Translate

Sunday, November 24, 2013

Is Bitcoin Technology Secure?

The Bitcoin value reaches an all-time high of more than $800.  Yet the public wants to know how to use the currency and how secure is the technology?   Bitcoin is an online financial network that people use to send payments from one person to another.  In no way can this technology be compared to credit cards or US currency.  The currency is decentralized which means that no one owns or controls the Bitcoin network.  It has a peer-to-peer structure, with hundreds of computers all over the Internet working together to process Bitcoin transactions.  Bitcoin is not regulated by the government.  So who in their right mind would conduct commercial transactions with the use of Bitcoin?

Bitcoin transactions became mainstream in 2011, and seem to becoming more and more popular.  There are almost 12 million bitcoins in existence, so the Bitcoin "money supply" is now worth around $7 billion.  This technology is highly innovative and attracting to interest of many computer geeks and hobbyist alike.   Why not be in a position where you can produce as much currency as you like especially when there are merchants/consumers that are willing to trade in it?  There are reports of 10,000 merchants accepting Bitcoins in 2013.  Bitcoin has been associated with some illicit activity as well.  Suspected to be used in illegal gambling and drug trafficking.  

Bitcoin Security

There are very few off-line Bitcoin transactions occurring across the country.  Do you really know who you are making the transactions with, and will legal agreements stand up in court?  Bitcoins are stored in wallets online or on a person’s local computer.  The files contain encryption keys, or secret codes that allow you to transfer bitcoins to other people.  Bitcoin technology is a prime target for hackers.  Maybe the best option would be to print out the currency by the use of a paper wallet and store the currency in a safety deposit box.  The best practice would be to store the currency on a computer that is never continuously connected to the Internet.

Read more about Bitcoin Technology


For nationwide computer repairs and serving call 1 888 556-6371

Thursday, November 14, 2013

Hotmail Hoax

According to Sophos the number virus this week is the Hotmail Hoax.

Beware of the following text in emails:


 Hello to everyone from the Hotmail Headquarters! This is just a little test to see who is actively using their email account and in effect deleting all inactive users accounts. This process will make the whole site faster and easier to use for the active users. Now on to what to do with this email. All you have to do is forward this on to at least 10 registered Hotmail users. If you don't forward this on within 48 hours of reading it, your account will be deactivated momentarily until you contact Hotmail Headquarters.


READ THE PARAGRAPH IF YOU WANT TO KEEP YOUR HOTMAIL ACCOUNT!!!!!!!!!!!!!!!!!!!

Dear Hotmail User,

Because of the sudden rush of people signing up to Hotmail, it has come to our attention that we are vastly running out of resources. So, within a month's time, anyone who does not receive this email with the exact subject heading, will be deleted off our server. Please forward this email so that we know you are still using this account.

WARNING WARNING

We want to find out which users are actually using their Hotmail accounts. So if you are using your account, please pass this e-mail to every Hotmail user that you can and if you do not pass this letter to anyone we will delete your account.


Unfortunately people tend to believe Hoax messages and over react to the messages in E-mail.  We get calls everyday from people asking about possible viruses associated with their E-mail account.  Best rule of thumb is to delete the message rather than open it.  Go to another PC or Laptop and research the message on one of the popular virus protection sites.  We recommend Sophos, Trend or AVG as a good resources to research possible virus threats. Set up your E-mail client so that emails are scanned before download from your service provider.

If you are having severe problems with viruses on your computer systems

Call 888-556-6371 or Click http://ow.ly/qOzd4

Sunday, November 10, 2013

Civilian or Military Personnel Heading the Cyber Command?


 
What are the reasons behind the government appointing a civilian to the head of the NSA.  Gen. Keith Alexander was tapped to become head of America's national spying agency in 2005, and took up the additional role of the head of Cyber Command five years later.  The governments thought being that by combing the two agencies the country would be better protected.  Yet by combining the two agencies the civilian population may be a victim of abuse of power by the NSA.  By splitting the agencies and placing a civilian in charge of cyber security the potential of government agencies over stepping their bounds and violated a civilian’s rights to privacy become less of a threat.  Many Americans believe the NSA is listening to their phone calls and reading their emails.  By splitting the agencies this could renew the trust of the American people.
Read Related Stories:
 
 
 

Thursday, November 7, 2013

The FBI Moneypak Virus – A VERY NASTY VIRUS

The Ransom virus was discovered in 2012. The virus is categorized as Ramsomware by Anti Virus software developers. he FBI virus utilizes Trojan horses in order to gain access and lock computer systems. This is a classic form of social engineering were people are intimated by a fake agency; normally the FBI demanding money in the form of a fine in amounts $100, $200, $300, or more to be paid in order to unlock the computer system within the allotted time of 48 to 72 hours by use of Moneypak cards. For the novice PC user this I know can be very intimidating. We have had customers actually turn off their computer an never turn it back on again until months later. This virus is in no way associated with the government.
10 STEPS FOR REMOVING RANSOMWARE
Here’s how to use a free Symantec service that the company says often removes the virus:
1. If the computer is Internet connected, shut it off by holding down the power button for about 10 seconds.
2. Turn it back on while repeatedly tapping the F8 key.
3. When it brings up the “advanced boot options,” use the down arrow to select “safe mode with networking” and hit “enter.” You should see a screen that says “safe mode.”
4. Open a browser — such as Google Chrome, Mozilla Firefox or Internet Explorer — and go towww.norton.com/npe
5. Click the button to download the Norton Power Eraser, save it to your desktop and double-click the icon to run the file.
6. After reading the user license and clicking “agree,” click “scan for risks.”
7. As Power Eraser restarts the computer, repeatedly hit the F8 button and again select safe mode with networking.
8. Click “run” so Power Eraser can scan for the virus.
9. Once it finishes, you’ll see “scan complete” in a window with the results. Then click the “fix” button.
10. Click “restart” to reboot the computer again. You should see a confirmation that threat has been removed.
IF THIS IS FAR TOO COMPLICATED FOR YOU? CALL:Call 1 888 556-6371
Source: Symantec
Read More: http://www.mercurynews.com/business/ci_24387863/what-do-when-your-computer-gets-kidnapped-by