Test your computer knowledge!

It’s time to use two-step authentication for your email.

Received a call this week from a client. The issues they were having were as follows.

1: Not receiving any email.

2: Calls from friends and aquaintances that they were receiving strange emails from my client requesting help obtaining a $200 gift card for their nephew and if my client would purchase the gift card they would gladly pay them back when they got back to town.

3: Believing that their email account had been compromised, they attempted to reset the password but were unable to get a reset code from the their email provider.

So where do we go from here. I opened their email program and sent a test message to my account and it went through with no problem. I then clicked on Reply and saw immediately that the reply to email address was not theirs. It was close but no cigar. This was the secret sauce that allowed me to determine the issues.

How a hacker got their credentials to the email account may never be known. Most likely they received an official looking request purportedly from their email provider asking them to verify their account by logging in and providing a very pretty button to click that took them to a spoofed page that looked like their email providers login page. Once they entered their username and password the hacker had it.

Next the hacker logged into their email account, went to settings and made some changes. First the piece of scum changed the default “Reply to Address” from my client’s email to his spoofed email account so that any one that received a strange email from my client, if they clicked on reply to respond to the email, that response went to the hacker and not to my client.

Next he set up “Forwarding” so that all emails that came to my client were automatically forwarded to the cyberpunk. This way he could over time determine who my client banked with, utility bills, friends, family etc.

Then this garbage crook turned on Vacation Response so that anyone emailing my client would receive a response that my client was out of town and couldn’t reply at this time.

Finally, this waste of life, created an Email Rule that automatically archived all incoming emails. Consequently my client believed that he was not receiving any emails because they didn’t go to the inbox but went to the archive folder.

After correcting all the false settings, we were able to reset the password for the account. Next we turned on two-factor authentication. What this does in my client’s case, is that when anyone logs into the email from anywhere other than his main computer or his phone, the email provider sends a code via text message to my client’s phone which has to entered into the login screen within a short period of time.

This way, even if a hacker were to get hold of the username and password of the account, and then tried to log in from, oh let’s say, Pakistan, the hacker would be required to enter the authentication code which appeared on my client’s phone and not in Pakistan. Without the code, the email account would stay locked and the hacker denied access.

Click on the blue button and give your account away!

Be extremely vary of official looking emails requesting that you login or your account is or will be locked, suspended, deleted etc. Your email provider already has this information and certainly doesn’t need it from you. If you really think it is a legitimate request, surf to your actual providers page and log in there. DO NOT press the button in the email that says Verify, or Log in.

And please consider setting up two-factor authentication. It’s for your safety!

Take this Quiz if you Dare!

Quiz. Pop website test isolated human wisdom royalty free stock photos

This week I invite you to take a little quiz. Fifteen years the Bits & Bytes column has been showing up week after week with tips and must do items for folks to try, follow or of course, ignore. (Martha, I didn’t know there was going to be a test!)

Question 1: When the wireless mouse stops working do you: A: Try to scare it with nasty words? B: Call a computer tech to come out and fix it? C: Buy a new mouse? D: Put new batteries in it verifying they are seated correctly?

Question 2: Trying to open your email and it says incorrect password, do you: A: Retype the same thing over and over until the account is locked? B: Swear on a stack of bibles that the password you entered is correct? C: Proclaim loudly that you never had a password protecting the email account? D: Use the forgotten password link to reset the password?

Question 3: The printer suddenly stops printing, do you: A: Keep sending print jobs to it over and over figuring eventually it will give up and print? B: Restart the printer and the computer and see if that starts it printing? C: Google an 800 number that will fix the problem free for just $399? D: Call a local computer tech?

Question 4: The phone rings and a voice announces they are from Microsoft and your Windows License has expired, do you: A: Get out the credit card and pay to have the license renewed? B: Buy a new computer with a new Windows License Key? C: Allow the caller to have remote control of your binary buddy to FIX the problem? D: Hang up because Bits & Bytes mentioned that the Windows License Key never expires?

Question 5: A screen pops up with a voice speaking informing you that your computer is infected with the virus de jour and you must call the 800 number to save the computer, bank records, pictures etc. and you can’t close the warning message, do you? A: Immediately call the 800 number and pay $399 to have the nonexistent virus removed? B: Recognize that the window is actually a website made to appear to be a virus warning? C: Use Task Manager to close the offending window?  D: When in doubt, call a local computer tech?

Question 6: You’ve diligently performed a backup of critical data on a regular schedule, do you: A: Verify that the back up is actually being performed or just take it on faith? B: Do you back up your data to the same hard drive that runs the computer so that if the hard drive fails you lose the backups as well? C: Do you back up to an external drive and verify that it is working? D: Do you back up to a cloud based system automatically?

These are issues I run into almost every week. The answers to all the questions is D: Except there will be credit given on question 6, if you answered C.

How did you do?


person holding blue ballpoint pen on white notebook
Photo by Lukas on Pexels.com

The year is one third gone already. It arrived and like it or not it brought with it another year of triumphs and challenges. In the old days, when working for the MAN in the corporate world, life was defined, set, functions clear, directed and relatively meaningless. We would start each day with the Company Mission Statement, moved to the coffee and donuts, struggle till lunch, prepare our “Management by Objective” fictions, and then coast till quitting time. Ahhh, life was easy back then.

But today it feels like we can’t run fast enough. Someone or something is constantly pushing us to do something, buy something, contact someone, answer a survey, pay more, save less, go farther with less fuel, heat homes at lower temperatures, etc. I opened the mailbox today and thought there was only two pieces of junk mail until I picked them up and six more pieces fell to the floor. All junk, but I am sure that the folks that sent them thought they were the offers that couldn’t be refused.

I used to like junk mail. Really. I, like almost everyone here in Florida, came from a northern state. I won’t tell you which one, but our state motto was “Eight months of winter, and four months of rough snowmobiling.” In the winter months we welcomed the piles of junk mail, because when tightly bundled, they would burn for hours in the wood stove and help heat the house. When we made our midnight move to Florida, I thought that perhaps the junk mail, like our son would not find us in our new home. It took our son two years to find us and move back home, the junk mail was waiting for us when we got to Florida.

For a while I chuckled as I would remove the contents of one junk mail envelope and exchange it with another junk mail envelope and mail them in the postage paid envelopes to each other. But, after awhile, even this gets boring.

So this year I vow to clean up some of the detritus that distracts me every day. To do this I will turn to my faithful electronic companion. Join me as I fire up my computer and travel the first step: Go to http://www.optoutprescreen.com. Under the Fair Credit Reporting Act (FCRA), Equifax, Experian, Innovis, and TransUnion, are permitted to include your name on lists used by creditors or insurers to make pre-approved / prescreened offers of credit or insurance. Opting-Out refers to the process of removing your name from these lists for five years. Through this site, the Consumer Credit Reporting Companies are providing consumers with an easy and convenient way to exercise their right to Opt-Out. (Martha, tell your cousin in Maine that you can also Opt-in to receive all kinds of junk mail to burn instead of propane.)

Next I surf the net over to http://www.dmaconsumers.org/consumerassistance.html. This site is designed to help folks reduce the amount of commercial and non-profit mail going to their mail box. They claim that I will see a significant drop in junk mail within three months of registering. This group will also help to reduce e-mail soliciting, phone soliciting and even has a section pertaining to sweepstakes. It is run by the DMA (Direct Marketing Association) All members are required to run their mailing, e-mail and phone lists against the DMA op-out list every three months or more and will carry your name for five years.

I feel like the density of my life is lessening already. Hit that keyboard and surf over to http://www.donotcall.gov. In just a few moments, I have registered not only my home phone but my cell phone as well with the national Do Not Call Registry. There is a complaint section that allows us to file information about a caller which I bookmarked just in case I get that six o’clock call just as I put a bite of dinner in my mouth. After reading the details I almost wish a scofflaw company would call me so I could slap them with that $11,000 fine.

Finally, I want to visit http://www.annualcreditreport.com. This site allows you to request and receive online a copy of your credit report once a year from each of the three major credit reporting companies. Stagger the request so that every four months you receive a credit report from a different company. I found eight accounts still listed as open that my wife and I had closed in the mid 1970’s and one cell phone account that wasn’t ours. And if credit reports are as baffling to you as they were to me, spend a few minutes at http://money.howstuffworks.com/credit-report1.htm and get the lowdown on how they started, what they are and why you should care.

I’m feeling better already.

Who you gonna call?

cropped-computer-repair.pngOne thing we can be sure of is that our binary buddies will never spend two days in a row, exactly the same. Sometimes we change it ourselves, add new software to perform some desired task. Install new hardware such as an external back up drive or a new microphone. Sometimes it is a mystery how we turn off the computer at night and the next morning when it fires up there are changes made without our knowledge, some good and perhaps some not so good. It’s the not so good ones that perplex and frustrate us, especially if we don’t know how to fix or undo the change. The other issue that goes along with this is we don’t know which service or company to contact for help.
Example: A recent Windows update was thought to be the cause behind the speakers suddenly going silent. A call to Microsoft resulted in the user being told to plug in the speakers. They were already plugged in just not working. Here is where the problem arises. Speakers are hardware, the hardware works because of software called drivers, specifically designed for the audio card in that computer. That driver is provided by either the computer manufacturer if it is a major brand or by the maker of the audio card. It is not provided by Microsoft or their Windows service. So calling Microsoft to fix another manufacturer’s hardware would be akin to calling Comcast to fix our dishwasher.
Another example was a user whose AVG antivirus stopped working. A call to Comcast resulted in an attempt by Comcast to install Norton on the computer without removing the non functioning AVG. Now neither system worked, both antivirus programs were trying to start, then they would crash, try to start, crash on and on. Error messages were popping up on the screen and the poor defenseless PC was being over worked trying to start two systems that refused to start. In this example it should have been AVG that fixed their problem. Comcast doesn’t own AVG, nor service it. Again, calling Comcast to fix an AVG problem is like calling the car mechanic to change the refrigerator light bulb.
Still another example of who you should call for help. A client decided to take my suggestion and buy their own Internet modem so as to save the rental fee on the modem provided by their ISP. (Internet Service Provider) This example happened to be Centurylink but it holds for all providers. The client ran into some difficulty installing the new modem and couldn’t get online. A call to Centurylink resulted in being told they don’t support any modems except their own. A call to the modem manufacturer resulted in some technical jargon regarding settings to be obtained from the ISP. Which brought the client back to Centurylink and round and round.
So the question is, does there exist a single source of help that can address all the issues, knows what company belongs to which piece of software or hardware and understands how they all fit together? Of course there is. Call a LOCAL computer technician. It’s what they do.
Court Nederveld owns his own computer consulting and fixit service –Bits, Bytes & Chips Computer Services. He makes house calls in Punta Gorda/Port Charlotte! He can also fix most computer problems remotely! You can reach him at adakeep@hotmail.com or 941-626-3285

Want a useful Christmas present?

Grumbles from the Keyboard is a collection of newspaper columns written over a period of six years. Published as Bits and Bytes, under Court Nederveld’s byline. The column appeared each week in the Charlotte Sun, Charlotte County, FL. The articles target average home computer users. Many computer users harbor a fear of computers because they seem so mysterious. The columns attempted to inject a bit of humor into human/computer relationships simply to allow people to take a deep breath and realize that it really isn’t as frightening as it seems. At the end of the book is a handy log for recording website, user name, password and any notes appropriate to that account. Another huge issue with users is what I refer to as Computer Vocabulary. So often a user will describe an issue with words that make no sense to a tech. So, within each chapter there is a computer or Internet related word or phrase printed in bold type. At the bottom of the page will be a box labeled “Grandpa and Grandma, how come you’re so smart?” This box contains the bold word, its definition and a couple of sentences that demonstrate how to use it. Another column favorite over the years were the comments by Martha. Those familiar with the column know that Martha, in her own way, simply said what most of us were silently thinking. Grumbles From The Keyboard As a desk side reference putting similar or related columns together will make it easier to find information as needed Enjoy! If you take advantage of this offer, the author will autograph it for whomever you wish. The link to checkout is https://sites.google.com/view/bitsandbytesnews/home