Wireless Router -Secure It Now!

Secure your Wireless RouterSecure your wireless router

Your router is part of your window to the world. At home everything you see and do on the internet goes through your router, and wireless routers are becoming the normal way of connecting. But if you can see out the window, there is a possibility someone may be looking in. And you don’t want that. Your wireless router should be set up so that information comes and goes only when you want it to, and is only used by those to whom you have given permission.

Why change the settings on your wireless router?

If you don’t someone else can connect to your WiFi and use your bandwidth. What difference does that make?

  • Slows down your connection. Your ISP only gives you a certain download/upload speed. The more it is being shared the slower it will get.
  • Security. If they can get on your wireless, they may be able to get inside your computer. They may get personal information from your computer.
  • Malware and viruses can be installed on your computer without your knowledge.
  • Illegal Activity. Your internet may be used to do file sharing, or send spam. Worst case, imagine that child pornography or some other terrible activity was originating from your connection. It may be difficult to prove that you were not involved.

Consider this scenario: “When setting up a wireless network at home, I was surprised to be able to connect to my neighbor’s unsecured wireless router. Not only could I have used his bandwidth for free, but had I been so inclined, I could have used the connection for illegal activities. If the police came looking, he may not have been able to prove the activity didn’t come from one of his computers.”

Properly securing a wireless router is not difficult.

There are a number of settings to look at.

    • SSID -Service Set IDentifier- This is the name of your wireless connection. You give it a unique name, preferably one that doesn’t directly relate to you. For example you may wish to avoid using your personal name, or other personal information that may identify you. It can be a random set of characters if you wish. Routers will often come from the factory with a default name, such as “dlink” or “linksys”. Be sure to change this.
    • Change the administrator name and password.
    • Use a passkey, or password. Turn on WPA (avoid WEP) for authentication and TKIP for encryption.wireless router



How to secure your wireless router.

There are lots of blogs detailing how to set up security for YOUR wireless router. Get the name and model and google it. If you like assistance with a specific router Contact Us with the name and model of your router and we’ll try to help. For an overview of changing settings follow this link: http://lifehacker.com/5553789/what-settings-should-i-change-on-my-wi+fi-router

Pay special attention these sections:

  • Change the SSID and Administrator Password

  • Change Your Security Settings

These few steps will result in a greater level of security with your wireless router, with no one looking in your window.

Internet connected appliances could be compromising your security

(From CNN) — It’s bad enough that we have to fear identity thieves who are trying to scam us with malicious messages sent from PCs.beautiful refrigerator

We now must worry about being targeted by our household appliances, as well.

An Internet-security firm has discovered what they are calling a global cyber attack launched from more than 100,000 everyday consumer gadgets such as home-networking routers, televisions and at least one “smart” refrigerator.

If you have internet connected appliances, do you like them? Have you had any problems? Any words of advice for others?

If you don’t have internet connected appliances, tell us why not in the comments section below.

Read the article here


Portable Devices – Laptops, Tablets, Smartphones. What works for you?

Portable Devices – Laptop, Tablet or Smartphone


Suppose you are going outside? What kind of shoes should you put on? You need to know where you are going and what the conditions are. Is it wet out? Then the boots need to be waterproof. Is it cold? Then they need to be warm. No one pair of shoes or boots will be the best for all occasions. What you wear to play in the snow may not be appropriate for a formal occasion.I have a pair of safety boots. I wear them on construction. I have a pair of dress shoes. I wear them to weddings. I have a pair of high rubber boots. I wear them when it is raining. Any of these would serve all three functions, but very not well.

The same with portable devices – computers, smartphones, tablets etc. Any of them will do most of what we need. However different situations call for equipment best suited for the task. I don’t want to spend all day writing, using spreadsheets and doing graphic design on a smart phone or tablet with a touch screen. On the other hand, my laptop won’t fit in my pocket.

So, think about what you want from your portable device. Continue reading Portable Devices – Laptops, Tablets, Smartphones. What works for you?

Goodbye XP? Are you ready and why does it matter?

Goodbye xp

XP has been the favorite Windows operating system for years. Some people have used nothing else, so this is what they know. Like most other Windows systems it got better with age, with the possible exception of Millenium or ME, for which no one had a fondness.
Since the release of XP we have seen Vista, Windows 7, Windows 8.0, and 8.1.
Support will end for XP on April 8, 2014, after a long and successful life. Read about it here Continue reading Goodbye XP? Are you ready and why does it matter?

Save Emails Offline

Where are your emails?Golden symbol of e-mail comes out of the mail envelope

Most people today keep their emails online, or in the cloud. You likely access Gmail, Yahoo, Hotmail, or others by opening your web browser and reading and replying right from there. Gone are the days when we had to go home and fire up the desktop to check our mail. Now it is possible to receive and instantly respond to email wherever we are.

Of course, there are a lot of advantages to this. You can access your email across multiple devices: smart phone, tablet, or computer. It’s easy to go to a public wi-fi and log in to your account to check your emails. While instant messaging, texting and social networking takes care of a lot of our communication, we may still receive emails when documents or photos, etc. need to be sent. Many websites are happy to send you their newsletters. And of course, compared to social networking, there is a higher level of privacy for emails that you may not wish to share with all your friends.

However, if you have a computer at home, or a laptop that travels with you, it is possible to save emails offline. This will allow you to review and search your emails from various accounts. They will be in a folder on your computer and then can be securely backed up when you backup your other files. (Yes, Backup!! read about that here) Continue reading Save Emails Offline

Remove Malware

vector drawing
Would you want this in your computer?

To remove malware isn’t as easy as preventing it in the first place. Imagine that the door to a large factory is open and a sewer rat gets in.

Keeping him out was one thing, but to find him after he is in your building is difficult. Where will he go? Where can he hide? See the problem?

Malware is also able to hide in many different locations on your computer. It will seldom show up as a program that you can remove using “Add/Remove Programs” or “Programs and Features”.

It may only exist in the registry, which makes it very difficult to remove malware. But nonetheless, it is there, and may be slowing down your computer, or even gathering personal information.

Note: If you haven’t already done so use CCleaner to remove temporary files and optimize the registry. Continue reading Remove Malware

Don’t Unzip Dangerous Zip Files

Mailbox messages with dangerous zip files.

These can appear in your mailbox disguised as a legitimate fax from a reputable company, in this case Xerox. . In fact, the link to Xerox is valid and will send you to their website. However, the same cannot be said about the attachment. Although innocent looking, it may contain dangerous zip files. A zip file can be used to get past email filters that will not allow an executable file to be delivered. This can properly be used to send a legitimate file to someone.

An Email with a Dangerous Zip File

Dangerous Zip Files
An email like this can contain malicious code that can cost you your identity.

What are the clues that indicate that this email may contain dangerous zip files? Continue reading Don’t Unzip Dangerous Zip Files

Interpol Virus Holding Your Computer For Ransom?

Have you seen this screen?

Interpol Virus Removal

If you have then you have a big problem and must be reading this post on another computer.

Depending on what country you are in the Interpol Virus will show a national police logo and title.

The whole idea is to instill fear that you have engaged in some terribly illegal activity, for which you could even go to prison for a long time. They say that they can stop this trouble if you pay them a certain amount of money, usually hundreds of dollars. Continue reading Interpol Virus Holding Your Computer For Ransom?

Good riddance to malware rubbish!

Malware rubbish is like any other rubbish: annoying, useless, or in some cases downright dangerous.Malware rubbish

You wouldn’t let garbage pile up in your house, and you shouldn’t let it accumulate in your computer.

Last time we talked about cleaning up registry files and temp files.

You can check that out here. https://mypcsupport.ca/take-garbage-clean-computer/

So what are we talking about now?

What is malware? Continue reading Good riddance to malware rubbish!