Category Archives: Remote Support

  • 0

Norton Says Renew now or “Beg for Mercy”

Instead of Symantec’s Norton Anti-Virus removing all adware and keeping your PC safe, the pop-up for when the subscription expires says “Maybe things will be ok for a while longer, Then again, maybe cybercriminals are about to clean out your bank account. The choice is yours: Protect yourself now or beg for mercy.” Sounds more like malware extortion to me.


  • 0

Naked Pics of Dell Tech Support customer posted online

Strange things can happen when you call tech support.

But perhaps not quite as strange as what allegedly happened to Tara Fitzgerald. According to News10 in Sacramento, Calif., Fitzgerald wanted to send some pictures of herself to her boyfriend, but she couldn’t find them on her Dell computer.

Her urgent need to find these pictures drove her, quite naturally, to call Dell tech support. Her call was answered, she said, by a gentleman in Mumbai, India, named Riyaz Shaikh.

Shaikh, who, by the time you finish this tale, might not turn out to be a gentleman, after all, offered to remotely access her computer so that he could find the pictures for her. Fitzgerald said she watched him as he located her snapshots.

It was another fine day in the helpful history of tech support. However, this success was ruined somewhat, when Fitzgerald allegedly received an e-mail from an unidentified source telling her that her pictures were now freely available for anyone to see on the Web. They were on a site called “bitchtara.”

Perhaps I omitted to mention that many of these pictures depicted Fitzgerald in the nude. And the Web site, as well as clearly violating her privacy, unfortunately offered lewd descriptions of her proclivities that were not in line with reality.

http://c.brightcove.com/services/viewer/federated_f9/52409490001?isVid=1

When Fitzgerald contacted Shaikh again, he suggested that it was, indeed, her boyfriend who had created the site, and he allegedly offered to help take it down. He needed, though, a laptop on which he could work on this vexing problem from home, she said. So–and this is a very painful part of the story–she shipped him one.

“My conscience is talking to me, saying, ‘Tara, don’t send this. Are you crazy?’ I sent it anyway,” she told News10. This part of the tale occurred in January 2009. This is particularly notable, given that the site featuring her pictures was still active, News10 reported, as of last Wednesday.

Indeed, Fitzgerald claimed that her repeated attempts to solve this problem through official channels, both through Dell and the police, were entirely unsuccessful. It was only by turning to the media, she said, that she managed to finally get Dell’s attention.

In the intervening period between sending the computer to India and this week, Fitzgerald discovered that Shaikh had allegedly used her credit card details to spend $802 on a computer and router for a woman in Tennessee.

Finding no way to reverse the alleged evildoings, Fitzgerald said she maintained contact with Shaikh through his personal e-mail account and his official Dell account. As late as this week, she said, he was still offering to pay for the charges and, she believed, still working for Dell.

However, once News10 contacted Dell, it received the following reply: “We investigated the issue, which involved a technical representative at one of Dell’s vendors. We contacted the vendor about the allegation and can confirm that the representative no longer handles Dell calls. We’ve been in contact with Ms. Fitzgerald regarding this issue and continue to investigate her claims to best assist in a resolution.”

One can, of course, accuse Fitzgerald of some considerable naivete in this matter. She had to break the whole story this week to her 14-year-old daughter. However, it seems that if her allegations are, indeed, substantiated by the facts that News10 says it has at its disposal, she might deserve some considerable restitution from Dell itself.

Tech support is a powerful position. It does give those occasionally supercilious anonymous voices at the end of a telephone, whether in India or elsewhere, peculiar access to people’s inner workings.

Fitzgerald’s accusations suggest that the inner workings of one or two people in tech support might deserve closer examination too.


  • 0

Google can remotely add or remove apps on android

Category : Google , Remote Support

Google Has Android Remote App Install Power, Too

Trailrunner7 writes “The remote-wipe capability that Google recently invoked to remove a harmless application from some Android phones isn’t the only remote control feature that the company built into its mobile OS. It turns out that Android also includes a feature that enables Google to remotely install apps on users’ phones as well. Jon Oberheide, the security researcher who developed the application that Google remotely removed from Android phones, noticed during his research that the Android OS includes a feature called INSTALL_ASSET that allows Google to remotely install applications on users’ phones. ‘I don’t know what design decision they based that on. Maybe they just figured since they had the removal mechanism, it’s easy to have the install mechanism too,’ Oberheide said in an interview. ‘I don’t know if they’ve used it yet.'”


  • 0

How to fix your McAfee crippled computer

McAfee pushed out a malformed security patch early on Wednesday that wound up crippling computers running Windows XP, but there is a fix available. Users should note that it’s labor-intensive and must be applied manually to each computer. If you’re running Windows Vista or Windows 7, your computer shouldn’t be affected by the bad update.

As of 3 p.m. PDT, McAfee had yet to link on its front door to a fix for a false positive update with disastrous consequences that went out Wednesday morning.

If your computer is shutting down automatically, you must address that before you can fix anything else.

  • Step 1: Open a command prompt: Start menu, Run, then type cmd and hit Enter
  • Step 2: Type shutdown -a, which will prevent the shutdown from occurringMcAfee has revealed two fixes for the problem. Each one requires multiple steps, and can be confusing. If you’re not comfortable with advanced computer fixes, you should get help with this.For the first fix, go to the McAfee interface through the Start menu, and disable Access Protection and On-Access Scanner.
  • Step 1: Click Start, Programs, McAfee, and then VirusScan Console
  • Step 2: Right-click “Access Protection”
  • Step 3: Select “Disable”If you have Internet access, download the EXTRA.ZIP file provided by McAfee and unzip the EXTRA.DAT within. (Note that Nai.com is a safe site maintained by McAfee, for those who were wondering.) Once EXTRA.DAT has been extracted:
  • Step 1: Click Start, Run, then type services.msc and click “OK”
  • Step 2: Right-click the McAfee McShield service and select “Stop”
  • Step 3: Copy EXTRA.DAT to “Program FilesCommon FilesMcAfeeEngine”
  • Step 4: Then restart the McAfee McShield service by right-clicking on it and choosing “Start” from the context menu
  • Step 5: Re-enable access protection by going back to the VirusScan Console
  • Step 6: Right-click “Access Protection”
  • Step 7: Select “Enable”
  • Step 8: In the VirusScan Console, go to the Quarantine Manager Policy
  • Step 9: Click the Manager tab
  • Step 10: Right-click on each file in the Quarantine and choose “Restore”There is, of course, one massive hang-up with this McAfee-recommended solution: More likely than not, you don’t have Internet access on your McAfee-borked computer. In fact, it’s highly unlikely that you have access to much of anything, since deleting SVCHOST.EXE prevents key Windows 32-bit sub-system processes from functioning at all. To get the EXTRA.DAT on your computer, you’ll probably have to download it on an unaffected computer, then copy it to either a USB drive or a CD-ROM and use the command prompt to copy it over to your C: drive.The second workaround requires that you apply the EXTRA.DAT fix as detailed above before beginning and that you have access to a second, unaffected Windows XP computer. On that computer, go to C:WINDOWSsystem32 and copy SVCHOST.EXE to a network location or a removable media device such as a USB stick. Then copy the SVCHOST.EXE from the unaffected computer to the affected computer, and restart the McAfee-afflicted computer. There are details on applying the EXTRA.DAT via ePolicy Orchestrator at McAfee’s fix on Nai.com.Severe problems caused by buggy or false positive security updates are rare, but not unheard of. Recent instances include an update from Avast that marked hundreds of legitimate files as threats in December 2009, Computer Associates flagging a Windows system file as a virus in July 2009, and AVG marking ZoneAlarm as malware in October 2008.

    McAfee did not immediately responded to a request for comment.

    Updated at 5 p.m. PDT with additional information.

    McAfee Executive Vice President of Technical Support and Customer Service Brian MacPherson has written a blog post and a follow-up commenting on the situation, although neither addresses how the bad update made it past quality-control testing in the first place.


    • 0

    Free Remote Support!

    Now offering free remote desktop support for a limited time only!

    Please call 760-716-7339 or email me for more info.


    Call Now Button