Left Click stopps Working in Windows 10

Windows 10 App repair Re-Register

This can because by Windows 10 apps failing so its worth running a Powershell command to re-register them all:

  • Right click at Start button
  • Select Command Prompt (Admin) ( run this as an admin)
  • When the Command Prompt appears, type Powershell and press enter
  • Wait until the Powershell prompt appears: PS C:\windows\system32>
  • At the Powershell prompt paste the following command:
    Get-AppXPackage -AllUsers | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register “$($_.InstallLocation)\AppXManifest.xml”}
  • Press Enter

You will now see the Powershell sift through all of the Windows 10 packages and re-register them.  There will be some warning messages in red which can be mostly ignore.

Posted in Windows 10 tips by bigmike.

Is Cox shaping traffic to reduce VOIP quality other than there’s?

Okay I have been working with more and more clients were there VOIP quality is getting worse not better.  Cox’s generic response is that they need more bandwidth and more often than not the client goes for it but usually does not help.  When the Cox rep comes in they claim they are not guaranteeing quality just speed, spin cycle start here.  Then the Cox rep offers there VOIP service and hardware, magically they can in fact give better quality to VOIP systems especially theirs.  Seems like a double dip here.  I was told that they are allowed now according to the same law that allows them to collect and sell meta data.  Anyone know if this is fact or not, hard to find it.  Any other comments would be appreciated.

Posted in Mike's Blog by bigmike.

Get your RAM up to 8 GB or more

One of the best thing you can do for performance is to get at least 8 GB of RAM in your computer.  So many still have 4 GB and it just doesn’t cut it anymore.  Both Windows 7 or Windows 10 will show an improvement especially with all of those windows you love to leave open!  Of course changing your old spinner hard drive to a Solid state drive will really charge it up, just get a good brand don’t skimp here.

Posted in Windows 10 tips by bigmike.

the Tech way to detect if a Keylogger is installed on your system.

Keylogger are dangerous programs which the hackers install on anyone system to sniff password, credit card details etc. It stores every keystrokes of the person using the computer and thus in a way provides hackers some of his most important information. Some friends or employees also install keyloggers programs just for the sake of hacking facebook password etc. Whatever be the case if you are using a computer having keylogger installed, you are at serious risk of loosing sensitive information which can lead to financial loss also. Even if its your computer, it may have been used by some creepy friend of yours who have wrong intentions to steal your data.  Other than using a good commercial Anti-Virus program here is how we check to see what’s happening on your computer.

Open the Command prompt and type in netstat -ano

Look for the processes that have established in the 4th column. Look for the PID number to the right.

Now open task manager, go to details and sort by PID number.  look for the program on that PID and if it is not one you know google it.

 

 

Posted in Cyber Security by bigmike.

Learn to Recognize Suspicious Online Virus’s and Malware

Learn to Recognize Suspicious Online elements The “bad actors” have become experts at creating emails that look legitimate. Be sure you and your staff learn to recognize the signs of fraudulent social engineering of emails, links, websites, etc.:

  1. Suspicious sender:
    1. You do not recognize the sender
    2. The sender appears to be a legitimate business entity, but when you hover over the email address it shows an unrelated name and/or domain
    3. The sender’s domain is unusual
  1. Suspicious online addresses:
    1. Hover over the hyperlink; the link-to address should not direct to a different website
    2. An email contains only a long hyperlink, and the rest of the email is blank
    3. A hyperlink is misspelled
  2. Suspicious date/time:
    1. The email is sent at an unusual time, such as 3 a.m.
  3. Suspicious subject line:
    1. The subject line does not match the message content
    2. The email purports to be a reply to something you never sent or requested
    3. The subject line appears to contain common words, but they are misspelled, or substitute numbers for letters of the alphabet
  4. Suspicious attachments:
    1. You were not expecting an attachment
    2. The attachment is in Word or Excel
    3. The attachment contains an “executable” extension type such as .bat, .js, .exe, etc.
  5. Suspicious content:
    1. The email implies you will either avoid a negative consequence or gain something of value if you click on a link
    2. The content contains bad grammar or spelling errors
    3. It asks you to look at a compromising or embarrassing picture
    4. Content that appears to be about cheap pharmaceuticals, inheritance, or romantic connections, for example
Posted in Cyber Security by bigmike.