iPad Virus and Hijacking, Things You Need To Know #Calgary

I remember 20 years ago, the old IBM Aptiva with a 486 processor was the fastest computer out there, until it was infected with the AntiCMOS.a virus which ran a boot code and wiped out your CMOS, killing your computer.

Fast forward 20 years, and we have iPads, iPhones, eBook readers and the truly digital world of advertising. We now have no types of infections called adware and malware. Most of the time malware hides on your computer and collects your information, while adware pushes ad’s to you to increase add revenue for some third parties. Using an iPad or iPhone to browse the internet used to be a safe way to steer clear of these infections.

90% of our customers have at least 2 – 3 iPhones and iPads in their homes, and people who create this malware and adware are beginning to develop new forms of infections for these devices. Which leads me to introduce you to: iPad Browser Hijacking and How to Remove This iPad Infection

How to Tell if Your iPad has been Hijacked:

If your iPad is infected with a hijacker and you open Safari you will be quickly prompted with a pop up dialog asking you to pay a ransom to get your browser back. You can click close, or close your browser as many times as you want but this hijack will still be there when you reopen Safari.

How to Remove This iPad Virus

Removing this pop up dialogue is fairly simple.

1. Press the Home button on your iPad

2. Open you Settings application

3. Under the General section, turn on Airplane Mode, this mode will disable your wireless and cellular connection

4. Press the Home button, and open Safari

5. Safari will try to load the last page that was open, in our case it was the iPad virus, because there is no internet connection the page won’t load. Now all you have to do is browse to another website like google.ca, rmcr.ca or select a website from your bookmarks. Let the page try to load, you will see a message informing you that your internet connection is bad.

6. Press the Home button once more, and open your Settings application

7. Under the General section, turn off Airplane Mode, this will re-enable your wireless and cellular connections.

8. Press the Home button, and open up Safari, you should now be able to browse the internet hassle free once more.

Should I Scan My iPad For Viruses?

No, as long as your iPad is not jail broken this is not necessary. The reason for this is Apple only allows you to download programs through the App Store, this is a controlled environment and is also virus free. The iPad and iPhones are designed and built to only accept and run applications from the App Store.

I Need More Help

Worse case scenario we recommending bring in your device for a free consultation, if the above steps didn’t do the trick, or if this is constantly occurring this might be a bigger issue. JH Computer Solutions Inc. offers iPhone and iPad support and repairs to Calgary and area. You can contact us by phone: 403-875-7352  WWW.JHComputerSolutionsinc.com

Posted in Uncategorized | 1 Comment

Is Your iMac Hard Drive Failing?

Chances are if you have an Late 2012 iMac or older then your hard drive is failing, or is about to fail.

Why do we say this?

Hard Drives have a life span of 3-4years before bad sectors start to show up, bad sectors turn into lost files, which turn into corrupt partitions, and eventually a fully failed hard drive.

Last week, we had two iMac Late 2009 models that were running slower than normal, both customers had upgraded the RAM themselves thinking that was the problem, which it wasn’t. The reason your iMac slows down, rather than the typical Windows computer crashing is Apples HFS file system is much more efficient in managing bad sectors, and repairing corrupt files. This is why your iMac slows down, your hard drive is trying to do to much at once and it can’t.

How to check your iMac hard drive for errors:

1. Turn on your iMac

2. Open Finder and select Applications

3. Browse to Utilities and double-click Disk Utility

4. In the left pane you should see Macintosh HD in the list, select this drive

5. On the right side of the disk utility window you should see a Verify Disk button, click it

The Disk Utility will scan your hard drive for any issues, it will report any errors here as well, and direct you how to repair them. If you do see errors, and there is less than a few you should be able to repair them by select Repair Disk. Using this method will only buy you time, if errors are listed, you are only buying time and we highly recommend creating a time machine backup to ensure you do not loose any information.

failing hard drive

I See Errors in the Disk Utility What Do I Do?

As mentioned above, back up your hard drive sooner than later and plan to replace it. The keyword here is PLAN you now have time to bring your computer into an Apple repair shop to get properly diagnosed. Most repair centres can provide you with a quote to replace the hard drive within a couple hours.

Why repair and not replace?

We’ll its simple, your iMac is still good, unless you create movies, or edit photographs your iMac does everything you need it to. A hard drive replacement should only cost between $200 and $400 depending on the type of Hard Drive you choose. We here at JH Computer Solutions Inc. like to recommend a Solid State Drive which are extremely fast and reliable when compared to the typical hard drive. Replacing your iMac can be expensive, most iMacs today can cost upwards of $1500 just like your current iMac, they will do everything you’ll want it to do.

Posted in Uncategorized | Leave a comment

How to Recover Deleted Photos from Samsung Galaxy S6/S5/S4/Note? #deletedphoto

“I accidentally deleted the full contents of the “Camera” folder on my Samsung Galaxy S3.
All the photos and video that I had taken in the last 2 months were deleted. ( I know I should have backed them up…but I was planning to do it today…not thinking I was going to do something stupid last night!)
I have a hunch that the files might be able to be restored…possibly using some sort of restore/recovery software.How can I recovery deleted photos on my Samsung Galaxy S3 smart phone directly?”

Are you one of the users using Samsung Galaxy phone? I am use Samsung Galaxy S4 phones.I experienced a similar problem, I have used a android data recovery software to restore deleted photos on my Samsung Galaxy S4 successfully, and now I share with everyone, I hope this android data recovery can help a friend in need. As a result mang users now are complaining about losing data on their Samsung Glaxy S4 and are eager to find a way to recover data from Samsung phone.

Why is It Possible to Recover Deleted Photos from Samsung Galaxy phone
When a file is deleted from your Samsung Galaxy phone, it is NOT really deleted. It is simply removed from the file directory in the folder. Even though you can no longer see the file in the folder, its contents still exist 100% intact at this point. As long as the file remains there, you can easily restore photos in its entirety. As a result retrieve photos from Samsung Galaxy is possible if you have a software tool.
Tips: It works well with almost all Samsung devices,like Samsung Galaxy S5/S4/S3/S2, Samsung Galaxy Note 4/3/2 and Galaxy Ace,ect.

I want to share with you a way to do android phone data recovery with a professional Android phone data recovery program. Besides recovering photos from Samsung Galaxy mobile phone,but also can help you recover text messages, contacts, music, videos, etc. for your memory card, hard drive and other removable devices.Now let’s see how to recover Samsung lost data with the help of this android data recovery software.

How to Recover Photos from Samsung Galaxy?

Step1. Download Samsung Data Recovery and install it.
Step2. Select the target device where you want to recover your data from and click “Scan” button.
Step3. Preview the and select the files you want to recover. This provide a lot convenience for users who want to do Samsung Galaxy photo recovery
Step4. Click “Recover” button to save the recovered photos on your computer.

After these steps you could successfully finish Samsung Galaxy data recovery. Like I said it is quite easy, right?
Tips: You can use this Android Data Transfer software to copy those restored photos back to your Samsung Galaxy phone directly.

Posted in Uncategorized | Leave a comment

How To: Find Your Wi-Fi Password in Windows 8.1 #wifi #password

wifi-featureOnce you’ve successfully connected to your own wi-fi network it isn’t generally necessary to connect again or remember the password. However, I’m sure many of you will have encountered the situation where visitors want to access your wi-fi and, even though your computer still knows what the password is two or three years later, you’ve completely forgotten it. You’re pretty sure you wrote it down somewhere but the prospect of locating that particular piece of paper is looking more and more bleak.

Many of today’s modern routers come with the wi-fi password printed on an affixed label but, even under these circumstances; if you change the password (and it is a good idea to change your wi-fi password periodically) or the label detaches and gets lost, or becomes damaged and unreadable, you will need an alternative means of identifying the password.

There are a couple of ways this can be achieved. More savvy users who are familiar with accessing and navigating the router’s configuration utility can go to the wireless settings and find the password there. However, the simplest method for users who are not familiar or confident with the first option, is to locate the password from within their computer’s own settings.

These steps are fairly common knowledge for earlier operating systems so here’s the run down for Windows 8.1– you’ll need to be on a machine connected to your local wi-fi network:

  • Go to Control Panel and click Network and Sharing Center:

control panel - network and sharing

  • In the Network and Sharing window, click on the name of your current wi-fi network…

network and sharing center

  • … then, in the ensuing Wi-Fi Status window, click on the Wireless Properties button:

wi-fi status

  • In the Wi-Fi Properties window, open the “Security” Tab and you’ll see your Network security key (password) represented by a series of dots. Simply enable (click) the Show charactersoption to view the actual password:

wi-fi properties

Posted in Uncategorized | Leave a comment

Find/Delete large files wasting space for Windows users. #HarddriveSpace #computertuneup

Find/Delete large files wasting space A handy tool called WinDirStat (Windows Directory Statistics) can be used to easily find which files and folders are taking up the most space on your drive. From there, you can delete them and open up a ton of storage space.

Posted in Uncategorized | Leave a comment

How to Handle Liquid Damage on a MacBook Pro

It doesn’t matter what you spill tea, coffee, soda, or just plain water on your Macbook Pro the end result is the same. Most people give the Macbook a shake, set it on its side and watch the liquid slowly drain, and then start using their Macbook the next day.

That is the wrong way to handle the situation, and will most likely only buy you time till imminent failure occurs.

Here is what to do in the event you accidentally spill something on your Macbook:

Step 1: Turn off your Macbook by holding the power button down for several seconds

Step 2: Grab some paper towels, we prefer Bounty, as it is thick and absorbent. You will also want to grab a small Phillips screwdriver ( the “+” one)

Step 3: Turn your Macbook upside down and remove the 10 screws from the bottom, as show in the image here


Step 4: Once the screws are removed, you should be able to remove the back cover by grabbing an edge and just pulling up, you may have to tug on it a bit as it has been screwed down for a while.

Step 5: Dry off the underside of the Macbooks Bottom case with your preferred paper towel, and gently pat down any excess water on the Logic Board, Battery and Optical Drive.

We highly recommend disconnecting the battery, as you don’t want any current running through the logic board so the liquid doesn’t short anything out.  Note: Electrical shorts and corrosion is what will kill the Macbook after liquid damage.

Step 6: With the cover off, and any noticeable liquid absorbed by your ultra absorbent paper towels, you’ll see a larger black connected just below the battery. See the image below for what exactly you are looking for. This is the battery connector, and it just pulls straight up.


Step 7: Remove your hard drive, this can be done by removing the two screws circled below and pulling up on the little black strip depicted by the arrow below.


Lean the hard drive on the side, and remove any liquid underneath and on the bottom of the drive with your preferred paper towel.

Step 8: Wait 48 hours, it seems like forever but it really isn’t, in 48hrs the rest of the liquid should be evaporated, now just follow the steps in reverse to reassemble.

Most of the time, following these steps will work, and you should be able to use your Macbook without any problems, however depending on the liquid e.g. soda pop, you may have some sugar buildup underneath the logic board, or keyboard, which may or may not affect your Macbook.

As always, it is recommended to bring your Macbook into your local mac dealer to give it a good once over, and to ensure nothing else was further damaged.

Posted in Uncategorized | Leave a comment

The Worst Password Ever Created

People create some very bad passwords. In the list of the most popular passwords of 2014, all of them are terrible. Just look at the top 10:

  1. 123456
  2. password
  3. 12345
  4. 12345678
  5. Qwerty
  6. 123456789
  7. 1234
  8. baseball
  9. dragon
  10. football

But these don’t hold a candle to the very worst password. What is the worst password ever created?

The answer is:

The Social Security number

This is the worst password ever created, and it was made by the U.S. government and various organizations and businesses that use it.

The Social Security number (SSN) is a password because it continues to be used to authenticate identity. If you know your SSN, the assumption goes, then you must be you.

This use of the SSN is a password. As a password, the SSN is just a nine-digit number, no better than the 6th most popular password: 123456789. Here it is as an SSN: 123-45-6789. Just having numbers in one’s password is not adequate, as good passwords also need upper and lower case letters as well as special characters — or else they can be readily cracked.

Armed with your SSN, identity thieves can gain access to various accounts you have, open up new accounts in your name, and engage in fraudulent transactions and attribute them to you. All of this is possible because they have in essence obtained your password — the SSN.

Anyone can find out your SSN. It is often on various public documents; it is in countless record systems; and it has been involved in countless data breaches. It’s perfectly legal for someone to sell your SSN — and companies do. Anyone can buy your SSN online.

But what makes an SSN a worse password than, say, the password “123”? Why is the SSN the worst password ever?

There are two reasons:

1. The SSN is something that identity thieves know is used as a password, and they can readily find people’s SSN. At least with the password 123, others don’t know that it is your password.

2. The SSN is hard to change. With other passwords, if they are compromised, you can quickly change them. Not so with a SSN, which is a tremendous time-consuming hassle to change. As Jon Neiditz aptly notes, whenever there’s a data breach involving your SSN, you now have a potentially life-long increased risk because SSNs are so difficult to change.

Why is the SSN still being used as a password? It shouldn’t be. The SSN was created in 1936 as part of the Social Security System. It wasn’t designed to be a password. It was designed to be used in conjunction with a person’s name to make sure that information about people with the same name wouldn’t get mixed up.

Over time, businesses and government agencies began to use the SSN to authenticate identity.

The irony is that SSNs were designed to be part of a user name, and now they’re being used as a password!

There are ample tools in the law to stop the use of SSNs as passwords. I wrote a while ago how the FTC already has the legal authority to halt the use of SSNs as passwords. And certainly the government can simply pass a law banning such a use. There were proposals to do this more than 40 years ago.

Quite simply: The SSN should never be used as a password to authenticate identity. Never. Such a use is the paragon of inadequate data security.

So thanks to the government, which has given all of us the worst password ever. We can’t change it. And the government won’t protect us by limiting its use.

* * * *

Daniel J. Solove is the John Marshall Harlan Research Professor of Law at George Washington University Law School, the founder of TeachPrivacy, a privacy/data security training company, and a Senior Policy Advisor at Hogan Lovells. Along with Paul Schwartz, Solove is a Reporter on the American Law Institute’s Restatement Third, Information Privacy Principles. He is the author of 9 books includingUnderstanding Privacy and more than 50 articles. Follow Professor Solove on Twitter @DanielSolove.

Posted in Uncategorized | Leave a comment