Windows XP – is it time for an upgrade?

April 8th, 2014 – Its the drop dead date for Windows XP Support from Microsoft. After that date Microsoft will no longer be providing any updates to Windows XP. Most importantly this means no more security updates for Windows XP and Internet Explorer. While you can still use browsers like Google Chrome and use a good Anti-Virus, it doesn’t mean you will be protected at the level you should be.

What can you do? If you want to risk it and keep using your Windows XP machine – then go for it. Just download Google Chrome and get yourself a good Anti-Virus. We recommend and sell AVG. One thing to remember is that Windows XP is older and came on older hardware. Sooner or later it will get to a point where the hardware won’t work. I would be very careful on what you do as far as accessing the internet. Don’t log into any websites that need log-in information – like your bank, Netflix, or your email. Better safe than sorry.

There are a few things that Windows XP will still do well and you can keep doing for years to come. These activities mainly include the offline variety. Windows XP computers will still be good for holding files, pictures, movies and music for years to come. Just make sure you have a back-up. But you can very easily use Windows XP to host these files and share with the other computers in your household. Got an old version of office you like to write with? Windows XP will still be able to do that. Like the photo editor and organizer? That will still work.

So have you thought about doing an upgrade?

We can help with that. It doesn’t have to be scary. We can hold your hand for the whole process.

You can go out and buy a new Desktop or Laptop. The downside to this is that the majority of all new PC’s and Laptops come with Windows 8. While Windows 8 has some good points and bad points…the big concern is do you want to take the time to learn it? There is a large learning curve for Windows 8. Going to Windows 7 is a much easier transition for Windows XP users. It looks similar and functions on the surface very similar as well. It’s just a lot prettier and better on the back end.

One advantage Windows 7 has over Windows 8 is if you are moving from Windows XP and have some old programs you want to use – Windows 7 Professional has a Windows XP mode that will help you to use those. Windows 8 does not include compatibility modes to help user older programs. It doesn’t guarantee that all old programs will work, but you have a much better chance of it being successful with Windows 7.

We can help you either get your Windows XP machine upgraded and into Windows 7 or we can get you into a Refurbished PC or Laptop with Windows 7 already loaded on it. Either way you want to go we can help you.

Bring your PC or Laptop by the store today at 606 N Sullivan Rd in Spokane Valley or give us a call at 509-315-9492 to talk to us about what we can do for you and your Windows XP machine.

Tagged with: , , , ,
Posted in Uncategorized

Are PC’s Dying? Of Course Not, Here’s Why!

Reports of the PC’s demise have been greatly exaggerated. We’ve all heard that everyone’s just buying tablets and throwing out their keyboards and mice. But if you live in the real world, you see people using PCs every day.

The statistics show that PCs are still selling in large numbers and are used much more than tablets. But we don’t need statistics to see this — we all know that huge amounts of people still use and need PCs.

PC sales are declining fast. Soon, no one will buy them anymore. Everyone’s just buying tablets, and tablet sales are skyrocketing! That’s the established wisdom, anyway. But is that what the statistics really say?

Gartner reports that 82.6 million PCs were shipped in the fourth quarter of 2013. That’s a 6.9 percent drop from the fourth quarter of 2012 and the seventh quarter in a row of declining shipments. This sounds like bad news, but the decline in PC sales has actually been slowing. Gartner believes that PC sales have “bottomed out” — while PC sales are dropping, it’s hardly a market in free fall. But it’s not really the sales that are important — it’s what people are actually using.

StatCounter’s browser usage data for January 2014 shows that desktop browsers accounted for 71.89% of visits, while mobile (smartphones) accounted for 22.42% and tablets accounted for just 5.69%. Most people are clearly using desktop web browsers to access the web. If they’re not, they’re probably using a smartphone browser — tablet browsers are far behind.

But perhaps we’re just looking in reverse. What’s really important is the long-term trend. If tablet sales are accelerating, then tablets may just “kill” PCs.

Here’s the thing: While more tablets are being sold than ever, the growth of tablet sales is slowing. IDC reports that 76.9 million tables were shipped in the fourth quarter of 2013. That’s a 28.2% growth in shipments over the same quarter in the previous year, but that  previous quarter had an 87.1% growth over its previous year. In other words, tablet sales are growing more slowly — sales aren’t accelerating, but are slowing down. Many of these tablets are also cheaper, smaller, lower-end tablets that are even less prepared to replace a PC than premium tablets like the iPad. IDC concludes that “markets such as the U.S. are reaching high levels of consumer saturation.”

And, did you catch that? In spite of all the doom and gloom, more PCs than tablets were shipped worldwide in the fourth quarter of 2013.

We Don’t Need to Replace PCs As Often

IDC used a word — “saturation” — that perfectly describes a big part of what’s going on. You don’t have to replace your computer as often as you used to. There was a time when each new version of Windows, Office, and even your web browser was heavier than ever. You saw a big speed improvement when you bought a new computer. You needed to keep buying new computers, because Windows Vista definitely wouldn’t run very well on that PC you bought when Windows XP came out. Today, Windows 7 and 8 run faster than Windows Vista on the same hardware. Even gaming PCs built years ago can likely still run the latest PC games at high settings.

People just don’t have to replace their PCs as often, so of course PC sales are falling. PCs have reached a point where they’re “good enough.” People aren’t scrambling to upgrade their PCs every few years — they’re replacing them only when they need to. People have more PCs — laptops and even desktops — lying around than ever.

On the other hand, tablets are still a new thing. Many people still don’t have tablets, so people are buying them more and more. If you want a new gadget and you’re perfectly happy with your laptop, of course you’re going to buy a tablet instead. And, like smartphones, tablets are improving faster than ever. Tablets from a few years ago have noticeably worse screens and slower hardware. They’re improving fast, just like PCs used to. You’ll see more of a benefit from upgrading an iPad that’s a few generations old than you will a laptop that’s a few generations old. Eventually, tablets will get to that “good enough” point where people won’t have to upgrade every few years, too. Tablet sales will slow and people will be saying “tablets are dying” because everyone is buying those new virtual reality headsets instead.

So What’s Going On?

Let’s analyze this data using some common sense. In the real world, multiple types of products can coexist for different people.

First, tablets aren’t just a fad. In the past, everyone who wanted to browse the web, send some email, watch YouTube, do online banking, and play simple games needed an expensive PC that required regular maintenance. Now, if someone just wants an easy little device that lets them get online, they can get a tablet. Not everyone needs a PC, and even people who need PCs for some reason may want to use a tablet in their downtime instead.

Second, PCs are still useful. They’re not an obsolete piece of technology. iPads, Android tablets, and even Windows 8 devices with their half-baked “Store apps” are no substitute for real PCs when it comes to doing many things. Whether you’re writing, coding, editing images, doing CAD work, doing other productive work — or even playing PC games — there’s a good chance you depend on a mouse and keyboard. You also depend on having a larger screen — maybe even multiple displays — and the ability to have more than one thing on screen at a time.

People are using tablets, but people are also still using PCs. As usual, the answer is somewhere in between “PCs are dying” and “tablets are a fad.”

What is a PC? The Lines Are Blurring

But what is a PC, anyway? “PC” really just stands for “personal computer,” but it’s become synonymous with Windows, Linux, and even Mac OS X desktops and laptops. Really, smartphones are tablets are just as much personal computers as laptops and desktops are. They run software and are much faster than the PCs many of us grew up with.

This isn’t just a hand-waving distinction. The lines are blurring. For example, is a Surface 2 tablet running Windows RT a PC? Maybe not — it’s just a tablet and can’t run typical Windows desktop applications! But what if you connected a keyboard, mouse, and connected it to an external display? What if you spent all your time using Office applications on the desktop on a large monitor? What about those new 8-inch Windows 8.1 tablets with an Intel chip and a full desktop — are they PCs? If they’re not because the screen is too small and they don’t have a keyboard, what if you connected a keyboard and an external display? Do they stop being PCs when you unplug your peripherals?

It’s not all about Windows, either. Would an Ubuntu Phone be a PC? Of course not, it’s a phone! But what if you plugged that Ubuntu phone into an HDMI port, connected a mouse and keyboard, and used the full Linux desktop on an external display? It’s clearly a PC now — but it’s running on a phone.

Tablets and PCs are growing closer to each other. Tablets are becoming more capable, and many PC laptops are becoming more mobile with better battery life. Microsoft is forcing tablets and PCs together — with mixed success — but Ubuntu is also working on creating a single operating system that can run on your phone and also be your desktop PC with the appropriate peripherals.

In reality, there are more different types of hardware and software than ever. Not everyone is forced to use a beige tower running Windows. But PCs aren’t dying just because people have more choice. Some people will always need large screens, multiple windows, mice, keyboards, and all that other good stuff. Not everything will be done on a 10-inch or smaller touch screen.

If we all end up running powerful software on Android, iOS, or another “mobile operating system” and using devices with large screens, multiple windows, keyboards, and mice — well, then we’re just using a different type of PC. PCs are more than Windows and desktop towers. That said, there’s still a place for both Windows and desktop PCs in this new order.

So, can we all please stop saying the desktop PC is dying? Thanks!



Fast, Friendly Service from Friendly Computers in Spokane. Why Call a Geek When You Can Call a FRIEND? We come to YOU! We specialize in laptop repair, hard drive failures, and virus removal. We fix it all.

Tagged with: , , ,
Posted in Uncategorized

Keep unwanted programs out with Unchecky

You recommend a program to a family member, and they proceed to install it along with five other junkware programs that sneak their way on to their computer in the installation process.  Sound familiar?  Unchecky prevents these unnecessary programs from installing themselves by unchecking the appropriate boxes.

What is Unchecky?

Unchecky is a lightweight application that aims to “keep your checkboxes clear.”  It automatically unchecks the boxes that allow companies to install promotional crapware on your computer, and issues warnings if you accidentally agree to install something you may not want.

For the casual computer user, Unchecky is something of a godsend.  How many times have you heard “But I swear I didn’t install any of these toolbars, I don’t know how they got there!”  Indeed, most people are smart enough to avoid deliberately installing junk, but it’s a lot easier to inadvertently install something unnecessary when you’re going through the installation process for a legitimate program. is notorious for sneaking absolute crap on to your system, and passing off the option as an End User License Agreement, something that most people are accustomed to automatically accepting without reading.  As you can see in the screenshot below, Unchecky was able to detect the scam and issue a warning.


For a competent computer geek, Unchecky is probably not really necessary.  However, if you find yourself skimming through installations and ending up with coupon offers you don’t remember asking for, it may be a good idea to install Unchecky.  Even the most careful geeks can be duped into accepting a promotional offer, or maybe you just want to save some mouse clicks and make installations faster.

Installing Unchecky

This is probably the easiest program in the world to install.  Head over to and click on the big button that says download.  Run the file, click install, click finish, and you’re done!  Since Unchecky is mostly meant for novice users, its simple installation process is well-suited.

Wait, is it running?

Unchecky remains completely unobtrusive, working in the background to keep you safe from junk offers, without even displaying an icon in your notification area.  If you need to make sure it’s running, you can check the task manager.

Updates are automatic as well, so you can literally install Unchecky and then forget about it.  You should never actually notice that it’s running, until you go to install a program and see that all the junk offers have been unselected for you.

How well does it work?

Unchecky is still really new, as you can see by the short changelog.  It’s still in a very early beta version, and its first release was only a couple months ago (November 2013).  When we put Unchecky to the test, it failed to detect a lot of offers.  It seems to work particularly well for really popular and current versions of software.  When we tested against old software, it failed nearly every time.

On older software, we also noticed some mixed results, such as in this example where it succeeds at unchecking several boxes but leaves one checked and consequently installs some crapware.

As with all software, we expect these shortcomings to be addressed and become few and far between as it continues to mature.

The Verdict

Unchecky is an up and coming program that’s showing a lot of promise.  Its biggest faults are with old software and really obscure programs – the only people who really download that stuff are geeks, who should be competent enough to read through installation menus anyway.  Therefore, Unchecky caters perfectly to its target audience of casual computer users.  If you don’t want to download it, at least consider recommending it to your parents so you can save yourself (and them) a bunch of headaches later.



Fast, Friendly Service from Friendly Computers in Spokane. Why Call a Geek When You Can Call a FRIEND? We come to YOU! We specialize in laptop repair, hard drive failures, and virus removal. We fix it all.

Posted in Uncategorized

Keyloggers Explained

A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.

Keyloggers are generally installed by malware, but they may also be installed by protective parents, jealous spouses, or employers who want to monitor their employees. Hardware keyloggers are perfect for corporate espionage.

How a Keylogger Would Get On Your Computer

Most keyloggers on average computers arrive as malware. If your computer becomes compromised, the malware  may include a keylogger or function as a Trojan that downloads the keylogger along with other harmful software. Keyloggers are a popular form of malware because they allow criminals to steal credit card numbers, passwords, and other sensitive data.

Keystroke-logging software may also be installed by someone close to you. A protective parent might go beyond typical parental controls and install software that includes a keylogger, allowing them to see everything their child types. A jealous spouse concerned about their husband or wife cheating might install a keylogger on their computer to keep tabs on them — it’s not necessarily a good thing, but it happens.

Some employers might install keystroke loggers on their employees’ computers to monitor everything they do, or just to investigate employees they’re suspicious about. Laws vary about when this is legal from jurisdiction to jurisdiction.


Hardware Keyloggers

Some keyloggers can be implemented entirely as hardware devices. A typical desktop computer has a keyboard that connects to the back of the computer using a USB cable. If someone were to sneak in, unplug the keyboard’s USB cable, then attach a specialized USB device between the computer’s USB port and the keyboard’s USB connector, the device could function as a keylogger. Sitting in the middle, it could intercept keyboard signals from the keyboard, store them on the device, and then pass the keystrokes to the computer so everything would appear to be working normally. Security software on the computer wouldn’t be able to detect this keylogger, as it runs entirely in hardware. If the computer were hidden under a desk, no one would notice the device.

The person could then come back a few days later to grab the device and sneak off with it, leaving no trace of keylogging software or suspicious network activity.

If you’re worried about hardware keyloggers, just check the back of your computer and ensure there’s no suspicious device between your keyboard cable and the computer itself — of course, there probably won’t be. (And if there is, it’s probably some sort of legitimate adapter like the one below.)


How Keyloggers Function

Keylogging software runs hidden in the background, making a note of each keystroke you type. Software could scan through the file for certain types of text — for example, it could look for sequences of numbers that look like credit card numbers and upload them to a malicious server so they can be abused.

Keylogging software may also be combined with other types of computer-monitoring software, so the attacker would be able to see what you typed when you visited your bank’s website and narrow in on the information they want. A keylogger could detect the first keystrokes you typed into an online game or chat program, stealing your password.

Someone could also look through the entire log history to spy on you and see what you search for and type online. Computer-monitoring software intended for use by parents or employers may often combine the keylogger with a screenshot program, so someone can read through a history of what you typed combined with screenshots of what was on your computer screen at the time.

Ensuring You Don’t Have Keyloggers

Keylogging software is essentially just another type of malware. You can avoid keylogging software in the same way you avoid other malware — be careful what you download and run, and use a solid antivirus program that will hopefully prevent keyloggers from running. There are no real special tips for avoiding keyloggers in particular. Just be careful and exercise basic computer security practices.

If you’re feeling really paranoid about keyloggers, you could try logging into your bank’s website or other sensitive websites with a software keyboard — in other words, you click buttons on the screen rather than pressing buttons on your keyboard. This won’t protect you from many keyloggers that monitor multiple forms of text input beyond just logging keystrokes, so it’s probably not worth bothering with.


Keyloggers are one of the more dangerous forms of malware, as you won’t realize they’re running if they’re doing their job well. They hide in the background and don’t cause any trouble, capturing credit card numbers and passwords for as long as they can evade detection.


Fast, Friendly Service from Friendly Computers in Spokane. Why Call a Geek When You Can Call a FRIEND? We come to YOU! We specialize in laptop repair, hard drive failures, and virus removal. We fix it all.

Posted in Uncategorized

Top 25 Worst Passwords

If you have these as your passwords – you need to change them. These are the Top 25 worst passwords you can have.

1. 123456

2. password

3. 12345678

4. qwerty

5. abc123

6. 123456789

7. 111111

8. 1234567

9. iloveyou

10. adobe123

11. 123123

12. admin

13. 1234567890

14. letmein

15. photoshop

16. 1234

17. monkey

18. shadow

19. sunshine

20. 12345

21. password1

22. princess

23. azerty

24. trustno1

25. 000000

Fast, Friendly Service from Friendly Computers in Spokane. Why Call a Geek When You Can Call a FRIEND? We come to YOU! We specialize in laptop repair, hard drive failures, and virus removal. We fix it all.


Posted in Uncategorized

How to Lock Down Your iPad or iPhone for Kids

iPads and iPhones give you control over how your kids can use your devices. You can quickly lock your device to a certain app before handing it over or lock down an entire device with comprehensive parental controls.

These features are named Guided Access and Restrictions, respectively. Guided Access is ideal for temporarily handing your iPad or iPhone to a kid, while Restrictions are ideal for locking down a device your kids use all the time.

Guided Access

Guided Access allows you to lock your device to a single app. For example, you could lock your device to only run a specific educational app or game and then hand it to your kid. They’d only be able to use that specific app. When they’re done, you can unlock the device with a PIN you set, allowing you to use it normally.

To set up Guided Access, open the Settings app and navigate to General > Accessibility > Guided Access. From here, you can ensure guided access is enabled and set a passcode.


To enable Guided Access, open the app you want to lock the device to — for example, whatever educational app or game you want your kid to use. Quickly press the Home button three times and the Guided Access screen will appear.

From here, you can further lock down the app. For example, you could disable touch events completely, disable touch in certain areas of the app, disable motion, or disable hardware buttons.

You don’t have to configure any of these settings, however. To start a Guided Access session, just tap the Start option at the top-right corner of the screen.


If you try to tap the Home button to leave the app, you’ll see a “Guided Access is enabled” message at the top of the screen. Press the Home button three times again and you’ll see a PIN prompt. Enter the PIN you provided earlier to leave Guided Access mode.


That’s it — whenever you want to enable Guided Access, just open the app you want to lock the device to and “triple-click” the Home button.


Restrictions allow you to set device-wide restrictions that will always be enforced. For example, you could prevent your kids from ever using certain apps, prevent them from installing new apps, disable in-app purchases, only allow them to install apps with appropriate ratings, prevent access to certain websites, and lock down other settings. Settings you select here can’t be changed without the PIN you provide.

To set up Restrictions, open the Settings app and navigate to General > Restrictions. Enable Restrictions and you’ll be prompted to create a PIN that you’ll need whenever you change your Restrictions settings.


From here, you can scroll down through the list and customize the types of apps, content, and settings you want your kids to have access to.

For example, to enforce content ratings, scroll down to the Allowed Content section. Tap the Apps section and you can choose which types of apps your kids can install. For example, you could prevent them from installing apps with the “17+” age rating.


Tap the Websites option and you’ll be able to block the Safari browser from loading certain types of websites. You can limit access to certain types of adult content or choose to only allow access to specific websites. You can customize which exact websites are and are not allowed, too.

If you wanted to block access to the web entirely, you could disable access to the Safari browser and disable the Installing Apps feature, which would prevent your kids from using the installed Safari browser or installing any other browsers.


Other settings allow you to lock certain privacy and system settings, preventing them from being changed. For example, you could prevent your kids from changing the Mail and Calendar accounts on the device. Near the bottom, you’ll also find options for Game Center — you can prevent your kids from playing multiplayer games or adding friends in Apple’s Game Center app.

The settings you choose will always be enforced until you enter the Restrictions screen in the settings, tap the Disable Restrictions option, and provide the PIN you created.

iOS still doesn’t provide multiple user accounts, but these features go a long way to letting you control what your kids can do on an iPad, whether the iPad is primarily yours or primarily theirs.

Guided Access and Restrictions will work on an iPod Touch, too. If you purchased an iPod Touch for your kid, you can lock it down in the same way.



Fast, Friendly Service from Friendly Computers in Spokane. Why Call a Geek When You Can Call a FRIEND? We come to YOU! We specialize in laptop repair, hard drive failures, and virus removal. We fix it all.

Posted in Uncategorized

New RansomWare

Ransomware: Why This New Malware is So Dangerous and How to Protect Yourself


Ransomware is a type of malware that tries to extort money from you. One of the nastiest examples, CryptoLocker, takes your files hostage and holds them for ransom, forcing you to pay hundreds of dollars to regain access.

Most malware is no longer created by bored teenagers looking to cause some chaos. Much of the current malware is now produced by organized crime for profit and is becoming increasingly sophisticated.

How Ransomware Works

Not all ransomware is identical. The key thing that makes a piece of malware “ransomware” is that it attempts to extort a direct payment from you.

Some ransomware may be disguised. It may function as “scareware,” displaying a pop-up that says something like “Your computer is infected, purchase this product to fix the infection” or “Your computer has been used to download illegal files, pay a fine to continue using your computer.”

In other situations, ransomware may be more up-front. It may hook deep into your system, displaying a message saying that it will only go away when you pay money to the ransomware’s creators. This type of malware could be bypassed via malware removal tools or just by reinstalling Windows.

Unfortunately, Ransomware is becoming more and more sophisticated. One of the latest examples, CryptoLocker, starts encrypting your personal files as soon as it gains access to your system, preventing access to the files without knowing the encryption key. CryptoLocker then displays a message informing you that your files have been locked with encryption and that you have just a few days to pay up. If you pay them $300, they’ll hand you the encryption key and you can recover your files. CryptoLocker helpfully walks you through choosing a payment method and, after paying, the criminals seem to actually give you a key that you can use to restore your files.

You can never be sure that the criminals will keep their end of the deal, of course. It’s not a good idea to pay up when you’re extorted by criminals. On the other hand, businesses that lose their only copy of business-critical data may be tempted to take the risk — and it’s hard to blame them.


Protecting Your Files From Ransomware

This type of malware is another good example of why backups are essential. You should regularly back up files to an external hard drive or a remote file storage server. If all your copies of your files are on your computer, malware that infects your computer could encrypt them all and restrict access — or even delete them entirely.

When backing up files, be sure to back up your personal files to a location where they can’t be written to or erased. For example, place them on a removable hard drive or upload them to a remote backup service like CrashPlan that would allow you to revert to previous versions of files. Don’t just store your backups on an internal hard drive or network share you have write access to. The ransomware could encrypt the files on your connected backup drive or on your network share if you have full write access.

Frequent backups are also important. You wouldn’t want to lose a week’s worth of work because you only back up your files every week. This is part of the reason why automated back-up solutions are so convenient.

If your files do become locked by ransomware and you don’t have the appropriate backups, you can try recovering them with ShadowExplorer. This tool accesses “Shadow Copies,” which Windows uses for System Restore — they will often contain some personal files.


How to Avoid Ransomware

Aside from using a proper backup strategy, you can avoid ransomware in the same way you avoid other forms of malware. CryptoLocker has been verified to arrive through email attachments, via the Java plug-in, and installed on computers that are part of the Zeus botnet.
  • Use a good antivirus product that will attempt to stop ransomware in its tracks. Antivirus programs are never perfect and you could be infected even if you run one, but it’s an important layer of defense.
  • Avoid running suspicious files. Ransomware can arrive in .exe files attached to emails, from illicit websites containing pirated software, or anywhere else that malware comes from. Be alert and exercise caution over the files you download and run.
  • Keep your software updated. Using an old version of your web browser, operating system, or a browser plugin can allow malware in through open security holes. If you have Java installed, you should probably uninstall it.

For more tips, read our list of important security practices you should be following.


Ransomware — CryptoLocker in particular — is brutally efficient and smart. It just wants to get down to business and take your money. Holding your files hostage is an effective way to prevent removal by antivirus programs after it’s taken root, but CryptoLocker is much less scary if you have good backups.

This sort of malware demonstrates the importance of backups as well as proper security practices. Unfortunately, CryptoLocker is probably a sign of things to come — it’s the kind of malware we’ll likely be seeing more of in the future.


Fast, Friendly Service from Friendly Computers in Spokane. Why Call a Geek When You Can Call a FRIEND? We come to YOU! We specialize in laptop repair, hard drive failures, and virus removal. We fix it all.

Friendly Computers can help you be prepared for this. Give us a call – 509-343-0273.

Posted in Uncategorized