PC Apple Consulting, Apple, Amiga, PC, Web Master, Microsoft, IT, Consultant, Networking, Rigo Muniz, Web Site Administrator, Florida Notary Public, PC Apple Consulting, Programming, Repairs, iMac, iPhone, Windows 10, iMac, West Palm Beach, Wellington, Florida, Boca Raton, Belle Glade, Palm Beach, Go CompOnsite, Bilingual, Translations, Florida Career College, Technical Support, FIU, Palm Beach State College, Technical Support Specialist, Writer, Translations Services,
Search This Blog
Friday, July 24, 2015
Wednesday, May 13, 2015
Tuesday, April 07, 2015
Peeping into 73,000 unsecured security cameras thanks to default passwords by Ms Smith
NETWORLD MAGAZINE Article ==> A site linked to 73,011 unsecured security camera locations in 256 countries to illustrate the dangers of using default passwords.
This is the online website ==> The world biggest directory of online surveillance cameras
Thursday, June 12, 2014
How to fix system scan error on Windows 8?
How to fix system scan error on Windows 8?
Open a command prompt with admin rights and run this DISM command to detect and repair corrupted files on the HDD:
DISM /Online /Cleanup-Image /RestoreHealth
This is the advanced version of sfc /scannow. Windows now downlaods the corrupted files from the Internet instead of telling you that the files can't be repaired.
http://blogs.technet.com/b/joscon/archive/2012/09/26/fixing-component-store-corruption-in-windows-8-and-windows-server-2012.aspx
This is a windows of command.com:
"Microsoft Windows [Version 6.3.9600]
(c) 2013 Microsoft Corporation. All rights reserved.
C:\Windows\system32>sfc /scannow
Beginning system scan. This process will take some time.
Beginning verification phase of system scan.
Verification 100% complete.
Windows Resource Protection found corrupt files but was unable to fix some
of them. Details are included in the CBS.Log windir\Logs\CBS\CBS.log. For
example C:\Windows\Logs\CBS\CBS.log. Note that logging is currently not
supported in offline servicing scenarios.
C:\Windows\system32>DISM /Online /Cleanup-Image /RestoreHealth
Deployment Image Servicing and Management tool
Version: 6.3.9600.17031
Image Version: 6.3.9600.17031
[==========================100.0%==========================]
The restore operation completed successfully. The component store corruption was
repaired.
The operation completed successfully.
C:\Windows\system32>"
Tuesday, April 29, 2014
DO YOU USE INTERNET EXPLORER?
DO YOU USE INTERNET EXPLORER?
The Department of Homeland Security wants people to stop using it immediately because of a major security gap.
** SHARE WITH FRIENDS **
FOR FULL STORY- http://bit.ly/1rCFEb5
Source:
http://cbs12.com/news/top-stories/stories/homeland-security-stop-using-internet-explorer-15413.shtml
AOL hack causes zombie spam
AOL hack causes zombie spam
"NEW YORK (CNNMoney) -- Whether or not you use AOL, a recently exposed mass hack of the company's network promises trouble for everybody.
AOL users: Hackers stole "a significant number" of email addresses, passwords, contact lists, postal addresses and answers to security questions, the company said in a blog post Monday. Anyone of the company's 120 million account holders might be affected. Judging by AOL's description of the incident, that total number could well be in the tens of millions. But AOL isn't giving any details about the incident for now.
Non-AOL users: Watch out for spam that looks like it came from you or your friends' AOL accounts."
Sources:
WPTV 5
http://www.wptv.com/news/science-tech/aol-email-spoofing-hack-causes-causes-zombie-spam
CNN
http://money.cnn.com/2014/04/29/technology/security/aol-hack-spam/index.html?hpt=hp_t3
Thursday, March 27, 2014
What is a Hashtag? And What Do You Do With Hashtags?
What is a Hashtag? And What Do You Do With Hashtags?
Aug 11, 2013 by Anita Campbell In Social Media
#hastag #geekknowledge
For More Details Click here
http://smallbiztrends.com/2013/08/what-is-a-hashtag.html
Aug 11, 2013 by Anita Campbell In Social Media
#hastag #geekknowledge
What is a Hashtag?
A hashtag is a label for content. It helps others who are interested in a certain topic, quickly find content on that same topic.
A hashtag looks something like this: #MarathonBombings or #SmallBizQuote.
Hashtags are used mostly on social media sites. They rocketed to fame on Twitter. But now you can use hashtags on other social platforms, such as Instagram, Facebook, Pinterest and Google+.
Anyone sharing content on a relevant topic can add the hashtag label to their message. Others searching for that topic, can search for that label to find other messages on that same social media platform.
For More Details Click here
http://smallbiztrends.com/2013/08/what-is-a-hashtag.html
Tuesday, November 12, 2013
2014 BEST Antispyware Software Review
2014 BEST Antispyware Software Review
Product Comparisons:
http://anti-spyware-review.toptenreviews.com/
Remove FBI virus Removal instructions
"FBI virus is a sneaky malware, which mostly gets inside its target computer undetected with a help of Trojan.LockScreen. As soon as it gets inside, this scam presents about itself for the victim as 'The FBI Federal Bureau Investigation' and shows an aggressively-designed alert that claims that computer is blocked because of the Copyright and Related Rights Law violation or other reason. However, if you find yourself blocked by a program, which tells that you have been illegally using or distributing copyrighted content, viewing or distributing pornographic content and spreading malware to other computers, you must ignore such alert first of all and remove FBI virus immediately! This program is distributed by scammers to swindle the money. Be aware that security experts expect this group of ransomware to grow and improve.. "
Remove FBI virus
Removal instructions
Wednesday, June 05, 2013
If you Computer slow down or Freezes
If you Computer slow down or Freezes at times...What to do?
Use CCleaner to clean your computer, then run RKILL, Please see review about Rkill to detect any unwanted malware service running on the background.
Scan your machine for Malware with MalwareBytes then run Avast Anti Virus. These applications are free of charge.
If after cleaning the machine nothing happens then download and run TDDSKiller from Kaspersky Labs. to look for a hidden rootkit.
Please run also a defragger such as Auslogics Disk Defrag
P.S A rootkit is a program or a program kit that hides the presence of Malware in the system
Source(s):
http://www.filehippo.com/download_ccleaner (CCleaner)
http://www.bleepingcomputer.com/download (Rkill)
http://www.avast.com/en-us/index (Avast Antivirus)
http://www.malwarebytes.org/ (MalwareBytes)
http://www.avast.com/en-us/index (Avast Antivirus)
http://www.malwarebytes.org/ (MalwareBytes)
http://usa.kaspersky.com/downloads/tdsskiller (Tddsskiler)
Tuesday, May 28, 2013
Fake Adobe Flash player was trying to install into my computer!
AVAST antivirus just caught a malicious infection below trying to sneak into my computer via Firefox web browser. This is a fake Adobe Flash player
A Flash Player Update is Required to View this Content
- 100% FREE Update
- Experience the Web at its fullest
- Beautiful HD video, faster graphics rendering, and high performance
- Richer, more immersive user experiences
This update will only take a couple of minutes.
Subscribe to:
Posts (Atom)