281-647-997721733 Provincial Blvd Ste 110, Katy TX 77450 • Mon-Fri: 8.30am - 6.00pm, Sat: 10am - 4pm
281-647-997721733 Provincial Blvd Ste 110, Katy TX 77450
Mon-Fri: 8.30am - 6.00pm, Sat: 10am - 4pm
281-647-9977

21733 Provincial Blvd Ste 110, Katy TX 77450

Mon-Fri: 8.30am - 6.00pm, Sat: 10am - 4pm
TIPS2018-09-15T21:55:08+00:00

Tips

Adding a USB Printer to a Network so that you can print from multiple computers and laptops

Step 1. On the main computer that is connected to the printer. Go to Control Panel – The Printers and Faxes. Right Click on the printer that you want to share. Click on Share the Printer.

add printer to network

Step 2. On the computer or laptop that you want to add the printer, click on START the RUN and type in \\”computer name” of the computer that is connected to the printer. If you do not know the computer name, go to that computer and right click on “my computer” – left click on “properties” and click on “computer name.

Step 3. Right click on the shared printer that comes up and click on “connect”

A. Set Internet and Local intranet security zone settings to “High” to block ActiveX Controls and Active Scripting in these zones

You can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.

To raise the browsing security level in Internet Explorer, perform the following steps:

  1. On the Internet Explorer Tools menu, click Internet Options.
  2. In the Internet Options dialog box, click the Security tab, and then click Internet.
  3. Under Security level for this zone, move the slider to High. This sets the security level for all websites you visit to High.
  4. Click Local intranet.
  5. Under Security level for this zone, move the slider to High. This sets the security level for all websites you visit to High.
  6. Click OK to accept the changes and return to Internet Explorer.

Note If no slider is visible, click Default Level, and then move the slider to High.

Note Setting the level to High may cause some websites to work incorrectly. If you have difficulty using a website after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.

Impact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many websites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in “Add sites that you trust to the Internet Explorer Trusted sites zone”.

Add sites that you trust to the Internet Explorer Trusted sites zone

After you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted websites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.

To do this, perform the following steps:

  1. In Internet Explorer, click Tools, click Internet Options, and then click the Security tab.
  2. In the Select a web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.
  3. If you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.
  4. In the Add this website to the zone box, type the URL of a site that you trust, and then click Add.
  5. Repeat these steps for each site that you want to add to the zone.
  6. Click OK two times to accept the changes and return to Internet Explorer.

Note Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.

B. Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone

You can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, perform the following steps:

  1. In Internet Explorer, click Internet Options on the Tools menu.
  2. Click the Security tab.
  3. Click Internet, and then click Custom Level.
  4. Under Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.
  5. Click Local intranet, and then click Custom Level.
  6. Under Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.
  7. Click OK two times to return to Internet Explorer.

Note Disabling Active Scripting in the Internet and Local intranet security zones may cause some websites to work incorrectly. If you have difficulty using a website after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.

Impact of workaround. There are side effects to prompting before running Active Scripting. Many websites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in “Add sites that you trust to the Internet Explorer Trusted sites zone”.

Add sites that you trust to the Internet Explorer Trusted sites zone

After you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted websites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.

To do this, perform the following steps:

  1. In Internet Explorer, click Tools, click Internet Options, and then click the Security tab.
  2. In the Select a web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.
  3. If you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.
  4. In the Add this website to the zone box, type the URL of a site that you trust, and then click Add.
  5. Repeat these steps for each site that you want to add to the zone.
  6. Click OK two times to accept the changes and return to Internet Explorer.

Note Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.

C. Enable Enhanced Protected Mode For Internet Explorer 11 and Enable 64-bit Processes for Enhanced Protected Mode

Internet Explorer 11 users can help protect against exploitation of this vulnerability by changing the Advanced Security settings for Internet Explorer. You can do this by enabling Enhanced Protected Mode (EPM) settings in your browser. This security setting will protect users of Internet Explorer 11 on Windows 7 for x64-based systems, and all Windows 8 and Windows 8.1 clients.

To enable EPM in Internet Explorer, perform the following steps:

  1. On the Internet Explorer Tools menu, click Internet Options.
  2. In the Internet Options dialog box, click the Advanced tab, and then scroll down to the Security section of the settings list.
  3. Ensure the checkboxes next to Enable Enhanced Protected Mode and Enable 64-bit processes for Enhanced Protected Mode (for 64-bit systems) are selected.
  4. Click OK to accept the changes and return to Internet Explorer.
  5. Restart your system.
Please beware of scams or fake anti virus programs that

claim to scan for malware and display fake warnings of “malicious programs and viruses”. They then inform the user that they need to pay money to register the software in order to remove these non-existent threats. Win32/Winwebsec has been distributed with several different names. The user interface varies to reflect each variant’s individual branding.

Note: Reports of Rogue Antivirus programs have been more prevalent as of late.  These are programs that generate misleading alerts and false detections in order to convince users to purchase illegitimate security software.  Some of these programs, including Win32/Winwebsec, may display product names or logos in an apparently unlawful attempt to impersonate Microsoft products.

To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products will detect and remove this threat:
Microsoft Security Essentials

These are examples of what to look out for:

Security Shield 

System Security

Winweb Security

Security Tool

System Tool

If you have any queries you may contact us on 281.647.9977 or on the web www.impresscomputers.com

  • As a general rule do not trust any link. There are a lot of scams going on that look very real. These may seem to be from/related to Facebook, a bank, or a shipping company like Fedex, UPS, or DHL. When you click on a link they take you to a different location and your computer end up with an infection. Instead of clicking on the link it is safer to go directly to the correct website and enter your search, tracking number etc
  • Do not trust attachments, especially .zip files. If you click on the attachment it will unzip the program and infect your computer with a virus. We see a lot of emails doing the rounds that are pretending to be from UPS, FEDEX or DHL that states that they have been unable to deliver a package and that you need to click on the attachment. Again, the best thing to do is go directly to UPS etc and enter your tracking number. DO NOT OPEN THE ATTACHMENT.
  • The email might also claim to be from a leading store and states that you have made a purchase. If you want to cancel the transaction then they want you to open the attachment. This is a scam and should be deleted. If you are unsure you should check directly with your bank.
  • FAKE ANTI VIRUSES are on the increase. These come in the form of spyware or pop-ups initially and make you beleive that your computer is infected. If you click on the OK, Scan or even the “x” or close button, your computer will be infected with a virus. Once they infect your computer it will try and scam you into giving them your credit card details to “fix” all of the “errors” that it has found.To try and avoid these problems, when you first get the pop up try pressing ALT and F4 or “CONTROL and W” to close the window, or shut the pc down. You can also hit CTRL-ALT-DEL at the same time, then go to the Task manager, Click on the Offending Program or App and hit End Task.
  • Next Clean your temporary internet files by doing a Disk Clean Up. To do this type “Disk Cleanup” in your Windows Search by the Windows Key. Check all boxes and click OK

WATCH THIS VIDEO ON FOLLOWING THE ABOVE STEPS

  • Keep your anti virus and anti spyware up-to-date and check on it periodically. We recommend using Vipre as it offers real-time monitoring, scans emails and scans facebook etc.
  • Stay away from “busy” site that have a lot of advertising on them. Avoid downloading Free Music, Free Video, Free Screensavers and site containing Adult Material.
  • Good, Safe internet usage is one of the best ways of staying Virus and Spyware Free
How to flip your screen (Or un-flip it if you suddenly have an upside down screen)

Press CTRL + ALT + the up arrow key (see below)

Next press CTRL + ALT + the right arrow key

Then press CTRL + ALT + the left arrow key

Then, before you get too dizzy press CTRL + ALT + the down arrow key

computer keyboard

 

Warning: Cryptolocker Could Destroy Your Data – Please Read

CryptoLocker is an especially insidious form of Ransomeware malware that restricts access to infected computers and requires victims to pay a ransom in order to regain full access.

Crypto VirusWhat makes CryptoLocker so bad is the way it encrypts the user data on your hard drive using a strong encryption method. This makes it literally impossible to access your own data without paying the ransom amount to the criminals.

Once affected you will be locked out of your computer and unless you pay the ransom amount in 72 hours , the virus will delete the decryption key to decrypt all the files on your PC

We have seen this happen when you receive an email from someone you know or someone you don’t know with what looks like a VOICEMAIL attachment.

DO NOT OPEN ANY EMAIL ATTACHMENT THAT IS A ZIP FILE.

THERE IS NO WAY TO RECOVER THE DATA!

Wireless networks have made it increasingly easy to set up home networks to connect multiple devices to the Internet as well as share files or folders. Many people are learning the basics of network sharing in order to share common files. Particularly popular is the sharing of media files such as music, video and pictures across multiple computers or media center devices. Follow these simple steps:-

Instructions:

1. Open Windows Explorer and navigate to the file or folder you wish to share.

2. Right-click on the file or folder and click “Properties.”

3. Click on the “Sharing” tab.

4. Click the “Share this folder” selection if you are using an earlier version of Windows. In Windows 7, click the “Share” button.

5. Select the devices with which you would like to share this file or folder.

OR

Go to Advanced Sharing and click on the “Share this folder” then click on OK.

Spring has finally arrived and many of you have already started spring cleaning. This is a good time to also have a look at spring cleaning your computers.

Recently we have had a large number of computers and laptops that have been brought in to our store that have crashed due to a simple lack of cleaning. The fans have been choked up with dust and debris causing the processor to overheat and finally shut down. This is a photo of one of the computers.

A can of air only costs $5.99 and if you are a do-it-yourself type of person, you can watch the video on How to Clean your Computer under How To Videos on our website.

If this seems like too much hassle you can always bring it in and we will clean it for you for $20.00 Once you have covered the physical cleaning you will also want to look at the software side of your computer.

  1. Check your antivirus to make sure that it’s up-to-date. At the moment we are recommending Microsoft Security Essentials which is a free download. We have the link on our website under software downloads https://www.impresscomputers.com/content/view/23/76/ Remember you can only have one active anti virus program, so you will need to uninstall your existing Anti Virus program
  2. Next check to make sure that your windows operating system is up to date (Start; All programs, Windows Update) and that your Java and Adobe are up to date. There are a lot of viruses that can infiltrate your computer if you do not keep all of these programs up to date. If you do not use Java it would be better to have Java uninstalled rather than having an out-of-date Java. Most of the computers coming in with virus infections do not have all of these updates and the viruses have slipped past their anti virus program.IF YOU ARE NOT SURE IF THESE PROGRAMS ARE UP TO DATE THEN
    Scan Your Computer for Vulnerabilities
  3. Do a disk clean up and defrag. (Start, All Programs, Accessories, System Tools – disk cleanup and then defrag)

If your computer suddenly pops up with a Virus warning that it is infected with all kinds of infections – DO NOT CLICK ANYWHERE ON THE POP-UP. The chances are you have been infected with a Rogue Fake Anti Virus. The best thing to do is hit ATL F4 to close that window. If it doesn’t close turn off your computer by hitting the power button once. Start your computer in safe mode (by pressing F8 on start up), do a disk clean up and deep scan with your anti virus.

If this doesn’t work you can always do a system restore to an earlier date. (Start, All Programs, Accessories, System Tools System Restore.) If the system restore to an earlier date is not available then the virus has already disabled this function and you will have to bring the computer in. If you have any questions you may contact us on 281.647.9977 or at www.impresscomputers.com

– Windows key + D – shows the desktop
– Windows key + M – minimizes all open windows…
– Windows key + Shift + M – maximizes all open windows
– Windows key + E – Runs Windows Explorer
– Windows key + R – shows the RUN dialog
– Windows key + F – shows Search window
– Windows key + Break – shows System Properties box
– Windows key + TAB – Go through taskbar applications
– Windows key + PAUSE Display the System Properties dialog box
– Windows key + U Open Utility Manager
– ALT + TAB – Cycle through opened applications
– Hold down CTRL while dragging an item to Copy it
– CTRL + ESC Display the Start menu
– ALT + ENTER View the properties for the selected item
– F4 key Display the Address bar list in My Computer or
– NUM LOCK + Asterisk (*) Display all of the subfolders that are under the selected folder
– Cntrl-Alt – Arrow Keys will rotate the screen

You can be surfing along and suddenly a window pops up in your browser telling you that you have all kinds of infections and to click here and they will make it all go away. Actually, they will make it worse. This is Rogue Security Software in action. There are two things you can do – first press ALT and F4 on your keyboard (at the same time) and do not click on the window. If this does not work, you want to do a manual shutdown of your computer. Go to the on/off button and press the button once. This should set the shut down in motion and may take a few minutes to switch off completely – do not do anything untiil it is completely off. Do not go near the pop-up with your mouse as this can activate the Rogue. Better safe than sorry.

I would then recommend starting your computer in safe mode (by hitting F8 when it is starting up), then doing a “disk cleanup”, followed by a deep scan with your anti virus software.

If you have any queries you should phone us on 281-647-9977

Go to this website

http://ultimateoutsider.com/downloads/

Click on the GWX Control Panel

Run the file

When this box pops up, Click on the following

  1. Click to Disable Windows 10 App
  2. Click to disable Non Critial Windows 10 settings
  3. Click to prevent Windows 10 upgrades

Windows 10 prevent from installing

And last but not least… Always do regular backups – Watch this video on how to setup backups
Here are 3 ways to increase IT Security that are easy to implement and could dramatically improve the security of the computer system.

  1. Teach the team an easy way to structure “Strong Passwords”  Strong passwords incorporate letters, numbers and other keyboard characters.  Then Enforce strong passwords on the network
  2. Implement a local user and local admin account for each computer user.  The local account should not have permission to install software.  Daily use should be under the “local user” account and the “local admin” account should only be used when it is necessary to install software.
  3. Install A Firewall A firewall is a system that is designed to prevent unauthorized access to or from a private network. All communication between your computer and internet flows through the firewall since it lies between your computer network and the Internet. Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority. A firewall works as a barrier, or a shield, between your computer network and internet. When you are connected to the Internet, you are constantly sending and receiving information. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more
Sign Up For News & Updates

 

×