Virus/Malware Removal, Memory Upgrade, Java Update Fix, New PC Set-up

Here’s a few recent jobs that I can remember off the top of my head:

istartsurf Browser Search HijackRemote Virus, Malware, and unwanted programs removal. This image shows a browser search hijack, where instead of opening a Google.com search page it opens a different search page. This was done without the client’s knowledge, probably as a result of downloading free software from somewhere.

Memory upgrade (more RAM).

Remote to fix a Java update that wouldn’t install properly.

New PC setup, including security, and data transfer.

If you see anything like this, then you have a PUP (Potentially Unwanted Program)

RegServo

This is an example of a Potentially Unwanted Program (or PUP). These are generally offered as free scanners or bundled with other free software. PUPs are sometimes referred to as a virus, malware, fakeware or scareware. They offer little or no benefit. Moreover, they slow down the computer and generally annoy you.

Any program that gets onto you system and reports that you have problems is probably reporting fake issues. They generally ask you to register the software to clean up these fake problems, and part of the registration often includes paying money.

You should uninstall all such software, if you can. If you need help, please contact me. Most of this can be cleaned up remotely by me. The quicker you act, the less chance there is of this software messing up your computer even more or installing more software you don’t want.

Call me now if you want me to check your system security, remove software, sort out any other issues. Same day service often available!

Remove old versions of Java to help keep your computer secure (easy guide)

Remove old versions of Java to help keep your computer secure (easy guide)

If you want to know more about Java then there is some background information after these instructions.

Let’s get straight to it.  Here’s what to do today:

1. First, check that you have the current version of Java by going here http://www.java.com/en/download/installed.jsp and clicking “Verify Java Version”, and following the on-screen prompts, including “Run” to “Do you want to run this application”.

2.  When you have the recommended version, click the link (underlined text) in the box entitled “Windows Users”.  Again, Run the application when prompted.

3.  Click “I agree to the Terms and Want to Continue”.  Read the terms first, of course 😉

4.  Follow any instructions to remove old versions.

5.  When you see the page that says “There are no old versions of Java on your computer”, then you’re done for today.

If you get stuck, contact me to arrange for technical support from me.  If you’re local I can visit you, or if not I can access your computer remotely and securely (with your permission) and sort it out for you.

And, in the future:

1.  Always update Java when an update is available

2.  Be careful that it’s a genuine Java Update, not a fake one that is really a virus.

3.  When installing Java Updates, decline the extra software they recommend you install; this is a way Oracle earns money from Java, by installing other software too that generates income from them.  The generation of that income usually comes from the sale of your eyeballs by showing adverts, or your data by tracking your internet use.  See my post here http://www.bowenracing.com/2013/02/java-update-doing-naughty-things-again-trojan/

Background to Java

Java is a programming language.  You probably have it installed on your computer, phone, and tablet already.  It allows software writers to write one piece of software that will run on many types of device and operating system.  So, Java is very useful.

Unfortunately, if it’s useful for people to write software we can all use, it’s also useful to those who want to use it for bad stuff.  Virus writers, hackers, and ‘potentially unwanted program’ designers can all use the flaws (vulnerabilities) in Java to infect your devices.  Oracle, the owners of Java, then realise their software has security vulnerabilities and then ‘patch’ the holes with Java updates.

Unfortunately, the Java updates sometimes leave old versions of Java on the computer, including the security vulnerabilities, which can still be used.

If you didn’t already do it, go back to the top of this page and check you have the current version and remove old versions using my instuctions.

If you get any problems, please contact me to arrange for tech support from me.

Thanks.

SearchGol browser hijack removal

A new client called me in because they had adverts on their search page and pop-ups, and their home page was set to searchgol.com.  These browser hijacks or search hijacks aren’t just annoying, the can lead you to other websites that install more rubbish on your system, and the certainly track your internet searches and browsing history and habits.

I have had lots of this type of thing lately and usually it’s fairly easy for me to remove these search hijacks, but it was the first time I had seen SearchGol.  I removed everything as usual, but each time I restarted Chrome searchgol came back.  Internet explorer was ok, but even unistalling Chrome and reinstalling wouldn’t stop the searchgol redirect from coming back.

[EDIT: I subsequently suspect that Search Protect was being used to prevent the user (and me) from changing the search provider too.  Search Protect can also be difficult to remove]

I tried all the tools and instructions I could find when searching for a solution on Google, but none of them worked.  It had taken much longer than the time I estimated, but I was determined not to give up.  I slept on it, and had an idea.  The next evening I tried it and it worked, searchgol was gone!

I’m usually good at finding a solution on Google, but none of the solutions I tried had worked.  Sometimes, I have to rely on my own brain to solve a problem.

If you have ads showing on your search engine (or search page) then you might have a browser hijack or search hijack.  Contact me and I will arrange an appointment to remove it either in person, or by remote login to your computer.