Free Help from Tech Experts

Geeks To Go is a helpful hub, where thousands of volunteers serve up answers and support. Check out the forums and get free advice from the experts, including malware removal and how-to guides and tutorials. Converse about Windows 10, get system building advice or download files... Go to forums >>

Archive for Uncategorized

Beware the Facebook Urban Myths


If you have a Facebook account, you’ve probably seen, or shared, at least one urban myth. Maybe it’s this image:

100_shares_heart_transplantOr this:

Today, 12/01/2014 in response to the Facebook guidelines and under articles L.111, 112 and 113 of the code of intellectual property, I declare that my rights are attached to all my personal songs, lyrics, literary excerpts, data, drawings, paintings, photos, texts etc… published on my profile. For commercial use of the foregoing my written consent is required at all times……

Or even this:

I just found out that should you ever be forced to withdraw monies from an ATM machine, you can notify the police by entering your Pin # in reverse. The machine will still give you the monies you requested, but unknown to the robber, etc, the police will be immediately dispatched to help you.
The broadcast stated that this method of calling the police is very seldom used because people don’t know it exist, and it might mean the difference between life and death. Hopefully, none of you will have to use this, but I wanted to pass it along just in case you hadn’t heard of it. Please pass it along to everyone possible.

There is no validity to any of these posts, and none of them are new.  In fact, the third one started circulating in an email as early as 2006, before migrating to Facebook. The first one has been circulating since at least 2010. The Facebook privacy one surfaces in a new form every time Facebook announces changes to its privacy policy. These are just a sample of the many myths that are out there. All of these have been discredited, and the validity can be easily checked. The next time you see a Facebook status like that, stop and think about it. How will sharing a picture 100 times provide a free heart transplant? If entering a PIN backwards would summon police, don’t you think that information might actually be shared by your bank? Who decided stating your rights in a Facebook status would provide any legal protection whatsoever? (For the record, you agree to Facebook’s Terms and Conditions when you create an account. Stating otherwise publicly doesn’t change anything).

While it’s not possible to completely stop these things from circulating, you can become part of the solution. Don’t blindly share or post anything just because everyone else is. It’s possible to quickly check whether a post is valid or not. I use to check these items out. For example, here’s the Snopes link debunking the backwards ATM  PIN myth. If the story isn’t true, don’t spread it. While there’s not necessarily anything malicious about these myths, there’s no point in perpetuating them. Your friends will probably thank you for having a little less clutter in their feed, too.

How an HVAC Company May Have Compromised Target’s Data


Image courtesy of chanpipat/ Freedigitalphotos.netA recent post by KrebsonSecurity reports that the attacks on Target were made possible using stolen credentials from a third-party vendor, specifically an HVAC contractor for the company. While that may seem unlikely to you – how could an HVAC contractor have access to Target’s network? – it’s not surprising that in this day and age, HVAC systems can be remotely accessed and monitored. After all, we live in a digital age. We think nothing of programming our DVRs while away from home, or logging into our home thermostat to program it, so it should be no surprise that large systems have advanced capabilities. The surprising part is that credentials for the HVAC system would also allow access to the rest of Target’s network. The investigation is still underway, so there are a lot of unknowns.  Did Target  require some form of two-factor authentication for access, and if not, why not? Was the HVAC network segmented from the rest of the network? How frequently were passwords changed, if at all? I would assume Target is taking a hard look at some of their security practices, and in the light of this and the recent announcement of the Neiman-Marcus breach, a lot of other companies that process millions of credit cards should also be reviewing their practices.

The Krebs article highlights another security issue, as well. The stolen data was transmitted using “drop” locations; compromised computers that stored the data, and that could be accessed by the hackers. While Target shoulders the brunt of the blame for this situation, it also underscores the importance of security at multiple levels, from home computers to small and medium businesses. An infected computer or server doesn’t just put the users of that system at risk; hackers can use that system for their own nefarious purposes, such as being an intermediate drop for stolen data.

The important thing to learn from this is the importance of protecting a network, regardless of where it is and what it’s doing. Even Fortune 500 companies and security professionals can be vulnerable. Limit access to your network. If 3rd parties need access, limit their access, monitor their use, and disable the access when not needed. Take security seriously, even at home. It’s not just your data that you might be protecting.

Image courtesy of chanpipat/

Don’t Be Scammed by Fake Tech Support Calls

It’s happened to me a number of times. The phone rings, and often the caller id display reads “Private.” Upon answering, I’m greeted by someone with a heavy Indian accent who informs me that he/she is calling from the Windows Support Center, and that for several weeks my PC has been sending out many error messages. This caller wants me to allow remote access to my computer so the errors can be analyzed, then fixed remotely, for a fee.


If you get one of these phone calls, hang up. First off, there are no “Windows Support Centers” that monitor error messages from your PC. They just don’t exist. Secondly, neither Microsoft, nor any of its partners, will place unsolicited calls and offer to fix your PC. The real purpose of these calls is to gain access to your PC. From that point, the caller could install malware to capture personal data, or alter settings to make your PC less secure. They’ll also show you fake alerts and problems in event viewer, in order to dupe you into paying for repairs. Once they have your credit card information, not only are you charged for unnecessary services, but you’ve just provided your credit card information to a scammer.

What if you’ve already succumbed to one of these calls? First off, change your password for your computer, bank accounts, email, etc., but don’t do this from the infected computer. Make the change from another PC. If your credit card has been charged, call your credit card company and work with them to reverse the charges. They can also work with you to monitor your card for fraudulent activity. Scan your computer with whatever antivirus program you use (you do use one, right?), and if you’re concerned, you can ask for help here at Geeks to Go! to help ensure that your computer is clean.

If you want more information about these types of scams, then visit Microsoft. For more information about telemarketing scams in the US, visit the FTC.

Farewell, SpySentinel

Death is never easy.  We’ve all had to deal with the loss of a loved one, a mentor, a co-worker, etc.  Today, the Geeks to Go family has to deal with the loss of a colleague, known online as SpySentinel.  SpySentinel was a malware helper here, and in the past year became a mod.  He was a respected member of our staff, and his death leaves a big hole in our hearts. In real life, he was a college student.  He started his college career in the computing field, but realized it wasn’t where his heart was.  He changed his major to elementary education, and was looking forward to becoming a teacher and mentor to young children.  He would have succeeded, had he had the opportunity.

Read the rest of this entry »

Farewell, Steve

The passing of Steve Jobs means there will be, or already is, a proliferation of blogs, essays, and articles remembering a man who helped revolutionize how we use computers, how we listen to music, and how we use our phones.  A fitting finale would have been the announcement of the iPhone 5 the day prior to his passing, but it wasn’t to be.  I could write the typical article lauding his accomplishments and mourning his death at much too young an age (being just 5 years younger, I wholeheartedly feel he died much too young).  I don’t feel, however, that I could do justice to his life and accomplishments, and much has been written already. Instead, I’ve decided to give thanks for his creative genius, for that, coupled with the equally creative genius of that other computer company (no, not Dell; Microsoft) has made sites such as Geeks to Go a haven for those desperately seeking help for these sometimes confusing and uncooperative pieces of technology upon which we so desperately rely. Read the rest of this entry »

Lenovo M90z Contest Over!

Thanks to our friends at Lenovo, we’re giving away an M90z All-in-One multi-touch computer. This powerful, versatile PC would be at home in a classroom, on a workstation, or on your desktop. The All-in-One design eliminates most cables and clutter. Powered by a 3.2GHz Intel Core i5 CPU, 4GB DDR3 RAM, Windows 7 Pro (64-bit), and a 500GB hard drive. It also features a huge 23″ multi-touch screen. Read our full review.
So how do you win? It’s easy:

  • Login to Facebook
  • Click on this shareable link:
  • “Like” Geeks to Go on Facebook, enter your name and email address to enter.
  • Share w/friends, get an extra entry for every Facebook friend to enter!

Update: Our contest ended May 14th.  Thank you to all who entered.


OTL by OldTimer – A Modern Replacement for HijackThis

OT OTL by OldTimer is like HijackThis — on steroids. OTL scans your system for malware, and produces detailed logs. It’s primarily a malware diagnostic tool, but has advanced removal abilities. It is used alone, or with other tools to  remove malware completely.

OTL is a flexible, multipurpose, diagnostic, and malware removal tool. It also has some curative ability.

Read the rest of this entry »

If I install Windows 7 32bit twice would that make it 64bit?

There are some classic questions in tech support. “Where is the “Any” key?”. After being told to “press any key”. “My cupholder broke.” Actually their CD-Rom tray broke from setting cups on it, etc.

Here’s a very recent one from the Microsoft forums that’s destined to join others as a classic:

I have a question,

I recently took delivery of my new Dell, which came with the 32bit version of Windows 7, however the PC is capable of running at 64bit.

If I install Windows 7 32bit twice would that make it 64bit?

Any help would be greatly appreciated.

Read the rest of this entry »

What are the relevant IT certifications in 2010?

image What certifications should I get? We often get this question in our forums. While certifications seems to have become less important related to job experience, in this tight job market the opposite seems true. Courtesy of, here are the top 5 certifications for 2010. Please follow the source link for all the gritty details:

  1. VMware Certified Professional
  2. Microsoft Certified Technology Specialist
  3. Cisco Certified Architect
  4. Read the rest of this entry »

Windows 7 Christmas Theme Pack

Want to add a little Christmas spirit to your desktop? Microsoft teamed with Sax Fifth Avenue to design the Twinkle Wish Theme, based on the children’s book Twinkle, Twinkle Little Flake.


Read the rest of this entry »