PC HEAVEN February 2019 Newsletter

;--have i been pwned?
Has your email password been compromised in a data breach
And Smart Password Practices

Click here to view this online on our website
Hold the Ctrl key & Click the Reload Button in your Browser

Brian 'Woody' Whyte - Owner - PC HEAVEN
U.S. Naval Submarine Officer Veteran


;--have i been pwned?


Who is behind Have I Been Pwned (HIBP)

Troy Hunt, a Microsoft Regional Director and Most Valuable Professional awardee for Developer Security, blogger at troyhunt.com, international speaker on web security and the author of many top-rating security courses for web developers on Pluralsight.

Check if you have an account that has been compromised in a data breach

Pwned Passwords
Pwned Passwords are 551,509,767 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they're at much greater risk of being used to take over other accounts. They're searchable online below as well as being downloadable for use in other online systems

Pwned websites
Breached websites that have been loaded into Have I Been Pwned

Have I Been Pwned latest breaches

If You Find That You Have Been Compromised

You can go here for a Secure Password Generator or just to get ideas.
But please note it may generate
Special Symbol’s that are not allowed by your website, as most only allow these    ! # $ % + / = @ ~  

Smart Password Practices

To prevent your passwords from being hacked by social engineering, brute force or dictionary attack method, and keep your online accounts safe, you should notice:

Do not use the same password, security question and answer for multiple important accounts.

Do not use n
ame’s or name generator’s as they are vulnerable to a dictionary attack method.

Use a password that has at least 16 characters(if allowed), use at least one number, one uppercase letter, one lowercase letter and one special symbol.

Do not use the names of your families, friends or pets in your passwords.

Do not use postcodes, house numbers, phone numbers, birthdates, ID card numbers, social security numbers, and so on in your passwords.

Do not use any dictionary word in your passwords. Examples of strong passwords: ePYHc~dS*)8$+V-' , qzRtC{6rXN3N\RgL , zbfUMZPE6`FC%)sZ. Examples of weak passwords: qwert12345, Gbt3fC79ZmMEFUFJ, 1234567890, 987654321, nortonpassword.

Do not use two or more similar passwords which most of their characters are same, for example, ilovefreshflowersMac, ilovefreshflowersDropBox, since if one of these passwords is stolen, then it means that all of these passwords are stolen.

Do not use something that can be cloned( but you can't change ) as your passwords, such as your fingerprints.

Past Newsletter Items Enclosed Below

If you are being billed more than $4.99 Monthly
Call Us Asap 805-427-3806!
(we are still seeing this everyday)

Download Malwarebytes Today and Protect Your Data for Free

Help I Received An Email With My Password And A Ransom Request!

Now Offering Remote Support

Get Your Free 1-Hour Service Call*

Can Power Outages Damage My Electronics

Summer (Anytime) IT Travel Tips

VPN - Do I 'Need' it

Help - I'm getting (fake) phone calls

Fake Virus Pop - up's

iOS 11's image format problems for PC users

Some Online Backup Solutions for 2018

Ransomware attacks computers masquerading as Adobe Flash

Vaccine for Petya virus

FaceBook -
Makes it’s Privacy Tools Easier to Find

Unlimited Service is back

No more Toll-Free (888) #
Direct 2/7 Mobile Phone is for YOU ONLY 805-427-3806 Call or Text


Download Malwarebytes Today and Protect Your Data for Free


Everyone lives on the internet, period. Whether you’re streaming a standup special on Netflix, answering emails from your boss, chatting on Tinder, or completing everyday errands like paying bills online, you’re likely spending most of your day tangled up in the world wide web.

Unfortunately, that makes you a high-risk candidate for a cyber attack at some point along the way, be it through malware, phishing, or hacking. Best-case scenario, it sucks up your time to fix (or your money by paying someone else to fix it). Worst case scenario, it puts you and your computer out of commission for days and damages your files beyond repair. Not to mention the sheer terror of knowing some hacker has complete and total access to virtually everything about you, including all of your banking and credit card information.

Malwarebytes uses multiple layers of protection, aggressively detecting not just malicious threats but also junk programs that slow down your computer. For total security, it also blocks malicious websites that can hack your computer. The bottom line is you’ll have your own hackers working to beat the bad hackers who are trying to infiltrate your system.

Malwarebytes is a free program built to help you avoid the above scenarios altogether — and it makes traditional antivirus look old, tired, and played out seriously it’s free, download it here =


If you Don’t upgrade to the paid version for Real Time Protection
you can still run scan’s manually periodically


Help I Received An Email With My Password
And A Ransom Request!

1) How did they get my password?

The password as you have noticed is correct and, if not current, it is still a password used in the past.

The criminals have collected millions of passwords exploiting the various leaks released online, in the dark web, on Torrent, which contain data stolen from giants like Dropbox, and Linkedin or from one of the other many data breaches that have occurred within the last decade.

Obviously if you have not changed the password, run immediately to do it, especially because maybe you have changed the service on which the leak was reported but not on others where you have used the same credentials.

Websites aren’t supposed to store passwords in plain text but, sadly, some still do and ten years ago it was even more common.

2) Do they really have a video of my webcam?

No, they do not have it, …they pretend to have it in the hope that the victim will pay, feeling in default (perhaps because some pornographic video which they have actually looked at) and inculcating the fear of spreading compromising images. Generally, when extortion forms are initiated – in the sextortion style – the blackmailer shows the victim the swag, the material that will threaten to divulge in case of non-payment. The fact of not showing it is often an indication of a mere attempt to deceive the victim hoping that they will be convinced of being really blackmailed. In doubt, do you need to pay the ransom? NO, Paying the ransom is never the solution.

Now Offering Remote Support
For Urgent Problems

We still are a Mobile Computer(PC & Apple/Mac) Repair Service that comes to you, and will not change.

However, in the past whenever one of our clients has a server problem, such as, but not limited to; “can’t get email”, or “they have messed-up a view & can’t see the screen or program correctly”, then we can connect remotely to resolve the problem!

And we are now letting everyone know about it!

So, if you get in trouble and need an immediate fix, we may be able to help!
At the current 1-hour rate (note: 1-hour minimum does not apply)

Get Your Free 1-Hour Service Call*

Give Out (805)446-3366 = (818)889-0980

Not My Mobile Cell #

These Voicemail Message Numbers Are The Same

Please DO NOT Give-Out/ Post My Mobile Phone or on Reviews

Free Service? YES! The Old Reward was $50


> They NEVER Expire!
> They Can Be Combined!

While the old Reward Program was good…
We want to make it Better!

So, just refer your Friends
After we resolve their 1st problem

We’ll send you a $125* Off Reward


Can Power Outages Damage My Electronics?

Short-Term Scheduled Power Outages

During an expected power outage, is it wise to unplug the refrigerator to avoid damage to the unit? On the other hand, is it okay to leave it?

Fridge, baseboard heater, hot water tank, high current appliances ect, I would not worry too much about.

However... Electronics, computers, TV, Microwave ovens, Mobile phone chargers, battery chargers, might be pause for concern.

If you are concerned, turn off the main breaker to your home or apartment before the outage and wait for the power to be back up before you turn it back on. Many utilities have their status on a mobile app or a mobile friendly website

I have had friends that have lost microwaves, TV's, and more than a couple hard drives that were “coincident” with unplanned power failures.

Electrical current, as opposed to potential, is funny in a sense. Once it is generated, it needs a place to go or it will find one.

During a planned power disruption, the restart of the flow of electricity is controlled. If it is a planned outage, then the utility does not expect, but is prepared for, “odd flow”.

However… Sometimes crap happens. The risk of something going wrong is low but non-zero. Since you are going to be without power anyway and want peace of mind, hit the breaker. A homeowner should be capable of doing that comfortably.

So… The only foolproof way to protect your computer against electrical anomalies is to unplug it completely until the danger has passed. Seriously, it has to be physically disconnected. Flipping your power switch to “off” is not going to cut it. This is the only method of protection with a 100 percent success rate against power outages and power surges.

The thing to remember with power outages is that the outage itself isn’t exactly what causes harm, it’s the sudden surge of electricity when the power comes back on that can damage your appliances.

Against power surges, you will want a surge protector. This apparatus, which looks like a bulkier version of a power strip (the two are not the same), will attempt to divert electrical surges away from the devices plugged into it. Surge protectors are rated to withstand a certain maximum voltage and once they are triggered, they must be replaced.

Call if you need one installed / we can even pick it up for you without a price mark-up 805-427-3806 


Also... Have you signed-up for Power Disruption Alerts?
Remember… Do not panic… Check to see if your neighbors still have electricity. If they do, the problem could be inside your home.
Your supplier should also be able to tell you if it will be an extended outage.

Relax and have a safe and enjoyable summer!

Summer (Anytime) Travel IT Tips

Vacation should be all about sun, sand and drinks with umbrellas. But recently, cybercriminals are making it about something else -- something that might send you dashing to those umbrella drinks for a whole other reason.  Cybercriminals are now using pop-up alerts delivered over hotel WiFi to infect computers with malware, according to a recent FBI report.

Since that -- or any other computer issue like theft or viruses -- is pretty much the last thing any of us wants to deal with on our much-needed summer vacations, here are some tips;

1. Hackers/Attackers may create rogue  wireless networks
Hotel WiFi Networks will ask you to sign-in using your Room Number and Last Name…
Here's the Tip -
To verify that you're connecting to the REAL Hotel WiFi -
Try using the WRONG Room Number first…yes the 'wrong room', why…
Because if it's the REAL WiFi it will give an error and not connect, validating that this is the Hotels REAL WiFi, But if it does connect you…
Disconnect immediately and contact the front desk.

2. Don’t update software while on hotel WiFi
Before you go on the road, make sure your operating system and software are updated.  Once you get to the hotel, don’t update your software if you are asked to do so by the hotel’s WiFi.  That’s because this “update” could allow cybercriminals to install malware that monitors everything you do on your computer—including intercept passwords to email and financial institutions, host criminal web sites and send spam for fake pharmaceuticals and porn. Some malware can even turn on your webcam and record whatever is going on in the room.

3. Make sure your computer has antivirus software installed on it
While this isn’t a guarantee that you won’t get a virus while on vacation, it goes a long way towards protecting your computer. It’s a good idea to make sure your antivirus software is up to date and active before you leave home.

4. Backup your data before you leave home
Just in case something does happen to your computer while on vacation, you’ll want to backup the data on your computer to a hard drive or the cloud before you leave home.   This way, you won’t lose everything should your computer get stolen or get infected with a virus.
**see below for some choices

5. Make sure the network is encrypted with WPA2
Ideally, you’ll want to use hotel WiFi connections only if they’re encrypted with WPA2.  How can you tell this?  Usually, when connecting to any encrypted network, you have to enter the password for it in your wireless network settings, in which case your software may identify if a network is encrypted by WEP, WPA or WPA2 encryption. If in doubt, ask the front desk or contact technical support for the connection.  Only use WEP if you desperately need the Internet and have no other option. You may also want to confirm with the hotel before you book that it uses a reputable Internet service provider -- some of the more well-known ones include AT&T and iBahn. However, many times the hotel's Wi-Fi connection will be made to look like the hotel brand so you will not know who it is from. So, if in doubt, ask the front desk or contact technical support for the connection.  If you’re accessing your company’s network, do it through VPN (virtual private network) if possible.  Ask your IT (Brian) Team how to do this.**see below

6. Keep your computer locked up
This may seem obvious, but I’ve had a few friends get their computers stolen while on vacation. If the hotel room has a safe, keep your computer in it.  If you plan on carrying your computer with you in the car, never lock-up it or anything valuable in the trunk because criminals know (huge in Hawaii).

VPN - do I 'Need' it?

The short answer; maybe?... read more…

You may know what a VPN, or Virtual Private Network, is; you probably don’t use one.

You really should be using a VPN, and even if you don’t think so now, at some point in the future you may consider it as important as your internet connection.

What Is a VPN?

Put simply, a Virtual Private Network, or VPN, is a group of computers (or discrete networks) networked together over a public network—namely, the internet. Businesses use VPNs to connect remote datacenters, and individuals can use VP Ns to get access to network resources when they’re not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they’re using an untrusted public network.

The most important thing you need to know about a VPN: It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes.

Whether the VPNs you’re familiar with are the ones offered by your school or business to help you work or stay connected when you’re traveling or the ones you pay to get you watch your favorite shows in another country as they air, they’re all doing the same thing.

There are many choices out there…here is one.

"…hey Brian, I've seen a lot of commercials for NordVPN…


They do have a lot of good reviews…

PCmagazine -
"…when it comes to virtual private networks, or VPNs, NordVPN has proved itself to be our top service for securing your online activities."

Be warned, you still may have a problems with speed and/or connecting to some websites…as is with ALL vpn services.

Also, I do use NordVPN on all my devices; pc's, mac's, phones, and tablets…

(full disclosure; I never receive any product/company kickbacks)

If you need Help Installing one - give us a call to schedule an appointment - 805-427-3806

Apple CEO Tim Cook pounds the privacy drum in wake of Facebook scandal

Apple: chief executive Tim Cook spoke out on privacy during an MSNBC interview hosted by Chris Hayes and Recode’s Kara Swisher earlier today, saying that services that “[traffic] in your personal lives” are invading peoples’ privacy and emphasizing that Apple sees privacy as a “human right” and a “civil liberty.” He also said that he finds it “creepy” when “all of a sudden something is chasing me around the web,” referring to sophisticated ad targeting.

It’s Time to Make Our Privacy Tools Easier to Find

New Privacy Shortcuts menu. People have also told us that information about privacy, security, and ads should be much easier to find. The new Privacy Shortcuts is a menu where you can control your data in just a few taps, with clearer explanations of how our controls work. The experience is now clearer, more visual, and easy-to-find. From here you can:

If you need Help changing your FB Privacy - give us a call to schedule an appointment - 805-427-3806

I'm getting phone calls

REAL Companies NEVER CALL You:
AT&T / Microsoft / Windows / IRS / SSA / UPS / Apple / Yahoo / Facebook
and many more - get the picture?

Yep, once they have your # they call and call





Fake Virus Pop-Up's

Do Not Call Them!


 If one of any type of Fake Pop-up's Take-Over your Pc/Mac

 - Just press the following Keys(all at once):
 1- For a PC: Ctrl + Alt + Delete
(the display will change in a minute to Blue)
then depending on the version of your pc windows
Select: Log/Sign Off/Out
And then Restart
Push and hold the power button for 10-seconds and then release and then press again to Restart
2 - For a Mac:
Command + Option + W
Command + Shift + Option + Esc and hold
or release and repeat repeat repeat repeat
to force just the front app/program to quit
 Then a Force Quit window will open
and choose an app/program to force quit
Push and hold the power button for 10-seconds and then release and then press again to Restart

iOS 11's new image format might pose problems for PC users

Windows 10 doesn’t fully support HEIC yet

Apple has launched iOS 11 which means millions of iPhone users are about to upgrade their device’s software.

High Efficiency Image File Format (HEIC) is a new image container format from the developers of MPEG, a popular audio and video compression standard. HEIC will be used by default on new photos on iOS 11, and it’s designed to save you storage space but your pic’s will be in png not jpeg format in iCloud.

The option is to disable HEIC if you’re facing problems.
This will force iOS 11 to store all images as JPEG.
You can disable HEIC from
settings > camera > formats

But if you’re not having issues then it’s worth keeping the high efficiency mode enabled to save space.


Backup Solutions for 2018

Due to these Ransomware Virus Attacks we are recommending these affordably priced Online Backups;

1) Carbonite is one of the most recognizable names in online backup. It's also one of the easiest-to-use online backup services around, has decent mobile apps, and is a good value for your money. However, Carbonite recently removed its file sharing and folder-syncing features, limits you to a single PC or Mac, and restricts external and network drive backups to premium accounts. Carbonite is a solid "set it and forget it" option.

IDrive in the market for an online backup service? there are many variables to consider, including storage size, pricing, advanced backup features, and ease of use. IDrive hits high marks across all these categories, and it offers a good price-to-storage ratio, too. It also delivers a consistent experience across its desktop, mobile, and web platforms. It could be a bit faster, but it's an otherwise excellent choice for consumers.

Backblaze aims to address the concern that online backup services are too expensive and too complicated. It succeeds in that goal, delivering a service that is competitively priced and easy to use. Backblaze's back-up-everything approach will appeal to thrifty, hands-off users, and the latest release brings file-sharing options and improved performance throughout.

Facebook and Microsoft have teamed up to crack down on the hacking group believed to be behind a ransomware attack that spread around the world.
The two companies collaborated with other unnamed members of the security community to take action against the group, the companies and a White House official said on Tuesday. The group, known as ZINC or Lazarus, has been tied to ongoing cyber threats, including the WannaCry ransomware attack that targeted hospitals, businesses and banks in the spring.

Bad Rabbit Ransomware attacks computers masquerading as Adobe Flash

When On A Website
Don’t Click on Flash Player Fake Update Request

To protect your PC you can download this free program by

clicking here àRansomFree” protects 99% of ransomware.

     Vaccine for Petya virus Instructions Below 

Cybereason security has found a way to prevent the Petya (NotPetya/SortaPetya/Petna) ransomware from infecting computers.

The ransomware has been wreaking havoc across the globe, locking hard drive MFT and MBR sections and preventing computers from booting. Unless victims opted to pay a ransom
(which is now pointless and not recommended),

There is no way to recover your Data now!

To vaccinate your computer so that you are unable to get infected with the current strain of NotPetya/Petya/Petna (yeah, this naming is annoying)

Just click on the above link, after it downloads click on it to install, note you might need to click on windows safety overides, such as "more info" to select 'install anyway', and then reboot your windows pc.

This batch file can be found here:
NO Petya Vaccine
*(for those who wish to vaccinate their computer, but would rather have us perform it, you can do so by call us to schedule an appointment)



CALL US 805-427-3806 ASAP!

If your still having problems with the New Aol call to schedule an appointment


Unlimited cid:image017.jpg@01D433B4.2A2EFF80IS BACK!

Back by popular demand

Today, more and more Households and Offices have more than one device; pc’s, mac’s, tablet’s, smartphone’s, appletv, roku, wi-fi extenders, printers, wi-fi camera’s. ect…

So Unlimited Service is back

That’s right…just pay for a 1-hour minimum service call and we will fix as many device’s and problem’s as you want us to…

…after the 1st hour it’s still prorated at $31.25/15-min’s as it’s always been
…a lot better than taking them into Best Buy and pay for each device!

No Need for a Toll Free (888)266-XXXX Number


My Mobile-phone #  24/7 is:


The Toll Free (888)266-XXXX has been retired!

Main numbers to give-out are


(805)446-3366 or (818)889-0980

Please DO NOT post my Mobile Phone on Reviews

1336 N Moorpark Rd # 325,
Mail Only - We Come To You

Sent by






click here to unsubscribe at any time
or email a reply to us

You are receiving this email in accordance with our Privacy Policy found on our website