Never10

Don’t want Windows 10 forced upon you?

Stop Windows 10 upgrade notificationsSo over the last few months, I’ve had Lot’s, and Lot’s and LOT’S of people have been contacting me about Windows 10 automatically being forced upon them without specifically initiating the upgrade.

Well in my opinion, the word “forced” isn’t quite accurate.

Somewhere along the line, the End User has “Reserved” their copy of the free Windows 10 upgrade, which has subsequently set them on a path that, along with ongoing Windows updates, lead to an apparently automated upgrade to Windows 10.

Now whilst it is true that you can “Roll Back” Windows 10, there may be some consequences. The first of which is the time taken whilst the upgrade takes place, and the second is the time taken to roll it back.

The other consequence is the possible loss of data.

I had one customer who claimed to have lost all his Favorites.

So what to do if you want to stop those Windows 10 upgrade notifications?

Well I have come across a free little utility called Never10.

When run, it will disable the Windows 10 upgrade notifications.

So if you have had enough of the persistent Windows 10 upgrade notifications, give it a try.

You can download it from https://www.grc.com/never10.htm

Windows 7 to be retired

Only Windows 10 from the middle of next year

Windows 7 to be retiredThis will not please a lot of my customers, but it had to happen sooner or later.

Microsoft have given notice to its OEM (Original Equipment Manufacturer) partners that they must no longer sell PC’s or Laptops with an Operating System older than Windows 10 from the middle of next year.

According to Microsoft’s Windows Lifecycle Fact Sheet, Windows 8 sales must also end as of 1st July next year, and Windows 7 Professional and Windows 8.1 will no longer be allowed to be pre-installed on new PC’s and Laptops from 1st November 2016, .

The Home Basic, Home Premium and Ultimate editions of Windows 7 were retired by Microsoft on 1st November last year.

Windows 7 launched in October 2009, and Microsoft has permitted it to continue to be sold substantially longer than Windows 8, and Windows 8.1 which both arrived in 2013.

So I guess the salient point here is that if you want a new PC or Laptop with Windows 7, you will need to purchase it within the next 7 or 8 months.

Charred SSD Hard Drive

The importance of having a Backup Strategy

Charred SSD Hard Drive - Backup or lose it!!I am constantly telling people and Business Owners of the importance of having a sound Backup Strategy. I cannot stress enough that if you have important data on your Computer, and if you or your Business lives or dies by that data, you need to have an effective backup strategy in place.

Well it’s just as well I followed my own advice, because yesterday I had a catastrophic Hard Drive failure.

I walked into my office only to be confronted with a room full of acrid smoke. It was coming from my computer, so I quickly removed the cover and immediatedly saw charred wiring, and melted power cabling that led to my SSD Boot Drive.

Having this happen could easily have been very detrimental to my business if wasn’t for the backup strategy I had in place. Happily, I was back up and running again in a relatively short time, and more importantly, without any data loss.

So what is my Backup Strategy?

Well I have various things in place to avoid disaster. The first revolves around the computer itself, and how often I upgrade to a new one, and what I do with the old Computer. I build myself a new computer every 3 years or so. Once I have setup the new Computer and transfer all the data from the old one, and install all the software and setup email etc, I retire the old computer and keep it. By doing this, if something happens with the new one, I have an existing computer with all the software pre-installed ready to go.

Backup or Lose it!!

But that doesn’t help with preventing Data Loss.

You also need to be backing up your critical data. There are many ways, means, and options available to do this. What I do is this. I have an external NAS (Network Attached Storage) device connected to my Network. The NAS box has two Hard Drives that operate in a Mirrored RAID configuration. In other words, one Hard Drive Mirrors (exact copy) the other Hard Drive. If one of those Hard Drives fail, I can replace it, and it will automatically “Mirror” itself to the replacement drive. I have software installed on the Computer called “Syncback“, and Syncback it is setup to backup my data to the NAS Drive on a schedule specified by me.

In addition to this, I use Microsoft OneDrive. OneDrive will backup my data via the Internet to a secure Server in real time as files change. Offsite backups are important to protect you from events like a fire or theft of physical backup devices. Let’s face it, if your office burns down, or someone breaks in and steals everything, it doesn’t matter how many backups you have or how many devices your data is backed up on.

So after my calamitous Hard Drive failure, I fired up the old PC, did the appropriate Windows updates, Security Software updates, and accessed my data on the NAS Drive. Then I immediately ordered the parts I needed to build myself a new computer. The one that went up in smoke was due to be replaced anyway. I just wished I’d taken steps a week earlier to replace it 😉

 

Windows 8.1 installation media

Windows 8.1 Installation Media Creation Tool

Windows 8.1 installation mediaOK, so similar to our last Blog Post about a Microsoft Website that allows you to create a Windows 7 Install Disk, this Post is about another “Handy To Know About Web Page” from Microsoft.

This time however, instead of it being about the ability to create a Windows 7 Installation Disk, this website allows you to create a Windows 8.1 Disk.

So once again, if you have lost your original Installation Disk for Windows 8.1, or you never had one to begin with, or you need to make a bootable USB Drive, then you need to use the Windows Installation Media Creation Tool.

How to create your Windows 8.1 Media

When you click on the “Create Media” button, you will be prompted to download an executable file (which when “run”), will prompt you for your chosen Language, which Edition (ie. 8.1, 8.1 Pro etc), and what Architecture (ie. 32 bit or 64 bit). From here you will be asked whether you want to save to a USB Drive, or save as an ISO file. The file is quite large, so again be careful that you don’t exceed your plan data usage if you are on a Limited or Mobile Data Plan.

It is all very easy to follow, and the only issue I can see would be the End User’s ability to create a DVD from the ISO file.

So once again, as in our previous Blog Post, if you do not have the appropriate  software to burn a DVD from an ISO file, you can download the burning software from the Microsoft suggested website. Don’t forget that just as we mentioned in the last article, you will still need to download the Drivers from the manufacturers website for your specific hardware. If you have trouble doing this, or you are not sure how to go about it, Spotty Dog Computer Services can of course do this for you.

You may also be interested in how to Create a Windows 7 Installation Disk.

 

Windows 7 Recovery Medi

Create a Windows 7 installation disk using the Microsoft Software Recovery website

Windows 7 Recovery MediWell here is a handy website to know about.

I don’t know how many times a customer has come to us, either wanting their Windows 7 PC or Laptop wiped and reinstalled, or it has needed repairing using Recovery Media, but they do not have their Recovery Media or a Windows 7 Disk.

Now this isn’t a particularly big problem for us because we have access to Windows OEM Disks, but for the End User, not having the Recovery Media is a huge problem that means they have no other choice but to pay someone to do it for them.

What to do if you don’t have Windows 7 Recovery Media

Help is at hand. By visiting the Microsoft Software Recovery website, the End User can download the ISO file required to burn their own Recovery Media disk. The size of the disk will be somewhere between 2GB and 3.5GB, so if you are on a limited Internet Plan or a Mobile Internet Plan, just be careful you do not exceed your download limit.

Microsoft even provide a link for software to burn a DVD from an ISO file if you don’t have suitable software installed to do that yourself. Once you have the software and a valid Product Key, you’re off and running.

The website also allows you to create a bootable USB drive with a copy of Windows 7 on it.

All-in-all, a very handy thing to know if you never had a disk, or you have damaged your disk. As we all know, it is impossible to reinstall or even undertake some really easy repairs without a Recovery Disk or Windows 7 Media.

Of course there will be some End Users that will still have difficulties installing Windows 7 even if they do have the disk. For example, you will still need to download the Windows Drivers from the appropriate hardware manufacturers websites. But if that is the case, Spotty Dog Computer Services can certainly do that for you 😉

Ransomware – The do’s and don’ts to protect you and your business

ransomwareRansomware (viral infections that encrypt data on your hard drive), are becoming more prevalent. Cryptowall and Cryptolocker are two that are increasingly infecting computers world wide, with an estimated 545,000 infections from between Sep 2013 to May 2014. Ransomwares’ purpose is to attempt to extort money from the victim with the promise that your data will be restored after payment.

The Senior Manager of Symantec’s Cyber Readiness & Response, Bob Shaker recently stated, “We’ve seen a sharp rise in requests from customers with respect to Ransomware.”

Mr Shaker tells the story of trying to help a customer who, after being infected with a ransomware virus, could only sit and watch while his company’s data was wiped out, file by file. “I never want to have to go through that again,” he says.

Since then, Symantec has gone to great efforts to ensure that businesses understand the risks and have a clear picture of what to do, and what not to do, to protect themselves from becoming a victim of Ransomware.

Here are some Ransomware Do’s and Don’ts

1. NEVER pay the Ransom!

Your first response will undoubtedly be panic, and your first instinct will be to pay the Ransom.
Don’t do it. This will just encourage the attackers, and help fund further development of these types of attacks.
And even if you do pay, there is no guarantee that you will get your data back.

Instead, Do:

Remove the infected system from the network if you are on one, and clean the system of all viruses.
Then restore data from a known good backup. Restoring data from a backup is the quickest way to get back up and running.

2. Do install a quality security solution

A multi-faceted security solution (like Norton Internet Security for example) should be installed. Norton has protections for not just file-based threats (traditional Viruses), but it also includes download protection, browser protection, heuristic detection technologies, a firewall and a community sourced file reputation scoring system.

3. Do educate employees

One of the main ways you can be infected is through “Spear Phishing”. This is whereby an unsolicited email arrives from an unknown sender that incorporates an attachment that, when opened, executes a program (the virus).
If you have employees, you must take the time to educate them about these threats, and how to recognise suspicious links and attachments, and what they should do in such circumstances.

4. Do use content scanning and filtering on your mail servers

All Incoming emails should be scanned for known threats and should block any attachment types that could potentially pose a threat.

5. Do make sure that all computers and software are kept up-to-date with security patches and updates

Compromised websites are frequently used to spread viruses. Regular patching of vulnerable software like Internet Browsers, Java, and Adobe Flash is necessary to help prevent infection.

6. Do limit end user access to mapped network drives

Ransomware is capable of looking for and encrypting data on any mapped drives that a user has access to. Restricting permissions for shared folders and files of a mapped network drive will limit what the Ransomware virus will be able to encrypt.

7. Do make sure that you have a comprehensive backup solution in place.

The fastest way to get back up and running after this sort of attack is to have a backup of your data.

These Dos and Don’ts will not prevent an attack, but they can certainly reduce your risk level.

Microsoft Office Comparison Table

Microsoft Office Comparisons

Usually when we build a new computer, or supply a new Laptop, the question is asked, would you like Microsoft Office with that?

Invariably the customer will say yes, to which we would reply, which version would you like?

To which the customer will reply, I didn’t know there were different versions.

And we would then respond with, yes there are several versions. You have Office 365 Personal & Home Premium, and Office Home & Student and Office Home & Business and Office Pro.

The conversation would then turn to all the differences of one version over the other.

As you can imagine, that is time consuming, and potentially confusing for the customer.

So in an effort to decrease both the time and confusion, here is a brief description of the differences, supported with an image that graphically displays those differences.

Office 365

Office 365 is a subscription based offering from Microsoft.

That is to say, you pay a yearly subscription fee.

The advantage of this is that you will always have the most up to date version of the Office applications (Word, Excel, PowerPoint etc).

There are two versions of Office 365. They are 365 Personal and 365 Home Premium.

The only difference between Office 365 Personal and Home Premium is that the Personal version can only be installed on 1 PC/Mac and the Home Premium version can be installed on 5.

Both versions include Word, Excel, PowerPoint, OneNote, Outlook, Publisher and Access, and both have a 1 Yr subscription term.

Office Home & Student vs Office Home & Business vs Pro

All of these versions of Microsoft Office are Disk Based, with no subscription.

All can only be installed on 1 PC/Mac.

All include Word, Excel, PowerPoint and OneNote.

In addition to these Applications, Office Home & Business includes Outlook.

And Office Pro includes Outlook, Publisher & Access.

Microsoft Office Comparison Table

Microsoft Office Comparison TableIf you would like to purchase Microsoft Office, it is available in our Online Shop.

 

Rootkit Virus

How to remove a Rootkit Virus

Rootkit VirusI recently had a Laptop in the workshop that had a particularly difficult to remove Rootkit Virus installed on it.

I couldn’t use the removal tool that I normally use because it isn’t compatible with Windows 8, so I did some research and found a different tool called GMER.

What is a Rootkit Virus?

But before I go on and explain how useful the tool was, I’ll just quickly explain what a Rootkit Virus is.

The name comes from a term used in Unix and Linux Operating Systems, with “Root” referring to a “Privileged” account or in other words an account with Administrative rights, whilst the “kit” part of the name refers to software components that implement it. A Rootkit virus assumes admin control of the Operating System, making it very difficult to remove.

So having found that my usual bag of tricks was not going to work, it was time to find something else.

During my research, I came across a removal tool that I hadn’t heard of before (as previously mentioned, GMER), and I gave it a shot.

To my surprise it was very simple and effective.

I downloaded the Removal Tool, and unlike many other tools, I didn’t have to rename the executable file to something that a potential virus wouldn’t recognise and therefore prevent running, because it is already named with a random file name at download. It was also a very small file size of 372kb.

GMER scans for the following:

  • hidden processes
  • hidden threads
  • hidden modules
  • hidden services
  • hidden files
  • hidden disk sectors (MBR)
  • hidden Alternate Data Streams
  • hidden registry keys
  • drivers hooking SSDT
  • drivers hooking IDT
  • drivers hooking IRP calls
  • inline hooks

If a Rootkit Virus is present, you will be notified with a screen that looks like the following:

How to remove a Rootkit Virus with the GMER Removal Tool

Removing the identified viruses involves right clicking on the identified virus and choosing “Delete the Service”.

Removing the Rootkit

Spotty Dog Computer Services can remove Root Kit Viruses from your PC.

Windows 8 Reset and Refresh options

How to Refresh, Reset, or Restore your Windows 8 PC

Windows 8 Reset and Refresh options

 

Windows 8 has Enhanced System Restore capabilities.

Not only can you do the normal System Restore we’ve all come to know, love and use on many occasions, but you can also Reset and Refresh the PC.

 

Here is a brief explanation of each:

  • Restore – Restore your PC (Windows System Restore) as in previous versions of Windows, undoing recent system changes you’ve made.
  • Refresh – Refresh your PC to reinstall Windows and keep your personal files, settings, and the Apps that came with your PC, along with Apps that you have installed from Windows Store.
  • Reset – Reset your PC will reinstall Windows, but will delete your files, settings, and Apps (except for the apps that came with your PC).

The new Refresh feature in Windows 8 is intended as an improvement on the previous Window System Restore. On the other hand, the Reset feature is intended to reset your Windows 8 system back to a pristine out-of-the-box setup.

Microsoft have extensive information regarding each of these features and how to use them, so rather than me typing it all out again here, this is the link to the Microsoft Website.