(403) 481-8080 service@xentas.ca

Xentas Inc. Newsletter Archive

Things to Know – Find important computer relevant information in our Newsletter Archive.

Newsletter Archive October 2019 - Computer Security

Computer Security

The Internet has transformed our lives in many good ways. Unfortunately, this vast network and its associated technologies also have brought in their wake, the increasing number of security threats. The most effective way to protect yourself from these threats and attacks is to be aware of standard cybersecurity practices. I like to present an introduction to computer security and its key concepts.

  1. What is Computer Security?
  2. Computer Security Threats
  3. Best computer security practices.

What is computer security?

Computer security basically is the protection of computer systems and information from harm, theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of your computer system.

Often people confuse computer security with other related terms like information security and cybersecurity. One way to ascertain the similarities and differences among these terms is by asking what is being secured. For example,

Information security is securing information from unauthorized access, modification & deletion

Computer Security means securing a standalone machine by keeping it updated and patched

Cybersecurity is defined as protecting computer systems, which communicate over the computer networks

It’s important to understand the distinction between these words, though there isn’t necessarily a clear consensus on the meanings and the degree to which they overlap or are interchangeable.

In simple language, computer security is making sure information and computer components are usable but still protected from people or software that shouldn’t access it or modify it.

 Computer security threats

Computer security threats are possible dangers that can possibly hamper the normal functioning of your computer. In the present age, cyber threats are constantly increasing as the world is going digital. The most harmful types of computer security are:


A computer virus is a malicious program which is loaded into the user’s computer without user’s knowledge. It replicates itself and infects the files and programs on the user’s PC. The goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all.

Computer Worm

A computer worm is a software program that can copy itself from one computer to another, without human interaction. The potential risk here is that it will use up your computer hard disk space because a worm can replicate in great volume and with great speed.


Disguising as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. Phishing in unfortunately very easy to execute. You are deluded into thinking it’s the legitimate mail and you may enter your personal information.


A rootkit is a computer program designed to provide continued privileged access to a computer while actively hiding its presence. Once a rootkit has been installed, the controller of the rootkit will be able to remotely execute files and change system configurations on the host machine.


Also known as a keystroke logger, keyloggers can track the real-time activity of a user on his computer. It keeps a record of all the keystrokes made by user keyboard. Keylogger is also a very powerful threat to steal people’s login credential such as username and password.

These are perhaps the most common security threats that you’ll come across. Fortunately, there are ways to protect yourself against these attacks.

Best Computer Security Practices

Computer security threats are becoming relentlessly inventive these days. There is much need for one to arm oneself with information and resources to safeguard against these complex and growing computer security threats and stay safe online. Some preventive steps you can take include:

Secure your computer physically by:

Installing reliable, reputable security and anti-virus software

Activating your firewall, because a firewall acts as a security guard between the internet and your local area network

Stay up to date on the latest software and news surrounding your devices and perform software updates as soon as they become available

Avoid clicking on email attachments unless you know the source

Change passwords regularly, using a unique combination of numbers, letters and case types

Use the internet with caution and ignore pop-ups, drive-by downloads while surfing

Perform full system scans and create a periodic system backup schedule to ensure your data is retrievable should something happen to your computer.

Unfortunately, the number of cyber threats is increasing at a rapid pace and more sophisticated attacks are emerging. So, having a good foundation in cybersecurity concepts will allow you to protect your computer against ever-evolving cyber threats.

Keep your computer’s operating system and antivirus/security software up-to-date. This is very important. If you have any questions or need help because you got hit, please feel free to contact me.


Xentas Inc. Computer Services and Repair

Christian Fruhen

Phone: (403) 481-8080

Email: service@xentas.ca

Web: www.xentas.ca

Newsletter Archive October 2019 – Computer Security

Newsletter Archive August 2018 - Scam: Virus message popped up

A “virus” warning popped up?

Don’t call that number! Don’t get scammed!

Over the last few months we had several customers who were scammed. We just want to send out a reminder that those messages and phone calls are scam. If you have any further questions please feel free to contact me Christian Fruhen, call (403) 481-8080 or email service@xentas.ca

How it starts

You’re using your computer when out of the blue a “virus” or “infection” or “suspicious connection” warning pops up on your screen. It will probably use a variety of technical-sounding phrases to tell you that there’s a problem, and that you are at risk for all kinds of scary consequences (“computer damage,” “data corruption”, etc.). You might see multiple pop-ups. At the end of this text there is a phone number you can call to get help.
In addition, you may see a “blue screen” or other colorful text and images, claiming there is a problem with your computer.
You may also hear a man’s or woman’s voice coming from your computer, telling you that this is urgent, call immediately, you are at risk, etc. Or you might hear a siren noise.

Don’t believe it! 

This is a scam, pure and simple. These messages and sounds are all designed to scare you, make you leave your common sense aside, and intimidate you into calling that number.
The message on your screen will probably have an “OK” button that, when you click it, closes and then immediately reopens the alert, making you feel trapped, and reinforcing the illusion that you have only one option, to call that number.
Don’t fall for this! Just because it says there’s a problem on your computer screen doesn’t make it true.

What happens if you call?

You will reach someone who will claim to be able to help you. Everything they say is designed to move you through their agenda:
Convince you that there is a problem with your computer, which there isn’t. (Yes, it’s possible that your computer might have some infections, but calling a stranger on the phone is not the way to deal with them. Trust me.)
If you ask them who they are or who they work for, they will tell you anything to convince you to move forward with their agenda – Microsoft, Google, Apple, etc. ( Those Companies NEVER call you – its like Revenue Agency, they never call either)
They will use anything and everything you tell them about you or your situation to reinforce their scare tactics and manipulation.
Their next step is to have you download some software into your computer to permit them to make a remote connection, giving them live control of your computer.
Then they will run fake “scans” that “prove” that you have “infections” in order to further convince you that there is a problem.
Their goal is to convince you to pay them to “remove” these supposed “infections.” They may also try to sell you a service contract. The “scan” was free, but the “solution” carries a fee.

What happens next?

If you agree and pay them, probably anywhere from $150 to $400 by credit card, they will pretend to “fix” the “problems,” but they are most likely installing software that may monitor your activities and steal your money and identity and passwords instead. In essence you’ll be paying them to infect your computer, and in the long run this may cost you far more than the charge for just this “fix.”
If you refuse, they may try to lock you out of your computer until you pay them.

Don’t believe everything you read on your computer screen.

Don’t give strangers access into your computer. Only work with people you trust or recommended by someone you trust.

See it this way – if somebody knocks on your front door saying he is from your Bank and needs to verify your bank password you wouldn’t let this person in your house nor give him your confidential bank information, or?

Keep your computer’s operating system and antivirus/security software up-to-date. This is very important. If you have any questions or need help because you got hit, please feel free to contact me.


Xentas Inc. Computer Services and Repair

Christian Fruhen

Phone: (403) 481-8080

Email: service@xentas.ca

Web: www.xentas.ca

Newsletter Archive August 2018 – Scam: Virus message popped up

Newsletter Archive October 2017 - Windows10: Fall update

Microsoft announced the Windows 10 fall creators update.

This update is only for Windows 10 Desktop and Laptop computers. If you see your computer being ready to update please allow the computer to update and please don’t interrupt the process.
If you have any questions regarding the update please feel free to contact me.
Phone or text: 403 481 8080 or email service@xentas.ca
Please read below the original message from Microsoft.

Beginning Oct. 17. 2017 at 10 a.m. P.T., the Windows 10 Fall Creators Update will start rolling out to Windows 10 PCs across the world in phases, starting with newer machines first.

As with the Creators Update, the key to our phased approach is actively listening to all available feedback mechanisms and making the appropriate product updates during the rollout. This allows us to provide a high-quality experience for the broadest set of users at an accelerated rate, while also continually increasing the quality and security of Windows 10. This was our approach with the Creators Update released in April and user feedback on this approach was very positive.
For the best experience, we recommend you wait until Windows 10 is automatically offered to your device. You don’t have to do anything to get the update; it will roll out automatically to you through Windows Update if you’ve chosen to have updates installed automatically on your device. Once the download is complete and the update is ready to install, we’ll check with you, so you can pick the right time to finish the installation and reboot.  We do this so we can ensure the update does not disrupt you, and we use active hours to help suggest a good time.

If you don’t want to wait for the update to roll out to you, you can manually check for updates on your personal PC.

This will only work if your device is eligible to get the Fall Creators Update as part of the initial roll out phase. Alternatively, you can manually get the update today via the Software Download Site. This option is only recommended for advanced users on devices running a licensed version of Windows 10. If you’re using a Windows 10 PC at work, you will need to check with your IT administrator for details on your organization’s specific plans to update.

Best regards
Xentas Inc.

Computer Services, Lessons & Webdesign

Christian Fruhen

Phone: (403) 481-8080


GREAT Service & Affordable Rates


Newsletter Archive October 2017 – Windows10: Fall update

Newsletter Archive May 2017 - Special Offer: System Clean Up and Tune Up

This service includes:
1. Deep root virus scan
2. System clean up
3. Windows registry cleanup
4. Windows System check
5. Internet Cookie removal
6. Tracking cookie scan

As always with Xentas Inc. you don’t pay for travel to your place.

Have a great sunny week and hope to see you soon.


Christian Fruhen
Xentas Inc. Computer Services and Lessons.
Phone: 403 481 8080
email: Christian@xentas.ca


Newsletter Archive May 2017 – Special Offer: System Clean Up and Tune Up

Contact Us

Xentas Inc.

Monday – Friday: 10am – 6pm

Computer Services: (403) 481-8080


Print & Design: (403) 481-0547


error: Content is protected !!