A Byron Bay school found its records encrypted and a ransom demanding $5000. The school could not pay, and after trying to bargain with the Eastern-European attacker, forfeited the data and recovered a limited data set from forensic analysis.
- Gold Coast medical practice The Miami Family Medical Centre was held to ransom by hackers demanding $4000 to decrypt sensitive patient information.
- February 2013: Melbourne bus company Firefly Coaches found its data had been encrypted and its Windows machines were locked down. A ransom notice was left demanding $5000 for the decryption key to unlock the data. Firefly had backups.
Firefly, a small family owned business in Avondale Heights, did what many of us fail to do – maintain regular, tested and “air-gapped” backups on a drive which was kept physically separate from the PC network.
A video by Symantec
How does ransomware infect?
Many of these ransomware attacks have occurred initially by visiting through malicious websites which deliver malware using drive-by-download or by opening malicious email attachments / clicking malicious links.
The attackers then breach the company network by brute-forcing open RDP credentials. The Remote Desktop Protocol (RDP) function, which allows remote access, is commonly unused and should be disabled (on port 3389).
How to protect against ransomware
A few simple steps will reduce your chances of being infected with ransomware:
- Ensure your computer system has the latest update patches installed.
- Be wary of opening email attachments and clicking links in spam emails, or installing software from untrusted sources.
- Be wary of visiting websites that suggest you need to update/install software, drivers or video codecs.
- Backup important data !!!
Once your data is held to ransom, there are only 3 options: 1. You can pay the ransom demanded, which is generally $3000-$5000 and provides no guarantee that your computer/files will be returned to you; 2. Attempt to crack the encryption using a decryption tool, or 3. Completely wipe and reinstall your system from backups.
Clearly just having a backup stored on a USB drive that is always connected is not safe from the attackers. You need to remove external hard drives, or they will attack them and lock them down too. For many businesses, a sensible “air-gap” solution is to ensure backups are taken off site, as this also prevents against data loss in the event of fire.
Panda Security have released a ‘Panda Ransomware Decrypt‘ tool.
Note: There is also fake ‘Australian Federal Police Ransomware’ which behaves in a similar fashion: Locking the computer and demanding money, with the attackers pretending to be Australian law enforcement officials. The lock screen looks fancy (shown below) but would the AFP accept Ukash ?
Tailormade IT Solutions would like to sincerely thank all our customers for their business in 2012, and wish you all a very Merry Christmas and a wonderful 2013.
Tailormade IT Solutions will close on the following days:
Tuesday 25th December 2012, Wednesday 26th December 2012 and Tuesday 1st Jan 2013.
My New Years Resolution for 2013 is that everyone keeps a backup of their important data !
Reason: It’s likely that Ransomware will continue to spread in 2013, and the only effective solution is to have a backup, that is not normally connected to the PC.
Symantec Whitepaper: Ransomware a growing menace
After infecting your PC, ransomware can encrypt your personal data and then display a message encouraging you to pay for the data to be un-encrypted. Some messages say your PC has been locked by police due to downloading illegal material, and you must pay a fine before your data will be released, earning the bad guys $5 million a year.
It’s quick and easy to get a decent backup in place, using online storage, or a USB drive and some automated backup software. This protects your important data from ransomware and/or Hard Drive failures.
What are browser toolbars ?
Browser toolbars are add-ons that sit inside popular internet browsers, such as Internet Explorer, Firefox and Chrome. They are often bundled with downloaded software and installed unknowingly.
Legitimate makers of browser toolbars use them to track users, view their latest activity, or see who’s online at any given moment, what buttons users click on toolbar, what keywords they use, and what they search for. (Source)
Other toolbars are actually spam or even keystroke loggers that offer themselves up as toolbars. Learn how to avoid Browser toolbars.
Ridiculous: You can hardly see the webpage for the toolbars!
How do I avoid browser toolbars ?
When downloading and installing software, you can no longer just select “Express/Standard/Normal” install. This almost guarantees you will also receive a free, unwanted toolbar.
You need to select “Custom install” instead. Ignore statements made about it being un-preferred or for advanced users – the only ‘advanced’ thing you need to do is un-tick a box or two, and click “Next” a few times…
As you step through the installation process, look out for check boxes such as “Include useless toolbar” and “Change my Homepage to useless.com” and un-tick them. In this example we need to click “Decline” aswell.
In the above example, downloaded from the popular C-Net Download.com, selecting “Standard Install” would have also installed the Ask toolbar, and changed your internet start & search settings to Ask.com.
What happens if you have multiple browser toolbars installed? (as shown above)
1. Your internet browser runs very slowly when first loading all of the toolbars.
2. Your internet surfing habits are being collected, transmitted and stored.
3. The browser toolbars may try to update often, even if the browser itself is at the latest version.
4. Your PC is likely to be infected with a malicious browser toolbar.
How do I get rid of browser toolbars?
Browser toolbars can be removed using a number of methods – this is dependant on the type of toolbar.
1. Legitimate toolbars can be disabled within the browsers settings, and are also likely to have an uninstall feature in the Control Panel / Add-Remove Programs list.
2. If you have malicious toolbars that you can’t uninstall with step 1, try a virus scan – this may find and remove it.
If these methods fail to remove the browser toolbar, then its time to contact Tailormade IT Solutions for further assistance.
For more information visit:
Tailormade IT Solutions is now listed in the Victorian Government Seniors Card Online Discount Directory, the online directory of discounts for Victorian Seniors Card Holders.
Click the image above to visit our page on the directory
We are also listed in the printed directory which is distributed to 650,000 older Australians, giving potential customers another avenue to find quality IT support at an affordable price.
Eligible card holders will receive a 10% discount on all services.
The full online directory of Seniors Card Discounts is available at http://www.seniorsonline.vic.gov.au
Canon Pixma MX410
New inkjet printers are very affordable, and include scanners and fax machines – but the cost of replacement ink cartridges soon ads up.
The Canon Pixma MX410 printer shown above normally uses Canon PG510 (Black) and CL511 (Colour) ink cartridges, available in a combo pack for $51.99 at OfficeWorks.
These cartridges contain just 9ml of precious ink, and have a page yield of 200-250 pages (approx), which is why they run out so often.
Looking for a cheaper option ??
I purchased a Rihac Constant Ink Supply Solution (CISS) for $115 which includes a 100ml refillable ink tank (pre-filled with High Grade UV Dye ink) which allows for countless refills.
Although a little fiddly to install initially, the system is mess free and the tank can be eventually be topped up using 100ml bottles of ink.
The savings speak for themselves.
According to Rihac, this system saves up to 90-95% on your printing costs! “*Equivalent to approximately 60 standard cartridges. Epson cartridges have approximately 10 mls of usable ink inside. Our CISS allows you to print continuously. Epson cartridges are approximately $23.52 each (officeworks). Our CISS is pre-filled with 100mls of each coloured ink, so in dollar terms that is approximately $1,400.00 worth of cartridges if bought separately.”
Click on the pictures above to see the Rihac CISS installed.
The Rihac CISS works with a range of Brother, Canon, Epson & HP printers. If you are looking for cheaper printing, I recommend using a Rihac Continuous Ink Supply Solution.
To see if your printer can use a Rihac CISS, visit: http://www.rihac.com.au/inklink8482-ciss-units-c-26.html
Our application to the Victorian Seniors Card program has been accepted and Tailormade IT Solutions is now authorized to display this logo and offer Seniors Card discounts to eligible card holders.
10% discount on all services for Seniors Card Holders
Please advise Tailormade IT Solutions when making a booking if you are planning to use your Seniors Card to claim a 10% discount on IT services.
Information about our pricing shedule is available at http://tailormadeitsolutions.com.au/pricing/
Please Note: The Seniors Card offer applies to IT Services only and does not apply to items purchased from the Tech Store.