Some Equipment Is Built To Last 10 Or More Years – Your PC Isn’t is located in West Texas – farm and ranch country. For the most peart are a hearty bunch – spending many hours outdoors in extreme weather working with our hands and with heavy machinery.

When I first started driving in the city – and still to this day – I was complaining about how slowly everyone drove. A friend told me, “Don’t get mad at the guy driving slowly in front of you, he spent all day yesterday on a tractor driving 15 MPH in a circle.” I still get mad, but this perfectly illustrates how the lines between life in the country and life in the city often blur here in West Texas.

What does all of this have to do with computers? Did you just fall for clickbait and this is actually an attempt to sell you farm equipment? No. Here’s my point and my theory.

Farmers and ranchers spend hundreds of thousands of dollars on equipment but they expect that type of technology to last for decades. My theory is that they expect this from all of the equipment that they buy, even a new computer.

Unfortunately, PCs just don’t last that long anymore. While there is no definitive answer as to how long they will last or how often you should replace your computer, here is our collective experience that matches many in our industry.

Plan to replace your PC every 3 – 5 years (the life expectancy of a laptop is slightly less). Here are a few reasons why.

Hardware fails.

The hard drive (where the data is stored) fans, power supply and the motherboard all fail eventually. These are man made components that are prone to giving out. We often see lower end computers have hardware failure what we call “a year and a day.” We started using this term to describe failures that happen just outside of the manufacturer’s warranty and it happens quite often.

Software constantly evolves and software companies stop supporting older versions.

Unlike a John Deere tractor (which you can typically find someone who can work on even a very old one), computer software companies eventually stop supporting and updating old versions. The cost is just too great.

Modern PC users run more applications and programs on the same computer than ever before and as each software title updates, it often uses more resources.

I remember my first Windows PC, it had Windows 3.1 installed on it. I ran MS Money and AOL on it. That’s it! Now, a new PC comes with dozens of apps right out of the box. Then the typical user begins to install the different apps that they need. All of these apps take system resources and with each upgrade they use more and more. This often makes it necessary to buy new hardware to upgrade or simply buy a new PC over time.

Proactively replacing a PC before a catastrophic failure typically costs less money and definitely takes less time and causes less stress.

When a PC is completely dead it takes different tools and a different approach to retrieve the data, find software keys (or buy new software) and get the new PC up and running than it does to transfer everything from one operational computer to another.

A thrifty person can sometimes squeeze an extra year out of a computer but sometimes that gamble is a bust and it actually costs them more money than just purchasing a new one when the time comes.

Please follow and like us:

Fighting Viruses Get’s Tougher – Popular Cleanup App Targeted

Over 2 million users recently installed a version of CCleaner that had been hacked and included a trojan virus, according to the software developer.

This isn’t the first time that software that is designed to help and protect computers has contained malicious code It is, however, the first time that a popular tool (used many computer repair companies and technicians) has been successfully targeted. And while the software company has given the all clear, it was recently discovered that the newer (not compromised) version is also affected.

It get’s worse, in addition to the Trojan injected into the code, the infection contains a second payload that hasn’t been executed as of yet.

This form of infecting a victim with viruses and malware is being called a “supply chain” attack because it relies on the fact that the person downloading and installing the software trusts the source and the software company.

The truth is, if the end users or the computer techs that they are trusting to remove viruses don’t stay on the cutting edge of technology (and news of this nature), they will end up eventually doing more harm than good due to future attacks like this one.

As enters it’s 15th year helping home PC users and home businesses battle the constant threat from hackers and viruses, we are committed to constantly monitoring the tools and apps that we use to fight malware, spyware and viruses and never become complacent.

Please follow and like us:

Who’s Calling? Not Equifax!

Just in case you are living under a rock, 143 million Americans (that’s almost half of the population) just had their Social Security numbers, names, driver’s license and birth dates stolen when Equifax was hacked.

It doesn’t help that Equifax itself has made it confusing and difficult to check to see if you are one of the victims by creating a confusing web page that gives users conflicting information AND a weak PIN, AND is vulnerable to spoofing which would create even more victims.

If you want to know how to NOT handle a data breach, Equifax just wrote the definitive rulebook.

Now, hackers and the scammers are taking full advantage of the situation by calling people and pretending to be Equifax.

The Federal Trade Commission has issued a warning asking people to not interact with anyone calling and claiming to be with Equifax. They aren’t calling you, they don’t do that (neither does Microsoft or Google or any major company) they don’t have the resources and frankly don’t care enough to try.

The scam starts off with something like “This is Equifax calling to verify your account information.” It may be an automated call or a live person.

Do not press one, do not trust your caller ID, do not interact with the call in any way.

Please follow and like us:

Email Phishing Scam Looks Like It Is Sent From The BBB

The BBB is warning businesses about an email phishing scam. The phishing email claims to be from the BBB with official sounding subjects like “violating the Fair Labor Standards Act” and “Safety and Health Act.” They also will appear to notify the recipient that a complaint has been lodged against their business. Contained within the email is a clickable link that will download malware which will then steal the victim’s passwords and/or hack company data.

The reason these emails are so successful, is that the BBB does send emails to businesses in order to inform or notify.

If you receive an email from the BBB, stop and take the time to read it over. Check for any grammatical errors and if it has a local signature located at the bottom. If there is a question about the legitimacy of the email, call your local BBB.

If you have already received one of the phishing emails and clicked on a link, immediately change passwords and contact

Please follow and like us:

US And European Electrical Grid Targeted In Massive Cyber Attack

The report states that hackers in Dragonfly has reemerged after about a four year hiatus and now has the ability to take control over the compromised power grids. Symantec is calling this new wave of attacks Dragonfly 2.0 in their report.

This isn’t the first time that hackers have set their sites on the power grid. In 2015 and 2016, hackers disrupted the Ukraine’s power grid and that attack resulted in hundreds of thousands of people without power. More recently, hackers linked back to the Russian government have developed malware in order to target the US.

Dragonfly 2.0 has used a sophisticated email campaign containing content specific to the energy sector which has tricked power company workers into opening the emails. Once the emails are opened, the malware sends the user’s network credentials back to the hacker’s server. The hackers also used attacks called ‘water hole’ to compromise websites frequented by users in the energy sector. Once a user visited the compromised sites, their network credentials were harvested. In one case, after the user visited a compromised website, a computer virus named Backdoor.Goodor was installed on the user’s computer which allowed the hackers to take control of the system.

According to Symantec, “Sabotage attacks are typically preceded by an intelligence-gathering phase where attackers collect information about target networks and systems and acquire credentials that will be used in later campaigns. The most notable examples of this are Stuxnet and Shamoon, where previously stolen credentials were subsequently used to administer their destructive payloads.”

Please follow and like us: