PRESS-F1 Computer Service

Saving The World  - - One Computer At A Time!

368-5252

  www.lodicomputer.com

In This Issue
Services
Feature Article
Contact Us
Specials
Support
Newsletters 
 

Tech News

Alan Turing and the Ace computer

In clean energy, U.S. needs more steel in ground

 


 Subscribe
Un-Subscribe

HELP!
Online Help

Make Appointment
Request Appointment

Contact Us
Contact Us

 

 

 

 

 

Welcome to our Newsletter

 

There's a lot of bad stuff floating around the Internet. The article below will explain. Is it a virus? Is it a worm? Where it comes from. What it does. How to prevent it.      Click Here

Office Hours: Office open: Monday, Tuesday, Wednesday 8:00 an to 12:00 noon. Afternoons are reserved for outside service calls. Thursday and Friday hours will vary. Please call.

Free Lunch!  Everyone enjoys a free lunch. You may have heard the phrase "There's no such thing as a Free Lunch." Well, here it is. If you refer a new customer to us and that customer results in a minimum of one hour of computer service, YOU will receive a $10 gift card to spend at a local restaurant. Details

This newsletter will be produced and delivered in the first week of each month. Our intent is to provide you with useful information. It is not out intent to annoy you with unwanted emails. If you would rather not receive this newsletter, by all means, find the Opt-Out link below.

If you find this newsletter useful or interesting, please share it. Just Forward it to anyone you think may benefit from the information. Also check out our Specials.

 

Gregory Walther
Press-F1 Computer Service
 



Services We Provide
   

368-5252

 

Here's Why You Call Us First:
  1. Your phone call will be answered.
  2. You will get same day on-site service.
  3. You will understand what we are doing.

 

  • On-Site or In-Shop Computer Repair.
  • Wired or Wireless Networking.
  • Complete Custom Computer Systems.
  • Spyware / Adware / Virus removal.
  • Data Recovery.
  • Website Design and Hosting.
     

more info...


Feature Article

   

 

Computer Hijack Defined

The motivations for computer hijacking are not always clear. They can include mischief, vandalism, data theft, fraud and major criminal activities.

Viruses

Viruses are software programs that attach themselves to files and make a computer do something unauthorized, like delete files or send e-mails with virus copies. The initial activation of a virus on a computer usually depends on some normally innocuous action taken by a user such as opening an infected file.

Worms

Worms are similar to viruses, but they don't depend on user action to become activated. Instead, they propagate themselves across networks and automatically infect vulnerable machines.

Malware

Malware is software that's placed on a machine where it remains resident for an unauthorized purpose, like stealing passwords or data. Malware can also turn an infected PC into a "bot" that sends out thousands of e-mail spam or phishing messages per hour.

Malicious Website Code

Some hijacking Websites covertly install hostile programs via a visitor's web browser. The programs can fulfill the same purposes as viruses, worms or malware.

Browser Hijack


A browser hijacker is a type of malware program that alters your computer's browser settings so that you are redirected to web sites that you had no intention of visiting. Most browser hijackers alter default home pages and search pages to those of their customers, who pay for that service because of the traffic it generates.

More virulent versions often: add bookmarks for pornographic web sites to the users' own bookmark collection; generate pornographic pop-up windows faster than the user can click them shut; and redirect users to pornographic sites when they inadvertently mistype a URL or enter a URL without the www. preface. Poorly coded browser hijackers -- which, unsurprisingly, are common -- may also slow your computer down and cause browser crashes.

Browser hijackers and the pornographic material they often leave in their wake can also be responsible for a variety of non-technical problems. Employees have lost jobs because of content and links found on their computers at work; people have been charged with possession of illegal material; and personal relationships have been severed or strained. In one case in the United States, a Russian immigrant was convicted for possession of child pornography, although he claims to have been the victim of a browser hijacker.

Like adware and spyware, a browser hijacker may be installed as part of freeware installation. In this case, the browser hijacker is probably mentioned in the user agreement -- although, obviously, not identified as a browser hijacker. The problem is that users typically either ignore the fine print or only give it a cursory reading. A browser hijacker may also be installed without user permission, as the result of an infected e-mail, a file share, or a drive-by download.

To avoid contamination, experts advise users to read user agreements carefully, and to be cautious about freeware downloads and e-mail messages from unknown sources.
A virus, worm or browser hijack do not go away on there own.

Once infected, a computer will continue to get worse until enough damage is done that the infections will prevent Windows from starting, Like all infections, early detection and treatment are the key.If your computer becomes infected, shut it down and call us as soon as possible. We will clear the infections and advise you on how to prevent future infections.

If you have a particular question or subject in mind, send us a note and we will share some information on the subject. Reader input is the key to a useful newsletter.


For more information, tips and resources visit http://www.lodicomputer.com. I hope you find this information interesting and useful. If you have any questions or need further information.  Call Today.

 

   
   
  [USERTRACK] 

Press-F1 Computer Service
420 North Sacramento Street, Suite #6, Lodi, California
209-368-5252 - service@lodicomputer.com

Copyright Press-F1 Computer Service 2008-2009 ~ All rights reserved.