| 
									Virus removal and 
									protection | 
						 
					 
					
										 
										 
									
									
									Virus, Trojan, 
									rootkit, adware and spyware 
									
									removal at our 
									office   ( $150.00) 
									
									Free Pick-up and 
									delivery  
								When your computer is infected with a virus 
								the first priority is to make sure your data is 
								backed up. Malicious Virus programs have the 
								ability to install files with system rights and 
								possibly altering the registry. They can disable 
								the computer from starting properly or 
								functioning with annoying pop ups and slow the 
								system down.  
								
									- Saving your data and programs is top 
									priority
 
									- Antivirus software is available for 
									purchase and is not included in price.
 
									- Turn around time is about 3 days
 
								 
					
					Shielding your browsing habits 
					  
					Clear 
					your cache. Your browsing record is a personal 
					privacy liability, particularly if you share a computer or 
					browse at work. To protect your privacy, clear your 
					browser’s temporary Internet files/clear your history after 
					each browsing session. 
					  
					Reject 
					unnecessary cookies. Some
					
					cookies are used to track 
					your browsing history for marketing purposes. Configure your 
					Web browser to prompt you every time a site tries to send a 
					cookie. This allows you to reject cookies from Web sites you 
					wish to browse anonymously. Usually, cookie configuration is 
					located in the “privacy” or “security” section of your 
					browser's Internet options or preferences. 
					  
					Use 
					    encryption service.
					    Encrypting is a process that encodes your message or communication over the 
                        internet so only authorized parties can access it. It does not prevent 
                        interferance but but denies the intelligable content to a would be interceptor. 
					  
					
					
										A few tricks hackers' 
					might use!   
										 
					Looks like cybercriminals have turned social networking into a 
										minefield of threats where one wrong 
										move may have very serious consequences. 
										Long gone are the days when you could 
										avoid being scammed simply by using 
										antivirus software. The more aware we 
										are the harder bad guys are working on 
										fooling us. And let me tell you, their 
										techniques are getting more and more 
										sophisticated! Have a look at some 
										examples of the latest cyber criminals’ 
										creations and how to avoid them. 
										
											- Koobface 
											(social networking worm). It gains 
											access to Facebook profile pages and 
											directs you to view a video that 
											then encourages you to update your 
											Flash player. Malicious files such 
											as flash_update.exe and 
											bloivar29.exe are being downloaded 
											and installed which results in a 
											range of visible problems, including 
											modifications to your Facebook 
											profile, with the immediate result 
											being an error message to contact 
											support. There is also the very real 
											potential for your identity and 
											finances to be compromised! Recently 
											documented that Facebook has not 
											been infected as much. But other 
											social networking sites are being 
											targeted.
 
											 
  
											- Picture files carrying 
											malware are "planted" on 
											social networking websites and 
											instant messaging programs. Hackers 
											try to convince you that your friend 
											has sent you a message or IM to view 
											pictures. Legitimate looking URL 
											when clicked on sends you to an 
											illegitimate website hosting 
											malicious files and executables, 
											which have been modified to 
											appear to be genuine picture 
											files (jpg, gif or bmp). When you 
											download and open those "pictures"; 
											the malware unknowingly runs on your 
											computer. It allows hacker to take 
											control over your operating system 
											as well as the information in it and 
											exposes you to identity fraud and 
											financial loss! 
 
											 
  
											- UPS Delivery Threat, 
											also known as Zbot. It delivers an 
											illegitimate file when you are 
											visiting a counterfeit UPS delivery 
											site. Zbot has been known to 
											distribute via email phishing and 
											instant messenger.  Upon informing 
											you that you have missed a UPS 
											delivery, the message urges you to 
											view the invoice online, which in 
											fact sends you to the counterfeit 
											website which downloads a malicious 
											program designed to bypass the 
											firewall and then steal banking and 
											personal information.
 
										 
										So how do we protect 
										ourselves against all this and more?
										 
										
											- Be wary of unexpected IM 
											messages and emails urging you to 
											open or run an attachment or 
											download 
											
 
											- Run up-to-date Anti-virus and 
											Malware software with behavioral 
											protection. Keep it running in the 
											background at all times. 
											
 
											- Ensure you keep virus 
											definitions up to date and maintain 
											your Microsoft updates regularly. 
											
 
											- If you are asked to update to a 
											new version of a flash player or any 
											other program go to producers’ 
											website and download the update 
											directly from it. 
											
 
											- Organizations usually contact 
											you by phone or mail, so when you 
											get an email call them back instead 
											of clicking on any links or 
											attachments. 
											
 
											- Never let your guard down, it’s 
											better to be too cautious then 
											sorry. 
											
 
										 
								 
								   |