Google+ June 2019 ~ High Tech House Calls
Expert Computer Consulting for Homes and Small Businesses

Let there be hope...

Life has changed there is no doubt and we wanted to reach out to see how you are doing.

As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!

Computer Security

If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.

What can you do about it?

I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.

Now offering consultations to give you the best protection possible:


404.229.0839
carlthorne@hthcatlanta.com

Jack of All Trades, Master of Many

Jack of All Trades, and Master of Many

We provide technical support for:


Homes and small businesses

Windows and the Mac OS platform

iPhones and Android Smartphones

Wireless and wired networks

New device setup

Old device upgrade or repair

One-on-one training

Remote assistance


How To Stop Malware

Monday, June 24, 2019

Over 100 million PC owners at risk from new security flaw By James Gelinas, Komando.com

One of the most difficult parts about creating technology is proofing it against the entire spectrum of digital threats. Not only are viruses constantly evolving and advertisements becoming more tricky to deal with, but hackers are also always probing popular systems for weak spots. When they find them, it can spell disaster -- not just for individuals, but for everyone with the same kind of computer or software.
When a device maker is popular enough, its products become a priority target for all manner of skulduggery. As it turns out, a recent discovery proved these fears are well-grounded. A dangerous exploit has been found in a popular, pre-loaded piece of software that can grant hackers backdoor access to a person's entire computer!
Not only is this security hole extremely vulnerable, but the software involved is also bundled with the majority of one device maker's products (as well as several third-party systems)! To fight back against this threat, it's releasing a critical security patch that can stamp out this flaw -- but not everyone has updated yet! Read on to learn if your device is at risk, and what you can do to stay safe.

The scoop on SupportAssist security

Researchers at security firm SafeBreach Labs found a startling flaw in a program that comes pre-installed in the majority of Dell-branded computers, as well as several third-party PCs under a different name. The program is known as SupportAssist, which is a built-in technical support tool tailored for Dell users, but it's also called PC-Doctor Toolbox when bundled with other devices.
Dell has stated that the flaw is a PC-Doctor vulnerability, and is present in SupportAssist due to its components shipping with the software suite.
According to SafeBreach Labs, the flaw arose from a lack of authentication when the system pulls library files from the folders it interacts with.
Since the program doesn't verify whether these libraries are legitimate or not, a skilled hacker could place a corrupted file into a folder that SupportAssist or PC-Doctor would accidentally scan and activate. Once opened, the entire system could be compromised, exposing private user data to hackers and cybercriminals.

Am I affected by this security flaw?

Thankfully, Dell took quick action to address the security hole and released a patch on May 28th of this year that completely addressed the issue. According to Dell, more than 90% of its customers have already installed the patch, meaning that the remaining 10% are most at risk of exploitation.
The widespread adoption of this patch is the result of automatic updates, which Dell often enables by default. If you don't have this enabled in your system (or don't know if you do), the best course of action would be to manually download and install the patch. Even if it's already on your system, installing the patch again manually won't cause any harm to your computer.
To get the patch, simply click or tap to visit the SupportAssist download page. Installing the update will put the latest version of the program on your computer -- with the vulnerability removed.
As for non-Dell computers, it's unknown if there are patches currently available at the moment. We'll be updating the story if and when they become available.
As dangerous as the internet can be for your computer's health, staying on top of the latest patches and updates is the best way to keep your system free of bugs and security holes. Just make sure that you're staying away from dangerous places where hackers are likely to lurk, and you'll substantially reduce your risk.
The web is a big place. Stay safe, and browse smart!

Sunday, June 16, 2019

Google Drive and Photos Are Splitting: What You Need to Know by CHRIS HOFFMAN

Google has announced that Google Drive and Google Photos will be separating in July. Google says, “the connection between these services is confusing,” so it’s making some changes to “simplify the experience.” Here’s what that means for you.

How Were Google Drive and Photos Connected?

Currently, Google Drive and Google Photos are linked together. From within Google Drive, you can select a “Google Photos” folder to browse all your photos and videos. The Google Backup and Sync tool for Windows and Mac can sync these photos to your computer, just as it can sync your other Google Drive files.
And, from within Google Photos, you’ll also see photos you store in other folders in Google Drive.
These interfaces are linked together. If you delete a photo from within Google Drive, it also vanishes from Google Photos. If you delete a photo from within Google Photos, it will also be removed from your Google Drive.
Google says it’s heard feedback that this connection is confusing, so it’s making some changes.

What’s Changing?

Starting sometime in July 2019, this connection is being removed. New photos (and videos) added to Google Photos will not appear in the Google Photos folder in Google Drive. According to Google’s announcement, any existing photos and videos you have in your Google Photos folder will continue to remain there in Google Drive—but no new ones will be automatically added.
New photos and videos stored in Google Drive won’t automatically be shown in Google Photos, either.
If you delete photos or videos from Google Drive or Google Photos, they won’t be automatically removed from the other service. Google says, “this change is designed to help prevent accidental deletion of items across products.”
In other words, the automatic link between the two services is being removed. Photos and videos will exist only in one place. Google is already showing a notification saying your “Google Photos folder is changing.”

What Happens to My Photos and Videos?

Google Photos folder is changing message from Google Backup and Sync
Nothing’s changing for existing photos and videos. If you currently have photos on Google Drive, those photos will still be shown in Google Photos in the future. If you currently have photos in Google Photos, they’ll still be shown in the Google Drive folder in the future.
However, any new photos uploaded to Google Photos won’t appear in Google Drive, and any new photos uploaded to Google Drive won’t appear in Google Photos.

How Can I Move Photos From Drive to Photos?

Google is adding an “Upload from Drive” feature to Google Photos. When you head to the Google Photos website, you can select “Upload from Drive” to upload photos and videos from your Google Drive account to Google Photos.
After they’re uploaded, these photos and videos won’t be linked—in other words, if you upload a photo from Drive to Photos and then delete it on one service, it won’t be removed on the other.
This also means that, if you upload a 50 MB video from Drive to Photos and leave it in both locations, it will take 100 MB of your Google account’s storage quota.

Can I Still Sync Google Photos to My PC or Mac?

Currently, this integration means you can automatically download (sync) any photos and videos added to Google Photos to your PC or Mac. It all happens via the normal Google Backup and Sync application that syncs Google Drive files—just select the Google Photos and everything syncs.
Is this feature going away? It looks like it might. Google’s statement says that “You’ll still be able to use Backup and Sync on Windows or macOS to upload to both services in High Quality or Original Quality.”
In other words, Google says you’ll still be able to upload photos and videos from your PC automatically—but doesn’t mention downloading photos and videos to your PC. We’ll have to see exactly what Google does in July, but it looks like this feature is going away.
If you need to sync photos to your PC, you might be better off switching to Dropbox or OneDrive on your phone. Those services can automatically upload photos you take, and then you can sync them to your PC like any other folder.

Can I Automatically Upload Photos to Google Drive?

The Google Photos application for Android and iPhone will still automatically upload photos, if you like—but only to Google Photos. You can no longer automatically upload them and have them placed in Google Drive—at least with Google’s own applications.
As Android Police notes, the Android app Autosync for Google Drive could help fill the hole. It will let you automatically synchronize files and folders (including photos) with your Google Drive folder. They’ll then sync to your PC. It’s two-way sync, too, if you like—you can delete photos or other files in the synced Google Drive folder, and Autosync will delete them in their original location on your Android phone.

Best Tablets You Can Buy in 2019 by Paige Szmodia

Thursday, June 13, 2019

How to Stop Your Phone’s Charger Cables From Breaking by TIM BROOKES

Add caption
Frayed charging cables can be dangerous to use and expensive to replace. Whether you’re using a Lightning cable with an iPhone, a USB-C cable with an Android phone, here’s how to protect them from breakage.

Taking Care of Your Cables

Anker Powerline+ Lightning cable
anker.com
The best way to stop your cables from breaking is to take proper care of them. In particular, always hold the cable by the plug when removing it from a device or USB port. Suddenly pulling a cable out without doing this will put pressure on the weakest part of the construction, where the cable joins the plug.
In transport, loop your cables and keep them bound with a strap or clip where possible. Make sure you loop your cable the right way by manipulating it with your hands. The cable will naturally coil in a specific manner, which you should always try to replicate. Some cables, like the Anker Powerline+ below, come with a velcro strap for easy transportation and storage. The “roadie wrap” is the best way to wrap your charging cables.
Avoid excessive bending of cables, or wrapping them up too tightly. Bending the cable, particularly at the point where the cable joins the plug, is the leading cause of damage over time. If you can avoid using your device while charging it, you will avoid unnecessarily wear the cable.
You will probably need to change your behavior and break old habits, but your cables will thank you for it. If you instinctively grab your phone in the morning before getting out of bed, take care to unplug the cable first. Laying there in bed with the cable bending back and forth as you roll over isn’t ideal. If you’re used to throwing your charging cables in a bag for a weekend away, take a second to coil them correctly.

Use Cable Protectors

TUDIA KLIP cable protector
tudiaproducts.com
Cable protectors work by protecting the point at which the cable joins the plastic or metal plug. They should be made of a flexible material like rubber, to allow the cable to flex slightly when pressure is applied. If the cable protector does not flex, it merely moves the point of weakness further up the cable.
You can buy a pack of cable protectors for a few dollars online. The TUDIA KLIP is one of the best solutions for Apple Lightning, iPod, MagSafe, and Apple Watch chargers. For a cheaper product that’s compatible with just about any USB charger, check out the Jetec multi-colored spiral protectors or the Nite Ize CordCollar.
Jetec Cable Protector
amazon.com
If you’re feeling crafty, you can add springs to your collars to add some tension and prevent the cable from bending to a critical point. For a more resilient homemade solution, check out the Paracord Cord Reinforcement tutorial on Instructables.
Almost anything that can prevent your cable from excessive bending will help protect it, whether it’s a homemade sleeve or a strip of electrical tape.

Prevent Accidents with Magnetic Adapters

Volta magnetic charging adapter
voltacharger.com
While cables wear naturally over time, cable damage is exacerbated by sudden movement. We’ve all accidentally snagged a charging cable, sending whatever was charging flying across the room. When this happens, the cable usually remains in place.
Magnetic adapters take the approach used in Apple’s (now defunct) MagSafe power cables and apply it to just about any device you own. First, place a small magnetic adapter into your device’s charging port. This adapter then connects magnetically to a charging cable when required.
Cables no longer get bent out of shape when you accidentally catch your smartphone, since a small amount of force is all it takes to detach the cable safely. You can buy as many adapters as you want, and use the same cable to charge everything. The adapter protrudes slightly from the bottom of your device for easy removal, and it might even help keep your charging port free of lint and other gunk.
Volta is probably the most well-known magnetic charging solution. For just shy of $20 you’ll get a Volta 2.0 charging cable and two adapter “tips” to fit Lightning, Micro USB, or USB type C connections. There are also plenty of affordable solutions available on Amazon and other online shopping services.
Keep in mind that you’re going to need to stick to a single system (or brand) if you want to share the same charging cable among several devices. You could even add a cable protector to your magnetic charger for an even more durable solution.

Charge (Almost Any Device) Wirelessly

Anker Qi wireless charger
amazon.com
Wireless charging is now widespread in modern smartphones. If you own a recent iPhone or Android device, there’s a high probability it can be charged wirelessly. You’ll need to purchase a Wireless Qi charger to use it, like this Anker 10W Wireless Charging Stand, which even supports fast charging.
This is one way to beat the broken cable blues. Unfortunately, it prevents you from using your device while charging, but that’s a great excuse to switch off and ignore your smartphone for half an hour. Just make sure you buy a wireless charger with a high enough wattage (10W) if you want to make use of fast charging. The iPhone X, XS, XR, and 8 all include wireless charging, but can only charge at a maximum of 7.5W—and, even then, only with specific, Apple-approved wireless chargers.
If your device doesn’t natively include wireless charging support, you can add it easily with a cheap Qi receiver. These take the form of thin charging pads that connect to your charging port and stick to the back of your smartphone. Most of them can live under your case, provided your case isn’t made of metal.
With a Qi receiver installed, your device will be able to receive a charge from Qi wireless chargers. Your charge speed may limit you compared to native wireless charging, but for around $10 the upgrade is inexpensive enough to justify.
Just make sure you buy the right Qi receiver for your device, whether you have a Lightning portMicro USB type-A, or USB-C connection.

Invest in One Cable to Rule Them All

Fuse Chicken Titan Plus charging cable
fusechicken.com
Apple’s official Lightning cable costs $29 for a 2-meter USB-A to Lightning connector. If you replace one a year, you’re paying nearly $90 for three years’ worth of iPhone charging. Why not invest more money in a stronger iPhone charging cable that will not only last but also saves you money in the long run?
The Fuse Chicken Titan Plus is a 1.5-meter USB-A to Lightning cable. It is made to Apple’s Made for iPhone manufacturing standards, which means it includes data capabilities and can be used as both a charger and sync cable. It’s protected by two layers of flexible steel, with sealed aluminum housing on each connection. It’s yours for $37.50.
Fuse also produces a range of cables with USB-C and Micro USB connectivity, perfect for Android users. They all ship with a lifetime warranty, but do be aware that all-metal construction results in added weight and reduced flexibility.
Anker’s Powerline+ is another highly rated charging cable available in LightningMicro USB, and USB-C variations. The cable features an aramid fiber (Kevlar) core and double nylon braiding which Anker claims will last ten times longer than other cables.
You can also find cheaper cables made with aramid fiber (like this Lightning cable and this Micro USB cable) all over shopping sites like Amazon. For best results, combine a tough cable with cable protectors and proper cable care.

Repair Your Cables Early

Electrical Heat Shrink Tubing
amazon.com
Frayed cables are dangerous. You’re taking risks if you continue to use a charger once it’s started to display signs of wear. Not only could you damage whatever you’re charging, but you could also receive a nasty shock or start a fire. We’d recommend throwing away damaged cables to be on the safe side.
If you’re convinced your cable isn’t too severely damaged, or it’s just started to show signs of wear without fully exposing the wiring, you may want to repair your cables instead. By far, the best way to do this is by using electrical heat-shrink tubing.
You can pick up a kit of heat shrink tubing for less than $10. These tubes fit over your existing wire, then shrink down to size when direct heat is applied. For fast results use a heat gun, but in many cases, a hairdryer will also work with a little patience. The tubing reduces flexibility somewhat, so these can even pull double duty as cable protectors to prevent future fraying.
Remember: if you’re uncomfortable with the state of a cable, cut it up and throw it in the bin.

Charge Your Phone in a Dock

Belkin ChargeSync
belkin.com
Smartphone docks might be unfashionable, but they serve a purpose. Since the dock doesn’t move, they’re not as susceptible to the same wear and tear as a standard charging cable. You won’t be reading your device in bed, but you also won’t be flexing the cable constantly either.
The majority of docks seem aimed at Apple users, like the Belkin ChargeSync. This is probably because a greater percentage of Android devices include wireless charging.

The Future is Wireless

Cables are fragile, and the fully wireless future isn’t here quite yet. You don’t need to spend a fortune; just make sure you’re buying good quality cables by avoiding the cheap and nasty ones. If you’re an Apple user, make sure you only buy cables that adhere to Apple’s Made for iPhone (MFi) standards.
If your device charges over USB-C, you’ll want to be extra vigilant that you choose a safe USB-C cable that won’t damage your devices.

Saturday, June 8, 2019

4 ways to check if a link is safe before you click it By Brittany Vincent, Komando.com

Navigating the internet can be especially tricky sometimes, and it's getting even worse as the days go by. It's hard enough to watch out for phishing scams that seek to pilfer your private information, but you've also got to make sure something as simple as clicking on the wrong link won't send you spiraling down into a terrible rabbit hole.
Click on a dangerous link from someone you don't know or on a dubious website, and you could be at risk for malware, ransomware, or other nasty online security issues.
Luckily, there are several ways you can verify if a link is legitimate or scammy. If you'd like to be more vigilant about your online safety, try one of these reliable ways to see if a link is safe before you click it. Because once you click, you could be inadvertently opening yourself up to some very frustrating situations. Protect yourself and get ahead of the curve!

Run links through ScanURL

One of the easiest ways you can check a URL is by copying it and then pasting it into the confines of ScanURL, a website that takes your link and runs it through several queries via secure HTTPS connection.
It checks Google Safe Browsing, PhishTank, and Web of Trust, the website's online Whois record about the owner, and combines them to provide an instant approval or warning if you should visit the site or not.
It's very quick, so you won't be left waiting too long, and that way you've got instant feedback on whether you should go ahead and click the link in the text message, email, or page you've just stumbled onto. And since it doesn't take long, it's a good practice to get into using it.

Kaspersky VirusDesk

Kaspersky is a trusted name in the world of online security, especially when it comes to viruses. That means another great source to cross-reference if you're looking to try and figure out if a link is legit is Kaspersky's own VirusDesk tool.
It will scan links you provide it with as well as actual files you can upload. It's all very simple to use and done right from your browser, making it even easier for you to check anything you're unsure about.
All you need to do is grab the URL you need to be scanned, paste it into the box, and click "Scan." After that, Kaspersky VirusDesk will let you know if your link is safe.
If for some reason you believe the link may be safe, you can click the "I disagree with the scan results" option to help Kaspersky employees better tweak their findings, and even contact you via email with what they figure out.

Check Norton Safe Web

Like Kaspersky, Norton is another trusted name when it comes to online security. Its online tool, Norton Safe Web, will scan a site for malware at your discretion. You just need to copy and paste the link into the browser bar.
When you proceed, you'll get a special rating that will let you know whether the site is safe to visit or not.
It features a summary of potential computer threats, identity threats, or "annoyance factors" that could result in some particularly frustrating visits to a website. Plus, you get a special community rating from others who have visited the site in the past to paint a better picture of a website's reputation.

Check your link with URLVoid

URLVoid is an online tool created specifically to help you figure out which websites are malicious and which aren't. It works similarly to the other tools on this list, in that you can type in the URL you're questioning, and the site will run a check.
The results returned include an overall rating of whether the link is safe or not, domain information and registration, whether it's been blacklisted, where the site is based, and other helpful factors to ensure you make an informed decision whether to visit or not.

Still haven't updated Windows? Now the US government is begging you -- here's what you need to do now By James Gelinas, Komando.com

Modern-day malware protection may be stronger than ever, but that doesn't mean the threat of viruses, worms, and trojans should be overlooked. Every day, security analysts, "white-hat" hackers, and software developers carefully monitor threats as they emerge. Their hope is to stop the next big malware pandemic before it breaks loose -- which is why they work closely with computer companies to find flaws and vulnerabilities that bad actors could exploit.
A few weeks ago, we covered a major threat identified by Microsoft and its developers that affects a number of previous editions of Windows. This vulnerability takes control of the Remote Desktop Client feature, which would give hackers carte blanche to access your files and personal data. Based on the scope of the issue, this new threat could rival WannaCry in the sheer amount of damage it can cause, as well as its ability to spread and affect other computers in a network.
Thankfully, Microsoft has released a patch for the issue -- one that's available for all previous versions of Windows affected by the security flaw. But it's not the only ones pushing for people to update. The NSA, one of the government's top cybersecurity organizations, is stepping in and urging Windows users to patch their systems before hackers have a chance to fully utilize the security flaw. Is this security flaw really so dangerous that the U.S. government feels the need to make a statement? You won't believe what this bug is capable of!

Why is the U.S. government urging users to update Windows?

In our previous story, we explained the devastating security hole found in numerous versions of Microsoft's Windows operating system. Like with the infamous WannaCry malware, this flaw (now called BlueKeep) allows a hacker to access a system called Remote Desktop Services -- a feature that normally allows users to access their computer remotely with special software.
When a hacker exploits BlueKeep, however, they gain access to the entire computer and all the data contained within it. That's why Microsoft released a number of patches to address the hole in each version of Windows affected by BlueKeep.
It appears, though, not everyone has been keen to download the patch and update their systems. That's why the NSA is making a stand regarding this security flaw -- with an urgent warning to Windows users about updating their computer. The security service even took to Twitter to spread the message as far as humanly possible.

How can I protect myself from BlueKeep on my Windows machine?

With the urgent need to update bearing down on Windows users, you might be feeling the pressure yourself to download the patch for your own computer. Depending on which operating system your machine is running, the steps to update may be different.
Thankfully, Microsoft is providing clear instructions to anyone interested in protecting their computers. We've summarized the following steps for our Windows users below:
On Windows 8, open the Start menu by pressing the Windows button on your keyboard, and then click on Store. Click on the Update Windows button once you've entered the store. From here, you'll be able to access the latest update.
On Windows 10, you can upgrade your system by going to Settings and clicking on Update & Security. On this screen, you can click Check for updates to see the newest version available for your computer.
If you're on an older version of Windows, this handy blog post from Microsoft contains links to the download files, as well as instructions on how to access and install files on your computer.
Like Microsoft and the NSA, we highly recommend you upgrade your system as soon as possible. With the threat of a malware epidemic looming large over PC users, any proactive defenses will likely be far more effective than just staying offline -- especially since this exploit can allow hackers to work their shady business without your knowledge.

As the saying goes: "Prevention is worth a pound of cure." Don't let your system get wrecked by this exploit. Patch it today, and you won't regret it when the next big bug makes its landing.