Category Archives: Computer Repair

Can we guess – how many local businesses can be hacked in 30 minutes?

13 in 30 minutes. Yes, in 30 minutes of driving around a small town in Indiana my cell phone found 13 businesses still using far outdated WIFI security protocols that have, for many years, been easily cracked by hackers in 30 minutes or less. This is 2019 folks – this should not be happening! As a business owner, customers should be able to trust that their data is secure when doing business with you. Plus you are responsible – by law – to protect your customer’s data from prying eyes.

The list of very insecure businesses touches almost everyone in their daily life. Some of those found include hardware stores, furniture stores, coffee shops, dry cleaners, animal hospitals, a golf course, a grocery store, a discount store and a government office.

If you are a customer of one of these businesses, as I am, you should assume that your identity has been stolen. And that’s not all. 74 of the homes still use the same outdated security protocols on their WIFI routers. In all 25% of the 429 WIFI routers that my cell phone picked up in a 30-minute drive while using a well known freely available app that will monitor and record WIFI SSID’s, signal strength, GPS location, and security protocols would be easily hackable in 30 minutes or less by an average digital thief with intent to steal your data or identity.

Here are the numbers by security protocol:

WEP Security – 24 Homes and Businesses. The easiest to hack.

WPA Only – 62 Homes and Businesses. Only slightly more secure.

WPA + WPA2 – 343 Homes and Businesses. Still hackable, still has WPA.

WPA2 Only – 0. Nada. None! Not perfect, but the better choice.

This isn’t just happening in small-town Indiana. It’s just as bad or worse in more densely populated areas. Consider the number of homes I found with very insecure protocols. Do business owners work on the business at home? As a small business owner myself, I know they do. Is their home WIFI router secure? Maybe…maybe not.

This is small town America, there are no hackers here, right? Wrong! I actually interviewed a professional hacker just 30 minutes away. And he was smart. So smart in fact that I felt very uneasy having my cell phone on at the time. Was he running a mobile hacking tool out of his backpack? Needless to say, I did an in-depth malware scan of my phone and then changed all of my passwords, making sure I also enabled 2-factor authentication on all accounts.

So what can a hacker do if they steal your WIFI routers password? For one, they can set up a ‘Man in the Middle'(MITM) attack. By configuring a mobile WIFI router with the same name and password as yours, they can cause your laptop, smartphone or other devices to disconnect from your real router and connect to their MITM hacking router. By doing this they will be able to intercept emails, login names, passwords, etc as you enter them. Now, what secure websites could they login to, pretending to be you? Think about that.

What can you do as a business owner? First, at a minimum login to your router as the admin and change the wireless security to WPA2 only. Then change the WIFI password. No WIFI is absolutely secure, but it’s the best option you have as a small business owner without a corporate I.T. department and bigger bucks to spend on extra security. Just because you are not a fortune 100 company doesn’t mean you have to be the low hanging fruit for hackers.

As a customer, just ask them. Ask if they have updated their WIFI routers to use only the latest wireless security protocols and if they ever change the WIFI password. Most probably don’t, as I found out in 2015 when I did a similar study. What are your thoughts? Has your identity been stolen? Feel free to share this article and together we can make a difference!

David Dubree


New Phishing Scam With Fake FBI Questionnaire

New Phishing Scam With Fake FBI Questionnaire

Heads-up! The IRS is warning against a new phishing scam that tries to make you download an FBI questionnaire. But if you click the link, your computer will be infected with ransomware instead. The scam email uses the emblems of both the IRS and the Federal Bureau of Investigation.

Remember that the IRS does not use email, text messages or social media to discuss personal tax issues, such as those involving bills or refunds. THINK BEFORE YOU CLICK!

If you think you have been scammed or have malware on your laptop, tower or tablet call us asap at 812-268-0656 or message us on Facebook:


Popular website hacked – dished out password stealing Trojan

Here is how you get malware/viruses on your computer and have your passwords stolen(excerpt from

Just For Men website serves malware

Posted September 20, 2016 by Jérôme Segura

“The website for Just For Men, a company that sells various products for men as its name implies, was serving malware to its visitors. Our automated systems detected the drive-by download attack pushing the RIG exploit kit, eventually distributing a password stealing Trojan.”

So which anti-virus should you use?  Well, there is no such things as the perfect anti-virus but my favorite is Malwarebytes AntiMalware. You can get your copy here.  This is part of what I use to clean up customers virus/trojan/malware infected computers.

My favorite Anti-Malware / Anti-Virus program

Just a quick note on what my favorite Anti-Malware / Anti-Virus program is and how to get it.

MalwareBytes AntiMalware has been my Go-To for many years and still ranks #1 in my opinion. No other well advertised anti-virus program cleans things up and finds the garbage that needs to go as well as MBAM. Grab your copy here – MalwareBytes Download.

They also have a ‘Back to School’ special combo right now –

Anti-Malware + Anti-Spyware for free. 1 User 3 PC’s for $39.95.

Malware Removal Secrets Revealed – Page 1

If you’re like me you want to know all the FREE ways to make things work better BEFORE paying anyone to fix it, right?  Well now I want to share the best FREE tools AND correct processes I’ve found and have used for years to get the job done when removing viruses / malware and cleaning up customers computers, whether it’s a Windows laptop, tower, desktop or tablet.

Most Windows computers require 10 to 12 steps to PROPERLY clean them up. Anyone who claims to be a guru and can clean your computer up in a few minutes or even an hour probably has limited experience and knowledge in virus removal and protection. Proper cleanup means using ALL of the proper tools. Today’s viruses / malware / spyware / trojans are VERY sneaky and VERY good at hiding. A few minutes WILL NOT get the job done right.

By the way, 90% of every computer I have ever checked has some form of malware on it. So just because you don’t see any popups or your Anti-Virus says everything is good doesn’t mean your computer is not infected. Chances are it is.

Anyone can have tools to fix anything. But knowing how and when to use those tools separates the pros from the wannabe’s.

I suggest using a known clean thumb drive (flash drive) to download the tools on from a clean computer before starting the virus / malware removal process.

So I’ll start with the first tool I use on everyone’s computer as soon as they bring it in. It’s called RKILL. This tool will TRY to stop ANY bad process / virus that is already running. It won’t remove it, but by stopping the process / virus it’s MUCH easier to run the other tools that will actually remove it from your computer. You can download RKILL from Just do a Google search like ‘RKILL Bleepingcomputer‘. It is usually the first or second result. ONLY click on the Blue ‘Download Now’ button. Sometimes there will be an Ad with a green download button, but it is only an Ad for something else. Fair warning.

To begin with, booting the computer into Safemode is highly recommended – if the virus will allow it. So how do you do that? The trick(for Windows XP thru 7) is to press F8 at the right time a few seconds after turning on the computer. It can take some practice for the first timer. So power up and start pressing F8 continuously. It may beep at you as the keyboard buffer fills up, but that’s OK. Soon you should see a text menu come up with several choices. Choose ‘Safemode With Networking’ and press Enter.  For Windows 8 or 10 use this link:  Windows 8 & 10 Safe Mode.   The computer will boot but all the icons will look big and maybe out of place. That’s OK. Now plug in your thumbdrive with the downloaded tools and give it a few seconds to recognize it and assign a drive letter to it. Click on ‘Computer’ or ‘My Computer’ depending your version of Windows. Two or more drive letters will be listed. One of those should be your system drive (usually C:) and one should be the thumbdrive (could be F: or any other letter). Double click on the thumbdrive to open it and display the tools you downloaded.

Once the files are displayed, right click on RKILL and choose ‘Run as Administrator’. If that is not an option then just choose ‘Open’. Click yes on any Windows security prompts that come up and allow it to continue. RKILL can take anywhere from a minute to twenty minutes or more to complete depending on how old the computer is and how badly infected it is. Once complete it will open a Log file to show you the results.

If RKILL completes and presents the log file (sometimes the log file is partially hidden behind some other window), then your ready to run the next tool – RogueKiller. We’ll discuss Step 2 in the next ‘How To’ post – Page 2.

If you have any questions feel free to comment on this post and I will do my best to help you out. Thanks!

We’re at 22 N. Main St. in Sullivan, IN. 812-268-0656. Just north of the courthouse square. Or email me: d a v i d  at  npgcomputers  d o t com.

Malware Removal Secrets Revealed – Page 2

Now that you have went through this initial process, the rest of the tools will be a piece of cake so I won’t bore you with the exact how-to’s. Just keep in mind that for many of the tools listed you may have to manually add a check to some of the ‘issues’ or malware they find, then click Remove (or Delete, etc.).

So here is the list, in order, of the required tools you should download and then Run as Administrator in SafeMode. Most if not all can be found on

RogueKiller (Check all tabs and select everything)
MBAR (MalwareBytes Anti-Rootkit)
ADWCleaner (allow it to reboot normally, then reboot into Safemode)
JRT (always reboot normally, then reboot into safemode after it runs)  No longer applicable
MBAM (MalwareBytes Anti-Malware)
ComboFix (only for XP, Vista and 7)
WISE Registry Cleaner (Choose fix everything that it finds)

Then open a command prompt as administrator and run ‘SFC / Scannow‘.
Then run Windows Update. Install all updates.
Open each internet browser (Internet Explorer, Chrome, Firefox, etc.) and check for any odd add-ons or extensions. Check the default home page. Check for odd search providers.

Now open Control Panel and go to Add/Remove Programs or Programs and Features depending on your version of windows. Scroll through the list of installed programs and check for anything that looks like a coupon/ad/bargain type of program. Most of those are garbage and most will get removed by ADWCleaner or JRT, but not always.

Once that is done, run ADWCleaner again.

Now check your Anti-Virus. Is it expired? If so uninstall it and download MalwareBytes Free Trial Avast Free Antivirus from or AVG Free Antivirus at Now run a complete scan.

Open each web browser again and enable the antivirus extension when it asks you.

You should be good to go unless it’s royally fouled up. There are so many other issues that can come up it would be impractical to try and cover them all here. But the majority of malware/virus issues can be resolved by taking the steps outlined in this article.

Well, there it is. The skinny on a proper cleanup using nothing but freely available tools and your own blood, sweat and tears.

If you have any questions feel free to comment on this post and I will do my best to help you out. You can also reach me by email at: d a v i d  at  npgcomputers  d o t com. Have a great day!