Wednesday, December 28, 2016

Downloading Streaming Videos

First the difficult, complicated and limited successful method. This requires the experience of knowing what sites are generally successful to download from. In general, low security sites offer less encrypting protection on the videos. These videos are easier to download but compromise the security of your pc. Lower security settings on any anti-spyware or browser settings may make this easier. Do so on your own risk. Find a video you want.

Use Google Chrome browser for best results. Click in the settings icon in the right top corner. Click more tools, then developer tools. Make sure the volume is on. Make sure the video plays. When the new tab comes up click the network tab. Then click all or media. You will be directed to hit f5 to reload the page. You will be able to hear if the video automatically loads. Or if you need to manually press play again. Okay, now you are looking for the longest bar in the timeline. A solid bar is best. Check the type to see that it says video mp4, media or something similar. Now right click the bar and choose copy link address. Now paste this into the address bar and click enter if you didn't choose paste and go. You should have the video playing with a black screen background. Once the video is playing and it must be kept playing. Right click and choose Save as. Choose a desirable location. Then you can rename the file. Press save. And your video will download. You will then have this streaming video to watch permanently without buffering!

The drawbacks to this first method are numerous, even if you have the patience and experience. Firstly, this works on a limited amount of websites and videos. Important sites such as youtube it will not work for. These videos are layered in multiple video streams and encrypted. However, you can download almost any video with the correct software. Some new videos that have high encryption you may have to wait to a time when you are able to properly download the video. However this works on youtube and most sites. Many of these free download software bundles your computer with adware. This isn't worth it in the least. Some of these software may have a worthless upgrade. There is one reliable software I have found. No adware and it downloads almost any video. Well worth the price tag.

Method two is to buy and use Wondershare video converter. I do not make any money from recommending them. This service has simply worked for me. You can even record videos that won't download by doing a screen shot capture and letting the video run. This is pretty good if you can figure out how to set the timer. You must let the video run at a time when you have fast internet. And limit the sound as much as possible as the recorder will capture any noises from your real physical environment.

I hope this guide helped to let you download your favorite videos online for free. (Free once you buy the software if you used method 2) You no longer have to deal with buffering.

Computer Maintenance: Updates

Like a vehicle or a house if you don't maintain it - if you do nothing it will be destroyed. Try an experiment and do nothing in terms of repairs or upkeep for your house - watch it deteriorate. So too with computers, one must be proactive or else the computer's stability and security crashes.

Wednesday, January 30, 2013


Google Malware intrusion!
Sensitive areas of your system were found to be under attack. Spy software attack or virus infection possible. Prevent further damage or your private data will get stolen. Run an anti-spyware scan now. Click here to start.       If you encounter a warning like this, hang tough, your computer is safe.

        In my past article Removing Spyware (September 2012) I explained how to use great anti-spyware programs to remove spyware. In this article I broach rogue anti-spyware programs, a huge pitfall for many people eradicating spyware.
       You are surfing the web and suddenly a pop-up floods your screen with dire warnings. You can't exit the screen, you can't double-click  your internet browser icon to reenter the web. You fear the warnings on your screen are true; all your personal files, business documents, favorite videos, and family pictures could become lost. These are the warnings:

  • Virus infection! System security was found to be compromised. Your computer is now infected. Attention, irreversible system changes may occur. Private data may get stolen. Click here now for an instant anti-virus scan.
  • Privacy alert!
    Rogue malware detected in your system. Data leaks and system damage are possible. Click here for a free security scan and spyware deletion.
  • System danger!
    Your system security is in danger. Privacy threats detected. Spyware, keyloggers or Trojans may be working in the background right now. Perform an in-depth scan and removal now, click here.
  • Security Breach!
    Beware! Spyware infection was found. Your system security is at risk. Private information may get stolen, and your PC activity may get monitored. Click for and anti-spyware scan.

        You have been hit by a Rogue anti-spyware program (RAP) and all these security warnings are false. These are actual warnings from XP Antivirus 2013, a RAP described on the engima software group website. They warn, "You can only protect your computer right now by buying the full version, your computer will crash soon." And they have the malware coded to immediately shut off your computer. So, thinking your computer is infected, you spend $100 on a bogus program that does nothing to remove spyware. In fact, XP Antivirus 2013 is malware!

          From approximately 0:20 to 0:30  in this Feature Presentation you will see the computer infected by a Rogue Anti-spyware program.  Notice how it fills the screen and prompts you to enter credit card information. At the end of this dramatic video a legitimate anti-spyware application removes the malware. You have a pretty good idea your computer is infected when you can't access the internet, yet you are able to visit their webpage and enter your credit card information. Perhaps some schmuck in Tennessee is controlling your computer, eh?
A total fabrication
         The registry is the control room of the computer, every program on your computer creates files that appear on the registry. Malware or bad software may hide entries on the registry or be difficult to differentiate from usable files. This is why I won't explain the process of manually deleting registry files because there are hundreds of thousands of registry entries and wrongly deleting one entry can crash the computer. Enigma Software Group has a threat database containing over 1000 rogue anti-spyware programs. Learn about each threat and utilize their legitimate anti-spyware program. And I recommend this method for removing malware. A scan of your system by authentic software will eliminate lingering threats.
The RAP is constantly regenerating its files in your registry every time you boot or start your computer. No human can keep up, these evil cyber programs will destroy you. Far too many unsuspecting people are unfortunately victimized of time and money by these deceitful programs. Let's do all we can to spread awareness of Rogue Anti-spyware programs so these cyber criminals are forced to get a legal job. The next time someone takes your order, she could be a reformed cyber criminal because of your efforts. Nice work!

       Finally, I would like to put out a final warning, especially to college students. While in college I was victimized by a rogue anti-spyware program. Part of the reason for this is that you are part of a network of computers, and if someone participates in peer-to-peer file sharing (movies, music, etc.) then naturally trojans will affect your computer. This is regardless of what sites you surf. You are affected by someone else's irresponsibility and ignorance.  Trojans appear good but like the story of the trojan horse they are deceitful. They bring scams like the dreadful rogue anti-spyware programs. Never purchase a anti-spyware program that you are forcefully prompted to buy.  Do your research first.
Works Cited        

Wednesday, September 5, 2012

Removing Spyware

1. Recognize Symptoms
Anytime your computer is not working properly, whether pages don't load or you can't login to accounts, you should seek to eradicate spyware. This is the likely problem. Education and calmness are essential when it comes to spyware removal. On the Enigma Software home page are articles about specific infections. The malware research tab is an excellent database on malware, which is corrupt software. If you are here with your infected computer I recommend downloading Spyhunter. It's well worth the money to have security for your files and ability to access the internet for email and social media. A word of warning to do-it-your-selfers,  it is impossible even for computer programmers to manually remove spyware once it spreads through the hundreds of thousands of files in the registry. And you might delete something that severely affects the operation of your computer. Also you need to differentiate the names of thousands of unnecessary files from thousands of similarly named critical files. I highly recommend running scans with reputable anti-virus software.
Viruses cause major headaches

2. Fixing the problem
You can begin by cleaning your computer; either manually or with software.

To do this manually:

  • Go to the start menu and choose All Programs
  • Next choose: accessories
  • System tools
  • Disk cleanup
  • Select the main drive and system clean. This will free up space in your computer to download more movies, and store your videos, pictures and documents. 
  • The screen tells you how much space will free up. Select ok. 
  • Select permanently remove files. 
Fix the problem ASAP

Using Software: Might I suggest a free software Malware Bytes Anti-malware or download the Enigma Software product Spyhunter. I won't say that's all you need to know and leave you hanging because chances are if you're computer is infected you can't read this blog from that computer. So get on that uninfected computer and do your research. Use one of the products I recommended or go to the website of the anti-spyware program you desire. Order the product and pay the extra 10 dollars to get a CD version. When you receive it in the mail, immediately run the software and remove the spyware. But chances are it's still not that easy, take solace I have been in your shoes. You probably still can't get internet to run the scan. The solution is to find the router in your house, a black tower with lights. Use an ethernet chord, a colored cable that clicks into your computer and connects into the router. Now you can work fast to connect to the internet and run the anti-spyware scan before computers in the same household network are infected. However, unless you have a worm, probably only one computer is infected.

Note: Don't simply search for an Anti-spyware program and choose the first option. Remember companies can pay to be listed in the search engine, even if they don't have your interests at heart. In fact, there are many rogue anti-spyware products online.
diligent research saves time and money

PC magazine recommendations for anti-virus software are questionable: they recommend Norton Antivirus, Webroot Software and Bitdefender Antivirus Plus 2013 (1). Norton Antivirus slows down your computer and never catches anything before, during or after it infects the computer. Webroot catches nearly everything but is extremely bloated and doesn't allow you to do anything else while it runs (even quick scans take hours). I am unsure about Bitdefender since I have never used it. However, Trend Micro is great, I highly recommend utilizing their cloud protection, which is the ability to detect and stop threats in a protected zone, before they infect your computer.

3. Maintenance
Run a scan regularly. Macafee and Avast have green marks next to safe websites on the search results page. Question marks  or red marks appear for unsafe sites. Unless you know the site don't take a chance. Unsafe sites have a red lock over the address bar where the URL resides. Safe sites have a green lock over the http portion of the URL. Be careful of phishing (not to be confused with actions of the band Phish). The point of phishing is to have a similar website to a well known website but with an unnoticeable different name or look to the site. You enter your information into the false website, and that webmaster now knows your password for the legitimate website. This explains what happened to my Amazon account.

Computer Attacked!  Watch this video to see a computer attacked by a current virus.

4. How the infection starts
To be safe: never purchase an anti-spyware program that pops up on your computer. Almost all rogue anti-spyware programs will pose as legitimate anti-spyware programs; like demons appear as angels of light. Research a program, talk about it with friends. Type the name of the program followed by the word(s), scam, error, rogue system, etc. Purchasing a program from a trusted site is often the most reliable method. Nobody knows the adware or spyware that free downloads, of any kind,  add to your computer. Unless it is something like Malware Bytes Anti-Malware that lets you try it out in the hopes of you upgrading to the professional version. There are no free lunches; you have to think how the company benefits from your free download, or the reasons behind it. One musician, John Wesley, a sick guitarist, allows free downloads of his albums because he wants them to be heard. If the site has neither an explanation or a visible way for them to make money, then they are probably earning money by illegally installing adware or spyware with your download. And if it is a really big download you may be susceptible to a Trojan horse back door virus. Very similar to how the Trojans thought they were receiving a free victorious gift and were harmed. On any free download, run a scan. Also be wary of unusually low prices by an unknown company; One such scam offers unlimited free movies for a $1; they then charge you $60 a month. The important thing is to buy from a website of a trusted company without any prompting.
Some sites will rob you 

5.  conclusion
I have explained how to safely surf the internet, preventing spyware. I have shared my experiences with removing treacherous spyware. If you bought a rogue anti-spyware program you are not alone, I and many other bright souls have blundered similarly. The main thing is staying calm when you have no internet access. There are other ways around this. Warning: The biggest sources of spyware are peer to peer networks. Popular ones like Limewire can be extremely dangerous to your computer. My computer was destroyed by a website that shares tennis matches. A truly wonderful site, but one that opens ports from my computer to another. This gives full acces to viruses that have infected any uploader's computer.
free downloads on peer to peer networks destroy computers
Bobby Hurley Jr. wrote the words and provided the graphics for this article.

1. Rubenking, Neil J., "The Best Antivirus of 2012",, August 30, 2012, 

Tuesday, May 29, 2012

How to remove Adware

Does your computer take forever to load pages? Does the computer strain endlessly doing simple tasks that require little use of the CPU or RAM? When visiting your home page do you often get redirected to other web pages with sales pitches?
         The problem is most likely that you computer is infected with adware. Not to fear there is a solution to remove the adware. I will first tell you common ways adware spreads on your computer; ways to remove adware; and finally some preventative maintenance.

Common ways adware is spread

  1. Free gaming websites or games that come with a computer. Wild Tangent, the result of free computer game package or website, slowed the heck out of my desktop for years.
  2. Free downloads. Often when you want to download free youtube to mp3 software. or free movies, music etc. you may get the service and think everything is fine and you saved money. But you spent something, namely the compromisation of your computer's security. As you allowed the file to download to your computer you also gave permission for adware to download and install to your PC. Not to mention the possibility of viruses. 
  3. Visiting certain websites automatically results in the installation of adware on your computer. 

Removing adware

  • The easiest way is to run a scan. Manual removal is more time consuming and easier to miss infections. For Internet Explorer users I highly recommend Spyhunter from Enigma Software . I also recommend Malwarebytes Anti-malware free from Malwarebytes Corporation   
  • The more difficult way is manual removal. This is the cleaning of the computer. Note: manual cleaning may not remove adware that regenerates. 
  • To clean your computer without software: First click on the start menu in the lower left corner. Click or hover mouse over All Programs. Next select Accessories by left clicking (normal click) it. Next click System Tools. Finally, click Disk Cleanup and following the promptings. 
  • The other way to manually clean your computer without software is to go to the tools setting in your browser and clear any adware cookies. 
  • The best manual method however is to use software such as the Piriform CCleaner. 
  • You may also find it helpful to import your favorites into another browser. Then delete the infected browser, and re-install it.

Preventative Maintenance
  • Pay for downloads. Buy the actual media. It's worth it!
  • Get software (start with what I recommended)
  • Run the scanners often, noting which sites or downloads repeatedly cause adware infections
  • Avoid those sites and downloads! Practice safe surfing
  • Give your computer a cleaning before you shut it down each nite.
  • Download only from the official website for such products as the VLC open source media player. 
Next week I will tackle "How to remove Spyware". Stay tuned!

       Written by Bobby Hurley