Remove Facebook Voice Message Virus (Improved Instructions) by 2-Spyware

Facebook voice message virus – a malicious campaign that can relate in the installation of a Trojan horse if the misleading voice message is played by the victim…

Even though the message itself might not always directly launch the installation of malware, it might reroute the user to some type of potentially dangerous website where cyber threats such as trojans, ransomware viruses, cryptocurrency miners, browser hijackers, or adware are distributed.

Messenger voice message virus

Source: Remove Facebook voice message virus (Improved Instructions) – Virus Removal Guide

Norton Power Eraser – A Tool To Help You Eliminate Deeply Embedded Malware

Norton Power Eraser was recently updated and I thought I would at least post some information on this security application.

This application has the ability to “aggressively” detect and remove malware that can impersonate legitimate applications, such as fake antivirus software. These applications often are described as scamware, rogueware, scareware, etc…

When using an application such as this, make sure you have some knowledge of the Windows OS above and beyond the basic level so that you don’t end up doing more harm than good. Here is a tutorial to get you started and to understand more – Click Here for Tutorial

Norton Power Eraser v4.0 Beta screenshot 1 / 2

Source: NortonLifeLock Rescue Tools – Norton Power Eraser


Thank You for visiting
What’s On My PC

FDA approves new Coronavirus test that could speed rate of testing up to tenfold | TechCrunch

The U.S. Food and Drug and Administration has granted emergency approval for use of a new test that can increase the range of testing patients by up to 10 times compared to methods in use currently, Bloomberg reports. That speed improvement refers specifically to the technical capabilities of the testing process, meaning access to testing is still a separate issue, but it is the first commercially available test that has received emergency approval and for which equipment exists in fairly high volume across the U.S.

Source: FDA approves new Coronavirus test that could speed rate of testing up to tenfold | TechCrunch

Never Delete an App Without Doing These 4 Things First – Reader’s Digest

Don’t go on a deleting frenzy just yet, though. For some apps, you’ll need to do more than simply hitting the “delete” button.

There are multiple steps involved in making sure an app is fully disconnected from your other accounts and information. Tcherchian suggests following this process:

  1. Delete all of your data on the app. All of it! Go through every setting on the app and look for options about data or privacy.
  2. Also log in through a web browser. Sometimes you’ll have additional settings available through the desktop version of the app.
  3. Unlink or revoke any Facebook or Google integrations you may have enabled.
  4. Contact the app developer and request in writing that your data be completely deleted.

Continue Reading @ Reader’s Digest

Destroy Adware, Restore Performance with Malwarebytes AdwCleaner

Highly recommend that you download and occasionally run Malwarebytes AdwCleaner on your computer. No installation is required. Just download and run.

Description on the website is as follows:

Computer running slow? Strange messages popping up? Browser homepage changed without your permission? This could be the work of adware (and its friends), a sneaky variant of malware that is hard to find, and harder to remove. Malwarebytes AdwCleaner employs innovative technology engineered solely to detect and remove these unwanted hitchhikers. It’s the cleaner of choice for home users and technicians.

Source: Malwarebytes AdwCleaner


Thank You for visiting
What’s On My PC

[UPDATED] PeaZip – Free file archiver utility, open, extract RAR TAR ZIP archives

PeaZip, my favorite (go to) file archiver has been recently updated. I use PeaZip as my primary method to archive encrypted (password required) private files.

rar zip file browser explorer

PeaZip is free file archiver utility, based on Open Source technologies of 7-Zip, p7zip, Brotli, FreeArc, PAQ, Zstandard, and PEA projects.

Cross-platform, full-featured but user-friendly alternative to WinRar, WinZip and similar general purpose archive manager applications, open and extract 180+ archive formats: 001, 7Z, ACE(*), ARC, ARJ, BR, BZ2, CAB, DMG, GZ, ISO, LHA, PAQ, PEA, RAR, TAR, UDF, WIM, XZ, ZIP, ZIPX, ZST – view full list of supported archive file formats for archiving and for extraction.

Source: PeaZip

Thank You for visiting
What’s On My PC

[UPDATED] Windows Repair Toolbox – A “Ready Made” Tech Toolbox

I have featured “Windows Repair Toolbox” here at “What’s On My PC” in the past and have it embedded as a permanent link at “Bookmarks4Techs“. This portable Windows-based program can be used by others who assist others with their PC’s OR can actually be used as a security application on your computer at home. For example, I keep a copy of this program on a flash drive that is connected to my PC; ready for use in the event I need to travel with it OR I use it to perform security scans of my PC on a regular basis. What I love about this program is that it will auto-update the applications. Very well done software that really took some thought to put this together.

wrt-1

Windows Repair Toolbox (freeware) is a software created to help you repair a Windows system, by making the process faster, easier and uniform.

Source: Windows Repair Toolbox – (Almost) everything you need to repair Windows problems in one small handy tool.


Thank You for visiting
What’s On My PC

AES Crypt – Advanced File Encryption for Windows, Mac, iOS, Android, Linux, Python, PHP, and Java

AES Crypt is a FREE (open source) file encryption solution that is available on many OS platforms. On a Windows-based computer, simply install and when you need to encrypt or decrypt a file, right mouse click on the file and select AES Encrypt or AES Decrypt. I also found that after you encrypt a file, you can also easily decrypt the file by clicking on the file and the password window will be invoked. AES Crypt is a great option when you want to store sensitive files in the cloud.

If interested in using this software on your Android devices, visit the Google Play store on your device and perform a search for AES Crypt and you will find several Android apps that is compatible with this software.

Source: AES Crypt


Thank You for visiting
What’s On My PC

DSynchronize – FREE Backup Software That Is Perfect For People At Home

If you are a person at home who saves data (pictures, videos, documents, etc…) to an external hard drive (or other source) you may want to take a look at the FREE backup software called DSynchronize. This software is actually a portable app (no install required). Simply download it to a folder, unzip it and run. I would put this in a folder that you can go back to in the future to run the program and retain the settings. After starting the program you will see a bunch of settings. I typically leave it at the default settings. For typical backups, simply select the source folder and then the destination folder, then click on synchronize. After running a backup, “DSynchronize” will retain your settings for future use. I have used this program for years and it is all I use to back up gigabytes of data across my home network and to a external hard drives.

DSynchronize Screenshot

DSynchronize is a stand-alone utility that let you periodically synchronize two or more folders on Hard Disk, Floppy Disk, LAN, USB Key, CD-DVD and FTP server.

List of main features:

° Standard and timer sync.
° RealTime sync.
° Bidirectional sync.
° Transactional sync (by the journal of NTFS).
° Selective filter (you can exclude single files or folders).
° Start as Service (the program don’t needs to log in).
° Supports Symbolic Links and Hard Links.
° Supports Junctions and Mount Points.
° Supports ACL.
° Log sent by Email.
° Backup of previous version of replaced files.
° Byte to byte compare.
° Supports multiple Jobs, each with it’s settings and sync paths.
° Minimum resource occupation (RAM and CPU).


Thank You for visiting
What’s On My PC

Two points I want you to know from the c|net article: “Strong passwords: 9 rules to make, remember and manage your login credentials:

I encourage you to take a moment, click on the source link below, and read the article from c|net that talks about password management. After reading this article myself, I strongly endorse all the points that are made; especially the use of a password manager, but there were two points that jump out to me that I see people at home doing all the time:

1 – People use weak passwords (and never change them)

2 – People will use those same weak passwords on multiple accounts.

Longer passwords are better: 8 characters is a starting point

8 characters are a great place to start when creating a strong password, but longer logins are better. The Electronic Frontier Foundation and security expert Brian Kerbs, among many others, advise using a passphrase made up of three or four random words for added security. A longer passphrase composed of unconnected words can be difficult to remember, however, which is why you should consider using a password manager.

Don’t recycle your passwords

It’s worth repeating that reusing passwords across different accounts is a terrible idea. If someone uncovers your reused password for one account, they have the key to every other account you use that password for.

The same goes for modifying a root password that changes with the addition of a prefix or suffix. For example, PasswordOne, PasswordTwo (these are both bad for multiple reasons).

Source: c|net – Strong passwords: 9 rules to make, remember and manage your login credentials

Powered by WordPress.com.

Up ↑