Protecting your children online

September 22nd, 2015

Over the last two weeks, we, your computer magicians at CET, have seen several systems infected with viruses due to “tween” sons straying from homework assignments into some of the worst garbage on the internet. It was one of this summer’s biggest news stories that has ultimately resulted in the ‘unintended’ proliferation of pornographic images across television, the internet, and Facebook postings. Strange to ponder and difficult to imagine but today’s teens and tweens are subjected almost nonstop to sexually explicit images. In an article published Monday, September 21, in “Christian Today”, the writer laments the fact that today’s teen and tween boys (and girls) are practically encouraged to engage in more and more risky behaviors involving sexting, videotaping, sending of sexually explicit images, taking part in sexually explicit conversations and surfing for pornographic websites and videos ( But there is a brighter side to that same technology that parents and grandparents can tap into – parental controls. In fact, nearly all internet-connected devices, from computers and gaming consoles to smartphones and tablets, can be configured for parental controls.
The website offers this breakdown of the different types of parental controls.
1. Filtering and blocking – limiting access to specific websites, words, or images
2. Blocking outgoing content – preventing the sharing of personal information online
3. Time limiting – setting limitations on the amount of time or hours of the day access is available
4. Monitoring tools – software or configurations that warn parents or record information regarding certain activities on the monitored system
Your child’s safety is important and unfettered access can be a pitfall, particularly for tween boys. If you need help, we’re here to assist you. Call us or come by our office.

A Month After Microsoft’s Windows 10 Release

September 2nd, 2015

It’s been a month since Microsoft released Windows 10 and we, your PC Magicians at CET, have been pleasantly surprised. Yes, there have been some hiccups but that’s kind of expected with a major operating system release, just ask Apple and all those Mac users to reflect on last year’s Yosemite release.
As expected, when impatience users attempt their own upgrades, there can be “heck to pay”. Remember that the upgrade will probably take significantly more time than the time it takes to watch a half hour episode of “The Big Bang Theory”. Also be aware that during the upgrade, your system may restart several times and could display a black screen with no indication of the system running for fifteen minutes or so – do not shutdown the system during this period. In fact, if you get anxious in any way, you shouldn’t watch the upgrade proceed at all – walk away and go watch “The Matrix” or something.
Another issue that we have seen at CET is that video drivers, particularly on HP systems running Intel HD graphics, can become corrupted during the upgrade. If you’re having issues after the upgrade, check with your manufacturer to get updated drivers.
Not everything is rainbows and unicorns, of course. We have also seen issues with folders being marked as Read-Only following the upgrade but simply changing the folder attributes will resolve this issue.
One of the nice things we’ve found is that – if you’re unhappy with your Windows 10 upgrade – you have the option to go back to your Windows 7 or Windows 8 (or 8.1) operating system. We have tried this on several systems and it works well – but should be done within the magical 30-day window.
We’ll keep an eye on Windows 10 as the system updates progress and keep you updated on the positives and negatives as we see them.

Safari Update Scam

July 31st, 2015

There is a new Safari update scam. I was keyed to this when we found an unintended installation of MacKeeper on a Statesville client’s Macbook Air. MacKeeper is generally an intentional installation by a user who doesn’t truly understand the program but this client was steadfast that she had not done any installations. We, of course, cleaned up her Mac and repaired the Yosemite OS X without any loss of data but it led me to do some more research and I found an article on the Malwarebytes’ blog, Unpacked. Their discussion of the fake Safari update was indicative of our client’s story and what we had found on her system. Be careful for fake updates like these that may appear to be legitimate but rarely are. Our PC clients are generally familiar with these attempts to infect their systems but our Mac clients are more vulnerable due to their unfamiliarity with the signs of malicious “hacks” on the internet. Read the full article at: