Bonza Mobile Computer Repairs | Bonzawebsites | Adwords Management


Bookmark and Share
 

Computer Problems »

About Clickjacking
Published June 17th, 2011 by Roslyn Garavaglia Comments Off on About Clickjacking

Hardly a day goes by without someone asking a Bonza technician to remove a virus(s) from a computer or laptop. This post may help you to “pause a sec” before you click! clickjacking

Suppose you visit a site and think you’re clicking on a button to close a window; instead, the action of clicking the “X” button prompts your computer to download a Trojan virus, transfer money from your bank account or turn on your computer’s built-in microphone. The host website may be a legitimate site that’s been hacked or a fake version of some well-known site like your bank’s website. You may have been tricked into visiting the site through links online or in email messages. 

It’s called Clickjacking (more…)

Keep tabs on your software and hardware
Published March 12th, 2011 by Roslyn Garavaglia Comments Off on Keep tabs on your software and hardware

Inventory your software and hardware

hardware-software-inventory

Do you know what memory your computer has or what type of processor you use?  Do you know which software programs are installed on your computer and what their serial numbers are? Do you have your software installation discs and licence keys? (more…)

How obvious are computer security threats?
Published February 6th, 2011 by Roslyn Garavaglia Comments Off on How obvious are computer security threats?

Threats are obvious only when we have knowledge of them and since cyber threats change from day to day… 

Words like phishing, hacking and malware have become part of the vernacular, but as our online connectivity increases there’s a new batch of cyber security threats we should be aware of.

What to look out for in 2011 (more…)

Please reboot your computer
Published December 12th, 2010 by Roslyn Garavaglia Comments Off on Please reboot your computer

Why powering down and rebooting fixes so many computer problems.

reboot itJust boot it, boot it,
No one wants to be defeated
Showin’ how funky and strong is your might
It doesn’t matter who’s wrong or right
Just boot it, boot it
Just boot it, boot it. (more…)

Are you a Pebcac, a Picnic or a Geek?
Published October 23rd, 2010 by Roslyn Garavaglia Comments Off on Are you a Pebcac, a Picnic or a Geek?

His Geekiness, Wayne (our senior technician), often endearingly calls me a PEBCAC (“Problem Exists Between Chair And Computer) or sometimes a PICNIC (“Problem In Chair Not In Computer”). The acronyms imply a lack of computer savvy asserting the user is at fault when a computer problem arises. Oh, alright! I admit it, I make mistakes.

I HATE COMPUTERS! I’m not a super geek, I just know how to use one to do my job. 

Typically, errors are caused by typing in a password with the caps lock on, by an unplugged device, by hitting the wrong key and by accepting a message dialogue without reading and understanding it, by an unplugged network cable or a session timeout. And by opening an email attachment or going to a particular web page.

Innocent errors with the capacity to cause severe downtime and expense for your business!

However, the biggest human error is lack of vigilance.

The focus of this article is not whether you’re a geek, a computer power user or Pebcac, it’s about cyber security.

A couple of nights ago the 7.30 Report had a segment on cyber crime. Did you see it? Here is a link to the transcript Cyber crime on the rise!

The report mentioned some startling statistics, but failed to provide anything substantial that we haven’t heard before. You’ve heard news stories before about credit card numbers being stolen and email viruses spreading. Maybe you’ve even been a victim yourself.

One of the best defenses is understanding the risks and knowing what you can do to protect yourself against them.

What are the risks?
Viruses erasing your entire system, someone breaking into your system and altering files, someone using your computer to attack others, or someone stealing your credit card information and making unauthorized purchases. Unfortunately, there’s no 100% guarantee that even with the best precautions some of these things won’t happen to you, but there are steps you can take to minimize the risks.

What can you do?
The first step in protecting yourself is to recognize the risks and being vigilant.

General security

•Choose and Protect your Passwords and change them regularly

•Understand your Anti-Virus Software

•Understand your Firewalls

•Coordinate Virus and Spyware Defense

•Have Good Security Habits

•Safeguard Your Data with offsite backups

Attacks and threats

•Understand Hidden Threats: Corrupted Software Files

•Understand Hidden Threats: Rootkits and Botnets

•Recognize and Avoid Spyware

•Avoid Social Engineering and Phishing Attacks

•Understand Denial-of-Service Attacks

•Identify Hoaxes and Urban Legends

Email and communication

•Understand Your Computer: Email Clients

•Use Caution with Email Attachments

•Reduce Spam

•Understand Benefits and Risks of Free Email Services

•Understand Benefits of Blind Carbon Copy (BCC)

•Understand Digital Signatures

•Use Instant Messaging and Chat Rooms Safely

•Stay Safe on Social Network Sites

Mobile devices

•Protect Portable Devices: Physical Security

•Protect Portable Devices: Data Security

•Use Caution with USB Drives

•Secure Wireless Networks

•Protect Cell Phones and PDAs Against Attack

Privacy

•How Anonymous Are You?

•Protect Your Privacy

•Understand Encryption

•Effectively Erase Files

Safe browsing

•Understand Your Computer: Web Browsers

•Evaluate Your Web Browser’s Security Settings

•Shop Safely Online

•Browse Safely: Understand Active Content and Cookies

•Understand Web Site Certificates

•Understand Internationalized Domain Names

•Understand Bluetooth Technology

Software and applications

•Understand Patches

•Understand Voice over Internet Protocol (VoIP)

•Understand Risks of File-Sharing Technology

•Review End-User License Agreements

•Understand Your Computer: Operating Systems

Are you a Geek? I’m not!  I get Wayne to handle all of the above, the do-it-yourself method is not an option.

Small businesses like yours and mine, can’t operate without computers. Without an IT expert on your staff means someone else’s time is being used inefficiently to deal with computer problems. It’s imperitive you have the best security measures in place for your computer systems and a trustworthy firm giving you the best professional service and impeccable after sales service. And that’s Bonza!

Don’t wait to see which virus, hacker, spy, hard drive crash, barrage of time-wasting spam, or other problem is going to derail your business operations.

  • Call to Action:  “What would your thoughts be on having an initial conversation with us about a Systems Audit? What is your availability over the next few weeks?”

It’s easy to get started. Just pick up the phone and call 1800 280 440

Fraud Antivirus Packages
Published September 24th, 2010 by Roslyn Garavaglia Comments Off on Fraud Antivirus Packages

Fake Antivirus Software

There has been a massive increase in the amount of users getting infected by fraud antivirus programs that are floating around the internet. Over the past 3 years I have seen the rate of infection climb from every 1 in 10 machines that have viruses to 1 in 3 machines which seem to contract it.

What is a fraud antivirus?

A fraud antivirus is a legitimate looking antivirus program which may pop up while you are browsing or after you have had a downloading stint using various P2P software downloading programs (see my guide on limewire and p2p programs for more information on these). These fake programs are actually viruses themselves and they disable your current antivirus and in some cases allow more viruses into your PC. They can be particularly difficult to remove and can even remove important windows files from your PC in some extreme cases, claiming that these needed files are in fact viruses and removing them upon the users request. A lot of these programs will ask you for credit card details to ‘activate the software’ and allow it to remove the ‘infected’ files. Under no circumstances should you ever enter your details into these programs as they have been linked to bank fraud, which means you could wake up the next morning to an empty bank account. (more…)

Downloading Free Music
Published September 17th, 2010 by Roslyn Garavaglia Comments Off on Downloading Free Music

 P2P program information.
(the best way to get a virus on your PC for Free!)

Hi everyone,

Bonza Mobile Computer Repair Technician - Cameron Lawless

Throughout my travels I have noticed a very serious trend when it comes to virus and malware infections. EVERY person that has had a peer 2 peer program (such as Limewire or Frostwire) on their PC has had viruses that require cleaning. I have also noticed that 90% of computers that obtain the fake security antivirus have also had one of these programs or something similar.

How do you get viruses from these programs?

When you start these programs they are connecting to a massive network of files such as music, videos and photos that people are sharing across that network. These can all be downloaded (most of them illegally) for free. (more…)

Laptop Health Guide
Published September 11th, 2010 by Roslyn Garavaglia Comments Off on Laptop Health Guide

The Do’s and Don’ts for everyday Laptop use. 

Greetings customers,

This laptop health guide will help you care for your notebook to protect your data, and prevent costly repairs.

First things first:

If you turn over your laptop and have a look on the underside you will notice several vents. These are used as an intake system for the laptops cooling. Blocking these off can cause many issues due to heat. Overheating can cause your laptop to lose hard drive integrity (which means losing your very important data), losing your wireless, destroying your ram as well as your processor and mainboard! (more…)

Watch out for ATO Scams…
Published August 28th, 2010 by Roslyn Garavaglia Comments Off on Watch out for ATO Scams…

Tax Refund Scams

There are a number of refund scam emails currently circulating. These emails claim to come from the ATO and offer a tax refund. They link to a bogus ATO website asking for personal and credit card details. These emails can differ in their appearance and level of sophistication but will generally state that you are eligible for a refund and instruct you to click on a link to submit a form to receive it. The ATO will never email you asking for personal or credit card details and you should never provide this information.

Key indicators of the email scam include: (more…)

Why can’t I see other computers in My Network Places?
Published June 20th, 2010 by Roslyn Garavaglia Comments Off on Why can’t I see other computers in My Network Places?

Wouldn’t you expect once a computer’s settings and configurations are in place it’d be smooth sailing?
NUP!
With all the high volume activity across networks going on day by day, something will come unstuck.

If you’re comfortable mucking around with your Settings and Configurations on your computer ….
(I’m not! I’m not an expert and my tinkering ALWAYS makes it worse!  I prefer Wayne, Bonza’s senior technician, to look after my pc). Because Troubleshooting networking problems can be tricky. (more…)


Bonzamobilecomputerrepairs.com