YOUR COMPUTER IS INFECTED. DO NOT TURN OFF YOUR COMPUTER UNTIL YOU CALL THIS NUMBER: 1-800-BOLOGNA.
People. It is a waste of your time to call that number or any like it.
IT IS NOT TRUE. There is no problem with your computer.You have landed on a web page specifically designed to trick you into calling a Fake tech support professional. Who by a few magical clicks of the mouse, will “fix” your computer.
$600 and 2 hours later, after “they” make you feel afraid for your life, you will be angry. You will feel stupid and degraded once you find out you have been taken.
Save Yourself Some Frustration
The fix costs $0. Here it is:
1) hit the [Ctrl] + [Alt] + [Del] keys, all once.
2) Select “Task Manager” from the list.
3) Right-click on the name of your browser.
4) Left-click “End Task”
Close the task manager when the “warning” web page has closed.
Enjoy your computer.
Your next steps:
Friend, I wrote this quick tutorial for you because I am tired… no, tired is not the word. Angry! That’s the word.
I wrote this because I am angry that Overseas Tech Support Shops are using unethical business practices to drum up business. Instead of providing value to their customers and building a relationship of trust first then asking for a value added transaction, they resort to taking them hostage and extort money from them.
If you got value from this post, please hit one of the buttons below and share with your friends.
A firewall is necessary to keep you safe on the internet. But what the heck is it and how does it work? Well, if you have known me for any length of time, you would know that I like to explain things in easy to understand analogies. Most likely I have explained something to you in your own language.
For example, if you are a cook, I would say something like: “a firewall is like a recipe. A list of ingredients that are allowed in your stew.” Or, if you are a gardener, I’d say, “A firewall is like your weed killer. A substance that suppresses weeds and allows your roses to thrive.”
The Internet and Email are the most dangerous avenues for viruses and scams. I am going to show you a couple of ways to protect yourself from these threats via email.
The first one, is to hide the message reading pane; and the second one is to use the “to” column to verify the recipient of the email before you open it.
Depending on your email client (the program you use to view your email) the settings should be similar to what I am about to describe. For this exercise I will use the Windows Live Mail program that comes with your windows Vista, 7, or 8. If you have a different operating system and email client, leave me a message at bottom of this article and I will respond with a specific solution for your case. Continue reading “Two Tweaks To Avoid Email Scams”
OpenSSL is an encryption method used by websites to provide security against prying eyes.
The problem is that someone found a flaw in the programming of a certain kind of SSL. The flaw allows crooks to peer into the working areas of the encryption process and extract important information from it, such as passwords, or other private information.
If you remember passing notes in class and getting caught by the teacher, you quickly learned to encrypt your messages. You devised a way to change the meaning of your letters or words. As an example, you might have changed the letter A to a C, the B to a D, C to a E, etc. Hello John would look like: Jgnnq Lqjp. Continue reading “OpenSSL what is it and why should you care?”