Friday, March 29, 2013

PROTECT YOUR PRIVACY



Think before you share personal information First, read the website's privacy policy Privacy policies should clearly explain what data the website gathers about you, how it is used, shared, and secured, and how you can edit or delete it. (For example, look at the bottom of this and every page on Microsoft.com.) No privacy statement? Take your business elsewhere. Do not share more than you need to Do not post anything online that you would not want made public. Minimize details that identify you or your whereabouts. Keep your account numbers, user names, and passwords secret. Only share your primary email address or Instant Message (IM) name with people who you know or with reputable organizations. Avoid listing your address or name on Internet directories and job-posting sites. Enter only required information—often marked with an asterisk (*)—on registration and other forms. Choose how private you want your profile or blog to be Modify Windows Internet Explorer or website settings or options to manage who can see your online profile or photos, how people can search for you, who can make comments on what you post, and how to block unwanted access by others. Monitor what others post Search for your name on the Internet using at least two search engines. Search for text and images. If you find sensitive information on a website about yourself, look for contact information on the website and send a request to have your information removed. Regularly review what others write about you on blogs and social networking websites. Ask friends not to post photos of you or your family without your permission. If you feel uncomfortable with material such as information or photos that are posted on others' websites, ask for it to be removed. www.livetechondemand.com

Thursday, March 28, 2013

Removing FBI Moneypak virus from your computer

Removing FBI Moneypak virus from your computer A type of threat, known as ransomware, displays alerts saying that you need to send money to unlock your computer. A ransomware restricts access to the computer and demands a ransom to be paid to the creator of the threat to use the computer. The threat instructs the user to send money by Moneypak or uKash depending on region. The threat tries to trick you into sending money by making you think that your computer is no longer accessible. STEP 1 Restart your computer in Safe mode with Networking Restart the computer. As soon as the computer starts, begin to tap the F8 key until the boot menu appears. In the Windows Advanced Options Menu, use the arrow keys on the keyboard to select Safe mode with Networking. Press Enter. If you are prompted, log on as administrator. STEP 2 Download and run Malwarebytes Download Malwarebytes Click run. Read the license agreement, and click Accept. In the Malwarebytes window, click the full icon. full scan requires a system restart. When you see a prompt to restart the computer, click Restart. Restart the computer normally. * If the FBI MoneyPak Virus opens in safe mode* Shut down your computer Restart the computer. As soon as the computer starts, begin to tap the F8 key until the boot menu appears. In the Windows Advanced Options Menu, use the arrow keys on the keyboard to select Safe mode with command prompt. Press Enter. tpye in the command below (windows xp) C:\windows\system32\restore\rstrui.exe (Vista or later) rstrui.exe follow instructions for system restore choose a restore date prior to infection once you computer reboots and system restore is completed follow step 2 instructions. For assistace with FBI Virus Removal Call Live Tech On Demand 1 (800) 910-8266 www.livetechondemand.com

The Benefits of Remote Computer Repair

Learn More about the benefits of remote computer repair below are a few articles:Choosing The most effective live tech support7327261How to pick The very best online computer repair8506116Choosing The most effective online computer repair5309374Selecting The top live tech support2862231Selecting The top live tech support6082367Choosing The most effective online computer repair8745865How To Choose The Best online virus removal42246How to pick The very best online computer repair2578593How to pick The very best online computer repair8250569Selecting The top live tech support3045797Choosing The most effective live tech support852955How To Choose The Best online virus removal4417842Selecting The top live tech support2064830Choosing The most effective online computer repair4723630How to pick The very best online computer repair2163889Selecting The top live tech support1965770How To Choose The Best online virus removal3653460How To Choose The Best online virus removal3752519How To Choose The Best online virus removal2116316 How to pick The very best online virus removal6619063How to pick The very best online computer repair4883801