17876 US Hwy 18 Apple Valley, CA 92307


All posts in Our News

What You Should Know About the Latest Windows 10 Update | Victorville Computers

What You Should Know About the Latest Windows 10 Update

The first major Windows 10 update of 2018 started rolling out in late April with an interesting name change announced by Microsoft. Many computer users were expecting to download and install the Windows 10 Spring Creators Update; however, Microsoft decided to change the name to Windows 10 April 2018 Update. The reason for the name change is not officially known; there was some speculation about this update not being as feature-rich as the 2017 Fall Creators Update, however, this does not seem to be the case.

What Windows 10 users should know about the April 2018 Update is that it should not be ignored. If your desktop, laptop or tablet has been getting regular updates without major issues, there is no reason why you should skip this one. To be on the safe side, here are a few things you can do to prepare your system:

File or System Backup

If you do not already have a backup routine in place, this will be a perfect time to set one up. Forget about backing up to a partition in your hard drive; your important files should be backed up to a secure cloud folder or to an external drive. If you navigate to the Settings menu of Windows 10, you will find a guided backup method within the Update & Security option. To be on the safe side, you can also create a full system image; our Windows technicians at A Plus Computers can help you with this process.

Make Room for the New Update

Windows 10 updates tend to be pretty large and are known to install in systems where there is not a lot of space left. The average size of the Windows 10 Anniversary Update, for example, was about 3.5Gb. To clear up some drive space, you can use the Windows 10 Disk Cleanup utility; if this still leaves little room for the update, your computer may need to be optimized, which is something we can certainly help you with.

Disconnect External Devices

To ensure that the update process is as streamlined and uncomplicated as possible, you may want to disconnect printers, scanners, cameras, external drives, game controllers, and all other peripherals; just be sure to reconnect them after the process is successful so that the right drivers can be installed.

In some cases, a Windows update may result in your system becoming unstable. If this happens to you, we can help you revert the process and troubleshoot the issue for a proper installation.
Laptops and the Risk of "Evil Maid" Attacks | Victorville Computer Repair

Laptops and the Risk of “Evil Maid” Attacks

In computer security circles, there is a growing consensus about the growing complexity of modern exploits and vectors of attack. There was a time when IT security experts could easily determine or detect if someone had tampered with a laptop; however, the sophisticated threats in use these days make this determination more difficult, particularly in the case of “evil maid” attacks.

Be Aware of “Evil Maid” Attacks

When laptops are physically tampered with in settings such as hotel rooms and airports, they are said to have been breached by an “evil maid.” These situations are more likely to happen in hotels where laptops are left unattended for a few hours; other settings for evil maid attacks would be at airports and during conferences. The attackers in these cases will gain physical access to a laptop by posing as housekeeping staff, airport security personnel or conference attendees.

Evil maid attacks are not random; they are generally sophisticated and expensive activities that seek to extract high-profile information from the laptops carried by journalists, executives, attorneys, activists, and politicians.

In a recent article published by The Intercept, a website that specializes in activism, the disclosure of secret information and leaks, tech journalist Micah Lee explained how he set up a “honeypot” laptop to invite evil maid attacks at hotel rooms and airports over two years. Using various detection tools, Mr. Lee came to a few conclusions:

  • First of all, he could not determine with absolute certainty if his laptop was compromised.
  • Second, he determined that full disk encryption is one of the best protections against potential evil maid attacks.
  • Finally, laptop users who handle extremely sensitive information may want to use secure operating systems that boot from USB drives such as The Amnesic Incognito Live System, known as Tails, or Whonix.

When a clever evil maid attacker realizes that a laptop has full disk encryption, he or she will still have at least one more software or hardware exploits to apply so that the system can be compromised the next time the laptop is accessed.

Protection Against Laptop Tampering

If you want to learn more about full disk encryption and securing data stored on your laptop when you travel, contact A Plus Computers in Apple Valley. With a solid system configuration that includes encryption, VPN, two-factor authentication, biometrics, or even a secure operating system such as Tails, your data will be safer against evil maid attacks.

Recycling Entrepreneur Sentenced to Prison in Windows Licensing Case

Recycling Entrepreneur Sentenced to Prison in Windows Licensing Case

A businessman engaged in the recycling of old computers has been sentenced to 15 years in prison for selling CDs intended to restore computers to their factory settings. Eric Lundgren commissioned a CD and software factory in China to manufacture 28,000 recovery CDs that often come with desktop systems manufactured by Dell.

Lundgren planned to sell recovery CDs to computer repair shops in Florida for a profit of about $0.25 per sale. The software tools loaded in each of these CDs can usually be downloaded from websites operated by Dell and Microsoft; in most cases, they include a copy of the Windows operating system as well as data rescue utilities; in all cases, computer users still require to input the product activation code that came with the original system.

Were Lundgren’s Actions Illegal?

Federal prosecutors and Microsoft argued that the value of each CD was almost $300; however, these discs are normally provided for free if the originals were thrown away as long as the system is still under warranty. Lundgren argued that he did not try to profit from piracy; instead, his intention was ostensibly to offer computer users an affordable and convenient way to repair their systems, thus reducing the ongoing rate of electronic waste, which happens to be his entrepreneurial focus.

Electronic waste is a problematic aspect of modern life. The internet revolution and the high demand for new consumer electronic devices have resulted in the issue known as e-waste, which is estimated to produce almost 10 tons of discarded items each year. There are several factors that worsen e-waste, and one of them happens to be computer owners who are not aware of the range of repair options available to them.

Without proper maintenance, desktops and laptops will eventually present issues that get in the way of optimal performance. Eventually, computer systems may become seemingly inoperable, and this is when the problem of e-waste starts; with so many computing devices found at store shelves for reasonable prices, it is very tempting to buy new systems instead of repairing existing ones.

As metric tons of e-waste continue to accumulate in landfills around the world, it is important to support efforts to reduce this accumulation. If your malfunctioning computer system is only a couple of years old, think about repairs and upgrades before throwing it away. At A Plus Computers in Apple Valley, our technicians are skilled in recovering data and restoring systems to their factory settings; contact our shop for more information.

How to Tell When You've Been Hacked | High Desert Computer Repairs

How to Tell When You’ve Been Hacked

Ransomware attacks, one of the latest trends in cybercrime, are not subtle at all. Hackers who intrude upon networks for the purpose of infecting them with ransomware make it a point of letting their victims know that their data has been compromised and that it could be destroyed unless a ransom payment is made.

Most cybercrime attacks are designed to be surreptitious. Ransomware is an exception based on what the hackers intend to achieve; in fact, a new ransomware strain detected by computer security researchers in late March actually used Star Trek imagery as part of the ransom message. Aside from ransomware, website defacement, hacktivism, and cyber vandalism, malicious cyber attacks are meant to be silent.

When your antivirus program notifies you that a threat has been neutralized, this means that a cybercrime incident was averted. Hackers are constantly working on ways to circumvent detection; if a computer virus or some other malware infects your system, you should not automatically assume that your antivirus has failed you. In many cases, the attack may have originated externally, or a change in your device’s configuration may be to blame. With this in mind, here are some red flags that may indicate a cyber attack:

Strange Purchase Transactions

Hackers are increasing their attacks on networks where they can access personal financial records; some examples include banks and online retail stores. If you receive an email notification alerting of a credit or debit card purchase that you did not make, this could be a sign of an external attack.

Your System Drastically Slows Down

Cryptocurrency miner attacks are on the rise; cybercrime groups have been infecting systems with malware designed to take advantage of computing and broadband resources for the purpose of mining digital currencies such as Monero, Dash, Ripple, and Bitcoin. If your Windows 10 Task Manager shows that CPU utilization is at more than 50 percent when you do not have any programs running, there is a chance that a malicious process could be hijacking system resources to mine cryptocurrency or to spread malware.

Sudden Shutdown or Restart Routines

Personal computing devices can be expected to suddenly shut down or restart from time to time. If this happens once or twice every couple of months, you should not be concerned. If it happens weekly or daily, this could be mean that malware is taking over your system.

If you notice any of the red flags listed herein, there is a chance that your system or online accounts have been compromised. Contact the security technicians at A Plus Computers in Apple Valley to learn more about keeping your computing devices safe.
GTA V and The Rise of Custom Gaming PCs | Apple Valley Computer Repair

GTA V and The Rise of Custom Gaming PCs

The latest chapter in the Grand Theft Auto franchise has proven to be one of the most influential video games of all times. GTA V broke global sales records within days of its release in 2013, and it seems as if this game is not quite done selling copies. More than 15 million copies of GTA V were sold in 2017, and the online version of the game reached its maximum player count back in December.

Another interesting fact about GTA V is that its high levels of graphical detail have made it the new benchmark title for players who are into building powerful custom gaming rigs. In early 2018, GTA fans started posting comparison videos of the game running on the Microsoft Xbox console and on a custom computer built specifically to handle 4K resolution at 60 frames per second and with a special graphics mod.

Custom Gaming Rigs Popularized By The Latest Games

The YouTube videos comparing the console and custom gaming PC versions of GTA V have attracted thousands of views and comments from gamers who are happy to see desktop gaming making a strong comeback.

Playing GTA V on a custom computer build is an experience that cannot be replicated on even the most advanced video game console. It should be noted that the GTA V developers delayed the PC version by two years because they wanted to push the Rockstar Advanced Game Engine to its limits; as such, this game is one of the most demanding in terms of hardware and performance.

The graphics settings within GTA V can be adjusted all the way up to “Maximum” level, which would involve playing on the monitor with a resolution of 3,840 x 2,160 pixels and with a frame rate above 90 fps. Some of the RAGE settings that can be appreciated at this graphical level include:

  • High texture quality that really brings out the natural beauty of San Andreas, the fictional version of Southern California in the game.
  • TX Anti-Aliasing: this feature eliminates all flickering and sudden shifts of game objects.
  • High-resolution shadows that are truly crisp, particularly when the game unfolds during a sunset.
  • Distance scaling eliminates the fog on the horizon and makes everything look natural.
  • NPC population: with a powerful custom gaming PC, GTA V comes alive with high numbers of people going about their business on the streets of San Andreas.

Some of the aforementioned YouTube videos claim that a $10,000 custom gaming rig was used to make the comparison against the Xbox; in reality, A Plus Computers can build a powerful gaming rig that can handle GTA V for far less than that.

Common Repair Policies for Computers Under Warranty | Apple Valley Computers

Common Repair Policies for Computers Under Warranty

Most computer buyers will not complete their purchases without first inquiring about the type of warranty that will cover their new equipment. Manufacturer warranties are pretty much standard for off-the-shelf and custom-built systems; in some cases, refurbished computers may also include a limited warranty offered by the store or the service center. In other cases, electronic retailers may offer service and maintenance plans that can be purchased for the purpose of augmenting equipment warranties.

For the most part, warranties extended by computer manufacturers are comprehensive, which means that buyers may get a replacement system if certain issues cannot be repaired within the coverage period. Warranties typically last anywhere between six months and a year, although companies such as Apple are known to offer longer terms.

The Most Convenient Way to Repair Personal Computers

Even though the personal computing industry dates back to the previous century, its warranty system has never been able to match the convenience that the automotive and home appliance industries provide. Computer owners would certainly like being able to take their devices to a local repair shop and even get a temporary loaner; however, this is hardly the case. With the exception of Apple device owners who purchase special maintenance plans for their Macs, PowerBooks, iPhones, and iPads, most computer warranties require device owners to get in touch with a call center and try to resolve the problem via remote tech support before shipping the computer to a repair hub. A more convenient process is available to those who purchase a maintenance plan since this allows them to take their devices to a retailer that has a service department, but even in this situation, their computers are often shipped to a repair hub if the issue cannot be resolved locally.

Local repair shops such as A Plus Computers in Apple Valley offer a convenient option for computer owners who feel that exercising their warranties will be cumbersome. Quite a few repair and maintenance services can be performed without voiding the warranty, and many issues can be solved a lot faster than when the computer has to be shipped.

The moment a computer owner exercises the device warranty, the manufacturer is bound to perform the required repairs. Should the warranty expire after the issue is reported or while repairs are still being performed, the manufacturer has to honor it.

In recent years, the scope of repairs covered under computer warranties has become limited. If your system has an issue that falls outside of the warranty, contact our repair technicians at A Plus Computers.

Ransomware is the New 21st Century Extortion Industry | Victorville Computers

Ransomware is the New 21st Century Extortion Industry

Ransomware infections were the most painful headaches that information security experts had to deal with in 2017, and the same can be said about this particular cyber threat in 2018. Ransomware has proven to be one of the most profitable revenue channels for malicious hackers and cybercrime groups, and there are various reasons why computer users in the High Desert should be concerned.

The FBI estimates that more than a billion dollars have been paid by ransomware victims in recent years. When ransomware infections were first detected a few years ago, they were a variation of the online tech support scams that prompted victims to enter their credit or debit card numbers to allow a fake virus scan and removal utility to clean their systems. Quite a few hackers and criminals were caught running these scams because law enforcement investigators were able to track merchant processing accounts that the hackers used to accept card payments.

New Ways for Ransomware to Extort Ransom

With the introduction of Bitcoin and later other cryptocurrencies that allow anonymous payments to be made through blockchain technology, ransomware attacks increased exponentially. Although there are multiple variations of ransomware attacks, the underlying mechanism is the same: the target device is infected with malicious code that proceeds to encrypt files with a very strong encoding scheme such as RSA-2048, which means that decryption by brute force methods would be out of the question.

The ransom note displayed in these attacks directs victims to make payments to a cryptocurrency wallet in exchange for the keys needed to decrypt files. While many victims have made payments and received the keys, recent reports of ransomware attacks indicate that hackers are pocketing payments without issuing keys. One of the current problems with ransomware is the level of sophistication that hackers have attained in this regard; they are now able to distribute malicious code that is not detected by antivirus software, and they have learned various deployment techniques from cyber weapons stolen from the United States National Security Agency and the CIA.

The ultimate protection against ransomware is to properly configure systems so that they are constantly backing up data and making it available for easy recovery; by doing so, computer users who are infected by ransomware can ignore the extortion scheme by simply resetting their systems and restoring data from a secure backup. The challenge is to find the right backup solution for your system; external storage will work for some users while cloud backups will work for others. To learn more about keeping your data safe from ransomware attacks, contact A Plus Computers in Apple Valley today.
A Future Without Passwords, Thanks to Windows 10 | Apple Valley Computers

A Future Without Passwords, Thanks to Windows 10

Although there is no question that passwords have served a crucial service to society during the Information Age, most security researchers agree that the time has come to look for more hermetic measures of access control and data protection. Tech giant Microsoft has been working on new security measures to replace the standard username and password credentials that have proven to be vulnerable to hacking and identity theft; recently, the company announced a new version of its Windows 10 operating system that is being considered to be the first step towards a future without passwords.

Meet the Newest Versions of Microsoft’s Windows 10

Windows 10 S is a streamlined version of Microsoft’s flagship operating system; it was introduced with the Surface Laptop as a more secure environment for students. The debut of Windows 10 S locked users into installing apps exclusively from the Windows Store for the purpose of preventing malware from sneaking into their laptops. Additionally, Windows 10 S also restricted various operations that could further compromise the functioning of the operating system and underlying hardware.

The new version of Windows 10 S goes further in terms of protecting users by eliminating passwords altogether, and this is possible thanks to the Windows Hello security protocol. Even though Windows Hello has been around for a few years, Microsoft has mostly positioned this protocol, which is meant to provide biometrics security functionality, as an optional feature. With the new Windows 10 S, the feature is configured during the setup stage, which allows users to set up their desktop, portable and mobile devices so that they are protected by fingerprints, facial recognition or temporary PIN combinations.

Solutions Provided by Windows 10

Microsoft is working with other tech firms to establish Windows Hello as a computing standard; the ideal situation would be for banks, e-commerce sites, and cloud service providers to adopt this security protocol so that new accounts can only be created and accessed with fingerprints. Transitioning existing username/password accounts to biometrics will be a more extensive challenge; however, smartphone manufacturers are starting to incorporate fingerprint scanners in greater numbers.

Windows Hello can be enabled in other versions of the Windows 10 operating system. If your device has a built-in fingerprint scanner or facial recognition functionality, it is strongly recommended that you enable Windows Hello. You can also purchase peripheral fingerprint readers that connect to your computer’s USB ports and are meant to work with Windows Hello. If you need help configuring Windows Hello, contact A Plus Computers.
The Importance of Securing Smart Home Automation Networks | Victorville Networking

The Importance of Securing Smart Home Automation Networks

If you have installed at least one smart device or appliance in your household, the chances are that your smart home automation network will continue growing as you add more devices in the future, and this implies a greater security risk. Each time you connect a new device to your home network, you are essentially adding an attack vector for hackers to exploit; for this reason, properly securing your smart home network is essential.

From an information security point of view, a device connected to a smart home network could be just as vulnerable as a device connected to an office network; however, the difference is that individuals are less likely to implement adequate security measures at home than in business settings. Most smart home devices can be installed on a “plug-and-play” basis; this makes them more attractive to consumers, but it also creates a security risk.

Ensuring Security Within Smart Home Networks

When a new device is added to a smart home automation network, it becomes part of the Internet of Things, a massive global network of connected devices that have been of great interest to malicious hackers in recent years. Devices connected to the IoT have their own IP and MAC addresses, which means that they can be indexed, scanned and located; this is the same for computers, laptops, tablets, smartphones, and wireless printers that become part of Wi-Fi networks when they connect through routers. Hackers are constantly scanning the IoT in search of devices that they can access, exploit and manipulate; one of the dangers of the IoT was exposed in 2014 when Russian hackers launched a website streaming live video feeds of private webcams installed in homes around the world. In this particular case, hackers took advantage of the known default username and password combinations of installed cameras to redirect the digital video stream, and they even obtained the GPS coordinates of the homes where the devices were installed.

The problem with unsecured smart home networks is that hackers have multiple ways to exploit them; for example, if you set up an IP camera or baby monitor to capture photos and send them to your business email address, hackers could be able to figure out where you work, and they can also determine when you are not home. The last thing you want is to let hackers control smart home devices such as remote garage door openers and digital door locks.

If you want to ensure that your smart home network is as safe as it should be, contact the networking security specialists of A Plus Computers in Apple Valley.

What You Should Know About Spectre and Meltdown in the High Desert

What You Should Know About Spectre and Meltdown in the High Desert

In 2017, information security researchers from Google’s Project Zero and from European universities stumbled upon two major vulnerabilities in the architecture of microprocessors manufactured by Intel, Advanced Micro Devices, and other major chip makers. The two flaws are known as Meltdown and Spectre, and they could potentially present security risks to users of desktops, laptops, tablets, and smartphones powered by Microsoft, Apple and Linux operating systems.

Major Hardware Vulnerabilities Revealed

These two vulnerabilities could allow hackers to develop malware that would target the way the CPU processes information handled by the kernel, which is the core system of a computing device providing an interface between software applications and the hardware. In essence, an attacker who understands the Spectre and Meltdown flaws could spy on the data being processed within the system’s memory without exception.

The most worrisome aspect of this discovery is that it affects all systems designed to work in the x86 computing architecture developed by Intel, which means that virtually all modern computing devices could be compromised since CPU manufacturers follow the x86 model. The fact that Spectre and Meltdown could affect Linux distributions is of high concern since more than 80 percent of servers around the world run on various Debian and Fedora versions. Major cloud computing operators such as Google, Microsoft and Amazon moved quickly to patch their data centers and protect them against this issue.

Solutions to Looming Malware Threats

Although no malware taking advantage of Meltdown or Spectre has been reported, information security firms and antivirus software developers are rushing to come up with solutions. The burden is on operating systems developers, and it has been problematic for Microsoft thus far. In a bulletin published in early 2018, the company explained that security patches would be suspended until certain antivirus software developers updated their applications to include a specific registry key. As of January 8, for example, popular antivirus suites such as AVG, Kaspersky, and F-Secure had complied with the registry key inclusion as part of their regular updates; however, McAfee and BitDefender Gravity Zone had not, which means that certain Windows users would not receive their scheduled security update for January.

Some Windows 10 users who upgraded their Athlon AMD machines in recent years reported that they could not boot their systems after the January security update addressing Spectre and Meltdown; for this reason, Microsoft froze its AMD patching efforts until further notice.

If your Windows system in the High Desert is having problems with the latest Microsoft updates, contact A Plus Computers for a solution.