WorldStart Tech Tips 2016-10-27
Having trouble viewing parts or all of the newsletter? View the entire newsletter here!
Malware Bytes Goiggles Up ADWCleaner
MalwareBytes has purchased the popular AdwCleaner program and plans to make it a part of the MalwareBytes program.
AdwCleaner is used to remove browser hijackers, adware and other potentially unwanted programs that sometimes sneak onto your PC on the backs of legitimate downloads that you did want.
According to a release from MalwareBytes, the program averages around 200,000 downloads a day. The company plans to give AdwCleaner a bit of a facelift and then eventually integrate their technology into the main MalwareBytes program.
Some people think LAN adapters have outlived their purpose... they're CRAZY!
That's what your computer manufacturers WANT you to think. Sure, your PC or laptop may have come with integrated wireless support... but what you didn't know is that they LOVE to stick in the cheapest part they can find for that.
"How are they gonna know?" they say. But when you're trying to watch that video on YouTube or Facebook, or check your e-mail... and it just loads and loads forever... oh, you know.
You're paying for FAST Internet... but your computer's lackluster wireless is HOLDING YOU BACK!
It's like paying for HDTV channels and being stuck watching the standard definition channels!
To see for myself, I checked the computers around the office...
It was no surprise - the HIGHEST speed on the built-in adapters? 150 Mbps.
The average router can handle TWICE that... but with the crappy integrated wireless support computers come with, it doesn't even matter.
"Can it really be that simple?"
YES IT CAN!
This LAN adapter may look small, but it is packed with HUMONGUS power, speed, and even security!
At 300 Mbps, this LAN adapter can handle any home connection you've got. You won't have to sit there wondering if your wireless is holding you back - because it won't be.
Whatever speed connection you have, this will let you get the MAXIMUM effect out of it!
See, it has this awesome feature that automatically detects the optimal network transmission rate for your connection!
To put it simply: without this feature, your network might try to send too little (which makes your speeds slooow) or too much (which overloads your network and can cause your Internet to "die" for a brief period. You've probably experienced this before with "random outages!")
This LAN adapter helps optimize that transmission rate so you always get the BEST experience - that means consistant, quality connections 24/7.
That's not even everything: the integrated antenna gives you extra range WITHOUT making this a bulky nightmare - since you might be using it on a laptop, you don't want some monstrosity sticking out the side, right?
Tiny adapters CAN pack a punch - this one proves it!
You might not even know if your integrated wireless is secure or not. Sure, it PROBABLY has some base level protection... but is it the kind of protection you trust when you go to bank online? Log into your e-mail?
There's nothing worse than uncertainty. That's why this LAN adapter's list of encryption means you've got peace of mind to go with that ultra fast speed!
It's okay if that's a bunch of gibberish - let me break it down:
This is like wrapping your connection up in an electrical, barb wired fence with armed guards every 3 feet.
Nobody gets in without your permission.
AND INSTALLATION COULDN'T BE EASIER!
It's a two-step process.
1. Plug in your LAN adapter.
2. Install the drivers from the disk.
After you take the one minute to do that, your PC or laptop now has wireless. Or if it had wireless, it now has FASTER, STRONGER, LONGER RANGE wireless.
AND THE DEAL COULDN'T BE BETTER!
It's only $12.97!
Only $12.97 for better Internet. That's less frustration, less wasted time, and for LESS than you'd ever imagine! WOW!
It's probably no surprise that I'm gonna urge you to be QUICK on this one! I don't know when these are going to sell out, but it won't be long.
Create A Birthday Reminder List In Excel
Here’s a fun trick to try with Excel. You can make a list of friends or colleagues and create a birthday reminder. Here’s how to do it.
First, you’ll need to create a worksheet and input the names and birthdates of friends or colleagues. Use any date format you prefer.
Next, enter or copy this formula into the cell:
=IF(MONTH(C3)<>MONTH(TODAY()),” “,IF(DAY(C3)<>DAY(TODAY()),” “,”Happy Birthday”))
C3 is the cell which contains the birthday date, you can change it as you need) into a blank cell D3, for example.
Press the Enter key, then select the cell D3 and drag the fill the handle to the range where you want to apply this formula. When the birthday date arrives it will show a message Happy Birthday in the cell. An Example: If the date is October 8 today, it will show Happy Birthday to Ritika.
~ Jitendra Chaturvedi
Do you have a question for us? Ask it here!
Hacked: Trying To Get Back My Instagram Account
Guess what guys? It’s time for another exciting edition of “Tech Writer Heal Thyself,” in which I tell you all about how I often don’t listen to my own advice.
So, you know how I tell you to be very, very careful about logging on to public WiFi networks? Well, I’m really wishing I’d listened to myself because I ended up having a social media account hijacked.
Here’s what was going on. I was at an event at convention center signing copies of my non-tech writing books. I was also posting a lot of photos and videos on Facebook and Instagram and that can take up a lot of data. I got a notification that I only had 10% of my data plan remaining on my phone with three days left in the month. I was concerned my online activities would eat up what was left of the plan, so instead of paying for a $15 overage fee, I opted to use the free public WiFi. There was a password to get it, but it was posted on the wall and not exactly a secret.
The last thing I managed to get up on my Instagram account was this photo. Some folks might think I deserved my fate for posting it.
Shortly after I made the post, someone got into my account, changed the password, and then changed the username. They also began posting photos of someone’s bottom in a bikini. I can’t say for certain it was because I logged onto the public WiFi at this event, but it seems like an awfully big coincidence.
When I went to log into my account, I could see that the username had been changed. I'm...
Think Before You Share
We talked last week about finding out if something is true before you share it via social media or in an e-mail. I’ve got a great example of why just taking a few seconds to think before you share something keeps falsehoods and hoaxes from spreading. Take a look at this post about the record-setting Powerball Jackpot.
It claimed to have a simple solution for poverty in the U.S. It claimed that if you split the $1.3 billion Powerball jackpot between the 300 million residents of the U.S., each would get $4.33 million dollars. This image was shared millions of times on Instagram, Twitter and Facebook. Clearly before anyone bothered to think about it. If you gave it a closer look, you’d see that the math is all wrong. $1.3 billion divided by 300 million is $4.33. That won’t even buy everyone in the country a large latte at Starbucks.
Even without doing the math, you should know that lottery jackpots are made up of the amount of money that’s put in to them by the players. So assuming that every single person in the country bought a ticket, that would mean that they put in an average $4.33 million each. That also seems pretty unlikely.
I’m a bit concerned that so many folks don’t seem to know that a billion is a thousand million. I’m concerned that so many people are willing to pass along information without the slightest attempt to verify it.
Does this Powerball post matter? No, not really. But when people pass along...
Create Free Muisc Tracks With Juke Deck
If you ever decide to create something that you wish to share with the world, like a video, you may find it difficult to find good music to go along with it that is not copyrighted. Asking for permission to use a particular copyrighted song may be time-consuming, and in the end, the original creators of the song or music may not even allow you to use it. Luckily, a web app called Jukedeck can automatically generate a song for you, suited to your preferences. This tutorial will guide you through the process of creating the song and downloading it to your computer.
Open the web browser of your choice and go to jukedeck.com. In this tutorial, Google Chrome will be used. This page will open. You’ll see the option to make a track of a genre of music, with a particular mood and a length.
Click on any of the highlighted boxes to see a menu. First select the type of track and the mood.
You can also decide how long you want your music to be. Click on the box that displays the duration of the song (highlighted in red) and type in how many minutes you want your music to be. Currently, the maximum duration is 5 minutes.
Once you’ve made your selections...
The Nature Of Cities
Welcome to the Nature of Cities. This international platform wants to bring people together from all over the world in order to think, design, and create better, sustainable cities around the globe.
When you arrive at the site I recommend checking out their About page where you can learn more about their project. It gives you details on how it works as an Idea Hive, who founded it, and what they hope to accomplish.
Once you’re done there head back to the main page where you’ll find the most recently added content to the site. There are essays, roundtables, podcasts, reviews, and more. You can also flip through the images on the header strip and click on the titles to visit the articles highlighted there.
Along the top of the page is a white navigation strip where you’ll find a link to check out the Projects on the site. They are The Nature of Graffiti, The Just City Essays, Bangkok to Barcelona, and Urban Environment Ed.
I actually found this site by stumbling across the Nature of Graffiti portion of the site. I had been looking up street art and it came up. Then I started browsing and thought the premise of the rest of the site was cool enough to share.
Go check it out for yourself today!
Send it to Amanda at email@example.com
OH YEAH! We're excited!
Steve, and our lead technology expert Cynthia created an absolutely incredible E-Book that's going to rock the entire Internet - Worldstart's Ultimate Online Defense Guide!
Everyone loves their computers and smartphones - but very few realize how devastatingly DANGEROUS things can get when a device is compromised and turned against you!
And it happens to people just like you EVERY DAY!!
The threats just keep piling up - hackers, viruses, malware, spyware, scammers, phishing attacks, compromised public WiFi, over the shoulder attacks, router attacks, password crackers, compromised software, outdated operating systems, firewall breaches, browser hijacking, malicious web sites, dangerous pop-ups, cross site scripting, e-mail hacking, virus hoaxes, deadly file attachments, compromised personal information, stolen data from old computers, hijacked HOSTS files, spoofed file extension tricks, autorun viruses, ransomware, infested freeware - well, you get the idea!
Do you know how to protect yourself from ALL of the threats listed above?
If you don't, I can PROMISE this...
It's not a matter of IF you become a victim - it's truly a matter of WHEN!
They always say, "What you don't know can't hurt you." Well, here in the Internet age, ignorance is NOT bliss!
Millions of people who didn't think it could happen to them fall victim EVERY DAY - simply because they didn't KNOW there was a threat!
That's CRAZY. In fact, it's not just a little crazy, it's "Trying-To-Jump-The-Grand-Canyon-With-A-Bicycle" INSANE!
Especially when it's SOOOO easy to avoid the problems in the first place IF you know what the threats are AND how to avoid them!
Bottom line - You need to know exactly what dangers lurk around the dark corners of the internet - or you WILL be the next victim! You absolutely, positively MUST know HOW you can get attacked and HOW to defend yourself!
And THAT'S why we created this absolutely fantastic new E-Book!
AND we've written it so EVERYONE can understand!
Each and every chapter is written in fun, easy to read language that you'll discover is REALLY SUPER-SIMPLE to follow!
We even have loads of pictures and illustrations!
I know there's a few people out there crazy enough to think:
"There's nothing of value on my computer, I have nothing to hide, so I don't care if someone gets in or I get a virus."
Music to a hacker's EARS! The bad guys rely on IGNORANCE in order to attack your PC! They rely on people who think that there's nothing of value on their computer - and NOTHING could be further from the truth!
Even a computer with nothing but a fresh Windows install is a juicy target!
If your computer or phone is compromised - either by a hacker or malware (viruses, rogueware, spyware, etc) any of the following can happen:
Your identity is stolen (easier than you think - we spill the beans)
So, yeah, it IS a big deal if you get compromised. In addition, if your computer is used for illegal purposes by the hacker the feds could come knocking on YOUR door - not theirs.
Oh - and just think how expensive it would be to take your computer to a shop to get it working again - all because YOU didn't know what's in our life-saving e-book!
We want to show you how to recognize and avoid the pitfalls that MILLIONS of people fall victim to each and every day. You know - the people who never thought it would happen to them.
By the time you finish reading this incredible book, you'll have your computer locked down so tight the folks over at Fort Knox will come to YOU looking for advice!
We've divided the book into 12 sections and there's a VERY brief outline below. But...
PLEASE keep in mind you're only seeing a small FRACTION of the information that's jam-packed into this breakthrough book!!!
There's another 85% of the book we haven't even hinted at below! WOW!
When it comes to attacking your computer, there are no shortage of tools at the disposal of the bad guys! Do you REALLY know how to stay safe? This section will show you the threats - and how to avoid them! We show you how to set up your computer to guard against all types of malicious software - viruses, spyware, adware, rogueware, ransomware - we show you the software and techniques you need to block it ALL!
Oh, and just wait till you see the free anti-malware titles and amazing firewall we've discovered!
Everyone loves to use their laptops with public WiFi. Hey, what could be better than sitting down in your hotel room, at an airport, or coffee shop and logging on for some free Internet?
Well, hackers LOVE these places too - only it's your data they're after!
In fact, I'd go so far as to say if you don't know what we have in our book you probably shouldn't even be using public WiFi - EVER! It's FAR more dangerous than most people realize!
Your accounts can get compromised, your passwords stolen, and your e-mail intercepted - and that's just for starters. Identity theft, attacks on your friends / contacts are ALL possible - AND probable!
Oh, yeah - and the hacker doesn't even need to break into your computer to pull this off! He just logs onto the wireless network and goes to work with software that can "spy" on you!
We'll show you how he does it - and how YOU can stay safe!
The online world is a dangerous place - from scams, to hijacking, to malicious pops-ups, to fraud - there's a lot of ways to trip and fall out there! You need to know how to tell the good from the bad, how to spot phishing scams, online scams, and con artists. You need to know how to properly set up your browser, how to stay safe on Facebook, how to respond to malicious pop-up windows, how to deal with cookies, and more!
A lack of knowledge in ANY of the areas above is a guarantee for trouble down the road. And that's a HUGE problem! All it takes is one scam, one vicious pop-up, or one drive-by infection to compromise your data, ruin your computer, and get your identity stolen - what you DON'T know WILL hurt you
Oh, this is HUGE - this chapter ALONE is worth the price of the entire book! We reveal all the pitfalls people make when setting and using passwords - and show you how to avoid 'em!
Knowing the difference between a strong password and a typical password is the difference between getting your accounts hacked or staying secure.
We also talk about how you handle passwords in general. If you don't know the critical 7 steps we outline in this book even the strongest of passwords are at risk! Getting your accounts hacked can RUIN your life in ways you've never even thought of!
What happens if a hacker breaks into your bank account? Or your credit card account? Or heck - even your Amazon account? Talk about a nightmare! Our passwords section gives you the key to minimizing your risk!
It takes less than 30 minutes to compromise an unsecured computer connected to the Internet. There are thousands of hackers out there scanning for weaknesses right now - you're likely getting scanned dozens of times a day - you could be getting scanned even as you read this!
Is your home network set up properly or are you about to be the next statistic? Make sure you know for sure with our book!
We're going to show you how to lock down your home network - your router, your wired network, your wireless network - everything. We'll show you how to set the right encryption on your wireless, how to make sure your firewall is engaged properly, and even how to name your network to avoid getting personally targeted for a WiFi attack.
E-mail is literally the door to your digital world. A compromise here - by either a hacker or malware program - can be devastating! If there's ONE place you need to be safe, it's when you deal with your e-mail!
Just think - what would happen if someone had access to your e-mail account? Chances are they could easily piece together enough information about you to steal your identity (just think of all the items in your inbox, sent items box, and outbox). In addition, every private account you have online - your bank, credit cards, Amazon, Paypal, etc ALL use e-mail to recover passwords. If the bad guy has your e-mail account, he can be in ALL your accounts in a matter of MINUTES!
You DO NOT want your e-mail compromised - and we're going to show you how to keep it locked down tight. Everything you need to know to set the right kind of password, avoid scams, and KEEP IT PRIVATE!
This is the fun section! We have a LOAD of general safety tips designed to help you keep safe in all your online endeavors. We'll show you a "secret" file you can use to prevent your computer from ever seeing another malicious site. We'll show you how to properly dispose of an old hard drive. We'll show you how to avoid "bad" freeware. We'll show you how to avoid ransomware. And that's just for starters!
There's a literally TRUCKLOAD of advice in this section that'll help keep you super-secure and safe!
And that's just a small sample of what we're going to cover!
In addition to the sections above, there's also a section on why the bad guys are after you and what they can do if they get access to your PC. We also cover just what to do if you get infected - and 6 easy step to follow for getting uninfected! Our book also includes tips for keeping your computer physically safe from theft - after all, if your computer gets stolen, what's the point of the rest of the security?
Finally, we've also included a glossary to help with the terms found throughout the book and 20 of our favorite FREE security-related programs! The money you save on commercial software will pay for this book 20X over!
Whew - this is BY FAR the most important book ANY computer user will ever read!
We've looked around - and there isn't anything like this anywhere! Amazingly enough, finding a traditional book on computer security is almost impossible - and when you DO find one, it's written in such a technical manner you'd need a degree in Computer Science to figure the thing out!
This innovative new book is TRULY unprecedented! It's easy to read, packed with pictures, screen shots, and illustrations, and hey - we even try to make the whole thing entertaining! You'll BLAST through the material and before you know it everyone will be coming to YOU for advice on computer security!
Yup, EVERTHING we know about Internet security for the home user is JAMMED into this earth-shattering e-book!!
Your cost? Get this - we're almost giving this away!
Just $6.97 and you get an immediate download! How cool is that? You could be browsing the pages of this e-book in a matter of MINUTES! Oh - and no special reader required either - it's a standard PDF file that can be read with the free Adobe Reader!
HURRY! Grab your copy of this indispensable book now for just $6.97!
PS - Anyone who thinks they don't need this information and that an attack "won't happen to them" is living a lie. It's like not wearing a seatbelt because "so far" you've never been in a bad accident.
Bottom line - If you're using the Internet and you don't know the information we outline in our e-book, then it's not a matter of IF you'll get compromised - it's simply a matter of WHEN.
Don't Surf The Internet Without It!
October Wallpaper Is Ready!
The featured desktop wallpaper for October is ready for you to download!
Check out the featured images below and stop by the site - hundreds to choose from.
All can be found here and are 100% free:
Oh, and if you enjoy these images, please tell your friends!
For these and other great selections of desktop wallpaper, head to:
As always, the wallpaper is 100% free, so enjoy!
You can also view the current newsletter and archives online at
Copyright, Disclaimer, Etc.
You are welcome to reproduce this newsletter (i.e. print it, store it) for your own personal use. You are also welcome to forward it, in its entirety, to friends and family.
If you would like to reproduce this publication, or any part of it, in any other publication, be it web based or otherwise, you must contact us for permission. Any unauthorized re-distribution will be considered a copyright infringement and grounds for a lawsuit.
Finally, you agree to try any advice contained or suggested in this newsletter at your own risk.
Microsoft and Windows are trademarks or registered trademarks of Microsoft Corporation (duh!)
If daily newsletters are too much to handle, then change your subscription to our Weekly Edition...
If you need to change your email address, go here...
"I don't want yer stinkin' email!"
WorldStart, Inc. - 6725 W. Central Ave., Suite M, PMB# 357, Toledo, OH 43617
You are receiving this daily newsletter because you requested it either at Worldstart.com or one of our affiliates.