Geeks in Phoenix

Geek Blog


Clean up your Internet browser with AdwCleaner

Updated September 5, 2024

I've been doing virus/malware removal for a while now and have seen many different types of infections. The latest trend is to target your Internet browser. Whether it is Chrome, Edge, Firefox, or Safari, it can get compromised. One of the best programs I've found to clean up Internet browsers is AdwCleaner by Malwarebytes.

The main screen inside AdwCleaner
The main screen inside AdwCleaner

Browser exploits have been around for a while now. Who hasn't had their home page changed or had a mysterious toolbar appear when they opened their browser? AdwCleaner is the perfect tool for getting all that junk out of your browser(s).

The settings screen inside AdwCleaner
The settings screen inside AdwCleaner

AdwCleaner works great for removing adware, PUPs (Potentially Undesirable Program), unwanted toolbars, and home page hijacking. It can also clean up all Internet settings and reset your network adapter(s) back to their default state. With its intuitive interface and powerful scanning capabilities, AdwCleaner has gained widespread popularity among individuals and IT professionals alike. Here is a list of Adwcleaner's key features:

  • Comprehensive Scanning: AdwCleaner employs advanced algorithms to thoroughly scan your system for adware and PUPs, targeting areas where these unwanted programs typically reside, such as browser extensions, registry entries, and system files.
  • User-Friendly Interface: The interface of AdwCleaner is designed to be user-friendly and straightforward, allowing users to initiate scans and easily remove detected threats. The simplicity of the tool makes it accessible to both novice and experienced users.
  • Quarantine and Restore: Upon detecting adware and PUPs, AdwCleaner provides users with the option to quarantine and remove the identified threats. Additionally, the tool allows users to review and restore any items that have been mistakenly flagged as unwanted.
  • Frequent Updates: To keep pace with the evolving threat landscape, Malwarebytes regularly updates AdwCleaner to ensure that it can effectively detect and remove the latest adware and PUPs.

AdwCleaner is a stand-alone program (requires no installation) except for the quarantine folder and a few registry entries it creates. Just download it to your computer, and you are ready to go. And you can uninstall it right from the main user interface. Best of all, it's free.

AdwCleaner from Malwarebytes is a formidable weapon in the fight against adware and PUPs. Its ease of use, powerful scanning capabilities, and the backing of a reputable cybersecurity company make it a go-to choice for individuals and professionals seeking to keep their systems free of unwanted software. As adware and PUPs continue to pose threats to computer users worldwide, AdwCleaner remains a crucial tool in maintaining a clean and secure computing environment.

For more information on AdwCleaner, follow the link below.

Malwarebytes AdwCleaner

How to spot a piece of spam e-mail

Updated August 19, 2024

With the increasing amount of spam flooding into our inboxes daily, it's essential to be able to discern between legitimate e-mails and spam. Spam e-mails can be annoying, deceptive, and even dangerous. Identifying and handling spam e-mails can help protect your personal information and keep your inbox clutter-free. Here are some tips on how to spot a piece of spam e-mail.

How to spot a piece of spam email

When it comes to spam, I like to break them down into three (3) groups:

  • Junk: Just straightforward advertising
  • Phishing: Trying to get personal information, like login credentials
  • Malicious: Meant to deliver some kind of payload, usually file-encrypting malware

Of all three types of spam e-mail, malicious is the most dangerous, but phishing is the most popular. With the progress in security over the years, malicious spam with attachments has decreased. Scammers now want a quick payday, and bank credentials and gift cards are just a couple of ways they try to get your money. But if you take the time to look at a questionable e-mail, you will be able to determine whether it is or is not spam. Let's look at the different areas of an e-mail.

The From line

The sender's e-mail address (From line) is one of the first things to look at when determining if an e-mail is spam. Legitimate companies will usually have domain-specific e-mail addresses, such as @companyname.com. If the e-mail comes from an unfamiliar or suspicious domain, it's likely to be spam. Additionally, be wary of e-mail addresses that contain long strings of random characters or misspelled variations of well-known domains.

The From line can be easily faked, and you can check it quickly by hovering your cursor over the From line.
The properties of the From field inside of Google Chrome
Do you know the sender? Do you now or in the past done business with that company? If you answered no to both questions, it is probably spam. Also, look for e-mail addresses from domains that provide free e-mail addresses (gmail.com, yahoo.com, etc.) or end with a two-letter extension (@com.uk, @com.ru, etc.). Two-letter extensions are for domains outside America.

Another tactic spammers use is impersonating legitimate companies or individuals. They may use logos, branding, or language that closely resembles that of real organizations to trick recipients into thinking the e-mail is genuine. If you receive an e-mail that claims to be from a familiar company but seems off in any way, it's best to verify the source (phone call) before taking any action.

The To line

This line should contain just your e-mail address. If multiple e-mail addresses are listed, do you recognize any other e-mail addresses? If you don't, it could be spam. And if this line is blank, the odds are it's spam.

The Subject line

Another red flag to look out for is the Subject line of the e-mail. Spam e-mails often use sensational or urgent language to entice you to open them. Phrases like "urgent action required" or "you've won a prize" are common in spam Subject lines. If the Subject line seems too good to be true or overly dramatic, it's best to err on the side of caution and consider it potential spam.

When it comes to the Subject line, if it doesn't sound right, it's not. Spam from other countries is quite often full of grammatical errors. Always remember that if it sounds too good to be true, it probably is. The odds are that the anti-virus/service contract renewal invoice is bogus and that the e-fax scan from a Xerox WorkCentre (notice the spelling) or notice to appear in court that is attached is just a virus.

The e-mail body

The message in the body of the e-mail usually tries to get you scared or angry, and they want to use your emotions against you. But the first thing to remember is do not call any phone number or click on any links in a panic. That is just what they want you to do. Take your time and read the e-mail carefully.

Furthermore, scrutinize the content of the e-mail. Many spam e-mails are rife with spelling and grammatical errors and may contain strange formatting. Legitimate companies usually take care to ensure their e-mails are well-written and professional. If you notice oddities in the language or formatting of an e-mail, it could be a sign that it's spam.

For those spam e-mails that tell you that your bank account has been charged for something you did not order, do not call any phone number listed in the message. As I wrote in the How to handle a tech scam article, the scammer's primary goal is to get your money.

If the e-mail states that you need to verify your login credentials, do not click on the link they put in the e-mail. They are just phishing for your personal information. You can check where the link points to by hovering your cursor over it without clicking.

The properties of a link inside of Google Chrome
Chrome displays the URLs at the bottom of the browser

The properties of a link inside of Microsoft Outlook
Outlook displays URLs next to the link

If you want to be reassured that a particular e-mail is spam, use your usual way of accessing that resource (bank website, credit card website, phone number, etc.). Remember that credit and debit cards usually have a toll-free phone number on the back.

Attachments

Links and attachments in e-mails can also be indicators of spam. Hover your mouse over any links in the e-mail (without clicking on them) to see the actual URL. If the link doesn't match the purported destination or appears suspicious, it's likely a phishing attempt. Similarly, unsolicited attachments in e-mails should be treated with caution, as they may contain malware or other harmful content.

Never open attachments from people you do not personally know. Never. If you receive a questionable e-mail from someone you know but were not expecting, contact them directly (via phone call) and verify they sent you the e-mail with the attachment.

Scammers are notorious for adding fake file extensions to attachments to get you to open them. They know that most e-mail programs hide the extensions of attachments. So what they do is name a malicious file as something like OpenMe.pdf.exe, and the e-mail program will only display OpenMe.pdf.

In some cases, legitimate e-mails may end up in the spam folder due to aggressive filtering by e-mail providers. Therefore, periodically checking your spam folder for misplaced e-mails is essential. However, please exercise caution when reviewing the contents of the spam folder, as it may contain actual spam e-mails alongside legitimate ones.

To further protect yourself from spam, consider implementing spam filters and using a reputable anti-virus program. These tools can help reduce the influx of spam and prevent malicious content from reaching your inbox. You may also consider using an anti-spam program like Mailwasher.

In conclusion, identifying spam e-mails is crucial for maintaining a secure and organized inbox. By paying attention to the sender's e-mail address, subject line, content, links, and attachments, you can effectively spot and avoid falling victim to spam e-mails. Remember to stay vigilant and skeptical when interacting with unfamiliar e-mails, and don't hesitate to report suspected spam to your e-mail provider.

How to upgrade or add more memory to your computer

Updated August 15, 2024

As a computer repair technician, I get many questions about how to speed computers up. Adding more memory has always been the best 'bang for the buck' when improving your computer's performance. And it's pretty easy to do. Here's how to upgrade or add more memory to your laptop or desktop computer.

How to upgrade or add more memory to your computer

When you start to look at upgrading your computer's memory, you need to know three (3) things: the type of memory it uses, how much memory you currently have, and the maximum amount of memory your system can handle. Computer memory is installed into slots on the motherboard. Laptops use SO-DIMM (Small Outline Dual In-line Memory Module) slots, and desktops use DIMM (Dual In-line Memory Module) slots. The amount of memory slots varies from a laptop (1-2) to a desktop (2-8). High-performance motherboards, like the ones used in servers, can have 16 or more memory slots.

There are a couple of ways to find out your computer's memory specs. The first is the tried-and-true method: reading the manufacturer's manual (either system or motherboard) and physically checking the slots in the computer (some laptops have memory slots in two different locations). You can also download a program like CPU-Z to find out what type of memory your computer has. In some cases, you may have to replace the existing memory modules with larger ones instead of just adding more memory.

If you are planning on adding more memory, you want to make sure the timings match between the existing memory and the new modules. Mixing memory modules with different timings can affect your computer's performance. You should always try to add or upgrade memory in pairs.

Once you know what type of memory you need, it's time to purchase it. You can buy it online or locally. But remember, if you need to return it, it's easier to do it locally. Also, if you need two or four memory modules, many vendors offer twin and quad packs for less than the individual price. Once you have your new memory, it's time to install it.

Note: Remember to disconnect the power going to the system before working on it.

  • Desktops - Disconnect the power cord going to the computer
  • Laptops - Disconnect the AC charger and remove or disconnect the battery

How to remove a laptop memory module from the memory slot

How to remove a laptop memory module from memory slot

  1. Spread apart the securing clips on each end of the memory module slot until the module pops up.
  2. Remove the memory module from the memory module slot.

How to install a laptop memory module into the memory slot

How to install a laptop memory module into memory slot

  1. Align the notch in the memory module with the tab in the memory module slot.
  2. Slide the memory module firmly into the slot at a 45-degree angle, and press it down until it clicks into place. If you do not hear the click, remove it and reinstall it.

How to remove a desktop memory module from the memory slot

How to remove a desktop memory module from memory slot

  1. Push the release tabs near both ends of the memory module slot until the module pops up.
  2. Remove the memory module from the memory module slot.

How to install a desktop memory module into the memory slot

How to install a desktop memory module into memory slot

  1. Align the notch in the memory module with the tab in the memory module slot.
  2. Insert the memory module vertically and press down until it snaps into place.

How to create the Windows 8.1 user group of tiles on the Start screen

With the release of the Windows 8.1 Update, all new users have a new group of tiles on the Start screen: This PC (My Computer), PC Settings, Documents (My Documents), and Pictures (My Pictures). If you're a Windows 8.1 existing user or still running Windows 8, you will not see these added to your established Start screen; only new profiles get these. Windows RT users only get the PC Settings tile. Here's how to create the Windows 8.1 user group of tiles on the Start screen.

  1. On the Start screen, left-click on Desktop.
  2. Left-click on File Explorer on the Taskbar.
    Pinning This PC to the Windows 8 Start screen
  3. Right-click on This PC and left-click on Pin to Start in the context menu.
  4. Right-click on Documents and left-click on Pin to Start in the context menu.
  5. Right-click on Pictures and left-click on Pin to Start in the context menu.
  6. Left-click on the Start button or press the Windows logo key Windows logo key to bring up the Start screen.
    Pinning PC Settings to the Windows 8 Start screen
  7. Bring up the search charm: Windows 8 - Press the Windows logo key Windows logo key + F or bring up the Charms bar and select Search. Windows 8.1 - Left-click on the Search button.
  8. In the Search box, type PC Settings. In the search results, right-click on PC Settings and select Pin to Start.

Inside the Windows 8.1 Update

Microsoft recently released the Windows 8.1 Update (actual name), the latest refinement of Windows 8.1. Most of the changes are targeted at keyboard/mouse users, like me. The update comes only months (10/17/13) after the initial release of Windows 8.1 and includes user interface enhancements and security fixes. Here's a look inside Windows 8.1. Update.

The update builds on the previous Windows 8.1 changes geared towards keyboard/mouse users: the return of the Start button, smaller tile size on the Start screen, and booting directly to the Desktop. But the overall focus was still on touch-sensitive devices. The Windows 8.1 Update changes all of that.

The first thing you'll notice is the default behavior of Windows 8.1 has changed. Windows 8.1 now checks to see if there is a touch-sensitive display attached to the computer and modifies the way it runs. For example, if your computer doesn't have a touch screen, the default programs that open pictures, videos, and music files go back to the familiar Desktop apps that Windows 7 used. Here's a complete list of the changes to Windows 8.1 behavior:

Windows 8.1 defaults before update Windows 8.1 defaults after update
  • Boots to Start Screen
  • Closing App takes user back to Start Screen
  • Pictures, Music, and Video files open with Modern App
  • Boots to Desktop
  • Closing App takes user to the previously used App.
  • After closing all Apps the user ends in the Desktop
  • Pictures, Music, and Video files open with Desktop applications

New Windows 8.1 Update Start screen features
New Windows 8.1 Update Start screen features

The Start screen has seen some Desktop friendly revisions too. Microsoft has finally added a Power button, so you no longer have to log-off to turn off or restart your computer. Also added are familiar Desktop style content menus for the Tile properties. There are also a new set of tiles that are added for new users; This PC, PC Settings, Documents, and Pictures. They won't appear for existing users but can easily be recreated if you want them.

New Metro app Title Bar with Minimize and Close buttons
New Metro app Title Bar with Minimize and Close buttons

Microsoft also made some changes to the Metro (Windows RT) interface. In an effort to make it more Desktop friendly, Metro apps now have a drop-down Title Bar on top, similar to Desktop programs, with Minimize and Close buttons. Metro apps can now be pinned to the Taskbar (the Store is automatically pinned with the update).

For more information on the Windows 8.1 Update, just follow the link below.

Exploring Windows 8.1 Update

Free computer diagnostics

Repairing a PC can sometimes be expensive, and that is why we offer free basic in-shop diagnostics. Give one of our professional and experienced technicians a call at (602) 795-1111, and let's see what we can do for you.

Check out our reviews

Geeks In Phoenix LLC, BBB Business Review

Customer service is #1

Here at Geeks in Phoenix, we take pride in providing excellent customer service. We aim to give the highest quality of service  from computer repair, virus removal, and data recovery.

Bring your computer to us and save

Repairing a computer can be time-consuming. That is why we base our in-shop service on the time we work on your computer, not the time it takes for your computer to work! From running memory checking software to scanning for viruses, these are processes that can take some time.

Contact us

If you have any questions, please feel free to give us a call at (602) 795-1111  and talk with one of our Geeks. Or you can send us a message from our contact page , and one of our Geeks will get back to you as soon as possible. Or you can stop by and see us. Here are our hours and location.

Like Geeks in Phoenix on Facebook

Follow Geeks in Phoenix on Twitter

Watch Geeks in Phoenix on YouTube