Brian 'Woody' Whyte Owner - Pc
a U.S. Naval Submarine Officer Veteran
Received An Email With My Password
And A Ransom Request!
1) How did they get my password?
The password as you have noticed is correct and, if not
current, it is still a password used in the past.
The criminals have collected millions of passwords exploiting
the various leaks released online, in the dark web, on
Torrent, which contain data stolen from giants like Dropbox, and
Linkedin or from one of the other many data breaches that
have occurred within the last decade.
Obviously if you have not changed
the password, run immediately to do it, especially because
maybe you have changed the service on which the leak was
reported but not on others where you have used the same
Websites aren’t supposed to store passwords in plain text
but, sadly, some still do and ten years ago it was even more
2) Do they really have a video of my webcam?
No, they do not have it, …they pretend to have it in the hope
that the victim will pay, feeling in default (perhaps because
some pornographic video which they have actually looked at)
and inculcating the fear of spreading compromising images.
Generally, when extortion forms are initiated – in the
sextortion style – the blackmailer shows the victim the swag,
the material that will threaten to divulge in case of
non-payment. The fact of not showing it is often an
indication of a mere attempt to deceive the victim hoping
that they will be convinced of being really blackmailed. In
doubt, do you need to pay the ransom? NO, Paying the ransom
is never the solution.
Newsletter Items Enclosed Below
* AOL * URGENT *
YOU SHOULD BE PAYING $0.00 OR NO MORE THAN $4.99(GOLD) PER
MONTH! IF YOU ARE
CALL US 805-427-3806 ASAP!
Now Offering Remote
Get Your Free 1-Hour Service Call*
Can Power Outages Damage My Electronics
Summer (Anytime) IT Travel Tips
VPN - Do I 'Need' it
Help - I'm getting (fake) phone calls
Fake Virus Pop - up's
iOS 11's image format problems for PC users
Some Online Backup Solutions for 2018
Ransomware attacks computers masquerading as Adobe Flash
Vaccine for Petya virus
FaceBook - Makes it’s Privacy Tools Easier to Find
Unlimited Service is back
No more Toll-Free (888) #
Direct 2/7 Mobile Phone is for YOU ONLY 805-427-3806 Call or
Offering Remote Support For 911/Urgent Problems
We still are a Mobile Computer(PC & Apple/Mac)
Repair Service that comes to you, and will not change.
However, in the past whenever one of our clients has a server
problem, such as, but not limited to; “can’t get email”, or
“they have messed-up a view & can’t see the screen or
program correctly”, then we can connect remotely to resolve
And we are now letting everyone know about it!
So, if you get in trouble and need an immediate fix, we may
be able to help!
(normal 1-hour minimum rates apply)
Get Your Free
1-Hour Service Call*
Give Out (805)446-3366 = (818)889-0980
Not Mobile #
These Voicemail Message Numbers Are The Same
Please DO NOT Give-Out/ Post My Mobile Phone or on Reviews
Free Service? YES! The Old Reward was $50
THE NEW REWARD IS NOW $125!
> They NEVER Expire!
> They Can Be Combined!
While the old Reward Program was good…
We want to make it Better!
So, just refer your Friends
After we resolve their 1st problem
We’ll send you a $125* Off Reward
Can Power Outages Damage My Electronics
Short-Term Scheduled Power Outages
During an expected power outage, is it wise to
unplug the refrigerator to avoid damage to the unit? On the
other hand, is it okay to leave it?
Fridge, baseboard heater, hot water tank, high current
appliances ect, I would not worry too much about.
However... Electronics, computers, TV, Microwave ovens,
Mobile phone chargers, battery chargers, might be pause for
If you are concerned, turn off the main breaker to your home
or apartment before the outage and wait for the power to be
back up before you turn it back on. Many utilities have their
status on a mobile app or a mobile friendly website
I have had friends that have lost microwaves, TV's, and more
than a couple hard drives that were “coincident” with
unplanned power failures.
Electrical current, as opposed to potential, is funny in a
sense. Once it is generated, it needs a place to go or it
will find one.
During a planned power disruption, the restart of the flow of
electricity is controlled. If it is a planned outage, then
the utility does not expect, but is prepared for, “odd flow”.
However… Sometimes crap happens. The risk of something going
wrong is low but non-zero. Since you are going to be without
power anyway and want peace of mind, hit the breaker. A
homeowner should be capable of doing that comfortably.
So… The only foolproof way to protect your computer against
electrical anomalies is to unplug it completely until the
danger has passed. Seriously, it has to be physically
disconnected. Flipping your power switch to “off” is not
going to cut it. This is the only method of protection with a
100 percent success rate against power outages and power
The thing to remember with power outages is that the outage
itself isn’t exactly what causes harm, it’s the sudden surge
of electricity when the power comes back on that can damage
Against power surges, you will want a surge protector. This
apparatus, which looks like a bulkier version of a power
strip (the two are not the same), will attempt to divert
electrical surges away from the devices plugged into it.
Surge protectors are rated to withstand a certain maximum
voltage and once they are triggered, they must be replaced.
Call if you need one installed / we can even pick it up for
you without a price mark-up 805-427-3806
Also... Have you signed-up for Power Disruption Alerts?
Remember… Do not panic… Check to see if your neighbors still
have electricity. If they do, the problem could be inside
Your supplier should also be able to tell you if it will be
an extended outage.
Relax and have a safe and enjoyable summer!
(Anytime) Travel IT Tips
Vacation should be all about sun, sand and
drinks with umbrellas. But recently, cybercriminals are
making it about something else -- something that might send
you dashing to those umbrella drinks for a whole other
reason. Cybercriminals are now using pop-up alerts
delivered over hotel WiFi to infect computers with malware,
according to a recent FBI report.
Since that -- or any other computer issue like theft or
viruses -- is pretty much the last thing any of us wants to
deal with on our much-needed summer vacations, here are some
1. Hackers/Attackers may create rogue wireless networks
Hotel WiFi Networks will ask you to sign-in using your Room
Number and Last Name…
Here's the Tip -
To verify that you're connecting to the REAL Hotel WiFi -
Try using the WRONG Room Number first…yes the 'wrong room',
Because if it's the REAL WiFi it will give an error and not
connect, validating that this is the Hotels REAL WiFi, But if
it does connect you…
Disconnect immediately and contact the front desk.
2. Don’t update software while on hotel WiFi
Before you go on the road, make sure your operating system
and software are updated. Once you get to the hotel,
don’t update your software if you are asked to do so by the
hotel’s WiFi. That’s because this “update” could allow
cybercriminals to install malware that monitors everything
you do on your computer—including intercept passwords to
email and financial institutions, host criminal web sites and
send spam for fake pharmaceuticals and porn. Some malware can
even turn on your webcam and record whatever is going on in
3. Make sure your computer has antivirus software installed
While this isn’t a guarantee that you won’t get a virus while
on vacation, it goes a long way towards protecting your computer.
It’s a good idea to make sure your antivirus software is up
to date and active before you leave home.
4. Backup your data before you leave home
Just in case something does happen to your computer while on
vacation, you’ll want to backup the data on your computer to
a hard drive or the cloud before you leave home.
This way, you won’t lose everything should your computer get
stolen or get infected with a virus.
**see below for some choices
5. Make sure the network is encrypted with WPA2
Ideally, you’ll want to use hotel WiFi connections only if
they’re encrypted with WPA2. How can you tell
this? Usually, when connecting to any encrypted
network, you have to enter the password for it in your
wireless network settings, in which case your software may
identify if a network is encrypted by WEP, WPA or WPA2
encryption. If in doubt, ask the front desk or contact
technical support for the connection. Only use WEP if
you desperately need the Internet and have no other option.
You may also want to confirm with the hotel before you book
that it uses a reputable Internet service provider -- some of
the more well-known ones include AT&T and iBahn. However,
many times the hotel's Wi-Fi connection will be made to look
like the hotel brand so you will not know who it is from. So,
if in doubt, ask the front desk or contact technical support
for the connection. If you’re accessing your company’s
network, do it through VPN (virtual private network) if
possible. Ask your IT (Brian) Team how to do this.**see
6. Keep your computer locked up
This may seem obvious, but I’ve had a few friends get their
computers stolen while on vacation. If the hotel room has a
safe, keep your computer in it. If you plan on carrying
your computer with you in the car, never lock-up it or
anything valuable in the trunk because criminals know (huge
VPN - do I 'Need' it?
The short answer; maybe?... read more…
You may know what a VPN, or Virtual Private
Network, is; you probably don’t use one.
You really should be using a VPN, and even if you don’t think
so now, at some point in the future you may consider it as
important as your internet connection.
What Is a VPN?
Put simply, a Virtual Private Network, or VPN, is a group of
computers (or discrete networks) networked together over a
public network—namely, the internet. Businesses use VPNs to
connect remote datacenters, and individuals can use VP Ns to
get access to network resources when they’re not physically
on the same LAN (local area network), or as a method for
securing and encrypting their communications when they’re
using an untrusted public network.
The most important thing you need to know about a VPN: It
secures your computer’s internet connection to guarantee that
all of the data you’re sending and receiving is encrypted and
secured from prying eyes.
Whether the VPNs you’re familiar with are the ones offered by
your school or business to help you work or stay connected
when you’re traveling or the ones you pay to get you watch
your favorite shows in another country as they air, they’re
all doing the same thing.
There are many choices out there…here is one.
"…hey Brian, I've seen a lot of commercials for NordVPN…
They do have a lot of good reviews…
"…when it comes to virtual private networks, or VPNs,
NordVPN has proved itself to be our top service for securing
your online activities."
Be warned, you still may have a problems with speed and/or
connecting to some websites…as is with ALL vpn services.
Also, I do use NordVPN on all my devices; pc's, mac's,
phones, and tablets…
(full disclosure; I never receive any product/company
If you need Help Installing one - give us a call
to schedule an appointment - 805-427-3806
Apple CEO Tim Cook pounds the privacy drum in
wake of Facebook scandal
Apple: chief executive Tim Cook spoke out on
privacy during an MSNBC interview hosted by Chris Hayes and
Recode’s Kara Swisher earlier today, saying that services
that “[traffic] in your personal lives” are invading peoples’
privacy and emphasizing that Apple sees privacy as a “human
right” and a “civil liberty.” He also said that he finds it
“creepy” when “all of a sudden something is chasing me around
the web,” referring to sophisticated ad targeting.
FB: It’s Time to Make Our Privacy Tools Easier to
New Privacy Shortcuts menu. People have also
told us that information about privacy, security, and ads
should be much easier to find. The new Privacy Shortcuts is a
menu where you can control your data in just a few taps, with
clearer explanations of how our controls work. The experience
is now clearer, more visual, and easy-to-find. From here you
If you need Help changing your FB Privacy - give
us a call to schedule an appointment - 805-427-3806
I'm getting phone calls
REAL Companies NEVER CALL You:
/ Microsoft / Windows / IRS / SSA / UPS / Apple / Yahoo /
and many more - get the picture?
Yep, once they have your # they call and call
HANG UP ON THEM!
NEVER CALL BACK OR PUSH BUTTONS TO REMOVE YOUR NUMBER
Fake Virus Pop-Up's
Do Not Call Them!
If one of any type of
Fake Pop-up's Take-Over your Pc/Mac
- Just press the
following Keys(all at once):
1- For a PC: Ctrl + Alt + Delete
(the display will change in a minute to Blue)
then depending on the version of your pc windows
Select: Log/Sign Off/Out
And then Restart
Push and hold the power button for 10-seconds and then
release and then press again to Restart
2 - For a Mac:
Command + Option + W
Command + Shift + Option + Esc and hold
or release and repeat repeat repeat repeat
to force just the front app/program to quit
Then a Force Quit window will open
and choose an app/program to force quit
Push and hold the power button for 10-seconds and then
release and then press again to Restart
11's new image format might pose problems for PC users
Windows 10 doesn’t fully support HEIC yet
Apple has launched iOS 11 which means millions of iPhone
users are about to upgrade their device’s software.
High Efficiency Image File Format (HEIC) is a new image
container format from the developers of MPEG, a popular
audio and video compression standard. HEIC will be used by
default on new photos on iOS 11, and it’s designed to save
you storage space but your pic’s will be in png not jpeg
format in iCloud.
The option is to disable HEIC if you’re facing problems.
This will force iOS 11 to store all images as JPEG.
You can disable HEIC from
settings > camera > formats
But if you’re not having issues then it’s worth keeping the
high efficiency mode enabled to save space.
Solutions for 2018
to these Ransomware Virus Attacks we are recommending these
affordably priced Online Backups;
1) Carbonite is one of the most recognizable names in online
backup. It's also one of the easiest-to-use online backup
services around, has decent mobile apps, and is a good value
for your money. However, Carbonite recently removed its file
sharing and folder-syncing features, limits you to a single
PC or Mac, and restricts external and network drive backups
to premium accounts. Carbonite is a solid "set it and
forget it" option.
2) IDrive in the market for an online backup service?
there are many variables to consider, including storage size,
pricing, advanced backup features, and ease of use. IDrive
hits high marks across all these categories, and it offers a
good price-to-storage ratio, too. It also delivers a
consistent experience across its desktop, mobile, and web
platforms. It could be a bit faster, but it's an otherwise
excellent choice for consumers.
3) Backblaze aims to address the concern that online backup
services are too expensive and too complicated. It succeeds
in that goal, delivering a service that is competitively
priced and easy to use. Backblaze's back-up-everything
approach will appeal to thrifty, hands-off users, and the
latest release brings file-sharing options and improved
Facebook and Microsoft have teamed up to crack
down on the hacking group believed to be behind a ransomware
attack that spread around the world.
The two companies collaborated with other
unnamed members of the security community to take action
against the group, the companies and a White House official
said on Tuesday. The group, known as ZINC or Lazarus, has
been tied to ongoing cyber threats, including the WannaCry
ransomware attack that targeted hospitals, businesses and
banks in the spring.
Bad Rabbit Ransomware attacks computers masquerading as Adobe
When On A Website
Don’t Click on Flash Player Fake Update Request
To protect your PC you can download this free program by
clicking here à “RansomFree” protects 99% of ransomware.
Vaccine for Petya virus
Cybereason security has found a way to prevent the Petya
(NotPetya/SortaPetya/Petna) ransomware from infecting
The ransomware has been wreaking havoc across the globe,
locking hard drive MFT and MBR sections and preventing computers
from booting. Unless victims opted to pay a ransom (which is now pointless and not recommended),
There is no way to recover your Data now!
To vaccinate your computer so that you are unable to get
infected with the current strain of NotPetya/Petya/Petna
(yeah, this naming is annoying)
Just click on the above link, after it downloads click on it
to install, note you might need to click on windows safety
overides, such as "more info" to select 'install
anyway', and then reboot your windows pc.
This batch file can be found here: NO Petya Vaccine
*(for those who wish to vaccinate their
computer, but would rather have us perform it, you can do so
by call us to schedule an appointment)