Accidental Spyware Installation

In a previous entry we talked about recent viruses and spyware that have been on the rise in 2015. Here we will go through the installation of a program that we want which is bundled with spyware.

PowerISO is a disc image application for managing ISO and other images. It can be used to modify an image (add/remove files) and mount images as well. The problem is that it has bundled spyware in the installer. While some installers may have good programs bundled, the fact is that you don’t want any third-party programs – just the one that you downloaded. So let’s start the installation from the downloaded file.

PowerISO Installation 01We agree to the license and continue.

PowerISO Installation 02This is something that we don’t want – so we skip.

PowerISO Installation 03We don’t want this either – so go to CUSTOM and uncheck this then hit NEXT.

PowerISO Installation 04TuneUp Utilities is a good piece of software and was acquired by AVG who makes an antivirus package. While it is good, personally I don’t trust installing through a third party – so uncheck the box and click NEXT.

PowerISO Installation 05After all of that we finally get to where the files will be installed – and hit NEXT.

PowerISO Installation 06Once it’s done – NEXT.

PowerISO Installation 07Once we get to this point we’re done! Set up the virtual drives if you want  – select the files you want to associate with the program and integrate with the Windows Shell if you want. I’d recommend unchecking the update option so that you don’t accidentally download and install anything you don’t want to. Just repeat the steps above if you do actually update.

If the options have changed in any newer versions in the future then just be sure you uncheck and skip all additional installations.

General Audio Problems

Recently we’ve found that persons have had some issues with audio – particularly in games. Turns out that at times either accidentally – or intentionally by someone playing a prank – the volume for a particular item may be disabled or turned down.

So let’s take a look at what your typical volume controls look like. From the desktop section of your PC (Windows 7 and below) you should see your speaker icon in the bottom corner.

Volume 06

If you’re using Windows 8/8.1 then you can access this by first going to DESKTOP after your device has booted.

Next you want to either click on the icon then click on MIXER.

Volume 05

Or – right click then go to OPEN VOLUME MIXER.

Volume 04

Once this is up your default view should look like the one in the pic below.

Volume 01

However – any application you launch may appear in the mixer. That happened even with the screenshot app that I was using – PicPic.

Volume 02

I had then launched an old game called ONI that the younger gamers wouldn’t know about. Even with this old game a separate volume control came up for it. So next I launched L4D2 through STEAM.

Volume 03

Here you can see that I’ve turned down the volume for L4D2while the rest of the system sounds are working. The mixer even put an entry for STEAM itself.

Now if you ever find yourself in a situation where a game or app gives no sound – but the sounds work everywhere else and in everything else – or if you find that the sounds are lower in one app or player than another – check the mixer. You may have to run the game then ALT+TAB away from it to check the mixer, but after this inconvenience once you shouldn’t have to do it again.

Hope this helps if you’ve had any sound issues. Let us know in the boxes below!

Viruses & Spyware in 2015

Viruses & spyware are things which have evolved over time to become what they are today. Bad stuff for your PC. How do you protect yourself in today’s world of this? It’s not easy if you’re looking for solutions online, but very easy if you already know exactly what you want and where to get it. So let’s see if we can help everyone be safer online and safer overall.

VIRUSES & SPYWARE DEFINED

These are nasty little bugs that get on your system. While different people (and companies) will have different definitions for each, and some will even group them all in the same category, they do have some slight differences and the names of each also depend on what they do.

Viruses in general harm your system by compromising some key components and usually tries to duplicate itself. You’ll find that some spyware does this too, but while viruses typically harms your system or covertly replicates itself spyware is blatant about being present – but in a nice way.

Let’s get some definitions in this. Courtesy of Google.

Virus – a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Spyware – software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.

Malware – software that is intended to damage or disable computers and computer systems.

Scareware – malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.

Ransomeware – a type of malicious software designed to block access to a computer system until a sum of money is paid.

And believe it or not – there’s more. For each method used you’ll find a different definition. For the purpose of this post however we’re going to just use the two broad categories of viruses and spyware.

So let’s break it down for clarification. Viruses and spyware may behave in similar ways, but viruses act behind the scenes while spyware is more up-front. Usually spyware will install itself bundled with something that’s good or that you want. A typical example of this is the Conduit Search spyware which is bundled with a lot of different things that you may want to use – like Crystal DiskInfo.

The software you’re installing is good, but the installer package that the programmer uses may just have garbage bundled with it. Most end-users are programmed by technicians to “just click NEXT, YES or I AGREE” and as such they do this. The problem is that the “bundled offers” with most packages are the things that mess you up, and then trips to the store for multiple unwanted popups or unable to change your home page or similar things come up. Stuff that finds things to fix on your PC but you have to pay for the software to get the supposed fixes. Then once your credit card info is obtained – you’re stuck with them for life.

In order to keep yourself protected and have minimal down-time if you get infected we’re going to give you three steps. Not necessarily simple steps, but three that should be fairly easy to do.

  1. Always have a system backup.
  2. Practice safe browsing.
  3. Use protection.

The steps are not listed in any particular order – it’s just how we put it while typing them out.

1. SYSTEM BACKUP

This involves two things you need to have. First is your actual system or factory image/backup and the other is a backup of your files.

Most persons have a desktop or laptop that they use. If it’s a laptop then half of your work is done. If it’s a desktop that’s a custom build – meaning not a Dell, Acer, HP or any other factory-made machine – then it’s a little harder.

For laptops and factory machines you should have an option to create your factory or system recovery discs. This entails purchasing DVD discs or an external drive (for systems without CD/DVD drives) and running the manufacturer’s software to create your recovery/factory image. Once this is done you will always be able to restore the laptop/desktop to the way it was when you just purchased it.

For desktops that are custom built you will need third-party software from Paragon or Acronis. While both will have paid solutions you can find a free solution from Paragon.

Create the backup disk image using the software of your choice and then we’re on to the next phase – the file backup.

Click on START then on RUN. For persons with Windows 8/8.1 press and hold the WINDOWS key on the keyboard and then press R. This keyboard shortcut can be done from any edition of Windows but is specifically needed for Windows 8/8.1 as they have no start menu. If you do have a start menu but can’t see the RUN option just use the same shortcut key. Type in %UserProfile% and click on OK or press ENTER on the keyboard. This should bring you to your user profile folder. Copy the entire contents to DVD or an external drive. If using DVDs you may need multiple depending on the size of the folders – an external drive is highly recommended.

Once these steps are done keep the backups in a safe place. Make periodic updates to your backup of the folders from the %UserProfile% folder to keep things current. This will ensure that you can always get your system back up and running and your files will always be safe.

2. PRACTICE SAFE BROWSING

This is something that can’t be stressed enough. Check your email. Check your social media. Check forums and such. Don’t click on the pretty flashing ads. Just don’t.

While infections can come from any angle the bulk of new infections come from clicking on things that you think are harmless. There have even been some FaceBook viruses (scripts) that hijack your account and replicate themselves by posting random things to your wall for others to click on. Some of these include porn-related things for celebrities, stating that the account holder won money and you can get a share, photos of friends that you caught that they don’t have and other such claims.

While it seems like being paranoid – and it kinda is – in some cases it’s needed. If you see something that you like, check it out by running a search about it first. If you’re still not sure then go to a reputable site – like Download.com from CNet – and search for the program there. If it’s not listed then it’s probably not safe – that’s not a rule to live by, but it’s a start. One example of a good app that’s not on CNet would be Explorer++. It’s not bundled with any spyware (at the time of this writing) but it’s not listed on CNet.

So…………..basically you just need to read the things you’re installing. Stay within the zone you’re accustomed to. Don’t download and use things that you’re not familiar with.

3. USE PROTECTION

Finally – we suggest the use of free protection if you can’t afford to buy protection at this time. Free things to use include AVG and Avast! antivirus. Paid versions of most antivirus software will work, and other popular ones include Norton, Kaspersky and Bit Defender.

ALREADY INFECTED?

If for some reason you believe you’re already infected then download and install one of the antivirus packages mentioned above and run a full scan. If you think you still have an infection then use SUPER AntiSpyware and MalwareBytes Anti-Malware – not one or the other – BOTH. Download and install then run a full scan with one then the other. If you find that this has not cleaned your system then you’ll need to perform the steps in #2 to get your files off, and use the backup created prior to an infection in #1 to get your system back up.

CAUTION

At the time of this writing it’s been brought to our attention that some of the reputable sites – like Download.com – may have started to bundle installers with some of their downloads. As a result ensure that you’re only installing things that you WANT and not additional bundled items. Here’s a few names to look out for and avoid when you’re downloading or installing stuff.

Babylon toolbar
Conduit Search Protect
Delta search
Delta toolbar
Facemoods
Qvo6
Search Assistant SearchWeb
Search result
Snap.do
Trovi Search Protect
Vitalia installer

Norton has provided a tool to remove some of these toolbars free of cost.

Hopefully with the information provided here you’ll not be needing a format/reinstall or restore from backup, and if you do end up needing it then hopefully the information here will prepare you for the worst.

Acer Aspire 4830T Keyboard Removal

This will go through the removal process for the 4830T – specifically the 4830T-6452 – but you may be able to apply some of the steps here to other models.

DISCLAIMER
While the steps here should be straightforward we don’t recommend doing this unless you either have no other choice or feel REALLY safe doing it yourself. In all cases take it to a professional or take it in for warranty repair if it’s still under warranty. DON’T DO IT YOURSELF!!!

OK. Now that that’s out of the way, let’s get down into your laptop.

Flip it over and you’ll notice that there’s a lot of screws. Fortunately 90% of the screws on this model are exactly the same, so taking them out and mixing them up won’t be much of an issue.

This model has a sealed battery, but removal of the first cover will trigger a switch that turns the battery off.

DSC08630

In the uploaded picture you’ll see blue dots on the various screws that need to be removed. The bottom panel has already been removed. There’s a gold arrow pointing to the screw that has to be removed before sliding off the panel and a green arrow at the screw for removing the optical drive (ODD). If all you need to change is the ODD then remove the indicated screw and slide it out after ejecting the drive previously and before shutting down the system or after the system has shut down with a paper clip. That means – you eject the drive with a paper clip and pull it out after the system is shut down – not shut down the system using a paper clip.

If you only need to get access to the memory (RAM) or hard drive (HDD) then remove the indicated screw for the lower panel and slide it away from the laptop (down) and then lift off. There is a switch highlighted in a red box that shows the on/off position. On the panel which you remove there is a tab that must align with the switch. Be careful not to break it.

Getting further into it you’ll want to remove the bezel below the keyboard. Ensure that all the screws from the bottom have been removed (see first picture). Flip the laptop over and open the screen. Once all the screws are removed the lower bezel is held in by clips. Pry it off (carefully) using your preferred tool/method and prepare to remove some ribbon cables. Pardon the messy table.

DSC08632Then you want to flip the bezel over and remove the trackpad cable. Once done you can take the bezel off.

Acer Aspire 4830T Trackpad CableDisconnect the ribbon cables and remove the indicated screws. One screw is different and has a red dot instead of blue. This one goes through a fabric-like attachment on the cable that connects the USB (and I think audio) on the right side. Since it goes through this part the screw shouldn’t fall out, but the fabric may tear when screwing it back in so be careful. The green arrow on the USB+ cable can be removed either from the board in the middle or from the part on the right. It’s up to you to remove one or both connectors. Either way the screw in the middle must be removed.

Acer Aspire 4830T Top BezelOnce this is done you’re almost at the keyboard. Remove the entire top bezel including the keyboard. This entire part is now held in by clips so just snap them out. Personally I took it up from the left side, then the back (close to the monitor) then all the way around. I know the pic is dark.

Acer Aspire 4830T Top Bezel RemovalOnce the top bezel is off you should be able to see the motherboard and battery.

Acer Aspire 4830T MotherboardWe’re not going into any other type of replacement specifically right now – while you can replace some other parts with what’s been done so far what we want is the keyboard.

Acer Aspire 4830T Keyboard Bracket

The picture shows all similar screws in the same color. White arrows show clip areas. The screw in purple holds the USB ports and audio jacks (labeled as USB+ previously) and must be removed prior to sliding the bracket off. Once all the screws are removed slide the metal bracket up (according to picture orientation) and then lift it off.  There may be some tape holding the black covering to the bottom of the keyboard – just peel it off as you go along.From here you can take off the exact part number for the keyboard to order it. You can then either put it back together till  you get the part or leave it disassembled – just don’t lose the screws. Once you have the replacement keyboard just remove and replace. When done just follow the instructions in reverse to put it all back together.

Acer Aspire 4830T Keyboard Bracket2 Acer Aspire 4830T Keyboard Acer Aspire 4830T Keyboard PNPLEASE NOTE – Your keyboard part number may be different. Ensure you’re getting the correct part. On this one there are two possible numbers from Sunrex or Compal – simply search for either one on eBay or Amazon.

Ticket System Up!

We now have a ticket system integrated into our site! By going to the link -> http://catsinja.com/ticket/ <- you can create a new ticket or view the progress of your existing ticket. This means that any work done can be easily tracked online right up to completion. Once done you can opt to pick up the device or have it dropped off. Remember that delivery around the town is free but based on availability.

Why And How To Service Your Desktop

INTRODUCTION

“If it isn’t broke, don’t fix it” – that’s a statement that I’ve heard used by individuals and companies alike when it comes to their IT equipment. Many of us believe that as long as the PC is working there is no need for any kind of maintenance, but this is a terrible approach and I’ll show you why. Let’s look at a heat sink for a CPU before and after servicing.

BEFORE
Heatsink Before1

Heatsink Before2

Both pictures above are taken of the same heat sink with the fan removed. Without the fan removed you wouldn’t see exactly how bad it is and you might think it’s not so bad.

AFTER
Heatsink After

While most users won’t see the insides of their PC some signs that servicing is required may include the system becoming noisy, slowing down, hanging up or shutting down during usage. Unfortunately most of these signs – especially the latter ones – don’t show up until the system is in dire need of servicing and some parts may have already been damaged as a result of the lack of care.

WHAT COULD POSSIBLY GO WRONG?

Well for one thing an excessive amount of dust/dirt is associated with static buildup. This means that there’s a chance of electronic parts dying due to static all because of a little dirt.

Another thing which most persons don’t realize is that dust and dirt in your PC will cause rust. Sounds unbelievable right? But this can be seen in a close-up of the AFTER picture above of the heat sink. Though it was cleaned it still has rust on some sections.

Static will literally kill PC parts and rust will cause extensive damage as it spreads. The really bad part is that when rusted areas on your circuits are covered by dust, cleaning can actually do more harm than good. Why? Because the dust and dirt get attached  to the rusted area, cause breaks in the circuitry, and then once cleaned the parts stop working because of all the breaks in the circuitry. This is one reason why some technicians will refuse to work on units that are either very old and/or dirty.

HOW TO PREVENT THIS?

So how to you clean your PC and keep it clean? You have two options:

First, if you’re comfortable with opening up the case, do so and blow it out periodically with compressed air.

  • MAKE SURE THE PC IS TURNED OFF AND PLUGGED OUT BEFORE PERFORMING THIS TASK.
  • CAREFULLY READ THE INSTRUCTIONS ON THE COMPRESSED AIR CAN BEFORE USAGE.
  • DO NOT TILT THE CAN OR TURN IT UPSIDE-DOWN DURING USAGE SINCE DOING THAT CAN GET LIQUID ON THE PARTS AND RUIN THEM FOR GOOD.

Simply remove the side panel of the PC and blow it out using the compressed air. Even if you’re not comfortable with removing the fan to do a thorough blowout, a basic blowout will still keep the dust under some kind of control until you can get it done thoroughly.

Your next option  – and the recommended one – is to take the PC to a repair shop or call in a professional individual to have the PC serviced since – as mentioned before, some parts will require disassembly and cleaning versus just blowing out.

POWER SUPPLY FAN BEFORE CLEANING
PSU FAN - BEFORE

CPU FAN BEFORE CLEANING
CPU FAN - BEFORE

FANS AFTER CLEANING
FANS AFTER

HOW OFTEN SHOULD I DO THIS?

I can’t answer this question definitively as each situation is different. I would say however, that everyone should have their PC cleaned professionally at a BARE MINIMUM of twice per year.

Having your PC checked periodically will not only prolong the life of the unit by keeping it clean, it will also help with preventative maintenance since your technician might be able to see potential failures so you can nip them in the bud.

WHAT SHOULD I EXPECT PROFESSIONALLY?

You should expect a few things to be done when you have your PC cleaned professionally. On the hardware side you should expect that:

  • Cleaning should be done with compressed air.
    • If detailed cleaning is requested then brushes, cloths and cleaning solutions may be used.
  • Checks should be done on the internal cabling.
  • Visible checks on the boards should be done for failing or damaged parts.
  • Hardware checks using manufacturer or third party software tools should be done (if required).

Please bear in mind that professional service costs may vary depending on the degree of work expected. Basic servicing will be cheaper than detailed servicing for example. Other servicing such as virus removal, software configuration or networking may be at an additional cost.

Hopefully the information provided has shown you just how important it is to have your device serviced. Even if you don’t want to do it yourself at least try and get it done every now and again. It’s definitely cheaper than having to buy all new parts.

BlackBerry Z10 USB Port Repair

So I needed to find a way to repair the USB port on my Z10. I had  purchased it used with issues on the port – the previous owner dropped it a lot and the port got damaged – wouldn’t charge properly. So I purchased some ports off eBay and did two things:

  1. Checked for a USB port fix / schematics online.
  2. Used another Z10 with a working port to verify the pinouts.

As it turns out this dude called ABUBABLU did some good repair work on a Z10 before and provided solder points for USB, battery and SIM slot on the Z10. I give all credit to this guy because he’s a very good electronics tech from the other stuff he posted – unfortunately he doesn’t answer back as I’ve emailed him on this issue.

All of the points check out except for one – his schematic diagram has the #4 USB pin as the CRADLE_USB_ID which is what (I guess) starts the USB connection – exists on my model. There may be a difference in the STL100-1/2/3 boards. There is a solder point near the SD card slot on the phone that does not exist on my model – on mine there’s just a row of capacitors (I think they’re caps – so small…..) and I can’t find where that pin should go.

The original posts I found on GSMARENA and others can be found on another site.

I had to run all the lines using IDE cables because all the solder points on the board for the USB port were torn off during removal – they were just that badly damaged (and I don’t have a rework station……) – The phone now charges with no issues, but the USB connection can’t work works occasionally – going to check and see if I can fix that permanently.

I’m not sure which model ABUBABLU took his information from, but my model is different. Here are pics of the ports as I’ve tested and mapped. Most of them are exactly the same as his except one. Hope this helps others with the endeavor. Mine doesn’t work so well due to the fact that I thought the connection went to a capacitor where his was in the picture. His pictures were also low quality so I couldn’t see it well. It was after some checking that I finally found out the models were different and the points not the same. I probably screwed up something, but it happens to help out others. Hopefully someone else will get their things fixed and not go through this issue.  All credits for the original information go to ABUBABLU – kudos.

Picture of full board (WARNING! picture is 10MB)

Z10 - USB MAP - C&TS

 

Close-Up of solder points

Z10 - USB MAP (CLOSE) - C&TS

Welcome To The C&TS Blog!

Hi to all our clients, potential clients and visitors! This is the official blog for C&TS – The Computer & Technology Specialists in Mandeville/Jamaica. Here we will be posting information on various fixes and links to tech information that you may find helpful, useful, informative or all of the above. Keep checking back for updates and thanks for stopping by!