Improve Your WiFi | Mobile Phone Signal

Here are a few tips from Tech Support on how to improve your WiFi signal

These tips will work for your Smartphone as well as other WiFi dependent devices around your home or office.

Do you have a few areas in the house/office where connection to WiFi is problematic?

Improve Your WiFi | Mobile Phone Signal
Improve Your WiFi | Mobile Phone Signal

Improve your WiFi: We have installed many networks with WiFi. There are many things that can make your WiFi signal weak. Concrete walls of course and having your WiFi antennas located at the opposite end of the house/office can create low to no signal. But also things you really don’t think about can get in the way. If you have a wireless portable phone (or the base station) located next to the WiFi antenna – that can cause interference.

Also most any other wireless device (speakers, Roku, Emergency Alert system, Children Room Monitor, Camera, Computer/Laptop with WiFi enabled, etc.) can disrupt the WiFi and cell phone signals. Best strategy is to try to locate the WiFi base (usually your ISP/cable company ROUTER box) as central in the house/office as possible and away from the other WiFi devices. If that is already located in an undesirable place and it would be costly or problematic to relocate it – you can get a number of different devices to extend your WiFi signal into low signal areas of the house.

One of the devices we like to use simply plugs into an electric outlet next to your Router/WiFi and makes your electric circuit in the house into a WIRED network. These are called “Powerline Kits” – keyword search will find them for you. You then locate a second device from the kit plugged into the wall in the low signal area and plug in a WiFi ACCESS POINT (again keyword search will find those). Your WiFi network has just been extended into another section of your building and works as if the Router/WiFi were located at the new point.

Note: Best to avoid anything called a “WiFi Extender” – while that sounds like what you are looking to do most of the ones I have installed were problematic.

You really want a WiFi Access Point (AP). You do not need to purchase anything really expensive – look for low cost and high reviews! As an added side benefit – anything (Smartphone, TV, Laptop, Tablet, etc) that requires a WiFi signal that is closer to this new AP will benefit from the stronger signal too.

There is a fairly new thing called “WiFi Calling” on some smartphones (AT&T has it).  This has the ability to improve your mobile phone call signal by connecting parts of the call over WiFi.  People who use it have reported noticing a pretty good improvement in some of the spots where their local Cell Tower had a weak signal.

Hope this improves your WiFi and helps your connectivity!

That’s Not Microsoft…

Microsoft will not call you or ask you to call them!

I thought everyone knew about this but after two more people in as many days have had their computers hacked and locked up, it seems that many are still not aware of this.

Microsoft will not call you or ask you to call them! It is a scam. The two people mentioned above have given out their credit card information and each lost hundreds of dollars due to this scam. Plus now have to cancel the credit cards and still have a computer that doesn’t work.

Microsoft Scam Screen Sample image

If you don’t know – it usually begins with a pop up screen while you are looking at a page on a web site. The message is intended to scare you into calling a number to speak with a Microsoft Representative. Once they show you a bunch of fake pages on various web sites to convince you that you have hundreds of bad files and virus/trojan infections – they will volunteer to clean your PC over a Remote Access connection. This is where you allow the access to your PC; they can see your screen and move your mouse and keyboard. We use this type of program daily to legitimately fix computers for our clients. It is a great tool but these people are using it to scam you.

The entire scam is to get your credit card information. The call usually ends with the “fake tech rep” using a real (little known) Windows security feature called Syskey – to encrypt your computer with a password. Once that is done you can no longer open your computer unless you can guess the password. This can be fixed but it is not easy and sometimes requires that the computer be reset back to factory (like the day you bought it). This means you lose any and all information that you do not have backed up. You do know you should be backing up all those photos right?

So what should you do – as soon as the browser window shows you the fake warning screen – close the browser. If the page keeps coming back up every time you open the browser – that means your browser has been hijacked to use the fake warning page as the home page. You can change the home page setting in the browser settings to make it go away. If the page keeps coming back up and filling the entire screen so you cannot get to your desktop icons then you may have been infected with Ransom-ware. This is another form of extortion to get your money – immediately disconnect from the internet by pulling the plug to the network or turning off the WiFi or shut down the computer (hold the power button down until it goes off). Seek assistance from a legit Tech Support person. They will have seen this many times and can get you back up and running.

I hope this helps.

Fake Tech Support Scams Troublesome – How to Recover

Customers worry legitimate tech company could be fraudsters.

Fake Tech Support Scams – Fraudsters who use remote desktop support programs while scamming their victims have made it difficult for legitimate IT companies to convince users that they can be trusted.

Scammers have made an estimated tens of millions of dollars by tricking computer users into thinking their PCs are infected. The scammers “cold call” people, tell them that harmless error messages in the Windows Event Viewer are actually signs of a major problem, and then convince them to install a remote desktop program that gives the scammer access to their computer. The scammers pretend to fix the computer and charge its owner for the unnecessary and imaginary service. The same tricks can be used to steal users’ passwords and private information.  Some even go so far as to hold the computer for ransom by encrypting all the files.

When you are looking for Tech Support make sure you initiate the first contact or phone call. Do not trust anyone who calls you out of the blue. As more people become educated as to the scam it will make it easier to hire a legitimate Remote Access Tech Support Service.

How to Recover From a Tech-Support Scam

According to an article by Kiplinger.com about 3.3 million people are victimized by unsolicited technical support scams every year and the fraudsters rake in an estimated $1.5 billion. Here’s what to do if you’re one of them.

“You need to make sure the scammer doesn’t set up camp permanently. Disconnect the affected machine from the Internet immediately to keep the crook from accessing your computer while you batten down the hatches. Use another PC, tablet or smartphone to change your passwords, starting with financial sites and e-mail accounts. If you paid for the bogus service with a credit card, ask your card issuer to dispute the charges, and monitor your statements.”

Then call us – Tele Computers Services – our company has been around since 1991 and is one you can trust.  We will get you back to where you were before the scam.  We charge a flat fee no matter how long it takes to resolve the issue.  You can watch on your computer screen as we do the work remotely.  Our Remote Service Call also includes a full year license of WebRoot (a $39.95 value).  WebRoot is one of the best anti-virus /malware programs ever invented.  It will find things other name brand AV programs leave behind.  This will ward off attacks in the future.

Compare the alternatives to our Remote Access Tech Support:  Best Buy’s Geek Squad charges $150 for in-store Virus and Spyware removal and $250 if the technician makes a house call.  Staples charges $160 in the store and $300 for a visit to the house.

Remote Access Computer Repair

Remote Access Tech Support
Remote Tech Support / Virtual IT Services

Remote Access Tech Support Service

With today’s advanced Monitoring and Access tools we can offer technical support to full networks or a single computer with secure Remote Access Software.
Warning –
Never give access to your PC to a third party who calls you on the phone claiming to be with Microsoft (they do not call people) or to anyone who displays a pop up on your computer while you are visiting a web site.  These are scams intent on getting your money and credit card particulars.  Only allow remote access support to your device by legitimate support companies where you make the initial contact.
Real time –
For those times when a computer is infected or being hijacked by malware, we can do a “remote session” into your machine and resolve the issue as if we are sitting right in front of the computer. As long as you have an Internet connection we can provide remote services.*  Not having to have a “Support Truck Roll” saves everyone on resources and money.
After hours –
Our “After-Hour” (non-business hours) sessions can keep your entire network running smoothly.  When Updates and new drivers are installed after-hours you save by not having any downtime to your system.  We also provide after-hour weekend backup services that can provide you with a 100% secure off-site backup of all your documents and data.
Security and support –
One of the first elements we install into your system is “the best” award winning anti-virus/anti-malware software.  This program reports directly to our support staff in real time and most times we know when a computer is infected before you do.  By catching it early we keep your costs low – no downtime or controlled robot machine that might require a trip to the repair shop. Most often our program cleans the malware before you see the pop up notice of infection.  Our backend system allows us to monitor all your computers from one place on one screen and we can see if there are any network wide issues of concern.
Save money –
By using remote access support you can outsource all your IT work to one party. You will never see us but you will always know that we are there, behind the scenes making sure everything runs smoothly.
USA Services –
We do not outsource to India or any third party. Services are provided by Americans and the only accents you may hear will be American.
Quarterly or Ala Carte –
Support contracts are available and based on number of locations and number of computers supported. Monthly or Quarterly billing allows you to budget your support over time.  Support contracts offer lower rates for services provided.  Alternate support billing is available on an Ala Carte basis where billing is done monthly based on services needed/provided at full non-contract rates.
Network / IT Consultation –
By providing support to many diverse networks we are familiar with configurations and tactics that can make your network more efficient and reliable.  It could be one of the best investments you can make in your networks stability and longevity. Call and schedule a consultation today:
TELE Computers Services
800-766-TELE (8353)    516-350-TELE (8353)

Email Hijacking at an All Time High

Email @ symbol with a locked chain
Email Hijacking at an All Time High
By now you have probably noticed many new spam email arriving into your post office each day.
This is due to the extremely high rate of free email account (Hotmail, Yahoo, etc.) that are being password hacked.
Normally this is due to a poor password choice. While easy passwords (pets names and real words) are easy to remember they are also easy to guess.  Automated programs (Bots) can “brute force” their way into most accounts by running a giant database of likely used passwords (i.e. – Spot, kitty, smile, password, password1, password2, etc.) while attempting to log into the email account over and over again until it works.The best defense against account hijacking is to use strong passwords.To assist you in testing your current password strength or to create a more powerful password we have provided you with this free program running from within our secure pages here:
Password Meter – Click here

The typical hijacked email account is usually used to send out hundreds of thousands of spam email to lists from all over the internet. Your inbox will begin to fill up with “undeliverable” notifications as  what “looks to be” legitimate messages from you are returned when they cannot be delivered for some reason.

Related News:

Recently Yahoo was hacked and more than 450,000 passwords were stolen.   If that isn’t bad enough; they published the entire list online.   See the article about it here:
http://www.pcworld.com/article/259244/yahoo_patches_password_leak.htmlLinkedIn (confirmed this on June 6) had over 6.5 million (161 million users) passwords posted on a Russian hacker’s web site.  If you belong you should change your password right now!
http://www.itworld.com/security/280216/change-your-linkedin-password-right-now

 

Delete QuickTime for Windows ASAP

QuickTime Dead – Delete QuickTime for Windows ASAP

Older QuickTime for Windows is no longer supported by Apple.

Researchers have found two security issues that will never be fixed as Apple stopped patching the program in Feb of 2016.  These two issues can allow a third party access to your computer.

QuickTime is no longer needed anyway as all browsers can play the files QuickTime used to play.

If you have ever installed iTunes or connected your Apple phone to your Windows computer odds are you most likely have some form of apple software  installed on your PC – even if you no longer use it. Best bet is to remove anything that is no longer needed and especially QuickTime.

How to uninstall – Control Panel | Programs and Features

Look for any “unneeded” Apple programs including QuickTime, Bonjour, iTunes, Apple Software Updater and pretty much anything with Apple in it.