September Newsletter: 90 Day Folders

The September PC Updater News is online now:

Learn how to cut your Outlook or Thunderbird boxes in half.

Phish Evolution

Back to Basics: a phish is an email that’s ‘fishing’ for you to click a link or take an action that hooks you into a scam, either to take your cash or control your online accounts, or convert your computer into an online employee (‘bot’) of the phish-sender (the ‘botnet herder’).

And a ‘spear phish’ is a targeted phish, customized to just one recipient, frequently with scary amounts of inside knowledge, like the names of coworkers, where you bank, and so on. In-between, there’s just a rough attempt to make the message look personal, usually by taking the domain from your email ( and using it throughout the email. It’s rarely a true one-recipient spear phish, unless you are a public officer of a large corporation, or a ‘target of value.’ Some of the Democrats hacked during the last election were attacked using spear phish emails. For most of us, we’ll just see phish with some mail-merge insertions of our email addresses in a few spots.

So, do you believe that the email shown below is real? Did I win the lottery?

I hope there were only ‘no!’ answers for that. The “UNITE STATE” company mentioned, Facebook, is made to appear to have a Canadian address, a South African bank, and a FREE email address from Yahoo of Japan, and a phone number with a South Africa country code of 27. And they’re asking for enough information, with that driver’s license, to run a credit check or apply for a loan. So, clearly I did not win a lottery that I never entered in the first place.

So, if no one believes that phish, why is this one so convincing? It’s a new version, just showing up this month in very large numbers, somewhat shortened because the original content is far too crude to include here:

Hello there,
Hope u do not mind my english sentence structure, because i’m from Germany. I contaminated your machine with a malware and im in possession of all of your personal data from your operating-system… (vague threats of web site history recordings here)
After some time additionally, it pulled out every one of your social contacts. If you ever would like me to remove your everything i currently have – transmit me 790 us in btc it’s a cryptocurrency. Its my account transfer address – 141…
At this moment you will have 26 hours. to make up your mind Once i will receive the transaction i’ll eliminate this video and every little thing thoroughly. Or else, please remember this evidence would be sent to your contacts.

Some of these show up with your own email address as the ‘from’ or ‘reply-to’ address. It’s faked. Scammers who have your real email login information use it to send bulk mail, not ask for Bitcoin. 

There have been a lot of these for the last two months, blackmail letters with Bitcoin payment demands and claims about webcams. Bitcoin is difficult to trace and impossible to call back. Delete these hoaxes. Some of them include real passwords-mine included a password for a video website I visited 6 years back, so I know that “” was hacked and lost their user list. 

I know that site was hacked because I gave it a unique password. No passwords used online should be used in more than one location, because once a site owner realizes that they’ve been hacked, they don’t tell you. They just set the database for everybody to “lock out user until they request a ‘forgot my password’ reset link.” But if they were hacked, that means that some hacker has your email address and a password that you have used, somewhere, at least once. So they’ll start bulk attempts to use their new million-address database of stolen email and password pairs to log in at the top 50 banks, Amazon, the Apple Store, even some online games where you’ve built up a powerful character to take over. They’ll attempt to log into anything with digital resale value or a cash equivalent. If they succeed, they can take over that account, and whatever it contains.

Again, don’t re-use passwords. When they’re hacked on one site, they’re tested elsewhere and everywhere.

Why Computers and Commuters Both Need Coffee

Computers slow down from too much traffic

The best explanation for why Windows is slow that I’ve heard was an explanation of ‘building funnels” from a state highway engineer. Roughly: “That commuting route is beyond planned capacity. Yes, we could add lanes to it and increase the capacity, fit more cars, and even increase the speed limit if we make it limited access. No problem there. But these commutes don’t end in highways, they end in neighborhoods, in areas we can’t control, county roads and other states. So adding capacity encourages more use, which results in building funnels at both ends of the commute where the extra lanes are taken away, and the funnel and resulting merges back up the traffic.”

And then, darker, “Sure, we could co-ordinate work with other states to extend things, but why should we invest anything to encourage building in areas that don’t give us any tax revenues but add to our highway costs? And worse, developers build homes on a much shorter timeline than we can plan state highways, let alone fund them and build them.”

Of course, the people who live alongside these racetrack routes, the worst of the commuter single-lane state highways, have things to say on these topics.

But back to technology. This is the classic Windows stupidity of running background tasks when the system is slow, but not in sleep mode. So let’s set a service, we’ll call it “Street Cleaning” just to make it non-techy, and say “We don’t want that to run during rush hour. Let’s have it run whenever the controller sees that traffic is low. Can’t do it when there is no traffic at all, because we’re turning off the streetlights when nobody’s on the road. So when the streetlights come on, check recent traffic, see that it’s zero, and start cleaning the streets. Excellent.” 

This, of course, turns on the streetlights based on a motion sensor, and sequentially starts  “Street Cleaning” at the moment that a car enters the parkway. Or triggers some service to start doing complex background stuff because you woke the computer and started typing. Or set twenty to fifty services to start running and phoning home for updates when the computer is first turned on. Which leads most users to start the computer, and then start the coffee pot, and not come back until both computer and operator have been thoroughly woken up. 

Preventing Startup Buildup

Old computers aren’t always slow because they’re old. If they were not budget computers on day one, they shouldn’t act like junk in year three. If they do, and the hardware tests out OK, the remaining cause for ‘slow’ or ‘erratic’ is generally “too much software trying to run at the same time.” That’s a traffic condition, background junk that does not need to be there. Some of it is malware, and a lot of it is just un-needed junk that is not remotely evil. But all auto-starting software adds to startup time.

So, to prevent that, you have to avoid software that adds auto-starting stuff to the system. I’ve told many of you this before, here it is again. It’s important: When you install software, always choose the Custom install. Always. Even if you have no plans to change anything, even if you’re afraid of even touching it. Always. And then read the screens during the setup, and pay attention to the options. The default options will work, they’re tested heavily, but they were not tested on every possible computer configuration. 

What you’re looking for in those option screens are the choices that mention “Also install this…” or “Start with Windows”. Those always require a moment of asking why would that be a good thing? Why allow that? Why allow a Hewlett Packard printer to run a program at startup that phones home to Hewlett Packard for a new driver, waiting for an overloaded server to respond, for the life of the computer? Think about that–not the life of the printer, and not the life of the printer warranty, but forever. Now multiply that by a dozen, and that’s a typical HP printer setup. 

Auto-running software is a problem

Now all of these startup items are not available to “just say no” to during setup, and I can follow up later during a tuneup to remove the useless autoplays, but for those choices that appear, if you won’t need a listed feature, don’t install it. And if it’s a third-party program, as in “we also recommend,” that’s a malware installation tactic. While not all software that arrives in that way is evil, you didn’t go looking for it, so you don’t need it, so don’t let it install. 

There are a lot of small utility programs that suggest ‘Run with Windows.’ OK, let’s see, it’s a little utility that you have never needed before, that converts something to something else, and it wants to start with Windows because you will need it every day, forever. No. Just say no.

As the Printers Die

Reminder: If you bought a new printer to replace another, go to Control Panel, Uninstall a program, and remove the software that installed with the former printer. Also check the printer list, in Settings, Devices, Printers & scanners, and remove the old driver there. It’s easier to do that before installing the new software, especially if the new and old printers are the same brand. The rule is like any other cleanup rule: Demolition before rebuilding. Make space before organizing. Remove that old plumbing before adding the new pipes. Or wires, or software. That helps you identify the old stuff, wipe it out before adding the new stuff. 

Other old software should also be removed. Any program that has an annual version can cause problems, so don’t allow them to build up forever. If you will never use these products past, say, year 3, then delete the “three years back” version when you add the latest version. 

Do Hard Drives Fill Up?

The answer is generally “not from saving documents.” But software can fill them, as can video editing in high resolution, or Windows errors that cause log files to never ever go away–that’s currently a recurring issue in Windows 7. If there is very little software on your system, but there are ‘full’ warnings in Windows, it can be the log files–call for a cleanup.