Christmas and Black Friday 2019 Specials
Filed under: Computer Specials, Wasaga Beach Geeks
End all Virus threats forever 100% Guarantee!
Filed under: Software Support, Tips & Tricks, Wasaga Beach Geeks, Wasaga Beach Geeks
Viruses, Malware, Spyware are now a thing of the past. Imagine no more infections of any sort, 100% Guaranteed, and best of all, this is available for only $99.99 per year. If you want to be 100% free of these types of infections, Don’t Freak and Call The GeeK. 705-816-4335 Takes only 5 minutes of your time.
February Specials At Wasaga Beach Geeks 705-812-8122
Filed under: Computer Specials, Wasaga Beach Geeks, Wasaga Beach Geeks
Macs vulnerable to virtually undetectable virus that “can’t be removed”
Filed under: MAC / APPLE, Wasaga Beach Geeks, Wasaga Beach Geeks
A security researcher has discovered a way to infect Macs with malware virtually undetectable and that ‘can’t be removed.’
The attack, which has been called Thunderstrike, installs the malicious code into the Boot ROM of the system via the Thunderbolt port.
Want to automatically respond to incoming text messages? This simple step-by-step guide will show you how to do it yourself in 10 minutes.
Trammell Hudson, who works for hedge fund Two Sigma Investments and is also the creator of the Magic Lanternopen-source programming
environment for Canon DSLRs, discovered the vulnerability after his employer asked him to look into the security of Apple notebooks.
“A few years ago we were considering deploying MacBooks and I was asked to use my reverse engineering experience to look into the reports of rootkits on the Mac
to see if it was possible to patch the firmware to be secure against them,” wrote Hudson in a summary of the vulnerability.
After initially discovering that the Boot ROM could be tampered with if the notebook was physically dismantled to give access to the chip soldered onto
the motherboard, he then refined this technique so the attack could be carried out via the system’s Thunderbolt port.
“It turns out that the Thunderbolt port gives us a way to get code running when the system boots,” Wrote Hudson. “Thunderbolt brings the PCIe bus
to the outside world and at boot time the EFI firmware asks attached devices if they have any Option ROMs to be run.”
Hudson discovered that he could use a modified Apple gigabit Ethernet Thunderbolt adapter to carry out the attack.
“Since it is the first OS X firmware bootkit, there is nothing currently scanning for its presence. It controls the system from the very first instruction,
which allows it to log keystrokes, including disk encryption keys, place backdoors into the OS X kernel and bypass firmware passwords,” Hudson said.
And once it is on your system, it is incredibly hard to remove.
“It can’t be removed by software since it controls the signing keys and update routines. Reinstallation of OS X won’t remove it.
Replacing the SSD won’t remove it since there is nothing stored on the drive.”
“The classic ‘evil-maid’ attacks also are feasible. Given a few minutes alone with your laptop, Thunderstrike allows the boot ROM firmware to be replaced,
regardless of firmware passwords or disk encryption,” explains Hudson. “So while you are getting breakfast at the hotel during a conference and leave the machine
in your room and house-cleaning comes by to make up the bed, install the firmware backdoors, and replace the towels.”
According to Hudson, Thunderstrike “is effective against every MacBook Pro/Air/Retina with Thunderbolt.”
Fortunately, Hudson reports that Apple is working on an update that will prevent malicious code from being written to the Boot ROM via the Thunderbolt port. However, this update would not protect the system from having the Boot ROM tampered with directly.
One defense against this would be to paint over the case screws with glitter nail polish and take close-up photos of the seal you created. The glitter in the nail polish sets into a random pattern that would be impossible to replicate, and as long as you keep the photos safe, you can make sure they screws haven’t been messed with.
Wasaga Beach Geeks Smartphone Repairs
Filed under: MAC / APPLE, Wasaga Beach Geeks, Wasaga Beach Geeks
The Geeks repair,IPads, IPods, Samsung Tablets & Phones, Nexus, Motorola and more!
Licensed and warranty with most parts always in stock.
iPhone 4/4s Front Screen 75.00(Backings) $10.00
iPhone 5 Front Screen $85.00
iPhone 5c Front Screen $95.00
iPhone 5s Front Screen $95.00
iPod touchiPod 2nd glass $55.00
iPod 3rd glass $55.00
iPod 4th glass+ digitizer $85.00
iPad 2nd 3rd and 4th GENDigitizer——$105
(glass)LCD—— $125 (coloured screen)
iPad air $175
iPad mini $125 (glass)
SamsungAce 2 x glass $75.00
S3 crack glass touch works $75.00 (LCD and glass $155.00)
S4 crack glass touch works $95(LCD and glass $175.00)
Mega crack glass touch woks $150.00
BlackBerry Z10 Front Screen $95.00
BlackBerry Q10 Front Screen $100.00
BlackBerry Q5 Front Screen $100.00
Blackberry Z30 Front Screen $145.00
LG G2 Front Screen $175
Nexus 4 Front Screen $115.00
Nexus 5 Front Screen $175.00
Please call for availability and or any other products not mentioned here.Most repairs take less than 1 Hour.
We also repair water damaged devices.
Wasaga Beach Geeks 705-812-8122 or 705-984-4335 798 Mosley Street, Wasaga Beach L9Z2H5 info@wasagabeachgeeks.com
Wasaga Beach Geeks Launch Civil Defamatory & Copyright Infringement Suit
Filed under: NEWS, Wasaga Beach Geeks, Wasaga Beach Geeks
Finally after 2 months of Legal Action, John Prentice and a Local Computer Store My Computer People had their slanderous webpage removed from the Internet and a Civil Law Suit that is in place for Defamation & Intellectual Property Copyright Infringement.
This was regarding the site http://www.hoganscottcourrier.com that was created with the intent to discredit Wasaga Beach Geeks and Hogan Courrier. You will notice if you click on the link it gives a 404 error now.
Here is the letter from Dreamhost Hosting Company;
Hello Hogan,
I am in receipt of the court filing document indicated below, and in
accordance with U.S. law we will not allow further hosting of a page
containing the alleged infringing image on our network until such time as
the court renders its decision and finds the image does not violate your
copyright.
If you have further questions about this please let me know.
On Wed, 12 Nov 2014, you wrote:
> As per 17 USC 512(g)(2)(B), I have filed my claim and faxed it to you.