Profile cover photo
Profile photo
Vancouver Computer Repair Services

Post has attachment
What do dogs, population genetics, and an affinity for purple squiggles have in common? They all partially inspired Marsha Falco to invent the game SET.
Add a comment...

Post has attachment


1. Trust: Make sure you trust the IT support company you want to hire.It is vital that you feel comfortable with the person or company you are working with. After all, they are going to have your company’s data in their hands. You need to trust your IT services provider as you trust your accountant. Trust your intuition in this matter.

2. Skills: It is important to know if the computer support services company you are dealing with has the right level of skills for IT support. You might wonder how many years of experience the IT staff has, who are their clients and how long have they been with them. Are the field technicians fully supported by senior management and do they have access to invaluable resources that can save time if a serious problem occurs. For example Microsoft has a professional support for training and qualifications as well as technical forums and valuable troubleshooting information libraries.

3. Communication: Do the IT support company staff communicate in clear, understandable language (English). Miscommunication in some situations can have serious negative consequences.

4. Cost: Cheaper may seem appealing, but can end up costing more later, if the job was not done right the first time because of unqualified personnel. Hiring the right people has a cost.

5. Preventive maintenance Or reactive maintenance: Preventive maintenance (like IT Outsourcing) requires regular checks and updates of your IT infrastructure. If done properly the need for reactive maintenance

Add a comment...

Post has attachment
How To protect your Computer from a Ransomware attack?

In recent months, a very dangerous malware spread around the world and “infected” millions of vulnerable computers. Computers in more than 100 countries have been affected in just a few hours. WannaCry (which means “Wants to cry”) is so named because it is a ransomware: software designed by criminals that takes your data hostage until you have paid the ransom money.

How to protect yourself? There are various ways, as long as you act quickly.

What is ransomware and what exactly does WannaCry do?

As I explained above, this is a malware that takes advantage of a security hole to infiltrate your computer and take your data hostage.

A traditional virus infects your computer for the purpose of being reused to cause attacks on websites, for example, or to steal your personal data (banking or credit card information, passwords, etc.) without your knowledge.

Ransomware, on the other hand, will encrypt all your data, making your computer unusable and your data inaccessible. You cannot run your security software, even after restarting! To get rid of this nuisance and recover your personal or professional data, you must then follow the instructions on the screen and send a payment to cybercriminals.

The sum generally requested is around $ 400, in the form of Bitcoins, a virtual currency. Worse, again, the more you wait or try to get rid of this problem, the more the amount may increase!

WannaCry, a ransomware of another kind.

Deciphering (or decrypting) a disk or data without knowing the key is already almost impossible. According to the researchers, WannaCry is based on ETERNALBLUE, a kind of trojan created by the NSA (National Security Administration) in the United States, on which a group of hackers would have got their hands last months.

What makes WannaCry particularly dangerous is that once it infects a computer, it will try to spread to other computers in the same way: take advantage of the fact that a Windows computer was updated with all the security patches released by Microsoft.

The beginning of the end for WannaCry?

It is believed that the first infections happened through email. The user clicked on a link or opened an attachment and his computer was infected. The problem is that sometimes the malware does not activate immediately. They stay dormant for a few days or weeks, giving computers as much time as possible to become infected and then activate, causing maximum damage.

A computer security researcher named malwaretechblog, on Twitter, looked at the source code of WannaCry and noticed that it was trying to connect to a website whose domain name had not been registered (in short, the website did not exist yet). The researcher has registered the domain name in question and WannaCry has stopped working, unable to spread!

Microsoft had been aware of the security breach for few weeks, because of the NSA’s leak story , and developed a patch, included in a recent Windows update. But not everyone keeps its copy of Windows up to date and this made it easier for cybercriminals behind WannaCry. In addition, many computers are still running on Windows XP, a version that has not been supported by Microsoft for years. Unable to be updated, these computers were the most vulnerable and therefore constitute a large part of the pool of infected computers.

If the spread of WannaCry is stopped for the moment, infected computers are still infected. And cybercriminals are probably already working on a variation of this security hole.

FAQ about malware threats

What is going on?
Cybercriminals use malicious software called ransomware, which hijacks data on Windows computers by encrypting files, rendering them unusable and requiring payment of a “ransom” before they can restore access. This type of criminal activity has already occurred before, but this new attack seems to be the most widespread ransomware attack to date. It has spread to more than 100 countries.

How do I know if it’s happening to me?
These cyber criminals have designed their ransomware system to modify your wallpaper to present their ransom demands and instructions on how to comply with them. This desktop image is unavoidable and inevitable. The wallpaper will change almost immediately after infection. Once this happens, your data, technically speaking, has been encrypted. In concrete terms, they have been rendered unusable.

How can I avoid this attack?
First, be sure to have automatic updates enabled for your computer’s operating system and all applications. Next, make sure you have Installed the latest antivirus software on your computer. If you do not have one, you can search and buy one. Finally, be careful when you open attachments or click on links that are unknown to you or when you use public wireless networks.

What else can I do?
It is always important to back up important data on an external device or on the cloud. Note that if you are using an external hard disk, it is advisable to unplug it from your computer when it is not in use so that the files are not affected if your computer is infected. Cloud storage is available through a number of third parties, including Google, Apple, Microsoft, and Box.

If in doubt, please call Vancouver Computer Repair Services, an agent will be able to conduct a vulnerability assessment to ensure that your PC has received the latest updates from security.

If I’m infected and do not have my data backed up to the cloud or an external hard drive, what can I do?
Specialists in this field do not advise paying ransom because there is no guarantee that your data will be accessible after payment. Essentially, you pay at your own risk. In addition, it is thought that people making payments could be targeted in the future for additional ransom attacks.

If I’m infected and my data has been saved, what should I do?
If you have backed up your files, it is possible to “rebuild” your computer using these saved files. If you know the process, you can do it yourself. However, be aware that your computer may infect other computers on your network, so take appropriate precautions.

You can also request the assistance of our expert at You can come to the store for help, or we can come to your home or help you over the phone.

If my computer is infected, how can I avoid infecting other computers on my network?
This form of ransomware can affect other computers on the same wireless or wired network. If you discover a ransomware system on your computer, you should turn off the device immediately and take the appropriate precautions before turning it back on. This includes turning off Wi-Fi or unplugging wired connections on all other computers in your home.
Add a comment...

Post has attachment
The efficiency of Japan's bullet trains are a modern marvel, and now JR East, the East Japan Railway Company, wants to increase it even further. The company began a two-year construction project that will get passengers from Ueno to Omiya an entire one minute faster (at most).
Add a comment...

Post has attachment
Amazon may not have much choice but to address mounting criticism over its sales of facial recognition tech to governments. The American Civil Liberties Union has delivered both a petition and a letter from 17 investors demanding that Amazon drop its Rekognition system and exit the surveillance business. While the two sides have somewhat different motivations, they share one thing in common: a concern for privacy.
Add a comment...

Post has attachment
Firefox is jazzing things up with a couple of new test features that should embolden multitaskers and those who like to tinker with aesthetics. Side View lets you view a pair of tabs side-by-side without needing to open a new browser window. Once you click the Side View button on your toolbar, you can pick which tab you want to see on the side. It can be one you already have open or a tab you recently closed. You can open a browser link in the sidebar too. The two tabs are displayed in a mobile view by default to maximize your screen real estate, and you can drag the divider to make one tab larger than the other.
Add a comment...

Post has attachment
If it wasn't already apparent that Canada is becoming a major hub for AI research, it is now. Samsung has opened an AI Center (or Centre, for the Canadian crowd) in Toronto, and it's only the company's second big lab in North America -- the other is located near Google in Mountain View. The new location will help foster AI across a wide range of devices, ranging from self-driving cars to smart appliances.
Add a comment...

Post has attachment
The richest man in the world has been using his wealth in unexpected ways. Jeff Bezos announced this week that Amazon would create an independent company with JPMorgan and Warren Buffett's Berkshire Hathaway. The new venture seeks to keep employee health-care costs under control and will initially focus on technology that would "provide U.S. employees and their families with simplified, high-quality and transparent healthcare at a reasonable cost."
Add a comment...

Post has attachment
A new report from Ernst & Young details just how big of a problem security is when it comes to cryptocurrencies. Researchers collected data on 372 initial coin offerings (ICOs) that took place between 2015 and 2017 and found that over 10 percent of ICO proceeds are stolen by hackers, a percentage that amounts to the theft of up to $1.5 million per month. And in addition to monetary theft, hackers are also gaining access to personal information like addresses, phone numbers, bank details and credit card numbers.
Add a comment...

Post has attachment
It was widely available material, but it still raises concerns.
Add a comment...
Wait while more posts are being loaded