Finally Kim Komando agrees with me! :-) No, but seriously, I have
been recommending Malwarebytes as a free tool to clean up malware on
your system. It is one excellent tool and normally the first thing I run
on YOUR systems when you ask me to clean your system.
Kim points out, it is a passive tool. This means you have to run it.
Unlike your anti-virus program which is active and always looking out
for bad stuff, you take control with this tool. Please note that
Malwarebytes does have a fee-based tool as well, and this is an active
tool. If you don't mind spending the money go for it!
the time being I am using the free version, the one I have been
recommending all these years. It is an excellent tool. Kim recommends
running this once a month. I recommend every 2 weeks. I am considering buying the fee-based version.
Okay, I will admit I absolutely love Verizon FIOS. I quit them, oh maybe a year ago and switched to Comcast. Why? My Verizon Triple Play prices got out of control and I was up to nearly $200 a month! CRAZY!
So, as I said, I switched to Comcast. It was a disaster. Their internet speeds simply cannot compare to FIOS.
So there I have said it. I love Verizon FIOS.
I received a note from Verizon a few days ago and included in the note was this sentence: "We love having you in the FiOS community and as a member of My Rewards+. To show our appreciation, we upgraded your Internet upload speed to match your download speed—for free. This upgrade is just one more great benefit of being a member of My Rewards+."
I have to say that was nice to read, but I was paying for, and getting, 50 MBPS download and 30 MBPS upload. I didn't really feel I needed the extra upload speed, but it was free and automatic, so I got it.
I just ran a speedtest.net and look what I got (below). AMAZING results. THANK YOU Verizon!
Oh, by the way, when I came back to Verizon recently. leaving Comcast behind, I carefully crafted my package to favor internet and downplayed the TV and also eliminated the landline (more on that later in a separate post).
"Until today, Microsoft Windows users who’ve
been unfortunate enough to have the personal files on their computer
encrypted and held for ransom by a nasty strain of malware called CryptoLocker
have been faced with a tough choice: Pay cybercrooks a ransom of a few
hundred to several thousand dollars to unlock the files, or kiss those
files goodbye forever. That changed this morning, when two security
firms teamed up to launch a free new online service that can help
victims unlock and recover files scrambled by the malware.
spotted in September 2013, CryptoLocker is a prolific and very damaging
strain of malware that uses strong encryption to lock files that are
likely to be the most valued by victim users, including Microsoft Office
documents, photos, and MP3 files.
Infected machines typically display a warning that the victim’s files
have been locked and can only be decrypted by sending a certain
fraction or number of Bitcoins to a decryption service run by the
perpetrators. Victims are given 72 hours to pay the ransom — typically a
few hundred dollars worth of Bitcoins — after which time the ransom demand increases fivefold or more.
But early Wednesday morning, two security firms – Milpitas, Calf. based FireEye and Fox-IT in the Netherlands — launched decryptcryptolocker.com,
a site that victims can use to recover their files. Victims need to
provide an email address and upload just one of the encrypted files from
their computer, and the service will email a link that victims can use
to download a recovery program to decrypt all of their scrambled files.
The free decryption service was made possible because Fox-IT was
somehow able to recover the private keys that the cybercriminals who
were running the CryptoLocker scam used on their own (not free)
decryption service. Neither company is disclosing much about how exactly
those keys were recovered other than to say that the opportunity arose
as the crooks were attempting to recover from Operation Tovar, an international effort in June that sought to dismantle the infrastructure that CryptoLocker used to infect PCs."