SOBX Tech

  • Home
  • About Us
  • Our Services
    • Remote Support
  • Our Blog
    • Free Resources
  • Contact Us
  • GTG Gaming

August 27, 2015 By Nate Forant

How To Recover from a Virus or Trojan Horse

Considering the number of viruses traversing the internet at any given moment, it’s amazing that it doesn’t happen to everyone.

If you know what specific malicious program has infected your computer, then you can visit one of the several anti-virus websites and download a removal tool. However, using that tool you won’t be able to identify the specific program. If you can’t identify the program, the following steps might help save your computer and files.

1. Call IT support

If you have an IT support department at your disposal, notify them immediately and follow their instructions.

2. Disconnect your computer from the Internet

Depending on what kind of virus or trojan horse you have, intruders might have access to your personal information and may even be using your computer to attack other computers. You can stop this activity by turning off your internet connection. The best way to accomplish this is to physically disconnect your cable or phone line, but you can simply disable your network connection.

3. Back up your important files

At this point, it is a good idea to take the time to back up your files. If possible, compile all of your photos, documents, internet favorites, etc., and burn them onto a CD/DVD or save them to an external device such as a flash drive or external hard drive. It is vital to note that these files can’t be trusted since they are still potentially infected.

4. Scan your machine

Your computer (including its operating system) may be infected with a malicious program, it is safest to scan the machine from a live CD (or “rescue” CD) rather than a previously installed anti-virus program. Many anti-virus products provide this functionally. Another alternative is to use a web-based virus removal service, which some anti-virus software vendors offer (try searching for online virus scan).

The next best action is to install an anti-virus program from an uncontaminated source such as a CD-ROM. If you don’t have one, there are many to choose from, but all of them should provide the tools you need. After you install the software, complete a scan of your machine. The initial scan will hopefully identify the malicious programs. Ideally, the program will even offer to remove the malicious files from your computer; follow the advice or instructions you are given. If the anti-virus successfully locates and removes the malicious files, be sure to follow the precautionary steps in step 7 to prevent another infection. In the event that the anti-virus software can’t locate or remove the malicious program, you will have to follow steps 5 and 6.

5. Reinstall your operating system

If the previous step failed to clean your computer, the most effective option is to wipe or format the hard drive and reinstall the operating system. This corrective action will result in the loss of all your programs and files, it is the only way to ensure your computer is free from backdoors and intruder modifications.

Many computer vendors also offer a rescue partition that will do a factory restore of the system. Check your computer’s user manual to find out whether one of these is provided and how to run it. Before conducting a reinstall, make a note of all your programs and settings so that you can return your computer to its original condition.

6. Restore your files

If you made a backup in Step 3, you can now restore your files. Before placing the files back in directories on your computer, you should scan them to check for known viruses.

7. Protect your computer

To prevent future infections, you should take the following precautions:

  • Do not open unsolicited attachments in email messages
  • Do not follow unsolicited links
  • Maintain updated anti-virus and anti-malware software
  • Use an internet firewall
  • Securing your web browser
  • Keep your system patched

To ensure that you are doing everything possible to protect your computer and your important information, we are available to assist you in every way possible. 

Filed Under: How To Tagged With: Security, Tech Tips

June 5, 2015 By Nate Forant

How to Make an External Hard Drive

How to Make an External Hard Drive

Do you want an external hard drive, but don’t want to break the bank on buying one.  Making your own external hard drive is a lot cheaper and easier than you think.  There are some items that you will need in order to accomplish your goal.  You can use an old laptop hard drive or desktop hard drive.  Below you will find some useful information.

What you need:

– 2.5″or 3.5″SATA Hard Drive

– a small Phillips screwdriver

– an external hard drive enclosure

HDE 2.5″SATA External Hard Disk Drive Enclosure

Rosewill Aluminum 3.5-inch USB 2.0 External Enclosure

When you get all of your parts together, then open up the case. You will then need to slide the hard drive into the enclosure making sure that it is firmly attached.  Once everything is connected and attached your hard drive will be ready for use.

Don’t hesitate to give us a call or shoot us an email if you need assistance.

Filed Under: How To Tagged With: Tech Tips

March 28, 2015 By Nate Forant

Shortcut Sunday- Twitter

Twitter Short Cuts

Wondering if there is a faster way to tweet? There is and we have all your Twitter keyboard shortcuts to help you make your tweeting experience better!

Keyboard Shortcut

Actions  

  • n- New Tweet
  • f- Favorite
  • r- Reply
  • t- Retweet
  • m- Direct Message
  • u- Mute user
  • b- Block user
  • Enter- Open tweet details
  • l- Close all open tweets
  • /- Search
  • Ctrl+Enter- Send tweet

Navigation

  • ?- This menu
  • j- Next tweet
  • k- Previous tweet
  • Space- Page down
  • Period- Load tweets

Timelines

  • gh- Home
  • gn- Notifications
  • ga- Activity
  • gd- Discover
  • gp- Profile
  • gf- Favorites
  • gl- Lists
  • gm- Messages
  • gs- Settings
  • gu- Go to user

There are keyboard shortcuts for just about everything online. There will be more Saturday shortcuts to come in the future. Can’t figure something out, we also do personal one on one training at your business or residence.

Filed Under: How To Tagged With: Tech Tips

March 23, 2015 By Nate Forant

How to Turn Your iPad into a Wi-Fi Hotspot

Setting up a Wi-Fi hotspot on your device allows you to access your iPad’s cellular connection from other Wi-Fi enabled devices like laptops, smartphones and other tablets.  You can set up your iPad to function as a personal Wi-Fi hotspot provided its running iOS 4.3 or later.

Follow these five steps and you will have your own Wi-Fi hotspot.

Step 1

Tap the “settings” icon on your iPad

IMG_0154 (2)

Step 2

Tap “network”and choose “general”to access the network settings.

Step 3

Tap the “personal hotspot” option located halfway down the list.

 

IMG_0152 (2)

Step 4

Tap the small button labeled “off” at the top of the Personal Hotspot menu.  The button should slide left, turn blue and switch to “on.” If this option is not available, you don’t currently have Wi-Fi hotspot capability on your iPad.  Contact your wireless service provider to add this feature.

Step 5

Enter a Wi-Fi hotspot password. You will only have to complete this step if you have Wi-Fi hotspot capability.

IMG_0151 (3)

 

If you do have a tablet or device that you want to use as a hotspot, don’t hesitate to give us a call if you need help.

Filed Under: How To Tagged With: Apple, Tech Tips

March 17, 2015 By Nate Forant

How To Create a CyberSecurity Planning Guide

Small businesses are becoming a larger target for criminals seeking to access sensitive data. Attackers are well aware that small businesses have limited resources or personnel to information system security.

How To Create a CyberSecurity Planning Guide

The link below is a CyberSecurity Planning Guide I made from the FCC’s CyberPlanner tool.

CyberSecurity Planning Guide

It’s very informative and all small businesses should have one done. I have added the link below.  The link will walk you through each step to complete your small business CyberSecurity Planning Guide.

FCC CyberSecurity Planner

Keep your businesses safe and secure. If you need help, give us a call.

Filed Under: How To Tagged With: Security, Tech Tips

November 23, 2014 By Nate Forant

Securing Your Home Network

A protected home network means your family can use the Internet safely and securely.

Most households now run networks of devices linked to the Internet, including computers, laptops, gaming devices, TVs, tablets, and smartphones that access wireless networks. To protect your home network and your family, you need to have the right tools in place and confidence that family members can use the Internet safely and securely.

The first step is to Keep a Clean Machine and make sure all of your Internet-enabled devices have the latest operating system, web browsers, and security software. This includes mobile devices that access your wireless network.

Secure Your Wireless Router

A wireless network means connecting an Internet access point – such as a cable or DSL modem – to a wireless router. Going wireless is a convenient way to allow multiple devices to connect to the Internet from different areas of your home. However, unless you secure your router, you’re vulnerable to people accessing the information on your computer, using your Internet service for free, and potentially using your network to commit cybercrimes.

Here are ways to secure your wireless router:

  • Change the name of your router: The default ID – called a service set identifier” (SSID) or “extended service set identifier” (ESSID ) – is assigned by the manufacturer. Change your router to a name that is unique to you and won’t be easily guessed by others.
  • Change the pre-set password on your router: When creating a new password, make sure it is long and strong, using a mix of numbers, letters, and symbols.
  • Review security options: When choosing your router’s level of security, opt for WPA2, if available, or WPA. They are more secure than the WEP option.
  • Create a guest password: Some routers allow for guests to use the network via a separate password.  If you have many visitors to your home, it’s a good idea to set up a guest network.
  • Use a firewall: Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don’t permit. Your operating system and or security software likely comes with a pre-installed firewall, but make sure you turn on these features.

Fingerprint Scanning
Protect Yourself with these Tips:

  • Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online.
  • Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
  • Protect all devices that connect to the Internet: Along with computers, smartphones, gaming systems, and other web-enabled devices also need protection from viruses and malware.
  • Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.
  • Protect your $$: When banking and shopping, check to be sure the site is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “http://” is not secure.
  • Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.

Filed Under: How To Tagged With: Security

September 29, 2014 By Nate Forant

7 Tips for Protecting your Computer

7 Tips for Protecting your ComputerIn this day and age, you need to keep your computer and personal information safe. Hackers are out there and we all know that.  They will take your information and steal your identity.  Bank accounts, email, online shopping need to be kept safe at all times.  Changes to your passwords every 6 months aren’t mandatory, but we strongly recommended it.

7 Tips for Protecting your Computer

Protecting your computer from viruses and other threats isn’t difficult, but you must be diligent. Here are 7 tips for protecting your computer from viruses:

  • Install an antivirus program.  Installing an anti-virus program and keeping it up to date can help defend your computer against viruses. Antivirus programs scan for viruses trying to get into your email, operating system, or files. New viruses appear daily, so set your antivirus software to install updates automatically.
  • Install a malware program.  Many PC users just install an anti-virus. I strongly recommend installing both. There are different types of malware that include: infectious malware, web threats, concealment malware and mobile malware. McAfee might say that the total protection from them includes anti-malware, but I double checked and didn’t see it listed anywhere.
  • Don’t open email attachments, unless you’re expecting them.  Many viruses attach themselves to email messages and will spread as soon as you open the email attachment. It’s best not to open any attachment unless it’s something you’re expecting. Be especially wary of .exe files.
  • Keep your computer updated.  If you’re a PC user and use Windows, Microsoft releases security updates that can help protect your computer. Make sure that Windows receives these updates by turning on Windows automatic updating.
  • Use a firewall.‌ Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.
  • Use your browser’s privacy settings.  Being aware of how websites might use your private information is important to help prevent fraud and identity theft. If you’re using Internet Explorer, you can adjust your Privacy settings or restore the default settings whenever you want.
  • Use a pop-up blocker with your browser.  Pop-up windows are small browser windows that appear on top of the website you’re viewing. Although most are created by advertisers, they can also contain malicious or unsafe code.  A pop-up blocker can prevent some or all of these windows from appearing.  The Pop-up Blocker feature in Internet Explorer is turned on by default.
  • Turn on User Account Control (UAC).  When changes need to be made to your computer that requires administrator-level permission, UAC notifies you and gives you the opportunity to approve the change. UAC can help keep viruses from making unwanted changes.

Let Us Help

With hackers, identity theft, viruses, etc. being on the rise and technology changing daily, PC owners should stay on top of keeping their computers virus and malware free.  If you need help with anything related to viruses, don’t hesitate to contact us!


About Us

SOBX Tech is Eastern North Carolina’s leader for computer services, computer repair, software installations and software upgrades.  SOBX Tech serves the Southern Outer Banks community and surrounding areas. Located in Eastern North Carolina, along North Carolina’s beautiful Crystal Coast, we’re happy to provide on-site service in your home or business, at no extra charge!

 

Filed Under: How To Tagged With: Tech Tips

June 24, 2014 By Nate Forant

Tips for Protecting Your Computer from Viruses and Malware

Tips for Protecting Your Computer from Viruses and Malware

Photo by NeONBRAND on Unsplash

Not everyone is aware of malware, spam, and spyware that can be running in the background. Most of the time you wouldn’t even know it.  When opening email or browsing the web, you must be aware of the site, and what it contains.  A computer virus is a malicious software program designed to damage your computer system by deleting files or even taking over the computer to launch attacks on other systems.  Running laptop and PC virus protection programs have to be a part of your daily routine, just like backing up your information in case of a computer malfunction.

Tips for Protecting Your Computer from Viruses, Malware, Spam and More

Need help with your laptop or PC? Not sure if you have a virus or some other type of malicious program, give us a call and we can set up an appointment.


About SOBX Tech

SOBX Tech is Eastern North Carolina’s leader for computer services, computer repair, software installations and software upgrades.  SOBX Tech serves the Southern Outer Banks community and surrounding areas. Located in Eastern North Carolina, along North Carolina’s beautiful Crystal Coast, we’re happy to provide on-site service in your home or business, at no extra charge!

Filed Under: How To Tagged With: Tech Tips

March 1, 2014 By Nate Forant

Inside a Hard Drive Replacement

Have you ever had a desktop or laptop hard drive fail on you? At SOBXTech, we can’t stress enough about backing up your computers at least once a week. We have listed the steps to replace a hard drive. We thought it might be interesting to show a few pictures from a recent hard drive replacement job we handled. This laptop was missing its battery, A/C adapter, and needed an operating system installed.

There are some steps before you make a decision about replacing your hard drive.

  • If your hard drive is still working, make sure that you make a recovery disk or image by using backup or recovery software.
  • Obtain a new hard drive– Make sure you purchase the right type of hard drive for your computer.
  • Hard drives come with either SATA (Serial ATA) or IDE data/power connectors. Hard drives may either come in a 2.5 inch for laptops or a 3.5 inch for desktops.
  • Take precautions when touching electronic components. Improper handling of electronic components can cause damage to computer parts. To avoid this, you must ground yourself when operating inside your computer by using an anti-static wrist strap.
  • Opening the computer case- To open a desktop case, you need to remove the screws and slide the panel off. To get to the hard drive of a laptop, simply turn your computer over and remove the screws. Then take the cover off.
  • Locate the existing hard drive. Most computers will have the hard drive screwed within a cage inside the computer case. For desktops, identify the data and the power connectors and disconnect them.

To put the new one in, just reverse the steps.

We thought it might be interesting to show a few pictures from a recent hard drive replacement job we handled.  This laptop was missing its battery, A/C adapter, and needed an operating system installed.

Inside the Hard drive compartment

Here’s A Peek Inside a Laptop Compartment

After opening up the laptop, we did a quick assessment and diagnosis. At the completion of the diagnosis, we had to replace the battery, A/C adapter and it needed a new 500 GB hard drive. We went ahead and made the necessary calls to get the replacement recovery software from the manufacturer.

Removal of laptop Hard drive

Closer look at the laptop hard drive

Factory Image Recovery Preparations

Have you thought about upgrading your operating system, more storage space or more memory?  Do you have questions about upgrading?

Not sure what operating system you should have. Don’t hesitate to give us a call at 252-285-9592 or find us on social media @sobxtech.

Filed Under: How To Tagged With: Services, Tech Tips

May 15, 2010 By Nate Forant

Backing Up Data on Your Laptop or Desktop

Computer UserAs any experienced computer professional will tell you, you’ve got to back up your data. There are a a few different ways that you can back up your computer.

Choose a back-up program. For personal computers, there are many options. If you are using Microsoft Windows, there is a back-up program built in (Start > Programs > Accessories > System Tools > Backup). You can also use third party back-up managers, ranging from small programs to full online backup services. If you use a flavor of Linux, there are many open source options available in repositories for all of the major distributions.

Do’s and Don’ts

  • Do back up your system weekly. Most computers and virus software gives you the option to set this up.
  • Do purchase an external hard drive and back up your data to it as an added precaution.
  • Don’t use your computer while a back-up is in progress. If you change a file during the back-up operation, you won’t know which version was actually saved, or you could halt or corrupt the back-up. It will also slow your computer down.
  • Don’t leave your back-up media in an environment that has a tendency to get wet or is not climate controlled. Computer equipment is fairly sensitive, and there is a chance you will lose your back-ups.

Backing up your computers is extremely important. We store our lives on our computers these days from pictures, to resumes and everything in between. My advice to everyone who owns a computer, back up as often as you can, in order to keep your important data.

If you need help backing up your system or choosing an external hard drive, we’re happy to be of service. Just give us a call.

 

Filed Under: How To Tagged With: Data

  • « Previous Page
  • 1
  • 2

Articles By Topic

  • Events
  • Gaming
  • How To
  • Lifestyle
  • News
  • Reviews
  • Tech

Articles By Sub-Topic

Apple Blogger Outreach Events COVID-19 Crystal Coast Geek Breakfast Data Internet Security Microsoft PC Resources Security Services Social Media Workshops Tech News Tech Tips

Read Past Articles

Get Tech Tips, Discounts & More

Subscribe to receive email updates with our latest news, deals, and information.

Copyright © 2023 SOBX Tech · Web Design & Maintenance by SOBXTech