Google+ High Tech House Calls: Internet
Expert Computer Consulting for Homes and Small Businesses

Let there be hope...

Life has changed there is no doubt and we wanted to reach out to see how you are doing.

As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!

Computer Security

If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.

What can you do about it?

I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.

Now offering consultations to give you the best protection possible:


404.229.0839
carlthorne@hthcatlanta.com

Jack of All Trades, Master of Many

Jack of All Trades, and Master of Many

We provide technical support for:


Homes and small businesses

Windows and the Mac OS platform

iPhones and Android Smartphones

Wireless and wired networks

New device setup

Old device upgrade or repair

One-on-one training

Remote assistance


How To Stop Malware

Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Friday, December 11, 2020

New Computer Setup Checklist by Carl Thorne

 


New Computer Setup Checklist (Windows)

Create Microsoft Account for login and to use Microsoft Office

Adjust page file size

Update operating system

Update vendor specific software

Update Intel drivers

Update other software provided by vendor (video, photo editing, etc.…)

Install Microsoft Office

update Microsoft Office

Setup Outlook

Setup access to Gmail

Install Chrome and Firefox browsers

Log into Gmail account for Chrome browser

Install iTunes

Install cloud storage solutions (iCloud, DropBox, Google Drive, Microsoft OneDrive, etc.…)

Setup shortcuts on task bar and desktop

Remove unneeded files to free up space on computer

If standard hard drive, defragment it

If solid state drive, trim it

If solid state drive, install vendor administration software

Install Adobe Reader

Install Anti-Viral software

Install Malware Removal software

Set up power plan

Customize privacy setting for Windows

Remove bloatware from Microsoft and vendor

Install printers

Connect to client Wi Fi network

 ------------------------------------------------------------------------------------

New Computer Setup Checklist (Mac OS)

Create Microsoft Account for login and to use Microsoft Office

Update operating system

Update vendor specific software

Update other software provided by vendor (video, photo editing, etc.…)

Install Microsoft Office

update Microsoft Office

Setup Outlook

Setup access to Gmail

Install Chrome and Firefox browsers

Log into Gmail account for Chrome browser

Install iTunes

Install cloud storage solutions (iCloud, DropBox, Google Drive, Microsoft OneDrive, etc.…)

Setup shortcuts on task bar and desktop

Remove unneeded files to free up space on computer such as foreign language packs

Install Adobe Reader

Install Anti-Viral software

Install Malware Removal software

Set up power plan

Install printers

Connect to client Wi Fi network

 

 

 

 

Friday, June 19, 2020

Why Am I Connected to Wi-Fi But Not the Internet? by BENJ EDWARDS

It’s happened to all of us at some point. Your Wi-Fi signal is strong, but there’s no internet connectivity. That’s because Wi-Fi and the internet are two different things, and understanding the difference can help you troubleshoot future network problems.

How Is Wi-Fi Different from the Internet?

Wi-Fi is a registered trade name for a group of technologies that allow a device, such as a computer, smartphone, or game console, to wirelessly connect to a local area network (LAN) using a radio link. Wi-Fi replaces the need for a physical cable between a networked device and a router—a device that manages connections between all of the devices on the LAN.

The internet is a general name for hundreds of millions of smaller networks, such as LANs, linked together. Within these smaller networks are billions of devices connected via the TCP/IP protocols. These computers can be linked together using physical wires, optical cabling, radio links, or other technologies not yet devised.

So, when your device has a Wi-Fi connection, you are connected to a LAN. But the LAN you’re connected to may not necessarily be connected to the internet. That’s where the problem lies. Let’s take a closer look.

Understanding the Connection Problem

Here’s a very simplified network diagram. In it, your device is linked to a router via Wi-Fi, forming a local network, and your local network is successfully connected to the internet.

A network diagram showing a connection between a local network and The Internet

Sometimes, the link between your local network (managed by a router, hub, or modem) and the internet goes down. There could be a temporary problem with your ISP’s equipment, physical damage to cables that link you to the ISP’s network, or some other issue. In that case, you are still connected to the local network, but your local network is not connected to the internet.

A network diagram showing a broken link between a local network and The Internet

In this second case, your device may show a strong Wi-Fi connection or signal, but you have no internet connectivity.

What to Do When Your Internet Connection Is Down

When you have internet connection problems, first try restarting your device. If that doesn’t work, what you do next depends on where you are.

If you’re at home, you can try troubleshooting the router itself (by restarting that, for example), and if you are technically skilled enough, there are other steps you can take using your PC to troubleshoot your internet connection. If all else fails, call your ISP and report the problem.

Monday, May 11, 2020

Remote Support Primer by Carl Thorne



High Tech House Calls uses two different methods to connect to client computers remotely:
  1. Team Viewer
  2. Chrome Remote Desktop

I prefer the Chrome Remote Desktop application. The connection must be allowed by the client I am connecting to. There is a way that Team Viewer can be configured so that the Team View connection program is running all at times and the connecting remotely can be accomplished without the knowledge of the client. I consider this a huge security issues.

Team Viewer is used as a backup to Chrome Remote Desktop. To use Chrome Remote Desktop, you must have a Gmail account and the Chrome browser must be installed. Some clients may have privacy concerns with having a Gmail account.

Wednesday, April 22, 2020

Zoom security: Your meetings will be safe and secure if you do these 10 things By Charlie Osborne for Zero Day

As the novel coronavirus spread across the globe, the business landscape was forced to make a number of swift changes.
Lockdowns and social isolation measures, restricted travel, and the closure of firms not considered to be "essential" services proved to be a catalyst for home working, of which many of us were woefully unprepared to accommodate. 
At the time of writing, there are 1.9 million coronavirus cases worldwide. The United States, Spain, Italy, and France are the hardest hit. 
Stringent measures that prevent employees from going into offices have required many companies, large and small, to adopt remote and virtual alternatives to stop operations from grinding to a complete halt. 
Email and the use of Virtual Private Networks (VPNs) aren't enough; workers and management need to be able to hold meetings, too. 
There is a range of virtual conference solutions out there, including Skype, Microsoft Teams, BlueJeans, and GoToMeeting. (ZDNet's top enterprise picks can be accessed here).
Enter Zoom. 
A few weeks ago -- although it may seem like a lifetime -- Zoom was not a well-known virtual conference option in the enterprise space. Almost overnight, however, it seemed everyone had adopted the platform as the go-to option to hold lessons, business meetings, and sensitive discussions.
Over 2020, the company has added 2.2 million new monthly users, outstripping the entire 2019 new user base of 1.19 million.
Zoom's explosive surge in popularity, however, has created security ramifications. You could almost feel sorry for the company -- with its unexpected growth, the spotlight has also been shone on Zoom's security practices, some of which have fallen short of modern expectations.  
In July 2019, a researcher disclosed a severe security issue in which Zoom opened up webcams to persistent spying and compromise; a bug that stayed in place even if the software was uninstalled due to a leftover local web server.
Now, more issues have been uncovered, including security flaws in the Windows 10 build of the platform's software, iPhone user data being sent to Facebook whether or not they had an account with the social media network, and a bug in URL generation that permitted attackers to eavesdrop on private conferences. 
Zoom has also acknowledged that the company's "end to end encryption" marketing practices masked the truth. AES-256 encryption was meant to be implemented to keep video calls secure, but instead, a substandard AES-128 key in ECB mode was actually in use. Encryption remains a sticking point that the company insists it is working on. 
Google, SpaceX, the New York City Department of Education, the Taiwanese, Australian, and German governments, to name but a few agencies, have banned employees from using the software until Zoom's security posture improves. 
Zoom has tried to clean up its act, and quickly. To try and prevent Zoom-bombing -- the hijack of meetings and a practice the US Department of Justice recently deemed a crime -- meeting ID numbers will no longer be shown in address bars. 
A dedicated security tab has also been introduced to streamline the process of changing security settings for hosts and meeting attendees. 
Zoom has also promised an upcoming change to where data is stored. Starting April 18, paid subscribers can opt-in or out of specific data center regions. China, too, has been geofenced to stop information outside of the country from being transferred to the area. 
We've covered the basics and some useful tips for experienced users in a guide here. To maintain the security of your next meeting, our recommendations are below:

1. PASSWORD PROTECT YOUR MEETINGS

The simplest way to prevent unwanted attendees and hijacking is to set a password for your meeting. Passwords can be set at the individual meeting, user, group, or account level for all sessions. In order to do so, first sign in with your account at the Zoom web portal. If you want to set up a password at the individual meeting level, head straight over to the "Settings" tab and enable "Require a password when scheduling new meetings", which will ensure a password will be generated when a meeting is scheduled. All participants require the password to join the meeting. Subscription holders can also choose to go into "Group Management" to require that everyone follows the same password practices. 

2. AUTHENTICATE USERS

When creating a new event, you should choose to only allow signed-in users to participate. 

3. JOIN BEFORE HOST

Do not allow others to join a meeting before you, as the host, have arrived. You can enforce this setting for a group under "Account Settings." 

4. LOCK DOWN YOUR MEETING

Once a session has begun, head over to the "Manage Participants" tab, click "More," and choose to "lock" your meeting as soon as every expected participant has arrived. This will prevent others from joining even if meeting IDs or access details have been leaked. 

5. TURN OFF PARTICIPANT SCREEN SHARING

No-one wants to see pornographic material shared by a Zoom bomber, and so disabling the ability for meeting attendees to share their screens is worthwhile. This option can be accessed from the new "Security" tab in active sessions. 

6. USE A RANDOMLY-GENERATED ID

You should not use your personal meeting ID if possible, as this could pave the way for pranksters or attackers that know it to disrupt online sessions. Instead, choose a randomly generated ID for meetings when creating a new event. In addition, you should not share your personal ID publicly. 

7. USE WAITING ROOMS

The Waiting Room feature is a way to screen participants before they are allowed to enter a meeting. While legitimately useful for purposes including interviews or virtual office hours, this also gives hosts greater control over session security.

8. AVOID FILE SHARING

Be careful with the file-sharing feature of meetings, especially if users that you don't recognize are sending content across, as it may be malicious. Instead, share material using a trusted service such as Box or Google Drive. At the time of writing, Zoom has disabled this feature anyway due to a "potential security vulnerability."

9. REMOVE NUISANCE ATTENDEES

If you find that someone is disrupting a meeting, you can kick them out under the "Participants" tab. Hover over the name, click "More," and remove them. You can also make sure they cannot rejoin by disabling "Allow Removed Participants to Rejoin" under the "Settings: Meetings - Basic" tab.

10. CHECK FOR UPDATES

 As security issues crop up and patches are deployed or functions are disabled, you should make sure you have the latest build. In order to check, open the desktop application, click on your profile in the top-right, and select "Check for updates."

Thursday, March 26, 2020

Remote Support and Curb Service

High Tech House Calls Announces Remote Support and Curb Service For Computer and Network Issues


Remote support is now available to address any computer issue. You download install a program that allows us to connect to your computer remotely. 

For more involved problems, we can pick up from computer from your front door. Once all issues have been resolved in our lab, your computer is sanitized with a CDC approved disinfectant and return to you with a minimum of human interaction.


Sunday, February 23, 2020

FBI recommends passphrases over password complexity By Catalin Cimpanu for Zero Day

For more than a decade now, security experts have had discussions about what's the best way of choosing passwords for online accounts.
There's one camp that argues for password complexity by adding numbers, uppercase letters, and special characters, and then there's the other camp, arguing for password length by making passwords longer.
This week, in its weekly tech advice column known as Tech Tuesday, the FBI Portland office positioned itself on the side of longer passwords.
"Instead of using a short, complex password that is hard to remember, consider using a longer passphrase," the FBI said.
"This involves combining multiple words into a long string of at least 15 characters," it added. "The extra length of a passphrase makes it harder to crack while also making it easier for you to remember."

PASSPHRASES ARE HARDER TO CRACK

ADVERTISING
The idea behind the FBI's advice is that a longer password, even if relying on simpler words and no special characters, will take longer to crack and require more computational resources.
Even if hackers steal your encrypted password from a hacked company, they won't have the computing power and time needed to crack the password.
Academic research published in 2015 supports this argument, explaining that "the effect of increasing the length dwarfs the effect of extending the alphabet [adding complexity]."
The FBI's advice echoes a now-infamous XKCD webcomic that made the concept of passphrases-over-passwords widely known among internet users.
password-strength.png
Image: XKCD.com/936/
Today, there are web services that will help you generate passphrases in the XKCD style.
There are also open-source libraries that developers can use to add an auto-generate passphrase function in their apps.
Furthermore, NIST password recommendations issued in 2017 have also urged websites and web services to accommodate longer password fields of up to 64 characters for this same reason -- to let users choose passphrases instead of short passwords.
The same NIST guideline also recommended using passphrases over passwords when possible, a recommendation also picked up in a DHS security tip issued in November 2019, also urging users to give passphrases a try.
CorrectHorseBatteryStaple!

Monday, February 17, 2020

Reader question, answered: If I have https, do I need a VPN? By David Gewirtz

I recently got another letter from a reader that can serve as a great foundation for an article. Our reader asks:
Is not the encryption provided by my browser on the data I exchange with an https: site sufficient to protect the data? My understanding has been that it is. If so, a VPN is not needed for this purpose. Furthermore if so, it's perfectly safe for me to exchange private data (say, account info with my bank or stock broker) over any public, open network.
Of course, VPN's provide several other valuable functions, but as I understand it they do NOT provide any additional security to the actual data exchanged. VPN providers would likely not want to highlight this.
There's a lot to unpack in our reader's letter. Let's dig into each question/statement one-by-one.

EXECUTIVE GUIDE

VPN services: The ultimate guide to protecting your data on the internet
Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet.

PERFECTLY SAFE

Separate from the technical questions, our reader makes an assertion I think deserves an immediate and somewhat forceful correction. Our reader states:
It's perfectly safe for me to exchange private data (say, account info with my bank or stock broker) over any public, open network [using https].
Let's get this out of the way: It is never, ever, in any way, ever "perfectly safe" to exchange data over the internet, whether via a public, open network (shudder) or even from your home or office.
If reading ZDNet regularly tells you anything, it's that there are security breaches and security flaws throughout our networks that occur with constant, never-ending, and pretty much overwhelming regularity.
ADVERTISING
I'm not going to go into either all the breaches or even all the ways message traffic can be intercepted while in motion. Suffice to say, our data is never "perfectly safe," and so we must always take action to protect ourselves, our data, and by extension, our financial and physical security.
Just because you're not paranoid doesn't mean they're not out to get you.
Because of this reality, we often practice a belt-and-suspenders approach to all of our security practices. That means, even though we may have one level of security, it's never enough. That method of security may be cracked or buggy, or there may be some other reason it's leaky. It's always best to have multiple approaches to keeping safe.

IS HTTPS ENOUGH?

Let's start with what https does. It secures (through encryption) an http connection between a website and your browser. That means that the contents of what you're transmitting are unlikely to be read or changed between your browser and the website.
But you are not in control of this connection. It's up to the website operator (and any associated services it calls on) to be sure to properly set up and operate the secure connection.
Not all websites use https, so anything you do on an unencrypted connection is visible. What's actually of far greater concern with unencrypted traffic is that an attacker (usually called a Man in the Middle attack) can modify what is sent, injecting tracking bits -- or worse, malware -- into the stream.
The most visible of these are Great Cannon-style attacks that inject JavaScript and HTML payloads into unprotected web traffic. These payloads then conduct denial of service attacks (hence: cannon) against targets of interest to the hackers.
No one wants their web browser unwittingly turned into a denial of service weapon.
Another thing to consider about https encryption is it only encrypts your web traffic. Any other internet activity is not touched by the https protocol and therefore requires its own encryption. Examples of other activity include web-based video games that might send your account, password, and even credit card information in the clear; an e-mail program; or even a locally run accounting program.
So, yes, https does help. But it's only one security accessory in a belts-and-suspenders-security ensemble.

WIRELESS ROUTER ENCRYPTION

There's another encryption element that sometimes comes into the chain. That's the Wi-Fi encryption you get when you use a Wi-Fi router with a password.
Of course, here's another point of risk: You have no way of telling if the Wi-Fi router has been spoofed, and you're really sending all your data through a pineapple or some other data spoofing device.

ON CNET

Best VPN services
The CNET VPN Directory lists many of the most popular VPN Services available.

VPN ENCRYPTION

This statement by our reader is a little tough to unpack: "VPN's provide several other valuable functions, but as I understand it they do NOT provide any additional security to the actual data exchanged."
I think what our reader is saying that VPNs provide other services, but they don't provide any other data security services. But VPNs do. They also encrypt data.
VPNs absolutely do provide data security services. Packets are encrypted from the local browser to the VPN service provider. All packets.
Now, it's important to understand where this encryption helps and where it doesn't. If you're on your web browser in a coffee shop and you're talking to your bank's web interface, your traffic is encrypted in your browser, goes from your device to a local router, to the local ISP, across a whole bunch of hops, and then to your bank, where it's decrypted.
Https will encrypt that entire pipe, but only if everything is set up correctly.
Now, if you're using a VPN (with https or not), your data is encrypted on your computer. If you're using https, the https-encrypted data is encrypted again by the VPN. That data then travels over the usual hops to a VPN server, is decrypted once (the VPN's layer is removed), and sent on to your bank.
The benefit of VPN encryption is from your device to the VPN provider on the internet. This protects nearly all coffee shops, airports, and hotel lurkers who might try to snag your data in motion.

THINKING ABOUT SECURITY

When it comes to thinking about mobile security, it's important to keep in mind the endpoints and what's being encrypted. Let's look at the last three we discussed:
  • https: Encrypts web traffic between the web browser and the webserver.
  • Wi-Fi: Encrypts all network traffic between the mobile device and the Wi-Fi router in your local coffee shop, hotel, airport, etc.
  • VPN: Encrypts all network traffic between your mobile device and the VPN service provider on the internet.
Can you see how these different elements encrypt and decrypt at different points? Also, keep in mind that any one (or more) of these security services may be compromised. Plus, of course, there are other levels of encryption, like encrypted SSL and TLS tunnels between websites and payment providers.
By using multiple layers of encryption, each unable to see into the other, you're reducing the chance that any one compromised network will compromise you.

OTHER VPN SERVICES

As we've discussed in our various VPN reviews and guides, different commercial VPN services provide different added value. Some mix in anti-virus. Some mix in some identity protection services.
But all VPNs provide another very important security service: IP address obfuscation.
If you use a VPN, you get an IP address from the VPN provider. This is the IP address recorded by various services on the web. This allows you to protect your identity in terms of where you're located, what ISP you're using, or even what country you're in.
For some of us, this is a less critical service. For others, especially those dealing with stalking or other personal protection worries, VPN location protection services are essential.

BOTTOM LINE

So, in answering my reader's question, do they need a VPN? It's up to them. But is https the be-all and end-all of internet security? Oh, hell no.
What tools do you use to protect your security? Let me know in the comments below.

Thursday, February 13, 2020

What Internet Speed Do You Need for YouTube TV, AT&T TV NOW, Hulu, Netflix, & More? We Take a Look…by Luke Bouma

One of the most common questions we get is what Internet speed do you need for cord cutting? My number one tip: Don’t ask your Internet service provider. They will try to get you to buy the fastest speed possible. My suggestion is you can always get faster Internet as providers are always willing to upgrade you. Getting them to downgrade you to a slower plan is much harder. Hopefully, this post helps you pick the right speed without overpaying.
What speed do you need for a live TV streaming service like Sling TV, AT&T TV NOW, Hulu, and others?
Thankfully, Sling TV gives some guidance on what Internet speeds you should have to stream Sling TV. The following are the recommended speeds according to Sling TV’s Help Center.
  • Constant speed of 3.0 Megabits per second or more: Streaming video content on portable devices such as tablets and phones.
  • Constant speed of 5.0 Megabits per second or more: Single stream of video content on a TV, PC, or Mac.
  • Constant speed of 25 Megabits per second or more: Recommended for households that maintain Internet use on multiple devices.
What speed do you need for an HD stream?
Let’s look at what Netflix requires per HD video stream. According to the Netflix website, you need 5 Mbps down for each HD stream, which means if you want to stream two HD streams at once you need 10 Mbps.
The following is what Hulu recommends for each stream:
  • 720p HD: 3 Mbps
  • 1080p HD: 6 Mbps
  • 4K Ultra HD: 13 Mbps
So, if you want to stream two 1080p streams at the same time on Hulu you would need 12 Mbps down.
What about other web needs?
Surfing the web on sites such as Facebook can work on very slow connections. I would not worry about considering basic daily web surfing when looking at what Internet speed to get.
What speed do you really need?
Everyone has different needs. A single person living alone who only streams one stream at a time has a lower speed need than a family of six.
My suggestion is to add up how many streams you want at once and multiply it by 5 and then double it. So, if you want two HD streams at once that would be 10 Mbps down, but I recommend doubling that and getting 20 Mbps down so you can stream and surf without issues. (The speed you pay for may not be the speed you get.)
Again, add up the number of streams you want at the same time. Multiply by 5. After you get that number multiply it by 2. That should give you a good rule of thumb on what speed you need. (Remember many services limit the number of streams you can have at once.)
What if you are still having buffering issues?
If you are meeting our recommended speeds but are still seeing buffering and other streaming issues, we can help. Typically, they are caused by issues in your home network or issues at the streaming service. Check out our guide on ways to fix buffering and other streaming issues for help.
Lastly
Fast Internet speeds are great! Just don’t break the bank paying for a faster speed than you need.
Please follow us on Facebook and Twitter for more news, tips, and reviews. Need cord cutting tech support? Join our Cord Cutting Tech Support Facebook Group for help.