One of the first lines of defense when viewing the internet is your internet browser. What is a browser, you ask? It is the program your computer uses to decode the internet into graphics and text for you to read. Examples of browsers are Internet Explorer, Safari, Opera, Google Chrome, Mozilla Firefox, Pale Moon, and many, many more. The two best browsers out there that we recommend are first, Google Chrome and a close second, Mozilla Firefox. Both of these browsers use what is called a sandbox to open webpages. Yes, envision a child playing in a sandbox with the wooden borders there to ensure that the sand doesn’t spill over the side into the grass. The sandboxes these browsers use are similar. They view the internet inside a “border” to protect the rest of your computer. Using these browsers and having a decent antivirus – Yes free is good too (Windows Defender, Microsoft Security Essentials) — your computer will be much safer when online. Of course our computers are never at risk unless there is a person in the driver seat, however. Anything we give permission to or “Click” on totally bypasses ALL of the computers safeguards because we said go! The best thing we can do is to only click things we recognize and know to be safe and ignore the rest. Keep reading and we’ll talk about what I mean.
We all love free stuff. In fact, a lot of us will try to get free stuff first, especially on the internet. Songs, games, movies, pictures – we like ‘em when they’re free. But just know that the majority of “free” stuff you download from the internet has viruses and spyware along for the ride. We click through all the buttons to download and before we know it we’ve got new bars on our browser, apps on our home screen, viruses that are causing problems, and spyware that’s hijacking our private information. The best thing to do is to avoid these free things. “You get what you pay for,” is perhaps cliché, but very true. And a lot of times, downloading free music and movies is illegal. It’s best to steer clear unless you’re 100% sure it’s safe. If you’re unsure, give us a call and we’d love to help you decide if the button you’re about to push is safe.
There’s many ways that people around the world try to scam you. The most common ways are through e-mail and your own home phone.
E-mail: Don’t open e-mails from people or places you don’t know. Don’t click links in e-mails from people you don’t know, and if one of your friends sends an e-mail with only a link in it, or writes a message along with a link that doesn’t sound like them, don’t click on the link. Give your friend a call to see if they really did send you something.
Home phone: First thing to know here is that Microsoft, or any other big and reputable company, does not call you. If you get a phone call from someone claiming to know something about your computer, it’s a scammer. Microsoft, or any other company, doesn’t know anything about your computer, and they wouldn’t contact you on your phone. These scammers will try to get you to go to some random link and help them sign into your computer. Then, when they are inside of your computer, they may download viruses, steal bank info and other vital information about you.
Here are some good rules about passwords:
- Don’t reuse passwords over and over. It’s best to memorize passwords, but if you’re like me, I need to keep a sheet of paper or notebook somewhere safe to write down all my passwords and the places they are used for. As a standard rule, use 3 or 4 different ones. Don’t use the same password you use for your e-mail account for your bank sign-in.2. Pick passwords that would be difficult for someone else to guess. Pick something completely random, and then memorize it. Don’t use your birthday, or street name, or easy passwords like “123456”, “111111” or “Password.” Use a good combination of letters, numbers, and at least one special character (i.e ?!@#). This makes it almost impossible for computers, or even your neighbor or best friend, to guess your password.
3. Have your browser save your password. If your computer is used by only people you trust (aka you and your spouse, or just you), then have the computer remember your passwords. Usually, after you type a new password, it will ask you if you want your browser to remember that password. The reason to do this is because Keyloggers won’t be able to steal your password. Keyloggers are a type of spyware that hitches rides on some downloads that you accept, like we talked about under “Free Stuff” above. Keyloggers see everything you type on your keyboard, from e-mails, to English papers, to passwords, to e-mail addresses and everything in-between. If you type it on your keyboard, a keylogger can see it. So if you have a keylogger and type in “Gmail.com” to go to your e-mail, and then type in your username and password, that keylogger can get into your e-mail. The same can be said for your Bank account, Facebook account, and anything else you sign in to. So if your browser remembers all of your passwords, all you have to do is go to the website and click “sign in” instead of typing your password. If you use public computers or if your computer is used by other people you don’t completely trust, this option would not be good for you.
In this new age of Social Media, it seems like we put everything on the internet. Remember that no matter what it is or how private you think it is, anything you put online is permanent. Even if your Facebook profile is set to private, or so that only your friends can see, it’s really not. Once you put words or pictures into cyberspace, it can’t be undone, even if you delete them. It’s best to think twice before you post something online, and make sure that you’re 100% sure that whatever you’re putting out there, you’d be comfortable with it staying on the Internet forever.
Viruses come in a lot of shapes and sizes. Trojans are appropriately named after the Trojan Horse the Greeks used to secretly enter Troy. These viruses come into your computer disguised as something else. It might be from something good you think you’re downloading, but when you click the download button a Trojan can piggy-back in on the file you’re downloading. Worms are viruses that self-replicate. Their aim is to infect not only your computer, but other computers. They spread to devices on your own network, or they can spread to others through carriers like e-mail. There are many other types of viruses, but those are generally the main ones we deal with.
Viruses are made by callous computer programmers that have nothing better to do with their time than to ruin everyone’s lives with these annoying “bugs.” Viruses are designed to breach computer security and cause chaos inside your computer. Sometimes they pass through Firewalls and Antiviruses. They enter your computer by being disguised in things that you download from the internet, either accidentally or on purpose. They are almost always connected to pornography websites, “free” music websites, “free” movie websites, and many seemingly innocent websites. When downloading things off of the internet, you need to make sure what you’re downloading is free from viruses. A computer virus can do anything from causing an annoying nuisance by making pop-up windows never go away, to eating your precious files or making your computer completely crash, and everything else in between. There’s no end to what viruses have the potential to do. The best safeguard against them is to not download things off the internet, or make sure when you do that you’re not downloading a viruses into your computer. If you’re unsure, just give us a call and we’d be happy to talk with you over the phone –free of charge!– to help you decipher whether or not something is a good download or a bad one.
Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. Spyware can also negatively affect a computer’s performance by installing additional software, redirecting web browser searches, changing computer settings, reducing connection speeds, changing the homepage or even completely disrupting network connection ability. Spyware can also be used as a type of adware, where the software delivers unsolicited pop-up ads in addition to tracking user behavior. Typically, spyware is installed when a user installs a piece of free software that they actually wanted. When the desired software is installed, the spyware will piggyback on the installation and start collecting data from the user’s activities. The user can also be tricked into installing the spyware through a Trojan horse as well as it pretending to be a free piece of security software. Spyware authors have been known to pay shareware developers to bundle their spyware with the legitimate software as well as simply repackaging freeware and bundling it with their own spyware. Drive-by downloading is another method used to install spyware on an unsuspecting user’s computer.
- Hardware replacement
- Hardware and software upgrades
- Performance tweaks
- Virus and spyware removal
- Optimization (speeding it up)
- System testing and assessment
- Hardware and software troubleshooting
If your computer isn’t working right but you’re unsure what the problem is, just give us a call. We’ll get it working great again in no time!
For A Limited Time:
You might be asking, “Why the campaign against pornography? You’re supposed to fix computers, not worry about what people do in their spare time.” If there’s one thing we’re more passionate about than computers, it’s FAMILIES. We love our customer’s families and we truly want to protect them in this world that cares more about exploiting women and sex than building up families, all in the name of the great dollar. Whether you want out of the crippling cycle of pornography, you want to help a family member, or you want to protect your kids, we are now supporting and offering the use of a new software that actually works. No more hiding or deleting shameful history. No more spying, accidental and disappointing “findings”, or wondering what your spouse or partner is up to. No more worrying about what your child is doing when they’re not with you, or wondering if they’re on Facebook while at school, or worse, while driving. Bottom line: FREEDOM. Freedom to spend time building relationships. Help to provide a safe haven for your family by contacting us today. Filters and blocking apps don’t work, try Ever ACCOUNTABLE provided by PC Tune-Up today, risk-free, for 30 days. Continue reading to find out how it works and to take advantage of our one-time offer.
Ever Accountable is a powerful app designed to help you live above pornography, or protect your household from pornography. Whether you are using an android mobile device, Windows® PC, or Kindle®, Ever Accountable has you covered. With accountability being one of the best weapons against pornography, Ever Accountable is a simple, easy to use tool that arms you for the fight!
It works by tracking your internet browsing and apps you use and reporting all usage to our servers. Once a week, our server will send a report of all your activity to the accountability partners you choose.
Pornography addiction: If you’re addicted to pornography and are ready to step into the light and freedom, then you will choose up to three accountability partners (spouse, friend, counselor, clerical leader, etc) that will receive the report of your usage each week. It will track all internet usage including incognito and private browsing tabs, and all apps you use and the time spent on them. If any applications use the internet, in addition to reporting the time spent on the app, it will also report the content of the app as well.
Family protection: If you’re wanting to protect your family from pornography use and other websites you disapprove of, we feel this software enables families to protect themselves in the best way possible: HONESTY. We use this software on all of our devices. We have thoroughly explained how Ever Accountable works to our kids. There’s no blocking, no filtering — they have complete use of the internet. We want to show our kids that we trust them, and we want to prove to them that they’re responsible. They know our rules, they know what pornography is, they know the websites that we don’t allow in our home. They know that even if they go onto one bad website, it will track it and report it to Mom and Dad. This opens up an entirely new door of communication that was never before had in our home. Instead of hiding the fact that they fell onto a bad website, they come and tell us and we’re able to talk about it. Because of the reports, we’re able to see what it was that lead up to the bad website (an ad, a pop up, etc) and we can fix the problem and teach our kids how to use the internet safely.
Since it tracks all applications, we can easily see if our kids are spending too much time on games or applications like Facebook. We can also see if they’re using their phones during school, or worse, while driving. Again, this allows us to communicate with our kids. We can allow them access to the reports so they can see it themselves.
Why filters don’t work: For anyone that has used filters or blocking software, you know they can be annoying. First, they don’t teach our kids how to safely use the internet. They don’t create good habits for internet use. Second, they block and filter things you don’t want them to. If a child is doing a report, a lot of times you have to type the password in 20 times just for them to go to certain websites that are needed. It makes us babysitters instead of parents or spouses.
“Just a simple fact of knowing that someone will see, no matter what, cuts any temptation off at the knees. I never want to look.”
– Kent, Ever Accountable user, Meridian
Ever Accountable runs in the background of your android phone or tablet, PC, or Kindle, and sends a record of your website visits and the apps you use to our servers. Because it uses minimal resources to do this, it doesn’t drain your battery. It is an app that makes it easy to avoid pornography on a smartphone, tablet, or computer. It doesn’t treat you like a child by trying to block anything. Instead it simply holds you accountable for what you do.
By holding yourself accountable, you will find great strength in those moments of struggle. And to make it even better, the person receiving your report will know you are living clean, which is an incredible way to build trust.
Pornography destroys our ability to have real, honest relationships, to succeed at school or work, and to experience life to the fullest. Put pornography out of your life so you can live the life you always wanted!
Ever Accountable allows pornography users the freedom to break free. It strengthens relationships and allows for open and honest communication between couples and families.
“To answer your question, yes, it has been easier to stay away from pornography since using Ever Accountable. The power of exposure of my internet usage has been life changing as I no longer fear being online. The freedom to still use the internet and choose what I look at under the safety of accountability has been empowering. I am now free from temptations to look at pornography and am so much more clear minded to do God’s will over my own. My relationships have also benefited as I no longer have to hide in shame over what I’ve looked at under the cover of night or seclusion. I am truly free to live as God intended me and I look forward to the year to come as my life continues to improve.
Thank you for creating such an easy to use an non-invasive service that really does make a difference in our culture and in the lives of those who use it!”
– Matt, Ever Accountable user
- All internet browsing history
- Deleted internet history
- Incognito window and private browsing history
- Applications used
- Logs all times of websites visited
- Logs amount of time used for each application
- If the software gets deleted from a device – it will immediately tell you what device and when it was removed. This doesn’t wait for the weekly report.
- If a device is no longer active due to inactivity. If a device isn’t used for a week, it’ll let you know. As soon as the device is turned on again, it will send you an e-mail telling you the device is active again.
Once a week, our servers send everything mentioned above to up to 3 accountability partners. You can choose your spouse, a friend, a counselor, clerical leader, or even yourself if you’re using it for members in your household, like your kids.
“I just wanted to drop you guys a note. I’m “the wife.” I’m not sure how many of us you’ve heard from, but I want to tell you how grateful I am for your software. My husband’s secret came out at the worst possible time in our lives, and I wasn’t sure we would make it through because of how impossible it was for me to put that one step forward to fully trust him. How could I trust him without proof? Ever Accountable became my proof. Filters don’t work, and there’s always that awful Incognito Window. My husband was so ready to get out of it. He wanted help, too, but didn’t know how to do it. Ever Accountable has kept him away from pornography for several months now, and as he puts it, the desire to look at pornography is gone. He has become a changed person. I can see and witness the physical change in him — the light in his eyes and in his countenance — and the change that has come over our whole family because of it. I finally have the guy I knew was in there somewhere… Thank you!! You have changed our lives. Now we can start living our lives the way God intended without having the weight of the Pornography Anchor attached to our home. Even though he did it in secret, it affected each of our lives so much. My kids needed a dad. 🙂 🙂 :)”
– Asked to remain anonymous
Try Ever Accountable!
- Contact us today to schedule your appointment which will include:
A 30 day trial of Ever Accountable
Instruction and discussion on how best to use the software
Setup Ever Accountable software on an unlimited number of Windows® PC, or Kindle®, Android, or Chrome OS supported devices in your home
(Apple Support Coming Soon!)
Virus, sypware, and malware removal
Computer optimization to speed up your computer
Call 740-3278 and mention this page to get this entire package for only $48
(Limited time only, $128 value)
[*] A keylogger is a type of surveillance software that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, passwords, credit card numbers you type, and any information you type at any time using your keyboard.