1 00:00:00,320 --> 00:00:02,960 Speaker 1: Brought to you by the reinvented two thousand twelve Camray. 2 00:00:03,200 --> 00:00:08,760 Speaker 1: It's ready. Are you get in touch with technology with 3 00:00:08,920 --> 00:00:12,879 Speaker 1: tech Stuff from how stuff Works dot Com. Join Josh 4 00:00:12,880 --> 00:00:15,280 Speaker 1: and Chuck, the guys who bring you stuff you should know, 5 00:00:15,600 --> 00:00:17,680 Speaker 1: as they take a trip around the world to help 6 00:00:17,720 --> 00:00:20,720 Speaker 1: you get smarter in a topsy turv economy. Check out 7 00:00:20,760 --> 00:00:23,439 Speaker 1: the all new super Stuff Guide to the Economy from 8 00:00:23,440 --> 00:00:27,240 Speaker 1: how stuff Works dot Com, available now exclusively on iTunes. 9 00:00:30,240 --> 00:00:32,680 Speaker 1: Hey there, everybody, welcome to tech Stuff. My name is 10 00:00:32,760 --> 00:00:35,320 Speaker 1: Chris Polette. I'm an editor here at how stuff works 11 00:00:35,360 --> 00:00:37,479 Speaker 1: dot com and sitting next to me as usual as 12 00:00:37,479 --> 00:00:40,959 Speaker 1: senior writer Jonathan Strickland. Hey there, all right, then, so 13 00:00:41,080 --> 00:00:44,720 Speaker 1: I I guess it's time for uh yeah, it's we're 14 00:00:44,800 --> 00:00:52,040 Speaker 1: changing up things. It's time for listener may how Yeah, 15 00:00:52,120 --> 00:00:54,600 Speaker 1: Usually we wait to the end to do this, but 16 00:00:54,800 --> 00:00:57,920 Speaker 1: in this case we are our Our entire podcast episode 17 00:00:57,960 --> 00:01:00,760 Speaker 1: is based off of the message we see from a listener. 18 00:01:00,800 --> 00:01:03,920 Speaker 1: So let me read that really quickly. Hello, I've been 19 00:01:03,960 --> 00:01:06,560 Speaker 1: a listener and I love the podcast. I have a question. 20 00:01:06,720 --> 00:01:10,280 Speaker 1: I keep getting viruses on my computer Windows XP and 21 00:01:10,319 --> 00:01:13,080 Speaker 1: I was wondering if changing my IP address will stop 22 00:01:13,080 --> 00:01:16,320 Speaker 1: the attacks. I have my computer lockdown with trend Micro 23 00:01:16,440 --> 00:01:18,840 Speaker 1: and Windows Defender, and everything will be fine until I 24 00:01:18,920 --> 00:01:21,320 Speaker 1: randomly do a scan and it pulls off at least 25 00:01:21,319 --> 00:01:24,360 Speaker 1: five viruses. But this is not every time I do 26 00:01:24,400 --> 00:01:27,880 Speaker 1: a scan, just sometimes I do a scan every day. 27 00:01:27,959 --> 00:01:30,000 Speaker 1: I was listening to an old podcast of yours where 28 00:01:30,040 --> 00:01:32,480 Speaker 1: you talk about some program that makes it seem like 29 00:01:32,520 --> 00:01:35,600 Speaker 1: your I P is different. It was how proxy servers work. 30 00:01:36,000 --> 00:01:41,080 Speaker 1: Your help would be much appreciated. Alex from Arlington, Texas Well, Alex, 31 00:01:41,240 --> 00:01:43,480 Speaker 1: We're here to to help you a little bit as 32 00:01:43,560 --> 00:01:46,319 Speaker 1: much as we can at any rate. Uh, computer viruses 33 00:01:46,319 --> 00:01:49,920 Speaker 1: are nasty, nasty customers, and uh it's never fun to 34 00:01:49,960 --> 00:01:53,240 Speaker 1: find one on your machine. That's true. And UM, that's 35 00:01:53,240 --> 00:01:57,480 Speaker 1: why we've decided to entitle this computer Virus Emergency Response 36 00:01:57,480 --> 00:02:01,200 Speaker 1: Plan GO yes, because you have to figure out what 37 00:02:01,240 --> 00:02:02,960 Speaker 1: are you gonna do in the event of a virus. 38 00:02:03,040 --> 00:02:06,400 Speaker 1: You can't tell walk out and you know, walk out 39 00:02:06,400 --> 00:02:08,280 Speaker 1: in the hallway and find that big red box with 40 00:02:08,360 --> 00:02:11,839 Speaker 1: the in the event of a computer virus break glass, right, Yeah, 41 00:02:11,960 --> 00:02:14,320 Speaker 1: what are you going to do when they come for you? 42 00:02:14,720 --> 00:02:18,600 Speaker 1: Is I think the question we should ask. I'm going 43 00:02:18,680 --> 00:02:22,160 Speaker 1: to all right. So first thing, Alex, your first question 44 00:02:22,200 --> 00:02:28,440 Speaker 1: about changing your IP address, I'm sorry, that's not gonna work. No, no, UM, 45 00:02:28,480 --> 00:02:31,080 Speaker 1: you're looking at in that case you were talking about 46 00:02:31,320 --> 00:02:34,960 Speaker 1: using a proxy server. Uh. The specific case we were 47 00:02:35,040 --> 00:02:38,079 Speaker 1: talking about was you log into a server that would 48 00:02:38,120 --> 00:02:42,600 Speaker 1: allow you to then browse the web through that server. Uh, 49 00:02:42,639 --> 00:02:46,080 Speaker 1: so that if anyone were looking at at the you know, 50 00:02:46,200 --> 00:02:50,240 Speaker 1: the traffic coming into that site, they would see it 51 00:02:50,320 --> 00:02:52,720 Speaker 1: coming from the the proxy server you were using, not 52 00:02:53,000 --> 00:02:56,520 Speaker 1: your own computer. So in that sense, it's really kind 53 00:02:56,520 --> 00:03:00,560 Speaker 1: of misdirection. It's just telling someone, hey, I'm actually using 54 00:03:00,560 --> 00:03:04,680 Speaker 1: this computer that happens to be in another country or whatever, UM, 55 00:03:04,720 --> 00:03:07,280 Speaker 1: not my own computer at home. It's not going to 56 00:03:07,400 --> 00:03:09,960 Speaker 1: help you if you have a virus on your computer. 57 00:03:10,320 --> 00:03:12,080 Speaker 1: And that sounds that's what sounds like to me. It 58 00:03:12,120 --> 00:03:15,280 Speaker 1: sounds to me that you have a virus on your 59 00:03:15,280 --> 00:03:19,240 Speaker 1: computer that your scanner is not picking up. Um. And 60 00:03:19,320 --> 00:03:23,720 Speaker 1: there are many viruses or variants of viruses, other kinds 61 00:03:23,760 --> 00:03:28,880 Speaker 1: of malware that can download other malware like they're they're 62 00:03:28,919 --> 00:03:32,320 Speaker 1: trojans you can get or viruses or whatever. That part 63 00:03:32,320 --> 00:03:34,480 Speaker 1: of the thing that they do to your computer is 64 00:03:34,520 --> 00:03:37,840 Speaker 1: they invite this other nasty stuff onto your computer without 65 00:03:37,840 --> 00:03:41,920 Speaker 1: your knowledge. So that might be why you're getting this notification. 66 00:03:42,040 --> 00:03:45,320 Speaker 1: It's picking up the other stuff that your virus is 67 00:03:45,600 --> 00:03:51,360 Speaker 1: allowing onto your computer, but not the main culprit. That's true. Um, 68 00:03:51,400 --> 00:03:54,960 Speaker 1: you know, unfortunately sad to say, Uh, in order for 69 00:03:55,000 --> 00:03:58,480 Speaker 1: you to get a virus or a trojan horse or 70 00:03:58,600 --> 00:04:00,360 Speaker 1: some kind of other malware on your you do you 71 00:04:00,400 --> 00:04:03,000 Speaker 1: have to do some of the work yourself. Um that 72 00:04:03,000 --> 00:04:06,040 Speaker 1: that doesn't you know, not to sound accusatory, because I 73 00:04:06,080 --> 00:04:08,880 Speaker 1: certainly don't mean it to be that way. Um. You know, 74 00:04:08,960 --> 00:04:11,880 Speaker 1: the people who write this stuff have gotten a lot 75 00:04:12,000 --> 00:04:15,360 Speaker 1: better at social engineering, which is basically convincing you that 76 00:04:15,720 --> 00:04:18,960 Speaker 1: you're downloading something completely benign that will actually be useful 77 00:04:19,000 --> 00:04:21,839 Speaker 1: to you, such as a plug in for a website 78 00:04:21,839 --> 00:04:25,679 Speaker 1: to watch the special video or something along those lines. 79 00:04:25,720 --> 00:04:30,120 Speaker 1: So even even anti virus or spywear software. Sure, I mean, 80 00:04:30,680 --> 00:04:32,240 Speaker 1: you know a lot of people have been tricked into 81 00:04:32,240 --> 00:04:34,520 Speaker 1: doing that. They'll see a pop up from their browser 82 00:04:34,560 --> 00:04:37,119 Speaker 1: window it says, hey, you know, we we've detected virus 83 00:04:37,200 --> 00:04:40,760 Speaker 1: on your computer. Click here to download the free virus blocker, 84 00:04:40,839 --> 00:04:43,159 Speaker 1: and uh it'll wipe it out. Well. In fact, you 85 00:04:43,200 --> 00:04:46,520 Speaker 1: didn't have one, but you do now thanks to that 86 00:04:46,520 --> 00:04:49,440 Speaker 1: that little installer that they put on there. So um, 87 00:04:49,480 --> 00:04:54,000 Speaker 1: you know, certainly, through some kind of weird happenstance, you 88 00:04:54,000 --> 00:04:56,360 Speaker 1: seem to have gotten something on there. And even if 89 00:04:56,360 --> 00:04:59,480 Speaker 1: you clean it off, um, and you keep ending up 90 00:04:59,480 --> 00:05:02,320 Speaker 1: with new viru verses, there's some pop up somewhere that 91 00:05:02,480 --> 00:05:07,440 Speaker 1: something's going on, and you may be inadvertently reinstalling new 92 00:05:07,520 --> 00:05:10,120 Speaker 1: viruses on your machine, even uh, even if you did 93 00:05:10,160 --> 00:05:12,760 Speaker 1: wipe the old one or the original one off, right. 94 00:05:13,279 --> 00:05:15,320 Speaker 1: And so let's let's take a look at a couple 95 00:05:15,320 --> 00:05:18,320 Speaker 1: of things that you need to take into consideration. First 96 00:05:18,320 --> 00:05:20,400 Speaker 1: of all, you did mention that you're using Windows XP 97 00:05:20,480 --> 00:05:23,640 Speaker 1: as your operating system. Make sure that you have the 98 00:05:23,760 --> 00:05:27,600 Speaker 1: most recent service packs for Windows XP. Because one thing 99 00:05:27,680 --> 00:05:30,800 Speaker 1: that a lot of these uh hackers are really we 100 00:05:30,800 --> 00:05:34,360 Speaker 1: should call them crackers because it's a malicious hacker. Um. 101 00:05:34,839 --> 00:05:36,920 Speaker 1: One thing that they're looking at when they're building these 102 00:05:37,000 --> 00:05:39,440 Speaker 1: viruses and trojans and things like that, this other kind 103 00:05:39,480 --> 00:05:43,039 Speaker 1: of malware. UM, they look at vulnerabilities that exist within 104 00:05:43,160 --> 00:05:47,440 Speaker 1: operating systems to exploit those vulnerabilities. So you want to 105 00:05:47,520 --> 00:05:49,720 Speaker 1: have the most up to date service packs because a 106 00:05:49,760 --> 00:05:52,480 Speaker 1: lot of those have security patches that plug up these 107 00:05:52,560 --> 00:05:56,720 Speaker 1: vulnerabilities as Microsoft discovers them. So someone sees something that 108 00:05:56,760 --> 00:06:00,120 Speaker 1: can be exploited, they tell Microsoft. Microsoft says, oh K, 109 00:06:00,320 --> 00:06:02,359 Speaker 1: we need to fix this, and they address it and 110 00:06:02,400 --> 00:06:05,400 Speaker 1: then release a patch for you to download and install 111 00:06:05,560 --> 00:06:08,080 Speaker 1: so that it it patches your system. You want to 112 00:06:08,120 --> 00:06:10,799 Speaker 1: make sure you have the latest version of the service 113 00:06:10,800 --> 00:06:15,320 Speaker 1: pack so that it is going to be the most secure. UM. 114 00:06:15,400 --> 00:06:18,839 Speaker 1: So that's my first My first line of advice is 115 00:06:18,839 --> 00:06:22,200 Speaker 1: to make sure you have that. Second of all, there 116 00:06:22,240 --> 00:06:26,200 Speaker 1: are some viruses that are particularly tricky and will prevent 117 00:06:26,240 --> 00:06:30,480 Speaker 1: you from downloading the most recent version of your anti 118 00:06:31,080 --> 00:06:35,360 Speaker 1: UH anti virus software, so you want to you want 119 00:06:35,360 --> 00:06:37,320 Speaker 1: to make sure you have the most up to date 120 00:06:37,400 --> 00:06:40,240 Speaker 1: version of that as well. UM. If it looks like 121 00:06:40,279 --> 00:06:44,880 Speaker 1: you're being prevented from accessing that, from uploading, up updating 122 00:06:44,880 --> 00:06:47,800 Speaker 1: your database, essentially it is what it is. UH. If 123 00:06:47,800 --> 00:06:51,640 Speaker 1: that's happening, then you know that you've got something hiding 124 00:06:51,680 --> 00:06:54,679 Speaker 1: there that you need to find. UH. It may require 125 00:06:54,720 --> 00:06:58,479 Speaker 1: that you uninstall that particular kind of anti virus and 126 00:06:58,560 --> 00:07:02,279 Speaker 1: try something else. UM. I don't recommend that you use 127 00:07:02,360 --> 00:07:05,239 Speaker 1: more than one kind of antivirus software on a computer 128 00:07:05,400 --> 00:07:08,640 Speaker 1: at the same time, because it's very resource intensive, and 129 00:07:08,680 --> 00:07:12,400 Speaker 1: they tend to make each other. I get all tangled 130 00:07:12,480 --> 00:07:14,520 Speaker 1: up and they fall over each other. They don't work 131 00:07:14,640 --> 00:07:18,440 Speaker 1: very well together. In other words, that's true. That's true. Um, 132 00:07:18,720 --> 00:07:21,560 Speaker 1: And that sort of unless I'm jumping the gun here 133 00:07:21,720 --> 00:07:24,640 Speaker 1: brings me to the point I wanted to make. Um, 134 00:07:24,680 --> 00:07:26,360 Speaker 1: this may not be the best thing for you to 135 00:07:26,440 --> 00:07:30,400 Speaker 1: do on the hard drive that's infected. You know, what 136 00:07:30,480 --> 00:07:33,880 Speaker 1: you might need to do is use what I would 137 00:07:33,920 --> 00:07:36,280 Speaker 1: put in that little glass box if I were actually 138 00:07:36,280 --> 00:07:41,200 Speaker 1: making one, which would be an emergency response disc. Um. 139 00:07:41,240 --> 00:07:44,160 Speaker 1: And basically this is something that that you might be 140 00:07:44,240 --> 00:07:46,440 Speaker 1: able to use. You might actually have something that that 141 00:07:46,520 --> 00:07:48,840 Speaker 1: does it. You said, Um, we're using a trend micro 142 00:07:49,480 --> 00:07:52,560 Speaker 1: uh anti virus. Well, they actually have a disk that 143 00:07:52,640 --> 00:07:57,000 Speaker 1: you can use. Um. They're one of several. Kaspersky is 144 00:07:57,040 --> 00:07:59,320 Speaker 1: another one where you can build a rescue disc. And 145 00:07:59,360 --> 00:08:01,120 Speaker 1: what this does is it allows you to boot your 146 00:08:01,120 --> 00:08:04,760 Speaker 1: computer from the c D itself. Um, you might say, 147 00:08:04,920 --> 00:08:07,560 Speaker 1: so what's the big deal. Well, if you're running off 148 00:08:07,600 --> 00:08:10,760 Speaker 1: the CD rather than your hard drive, then your hard 149 00:08:10,800 --> 00:08:13,760 Speaker 1: drive doesn't have control of your computer. The operating system 150 00:08:13,800 --> 00:08:18,840 Speaker 1: loaded onto the CD does so it can actually scan, uh, 151 00:08:18,880 --> 00:08:21,880 Speaker 1: it can actually scan your hard drive without any interference 152 00:08:21,880 --> 00:08:24,000 Speaker 1: from that virus that's on your hard drive. So if 153 00:08:24,040 --> 00:08:27,600 Speaker 1: you suspect that something is preventing you from updating your 154 00:08:27,640 --> 00:08:30,920 Speaker 1: anti virus or updating your operating system to the latest 155 00:08:30,920 --> 00:08:34,079 Speaker 1: service pack UM, it probably is a good idea to 156 00:08:34,120 --> 00:08:36,520 Speaker 1: go ahead and build a rescue disk and and uh 157 00:08:36,760 --> 00:08:38,960 Speaker 1: possibly even on a system that that you know is 158 00:08:38,960 --> 00:08:41,520 Speaker 1: not infected UM, and then you can use it to 159 00:08:41,559 --> 00:08:44,840 Speaker 1: boot your machine and and hopefully exterminate those viruses, because 160 00:08:44,880 --> 00:08:47,880 Speaker 1: that those anti virus companies that help you build those 161 00:08:47,920 --> 00:08:51,800 Speaker 1: rescue discs actually uh they build in some anti virus 162 00:08:51,840 --> 00:08:53,600 Speaker 1: stuff in there, so it'll go through your computer and 163 00:08:53,600 --> 00:08:57,439 Speaker 1: see what it can find and hopefully exterminate those viruses. Yeah, 164 00:08:57,520 --> 00:09:00,760 Speaker 1: it's always a good idea to to follow that. Another 165 00:09:01,440 --> 00:09:03,319 Speaker 1: another way, you can kind of look into the same 166 00:09:03,360 --> 00:09:05,400 Speaker 1: sort of thing as to uh to boot your computer 167 00:09:05,480 --> 00:09:09,679 Speaker 1: and safe mode, which means that it doesn't actually initialize 168 00:09:09,720 --> 00:09:15,520 Speaker 1: the Windows UM the Windows uh software operating systems. So 169 00:09:15,760 --> 00:09:19,679 Speaker 1: a lot of the viruses are part of your Windows registry. 170 00:09:19,720 --> 00:09:22,800 Speaker 1: If you're using a Windows machine, UM, that's part of 171 00:09:22,800 --> 00:09:25,160 Speaker 1: how they kind of load themselves up when you boot 172 00:09:25,200 --> 00:09:28,319 Speaker 1: your computer. Uh, the Windows Registry keeps up a full 173 00:09:28,400 --> 00:09:32,440 Speaker 1: database of all the different programs and applications that need 174 00:09:32,520 --> 00:09:35,280 Speaker 1: to to come online as soon as you turn your 175 00:09:35,280 --> 00:09:38,880 Speaker 1: computer on. Um. And and it's a tricky thing. If 176 00:09:38,880 --> 00:09:41,920 Speaker 1: you ever open up your Windows registry to look at it, 177 00:09:41,960 --> 00:09:44,800 Speaker 1: there's often a ton of stuff on there, especially if 178 00:09:45,120 --> 00:09:49,760 Speaker 1: you've ever deleted a program without actually uninstalling it first. Uh, 179 00:09:49,880 --> 00:09:52,079 Speaker 1: stuff that can be you know, remnants of that stuff 180 00:09:52,080 --> 00:09:54,800 Speaker 1: can be on your Windows registry forever. And it it 181 00:09:54,880 --> 00:09:58,640 Speaker 1: gets really clunky and hard to navigate through that. And 182 00:09:58,800 --> 00:10:02,280 Speaker 1: things don't necessarily have the names you would expect in 183 00:10:02,320 --> 00:10:04,400 Speaker 1: the registry key so you could look at it all 184 00:10:04,440 --> 00:10:08,319 Speaker 1: looks like a big jumbled gobbledegook. But um, if you can, 185 00:10:08,480 --> 00:10:10,680 Speaker 1: if you can start your computer and safe mode and 186 00:10:10,800 --> 00:10:14,760 Speaker 1: uh and run some anti virus software through safe mode, 187 00:10:15,320 --> 00:10:16,559 Speaker 1: And there are a lot of websites that tell you 188 00:10:16,600 --> 00:10:19,239 Speaker 1: how to do that. It all depends on which antivirus 189 00:10:19,240 --> 00:10:23,280 Speaker 1: software you're using. That might also help because it won't 190 00:10:23,320 --> 00:10:27,440 Speaker 1: allow the virus to disable whatever it is in that 191 00:10:27,520 --> 00:10:30,760 Speaker 1: antivirus software that that's preventing it from finding the stuff 192 00:10:30,800 --> 00:10:36,320 Speaker 1: in the first place. Now, um, let's say that Let's 193 00:10:36,320 --> 00:10:38,200 Speaker 1: say that you're able to run the stuff and it 194 00:10:38,240 --> 00:10:41,840 Speaker 1: finds a virus. Uh, what do you do? Then? It 195 00:10:41,920 --> 00:10:46,640 Speaker 1: depends again on what software you're using. Most antivirus software 196 00:10:46,679 --> 00:10:49,280 Speaker 1: has some sort of tool that will automatically remove the 197 00:10:49,360 --> 00:10:51,679 Speaker 1: virus from your system, which means it will look for 198 00:10:51,760 --> 00:10:55,520 Speaker 1: every single file that's associated with that virus and delete 199 00:10:55,520 --> 00:11:01,000 Speaker 1: it or at least quarantine it. Um. So, Then and again, 200 00:11:01,880 --> 00:11:04,560 Speaker 1: just because you track down a virus to a specific file, 201 00:11:04,640 --> 00:11:07,640 Speaker 1: like a specific application, if you delete that application, it 202 00:11:07,679 --> 00:11:10,199 Speaker 1: doesn't necessarily mean that you've gotten rid of the virus. 203 00:11:10,360 --> 00:11:13,080 Speaker 1: Because there are many many parts to some of these viruses. 204 00:11:13,080 --> 00:11:17,280 Speaker 1: They'll they'll they'll spread files around in several different locations, 205 00:11:17,280 --> 00:11:21,280 Speaker 1: so you need to make sure you get all of them. Um. So, 206 00:11:21,400 --> 00:11:22,800 Speaker 1: one good thing to do is, if you run the 207 00:11:22,840 --> 00:11:25,600 Speaker 1: antivirus software, you write down the name. If a virus 208 00:11:25,640 --> 00:11:28,040 Speaker 1: pops up right down the name of that virus, uh, 209 00:11:28,080 --> 00:11:31,439 Speaker 1: and make sure you link it to whichever antivirus software 210 00:11:31,440 --> 00:11:34,720 Speaker 1: you're using, because some companies use different names for different viruses. 211 00:11:35,600 --> 00:11:37,560 Speaker 1: You don't want to just assume that it's gonna be 212 00:11:37,640 --> 00:11:40,080 Speaker 1: the same in every single one, although most tend to 213 00:11:40,240 --> 00:11:44,880 Speaker 1: list the alternate names as well in their virus databases, 214 00:11:44,920 --> 00:11:47,199 Speaker 1: so usually you can figure it out even if you're 215 00:11:47,240 --> 00:11:49,360 Speaker 1: using if you're looking at a different database and the 216 00:11:49,400 --> 00:11:54,240 Speaker 1: one supported by your antivirus software. So at that point 217 00:11:54,280 --> 00:11:57,079 Speaker 1: you would need to go and look up this virus 218 00:11:57,120 --> 00:11:59,200 Speaker 1: and see what all the names of all the different 219 00:11:59,240 --> 00:12:03,960 Speaker 1: files that are associated with that particular virus, and then 220 00:12:04,000 --> 00:12:06,280 Speaker 1: you would need to go and try and remove those 221 00:12:06,320 --> 00:12:09,400 Speaker 1: files from your computer. Now, keep in mind if that 222 00:12:09,480 --> 00:12:13,080 Speaker 1: involves going into your registry and you remove the wrong file, 223 00:12:13,720 --> 00:12:15,920 Speaker 1: your computer might not work the way it was supposed to. 224 00:12:16,120 --> 00:12:20,600 Speaker 1: So always back up your Windows registry file before you 225 00:12:20,600 --> 00:12:23,679 Speaker 1: start making changes to it. You do not want to 226 00:12:23,760 --> 00:12:27,640 Speaker 1: have the headache of turning on your computer and realizing, Oops, 227 00:12:27,679 --> 00:12:30,600 Speaker 1: I deleted something that was apparently really important and I 228 00:12:30,600 --> 00:12:33,760 Speaker 1: don't have a backup YEA, well really you should back 229 00:12:33,840 --> 00:12:37,280 Speaker 1: up your hard drive regularly anyway. Yeah, well I was 230 00:12:37,280 --> 00:12:39,120 Speaker 1: going to get to that when we're talking about preventive, 231 00:12:39,200 --> 00:12:42,280 Speaker 1: but um yes, if you are not backing up your 232 00:12:42,360 --> 00:12:46,800 Speaker 1: hard drive, please change that behavior as soon as possible. 233 00:12:47,360 --> 00:12:50,679 Speaker 1: Um I, whether you're backing it up to a solid 234 00:12:50,720 --> 00:12:55,640 Speaker 1: medium medium like a compact compact discs or um flash drives, 235 00:12:55,640 --> 00:12:57,280 Speaker 1: which I'm sure it would take quite a few for 236 00:12:57,400 --> 00:13:00,599 Speaker 1: most of us, or a an external hard drive is 237 00:13:00,600 --> 00:13:03,880 Speaker 1: probably your best bet, and they're not that expensive, especially 238 00:13:03,920 --> 00:13:07,520 Speaker 1: when you compare it to the the headache you would 239 00:13:07,559 --> 00:13:11,920 Speaker 1: receive if you had to start from scratch. UM, invest 240 00:13:11,960 --> 00:13:14,360 Speaker 1: in one of those. Do regular backups of your hard 241 00:13:14,400 --> 00:13:18,040 Speaker 1: drive just in case if the absolute worst should happen, 242 00:13:18,920 --> 00:13:22,240 Speaker 1: you might need to rely on it again. Yeah, I 243 00:13:22,280 --> 00:13:24,640 Speaker 1: mean if you if you lost all the information on 244 00:13:24,679 --> 00:13:26,440 Speaker 1: your hard drive, you know that your hard drive is 245 00:13:26,520 --> 00:13:30,400 Speaker 1: essentially hosed, and you had files on that's a technical term. 246 00:13:30,520 --> 00:13:34,000 Speaker 1: That is a technical term. Um, And you said, well, 247 00:13:34,160 --> 00:13:36,400 Speaker 1: you know I've got files on here. I've got to 248 00:13:36,440 --> 00:13:38,520 Speaker 1: have them. There are certain files on here that I 249 00:13:38,559 --> 00:13:43,400 Speaker 1: know are on here, even though it's contaminated with virus. UM, 250 00:13:43,520 --> 00:13:45,480 Speaker 1: I know I'm gonna have to reformat my hard drive 251 00:13:45,600 --> 00:13:48,840 Speaker 1: or buy a new hard drive. UM. You might have 252 00:13:48,880 --> 00:13:52,000 Speaker 1: to send it out to a data recovery service and 253 00:13:52,120 --> 00:13:56,680 Speaker 1: talk about spendy UM. It's you know, these guys are 254 00:13:56,720 --> 00:13:59,640 Speaker 1: like magicians. Honestly, they're they're amazing because they can pull 255 00:13:59,679 --> 00:14:01,840 Speaker 1: stuff off of it that that you thought was long 256 00:14:01,880 --> 00:14:04,079 Speaker 1: long gone, and they might be able to even identify 257 00:14:04,240 --> 00:14:07,120 Speaker 1: what is infected and what isn't. Yeah. These these are 258 00:14:07,120 --> 00:14:10,880 Speaker 1: the same guys that, uh that law enforcement agencies call 259 00:14:11,000 --> 00:14:14,560 Speaker 1: on when they need to scour a bad guys computer 260 00:14:14,679 --> 00:14:16,640 Speaker 1: and see if there's any evidence on it. These are 261 00:14:16,679 --> 00:14:19,000 Speaker 1: people who you know they can look and look for 262 00:14:19,040 --> 00:14:21,520 Speaker 1: traces for stuff that for on a hard drive that's 263 00:14:21,520 --> 00:14:25,600 Speaker 1: been reformatted multiple times. I mean, it's it's pretty amazing 264 00:14:25,920 --> 00:14:30,400 Speaker 1: damaged by fire shock, you know water. These guys do 265 00:14:31,120 --> 00:14:35,360 Speaker 1: it right, you can, you can. You can bet that 266 00:14:35,360 --> 00:14:37,760 Speaker 1: that they'll be able to do it. However, you'll be 267 00:14:37,800 --> 00:14:40,560 Speaker 1: spending a whole lot of money for the privilege of 268 00:14:40,600 --> 00:14:43,720 Speaker 1: having them recover your files and and check through them 269 00:14:43,760 --> 00:14:46,200 Speaker 1: to make sure that they're okay, so you know, backing 270 00:14:46,240 --> 00:14:49,040 Speaker 1: things up, you know, investing in in a storage solution 271 00:14:49,080 --> 00:14:51,080 Speaker 1: and maybe a little software to back that stuff up 272 00:14:51,120 --> 00:14:53,960 Speaker 1: on a regular basis. Um, we'll save you some serious 273 00:14:53,960 --> 00:14:55,880 Speaker 1: headaches if you get a virus infection and have to 274 00:14:55,920 --> 00:14:59,840 Speaker 1: restore to a previous version. Yeah. I've even seen external 275 00:15:00,120 --> 00:15:01,960 Speaker 1: drives that had a simple button on it and all 276 00:15:02,000 --> 00:15:03,240 Speaker 1: you have to do is press the button and it 277 00:15:03,240 --> 00:15:06,040 Speaker 1: would automatically back up your system from that point, so 278 00:15:06,040 --> 00:15:07,680 Speaker 1: all you have to do is remember to push a button. 279 00:15:07,880 --> 00:15:09,800 Speaker 1: And now, of course there are external hard drives that 280 00:15:09,880 --> 00:15:12,320 Speaker 1: have automatic software so that if you can't be bothered 281 00:15:12,360 --> 00:15:15,160 Speaker 1: to push a button, it'll do it for you. And 282 00:15:15,240 --> 00:15:17,320 Speaker 1: you know what, I'll be honest, there are things that 283 00:15:17,360 --> 00:15:19,120 Speaker 1: I need to do on a regular basis that I 284 00:15:19,160 --> 00:15:21,120 Speaker 1: forget about and then like three or four months will 285 00:15:21,160 --> 00:15:23,080 Speaker 1: go by and I realize, oh, I need to do that, 286 00:15:23,200 --> 00:15:25,600 Speaker 1: and uh so I'm one of those people who probably 287 00:15:25,600 --> 00:15:29,280 Speaker 1: could use the automatic feature as opposed to, hey, you 288 00:15:29,320 --> 00:15:31,280 Speaker 1: need to press push that button. It's been a while. 289 00:15:31,680 --> 00:15:35,880 Speaker 1: It's a good Yes, it's it is a good thing. 290 00:15:36,000 --> 00:15:39,920 Speaker 1: They they are, they're not laxing that I was going 291 00:15:39,960 --> 00:15:43,120 Speaker 1: to mention. UM a utility that might be useful if 292 00:15:43,120 --> 00:15:46,200 Speaker 1: you know there's a file, a specific file you need 293 00:15:46,240 --> 00:15:49,120 Speaker 1: to get rid of, but your computer is not letting 294 00:15:49,120 --> 00:15:51,280 Speaker 1: you get to it. Um, Like, as soon as it 295 00:15:51,320 --> 00:15:53,880 Speaker 1: boots up, you can't even get into uh smart mode. 296 00:15:53,920 --> 00:15:56,920 Speaker 1: I mean this does sometimes happen. Um. There's a utility 297 00:15:57,000 --> 00:16:02,600 Speaker 1: called remove on reboot. And so let's let's say there's 298 00:16:02,600 --> 00:16:04,760 Speaker 1: a file on your system and you know that this 299 00:16:04,800 --> 00:16:06,680 Speaker 1: is a corrupt file and you have to get rid 300 00:16:06,720 --> 00:16:08,560 Speaker 1: of it. But every time you're try and delete it, 301 00:16:08,800 --> 00:16:11,480 Speaker 1: you're getting the message this file is currently in use. 302 00:16:11,600 --> 00:16:14,480 Speaker 1: You can't delete it. Um, And no matter what programs 303 00:16:14,480 --> 00:16:16,400 Speaker 1: you close out of, you're still getting that message. If 304 00:16:16,440 --> 00:16:20,200 Speaker 1: you use the remove on reboot utility, you can designate 305 00:16:20,200 --> 00:16:22,520 Speaker 1: that file as hey, this is a bad file deleted 306 00:16:22,600 --> 00:16:25,760 Speaker 1: as soon as I start up my computer, and before 307 00:16:25,760 --> 00:16:29,400 Speaker 1: it can even initialize, it will get booted. Um. Yeah, 308 00:16:29,520 --> 00:16:32,280 Speaker 1: so that's a that's something for you to to keep 309 00:16:32,280 --> 00:16:34,440 Speaker 1: in mind. If you have a problem with viruses and 310 00:16:34,480 --> 00:16:37,720 Speaker 1: you do know the pro the the specific files that 311 00:16:37,760 --> 00:16:42,400 Speaker 1: are a problem. Like we said before, don't go deleting 312 00:16:42,440 --> 00:16:45,560 Speaker 1: things willy nilly. Don't don't reformat your hard drive just 313 00:16:45,640 --> 00:16:48,520 Speaker 1: on a whim. You know, you try some other stuff first, 314 00:16:48,560 --> 00:16:52,400 Speaker 1: because you could very well remove these viruses without that 315 00:16:52,520 --> 00:16:55,680 Speaker 1: kind of headache. Yeah, proceed with caution. UM. You know, 316 00:16:56,040 --> 00:16:59,040 Speaker 1: ditching everything is is not going to be the best 317 00:16:59,120 --> 00:17:01,160 Speaker 1: use of your time. Even though it's gonna be faster 318 00:17:01,960 --> 00:17:03,880 Speaker 1: up front, you'll still have to go back and rebuild stuff, 319 00:17:03,880 --> 00:17:05,359 Speaker 1: and you're gonna lose a lot of information in the 320 00:17:05,440 --> 00:17:08,440 Speaker 1: process too. Um. And you know it can be a 321 00:17:08,520 --> 00:17:11,240 Speaker 1: learning experience if you can go in scientifically and eliminate 322 00:17:11,320 --> 00:17:14,040 Speaker 1: stuff that you know you know is fine in an 323 00:17:14,040 --> 00:17:16,240 Speaker 1: attempt to find them figure out what's what's wrong. You're 324 00:17:16,240 --> 00:17:19,240 Speaker 1: gonna educate yourself about how to do this if you 325 00:17:19,280 --> 00:17:22,520 Speaker 1: know it happens next time. Hopefully it won't. Yeah, so 326 00:17:22,640 --> 00:17:25,520 Speaker 1: let's let's just kind of do a quick recap. Make 327 00:17:25,520 --> 00:17:28,120 Speaker 1: sure your operating system is up to date. Make sure 328 00:17:28,119 --> 00:17:32,040 Speaker 1: you're anti virus and or anti spywear software is up 329 00:17:32,040 --> 00:17:35,520 Speaker 1: to date. Um, try and find one that that updates 330 00:17:35,560 --> 00:17:38,399 Speaker 1: at least once a week. Most of them do, um 331 00:17:38,480 --> 00:17:40,920 Speaker 1: and uh, and make sure you enable that function. Don't 332 00:17:40,960 --> 00:17:43,600 Speaker 1: don't tell your firewall to block it, because that's very 333 00:17:43,640 --> 00:17:45,560 Speaker 1: important that you stay up to date on that stuff. 334 00:17:46,240 --> 00:17:49,800 Speaker 1: And uh, and just use some careful web surfing. Uh. 335 00:17:49,800 --> 00:17:54,000 Speaker 1: You know policies. Don't open up weird attachments and emails, 336 00:17:54,640 --> 00:17:59,320 Speaker 1: don't follow links blindly, don't answer pop up ads stuff. Um. 337 00:18:00,040 --> 00:18:02,560 Speaker 1: You know, these are just general rules of thumb that 338 00:18:02,600 --> 00:18:05,399 Speaker 1: will make your web surfing experience much more pleasant in 339 00:18:05,440 --> 00:18:09,560 Speaker 1: the long run. So, well, do you have anything to 340 00:18:09,560 --> 00:18:13,040 Speaker 1: add to that? Well, Alex, I hope we answered your question. 341 00:18:13,080 --> 00:18:15,280 Speaker 1: And I really hope you are able to take care 342 00:18:15,280 --> 00:18:18,639 Speaker 1: of that problem. Um, but this does bring us to 343 00:18:18,680 --> 00:18:23,240 Speaker 1: an interesting moment. Yeah, it's the second time for the show. 344 00:18:23,280 --> 00:18:25,840 Speaker 1: In fact, you know what that means. Yeah, it's more 345 00:18:26,840 --> 00:18:34,119 Speaker 1: listener me. Yeah, you thought that we weren't gonna do 346 00:18:34,160 --> 00:18:37,080 Speaker 1: one at the end, but I fooled you, all right. 347 00:18:37,160 --> 00:18:40,200 Speaker 1: So this one comes from our friend Ben over in Clinton. 348 00:18:40,680 --> 00:18:43,960 Speaker 1: And uh. Ben writes to us and says, is the 349 00:18:44,080 --> 00:18:46,640 Speaker 1: alarm sound at the beginning of listener mail the same 350 00:18:46,680 --> 00:18:49,359 Speaker 1: sound used on M S T three K. That's Mystery 351 00:18:49,400 --> 00:18:51,360 Speaker 1: Science fet or three thousand for those of you who 352 00:18:51,359 --> 00:18:54,840 Speaker 1: are unfamiliar with it, to signal the start of a movie. 353 00:18:55,080 --> 00:18:57,119 Speaker 1: Every time I hear it, I get the mental picture, 354 00:18:57,119 --> 00:18:59,320 Speaker 1: you know what I mean. Thanks a lot, keep up 355 00:18:59,359 --> 00:19:03,680 Speaker 1: the good work. Huh do you know what he means? Well? 356 00:19:03,760 --> 00:19:06,359 Speaker 1: Why why we'll try another experiment, So for the third 357 00:19:06,400 --> 00:19:14,520 Speaker 1: time today, Tyler, if you please, movie SI movie sig no. No, 358 00:19:14,560 --> 00:19:16,840 Speaker 1: that's not saying it's not a little different all yeah, 359 00:19:16,840 --> 00:19:19,199 Speaker 1: it's a little different now. But thanks for writing then 360 00:19:19,320 --> 00:19:22,080 Speaker 1: we appreciate it. And if any of you have anything 361 00:19:22,119 --> 00:19:25,360 Speaker 1: you'd like to write to us, suggestions or corrections or 362 00:19:25,359 --> 00:19:29,000 Speaker 1: you know, just general weird comments. Uh, maybe even a 363 00:19:29,040 --> 00:19:31,440 Speaker 1: high ku, because I hear that Josh and Shock have 364 00:19:31,640 --> 00:19:33,880 Speaker 1: stopped the high kus. So if you have to get 365 00:19:33,880 --> 00:19:38,120 Speaker 1: your high kup on, why don't licks? I like limericks too, 366 00:19:38,119 --> 00:19:40,080 Speaker 1: but they've moved on to limericks. Actually. You know what, 367 00:19:40,520 --> 00:19:45,680 Speaker 1: if you want to write a Spencerian sonnet, you can 368 00:19:45,720 --> 00:19:48,640 Speaker 1: do so and send it to text stuff at how 369 00:19:48,720 --> 00:19:52,480 Speaker 1: stuff works dot com. And I'm talking Spencerian, not Shakespearean, 370 00:19:53,080 --> 00:19:56,000 Speaker 1: all right, so look that up so tech stuff at 371 00:19:56,000 --> 00:19:58,920 Speaker 1: how stuff works dot com. And remember we have blogs 372 00:19:59,440 --> 00:20:02,280 Speaker 1: up and running and you can find those. Actually now 373 00:20:02,359 --> 00:20:04,800 Speaker 1: you can find them straight from our home page, so 374 00:20:04,840 --> 00:20:07,520 Speaker 1: how stuff works dot com. Look on the right hand side. 375 00:20:07,520 --> 00:20:10,720 Speaker 1: You'll see that there are some interesting blogs up there. 376 00:20:10,760 --> 00:20:13,520 Speaker 1: Sometimes it's ours as well. And if you click on 377 00:20:13,840 --> 00:20:15,359 Speaker 1: if you click on the button at the bottom, it 378 00:20:15,400 --> 00:20:17,080 Speaker 1: will take you straight to the blog page and you 379 00:20:17,119 --> 00:20:19,120 Speaker 1: can read all the different blogs. There's lots of really 380 00:20:19,160 --> 00:20:22,760 Speaker 1: interesting ones. And remember you can read all about computer 381 00:20:22,840 --> 00:20:25,280 Speaker 1: viruses and other software that goes bump in the night 382 00:20:25,320 --> 00:20:27,480 Speaker 1: at how stuff works dot com. And we will talk 383 00:20:27,520 --> 00:20:31,760 Speaker 1: to you again really soon for more on this and 384 00:20:31,840 --> 00:20:34,400 Speaker 1: thousands of other topics. Is it how stuff works? Dot 385 00:20:34,400 --> 00:20:41,960 Speaker 1: com brought to you by the reinvented two thousand twelve camera. 386 00:20:42,280 --> 00:20:43,480 Speaker 1: It's ready, are you