Ahh, adware. Who doesn’t love being bombarded by messages from a million spammy websites and fake services?
I can’t call adware a form of malware, because technically not all adware is malicious (even though I hate constant ads as much as the next person). Adware is short for ad-supported software, and it’s all over the place, ethically.
You know when you go to install a legitimate program, like a photo editor or another tool, and it asks you if you want to install a free trial of another program? Or, even worse, when the installer just assumes you want the other programs as well, and just drops them on your computer real quick? That’s adware. Ironically enough, antivirus installers are often the worst about doing this! They get paid to bundle another software in with theirs to “trick” people into installing it. Unfortunately, antivirus software companies are often the worst offenders.
Another type of adware is less annoying—free versions of programs supported by ads. Mobile games are a great example. For developers, the benefit is twofold: they can collect revenue from advertisements, and incentivize users to pay for a “full” ad-free version of the game or software. Spotify, YouTube, and other services use this model, and do so responsibly (most of the time).
We give these large companies permission to keep and/or sell our data to advertisers in exchange for their services. Nothing is free, and we pay for most things on the internet with personal information. Some adware, however, does not get your permission before collecting data. The line is thin, and there are many experts who feel that even large corporations cross the line with data collection and the ads they serve users.
A big problem with adware is the spread of “malvertisements,” or ads that lead you to sketchy websites of all sorts. You’ve no doubt run into this—ads that you don’t want to see at all for services you would never use. They may fill up most of your screen, or have “close” buttons that are ridiculously small. If you accidentally click on them, you may end up somewhere you don’t want to be! These can be served up by malicious browser extensions and other programs that “hijack” your web browsing experience.
This is where adware gets really bad—these types of advertisements may come in the form of pop-ups or permanent windows stuck on your screen. They may prevent antivirus software from opening or detecting them. It can be pretty bad. They may take you to a site where a download automatically starts, infecting your computer even further.
When something like that happens, your best bet is to bring your computer to a local virus removal service or virus cleanup company like Facet. We can get the malware off your computer and leave it running like new again. If you haven’t already, look for an ad blocker browser extension to use as a first defense.
find files and documents on your computer 01 1024×495 1
“Where did that go?”
This tech tip comes from Toni Insalata, IT Bench Technician located at Nerds on Call in Normal, IL! This tip may help you if you ever can’t find your important documents and files when you need them. Toni writes,
Here’s a fun fact for all you Windows users out there: your Word documents aren’t saved in Microsoft Word, your Spreadsheets aren’t saved in Microsoft Excel and Text files aren’t saved in Notepad. Your files aren’t kept in the programs you use them with. Your computer is full of folders that your files call home. For example, the previously mentioned programs usually default to saving your files in a folder called “Documents” or “My Documents”. Photo viewing and editing software like Windows Photos or Paint.net may save your files in “Pictures” folder. If you download something off the internet using programs like Microsoft Edge or Google Chrome, those files will likely end up in your “Downloads” folder.
You can look inside these folders using Windows Explorer. You can get to it by clicking the little folder icon that may be on the bar at the bottom of your screen or by pressing the Windows key (the key with the four squares) on your keyboard and the letter E key at the same time. Once you open the file explorer you may see some common folders listed in the center and/or top left. If you don’t see the folder you’re looking for, click the “This PC” or “My Computer” option on the left side of the window. From there you will want to select your hard drive in the middle, “Devices and drivers” section, it will have another Windows symbol by its icon and is most commonly labelled “Local Disk (C:)” but may be named something else. If you click on the wrong one, you can always go back, the button for which is on the top left corner of the windows. Once you’ve opened your hard drive, you’ll want to click on the “Users” folder, from there open the folder with your account name, this may include parts of your name or may just be something more generic like “Owner”. Now that you’re in your user folder you can see all your folders.
This can be a helpful thing to know how to navigate. For example, if you are trying to attach a document or picture to an email it will open Windows Explorer for you to select which file it is you are trying to send. If you can’t find the file you’re looking for in the folder you think it should be in or are unsure of which folder a program saves in you can use the following method to find where it may be. Let’s use a Word Document as an example of the type of file you’re trying to find. First you will want to open Microsoft Work, this can be a new blank document or one that already exists. Now that you’re in the program click on the “File” option, the location may vary by the program, but most keep it in the top left. Once you’ve opened that menu go ahead and select “Save As”, this may open a Windows Explorer window, or you may need to select “Browse” first depending on the program. The folder that the explorer opens to is the default location where that program saves your files to, so you should be able to find what you need there.
I hope this can help you be more prepared to tackle the ever-increasing digital landscape we find ourselves in. Good luck on your journey and remember that if you ever need help along the way, you can always reach out to your local Facet Technologies or Nerds On Call locations.
What’s in a name? I work in marketing here at Facet, but when I was younger, I spent a lot of time helping answer the phones and assisting residential repair customers in the front of the store. Viruses were probably the most common reason for PC repair check-ins.
Although we use the term “virus” as a catch-all term for any bad software on your computer, a virus is just one type of software that can affect your system, part of a larger category of programs called malware (short for malicious software).
In the next few blog posts, I will do my best to provide a primer on types of malware. Up today: viruses and worms.
Viruses
Given our current, ahem, situation, I suspect we’re all pretty brushed up on biological viruses. Computer viruses operate in a way that is not so different from those that affect us.
Computer viruses, much like their biological namesakes, are designed to “replicate” rapidly once they enter the host (in this case, a computer). Not every virus is devastating, but some can wreak havoc on your computer.
The most important thing to know about viruses is that they’re not designed to replicate immediately upon entering your computer: they can only run if the user opens the program or file to which they’re attached, like a file, program, or the boot sector of the hard drive. Once the file or program is opened, that’s the green light the virus needed to be set loose and it’s about to Tokyo drift all over your computer. The virus will spread to other files and locations on the computer from there. It’s also going to find other hosts—just like viral infections in humans spread to other humans.
Firstly, a disclosure: I am not old enough to remember a time before the ubiquity of the internet, and thus, my first computer viruses were things that came attached to “free” wallpaper downloads and other relics of the early aughts (and we really all owe our parents a collective apology for those).
That being said, the easiest way to understand viruses is to know that they originally spread over networked computers in businesses and the public sector, making copies of themselves and attaching them to users’ files. If someone had access to another users’ file, the other user would also be infected. Infected floppy disks played a huge role in the first viruses for personal computers, as the vast majority of people weren’t accessing the internet. Nowadays, many viruses are sent as email attachments. Most viruses are attached to .exe (executable) files, Word documents, or other common file types, invisible to the user. While some will leave the original file intact, others will completely overwrite the files with which they come in contact.
Worms
The best way to explain worms is to juxtapose them against viruses.
Like viruses, worms replicate themselves and spread through networks to other computers.
Remember how viruses have to be opened with a file or program to run? Unlike viruses, worms do not have to be attached to a file or program to run and replicate. They’re standalone programs that just do their own thing, mostly exploiting vulnerabilities in systems to spread. These programs use pre-existing helpful tools that allow files, documents, and programs to be stored and moved across computers to get around and cause trouble.
This is what makes worms particularly pervasive—they don’t require much “human assistance” to spread and replicate.
In part 2, I will discuss other types of malware including trojan horses and ransomware. Subscribe to our newsletter to get these in your mailbox, as well as comics, recipes, and tech tips from other Facet employees.
Your business’s best defense against all malware is a technology partnership that works constantly to keep you and your employees safer and more informed about the current threat landscape. True Tech Peace of Mind with Facet is knowing that your networks are secure and your data is backed up. While there is no such thing as total security against all attacks, the right proactive tools can keep you safer.
Call us today to schedule a Security Plus Audit to find out where your business’s cybersecurity stands. We can provide you a roadmap to better security to protect your data, and we will work with you to implement it. Find more information on the Security Plus Audit here. For questions or to schedule an appointment with a Network Engineer, contact us.
I love this recipe because it’s very flexible and I can almost always throw it together quickly with stuff I already have around the kitchen. It’s good for vegetarians, too: you can use chickpeas instead of chicken and it’s still just as delicious (if you like chickpeas, that is).
I include instructions for a pressure cooker like an Instant Pot or Foodi as well. If you use this method, you still get the same wonderful flavor, but instead of a sauced chicken served over rice, your chicken and rice will be mixed together. A small price to pay for convenience.
Note on chicken: I like to use bone-in chicken thighs and legs, or boneless chicken thighs, because they have a higher fat content and maximize the tastiness of the recipe. Boneless skinless chicken breasts are an OK substitution. Alternatively, if you’re feeding a family, just use a whole chopped up chicken. Boneless skinless chicken will also cook faster than bone-in, if you’re short on time.
INGREDIENTS: 1 lb chicken CAN SUBSTITUTE OR ADD: 16 oz can of chickpeas ½ onion ½ c flour 1-2 tbsp butter or vegetable oil 2 cups chicken stock or broth (I use Better than Bullion Roasted Chicken Base) OR 2 cups vegetable stock 3 tbsp paprika (Hungarian paprika is supposed to be the best for this, but I mostly use regular) ½ c sour cream OR plain Greek yogurt (more or less, according to your tastes) Salt and pepper to taste Rice (can substitute egg noodles, dumplings, spaetzle, or mashed potatoes)
PREP:
If using boneless/skinless chicken, chop into small strips for faster cooking.
For all chicken, sprinkle with salt and pepper. You can use garlic salt if you are so inclined.
For all chicken, mix ½ c flour with a generous amount of salt and pepper. Dredge chicken in flour mixture.
Dice onion finely.
If using chickpeas, drain water from can.
STOVETOP (if using pressure cooker, follow alternate directions below):
Start preparing rice according to package directions. It can cook while you make the paprikash.
Heat butter or oil on medium-high heat in large skillet or Dutch oven until shimmering. If using only chickpeas, skip to step 4.
Place dredged chicken in skillet and fry on each side until browned, about 3 minutes per side for boneless/skinless, about 5 minutes per side for bone-in.
Remove chicken from skillet to plate.
Add onions to skillet and more oil if needed. Saute until translucent.
Add the 2 cups of chicken stock to deglaze the pan.
Add the paprika and more salt and pepper.
Return chicken to pan. If using chickpeas, add them now.
Turn heat to low and bring to simmer.
Simmer for about 30 minutes or until chicken is cooked through to 165°F.
Once chicken is cooked, stir in sour cream.
Serve over rice. Pairs well with broccoli, peas, or green beans.
PRESSURE COOKER
Turn pressure cooker to saute mode on high. Add oil or butter.
(If using only chickpeas, skip this step) Brown chicken on both sides. Remove from pot to plate.
Add onion to pot and saute for a couple minutes until translucent.
Add chicken stock, paprika, and additional salt and pepper.
Add 1 cup rice to pot.
Place chicken on top of rice. If using chickpeas, add them here.
Set pressure cooker to HIGH setting for 8 minutes for boneless chicken, or to 14 minutes for bone-in chicken. Natural release pressure for 10 minutes.
Brown 2 lbs of hamburger meat. Drain and mix 2 packets of taco seasoning in. Cook 3 boxes of shell mac ‘n’ cheese as directions state. Mix in 2 cups of sour cream with mac ‘n’ cheese. Layer mac ‘n’ cheese/sour cream mixture in bottom of casserole pan. Layer taco hamburger meat on top. Sprinkle 16oz frozen corn. Sprinkle with shredded cheddar cheese. Next, layer another layer of the mac ‘n’ cheese sour cream mixture on top (like you are making lasagna). Cover with aluminum foil. Bake for 15 minutes. Take out and sprinkle more shredded cheese on top and bake for another 5 minutes, uncovered.
This month’s recipe is from Jawara Simmons, LAN Technician at Facet! He says that his girlfriend loves when he makes this dish, and he loves how simple and easy it is to put together.
Pasta Aglio e Olio
Ingredients
1/2 head garlic, separated and peeled 1 bunch parsley, rinsed 1/2 cup good quality olive oil 1 tsp red pepper flakes 1/2 lb dry linguine 1/2 lemon
Method
Heavily salt a large pot of water, and bring to a boil. Cook pasta to al dente while completing the steps below.
Slice the garlic cloves thinly, and set aside. Pick the parsley leaves from their stems, and finely chop.
Add olive oil to a large sauté pan, and heat over medium flame until shimmering. Add sliced garlic, stirring constantly, until garlic is barely toasted. Add the red pepper flake and remove from heat.
Add the pasta, drained, with about 1/4 cup reserved pasta cooking water. Add lemon juice and parsley, and toss to combine. Season for salt and pepper, and serve.