Blog

Antivirus 2009

One of these days, I’ll find the guy who writes this stuff and leave his rotting carcass in a ditch.

How is it that people get more of these fake security programs than even actual viruses?

I’m becoming an expert at getting rid of stuff that’s just nagware, not even a real virus, and it’s getting quite old.  If I hunt the guy down that’s making the money off this thing (and I’m sure it can be done) perhaps I can spend my time helping customers with real issues instead of removing this trash from machines!

*sigh*

Anyone want to help me track down and de-fund the guy behind this stuff?

Why I don’t take credit cards. Also, rude customers!

Yesterday, we had a customer call up to get an external hard drive from us for $88.  I even offered to write him a quick backup script that would back his Windows user profile up to his external hard drive for no extra charge if he brought his computer with him.  Apparently he was coming from almost half an hour worth of driving distance, and at no point in the TWO telephone calls he made to my store did he ask about payment methods.  He liked our prices and I added further value to the service by offering to integrate the items he was purchasing for no additional cost.

When this man arrived at the store, he noticed my large green sign posted prominently on the front door stating that “we do not accept credit cards (but there’s an ATM next door!)”

The first words that myself, my wife, and one of my customers heard from this man were “I drove 25 minutes down here and was going to buy $160 worth of stuff, but you don’t take credit cards!”  His tone of voice was clearly hostile, as if I had insulted his mother.  He then said something which I cannot recall the exact wording of, but the gist of it was that “we just lost a sale because we didn’t tell him.”  My response to his poorly chosen attitude and words was “You didn’t ask, sir!”  That irked him enough to make him turn back around and say, “I’m not the one in business here, you are!” and subsequently storm out of the front door.

After an experience like this, you might be as perplexed as I was.  I did some thinking over the remainder of the day while my wife and customer issued some negative comments on this man’s handling of the situation, and felt that this topic was certainly important enough to deserve a very big blog post, explaining why this experience will NOT result in me taking credit cards.

I will openly admit that I am not blameless: I could have informed all customers on the telephone from the very beginning that we do not accept credit cards and prevented this scenario from occurring.  However, at the same time, this individual was dealing with a business which he knew nothing about, and made an (erroneous) assumption that “all businesses take credit cards.”  Common sense dictates that if one is dealing with a business that one has no experience with, the payment policy at that business is part of the information gathering process that a responsible consumer must engage in; while it’s safe to assume that Best Buy or Wal-Mart take credit cards, a lesser-known business such as mine is a great big question mark.  If you change auto mechanics, for example, and you’re calling a shop you don’t know anything about, do you ask the shop if they take credit cards, or do you make an assumption that they do and get flaming mad when they don’t?  It’s your payment method of choice, so it’s your responsibility to ensure that it’s accepted where you want to use it BEFORE you drive 25 minutes away.  While I am not blameless for failing to proactively inform potential customers, the customer is, at a minimum, equally at fault for the misunderstanding.

On to the main reasons why a very small business like mine does not take (and cannot afford to take) credit cards.  You need to understand how profit works, so let me explain it in brief.  Profit is easy: it’s just the price I charge a customer minus the price someone else charged me.  Let’s pretend that I purchase an item from a supplier for $60 each and resell the same item for $70 each.  On each item, I have made a profit of $10, because my price to a walk-in customer is $10 more than the raw amount I paid for it.  This would also be called a 17% markup.  (Cosmetics have markups as high as over 100%, but grocery markups are usually low single-digits.)  The bottom line:  my total profit on the $70 retail sale of an item is NOT $70, it’s $10.  The other $60 is just recovering the original cost of the item.  I’d have to sell $700 worth of those items just to make $100 in actual money for the business.

You also need to understand that credit card merchant services take a cut out of the total amount charged to the card before giving me my money.  As an example, this would usually be around 1.9% of the item’s cost plus $0.30.  I use 2% as an easy number to work with.  On a $100 item charged to a credit card, the card company takes a $2 cut, meaning I get $98 instead of $100.

Now, let’s explain how credit cards have affected my business so far.  This man refused to buy $88 of equipment, on which my profit would have been about $13, because we don’t accept credit cards.  We have been open for a little over one month so far, and out of all other credit card requests, this has been the only one that actively refused to make a purchase; the others walked to the bank immediately next door and pulled cash from the ATM, or wrote a check.  Therefore we are currently losing one sale per month due to our refusal to take credit cards.

The true problem lies in the ~2% cut that the credit card companies take.  For taking credit cards to not be worth that one lost sale’s potential $13 profit, I have to make enough credit card (a.k.a. “CC”) sales that I lose $13 to the CC company cut.

[Math Alert!]….If the $13 I lost is 2%, then 1% is $6.50, meaning 100% is $650.00 in sales on credit cards instead of cash that I have to make per month to lose money by taking cards.  If that sounds confusing, let me say it another way:  if I sell $650.00 a month or in merchandise on CCs instead of cash simply because I made CCs available, then I’ve paid that $13 I would have earned to CC companies anyway!  $650 a month is roughly equivalent to 11 hours of PC service before I pay a contract technician $20 for each hour of labor! If you consider that my business only yields $40 per billable hour, yet I’d be charged the 2% rate on $60 instead, that’s $1.20 per billable hour and represents a 3% cut instead of 2%.  In other words, once you stop looking at a credit card fee as a percentage of the cost to the customer and start looking at it after some expenses are paid out, that “little” 2% fee starts to grow pretty huge.

Let’s take all this stuff and expand it out a bit more with a (simplified) hypothetical situation.  If you were to examine CC cuts in terms of my net profit (actual money made after all obligations paid) instead of gross profit (money earned beyond the original cost of the item or sale, meaning services are usually pure gross profit), the picture gets worse: supposing I sell two hours of service a day, about 25 days a month, and half of those hours are charged on a credit card.  That’s $3,300 in a month for services, half of which I lose a 2% cut on, which is $33.  Now, $33 out of $3,300 total sounds awful small…until you pull out the double-whammy:  expenses.  The power company ain’t givin’ us no free powah!  You think the plaza space is as cheap as your apartment, too?  No, sir!  Cut out $1,000 a month for the retail space, $120 a month for power, $30 a month for water/sewer, $120 for business DSL, and a random figure of perhaps $100 in consumables such as paper and toner.  Then, after that $1,370 or so is deducted, don’t forget that the tech got 1/3 of the labor charges, so $1,100 was paid out to the tech for his work as well!  (All that ignores my initial startup costs and interest on the small business loan for SIMPLICITY, so this is an UNDERESTIMATE!)

In such a simple example, we took in $3,300 total from customers for services.  By the time expenses were taken into account, $2,470 of the $3,300 was gone.  Before the CC fees, this example yields $830 in net profits.

Anyone who’s been in school knows that percentages are easy:  “part over whole, times 100.”  So take the CC fees of $33 and do the math:  (33/830) x 100 = 3.976% of my actual earnings lost to the credit card companies.

This assumes that no one uses a stolen credit card and issues a chargeback, which could potentially cost me hundreds or even thousands of dollars; for example, if someone buys a $750 computer with a stolen card and the card’s owner issues a chargeback because they (honestly) didn’t purchase the computer and shouldn’t be out that $750, the CC COMPANY TAKES THAT MONEY AWAY FROM ME WITH ALMOST NO RECOURSE.  One fraudulent purchase of a new computer could wipe out an entire month’s net profits.

How do bigger businesses deal with these issues?  There’s only one answer:  everything is more expensive.  Period.  I can give a 4GB flash drive to a customer for $17 while my small but established competitor sells them for $40 because these “costs of doing business” are not rolled into the price of my products and services.  I don’t have 4% or more of my actual earned income being eaten by CC fees.  I don’t have the threat of CC fraud and subsequent chargebacks.  Add to that the fact that my margins and rates are already quite low and my customer service and turn-around are a million times better, and there’s no way even an established competitor can actually compete.

(Granted, a check could do about the same thing to me, so adding cards to the mix makes the risk significantly greater, and CC fraud is far more prevalent and easily executed than check fraud.)

The point is that the cost of taking credit cards isn’t exactly worth it, and the risk of chargebacks is too hazardous.  If the customer wants to use cards so badly, they can always step next door and withdraw a cash advance from the ATM, and eat the CC fees themselves that way.  So far, I have yet to have that happen to my knowledge.

If the customer doesn’t want to eat the CC fees, why in the heck would I?

If it wasn’t against CC merchant agreements for me to charge an extra fee for taking cards, I’d take them without too much hesitation.  The only way I can charge customers extra for taking cards and not run afoul of merchant agreements is to price all my items and services with the CC fee increase included, then offer a “cash discount” for non-CC buyers.  It’s the same thing as charging a fee to the card user, but also causes all my stated prices to increase, decreasing my competitiveness.  Completely unacceptable.

When the CC companies learn and change their merchant agreements, I’ll probably take cards.  Until then, it’s too risky and expensive, especially to such a small business as mine.

The “Getty Images Extortion Scheme”

UPDATE: I have related articles you might be interested in: Did your ISP forward you a DMCA copyright infringement notice? and Analysis and raw contents of a real copyright infringement notice.

Recently, a client of mine who shall remain anonymous received a nasty letter from Getty Images, claiming copyright infringement and demanding an immediate “settlement amount” for images they claimed my client was using on their website without a license.  The client had the website designed by an Indian firm many years ago and the content of the site was (obviously) represented to him as being completely OK.

My client, if in fact engaged in copyright infringement at all, was not willingly and intentionally doing so.  The images were kind of stupid in my not-so-humble opinion anyway, and being the inheritor of the site’s maintenance tasks (or lack thereof, since nothing’s been changed beyond link targets), I removed the potentially infringing images, despite the fact that the threatening letter forwarded to me for review contains no actual proof of copyright.

The content of this letter is malicious, to say the least, and attempts to deceive the recipient into ignoring their legal rights.  Furthermore, the letter asks for an outrageous “settlement” to the tune of $1,000 PER IMAGE…for images that aren’t even 300 dots across!  I can’t imagine why anyone would pay fifty cents a pixel for ANY image.  (Unless it’s porn, because you’d be shocked at just how many people look at the stuff and wreck their computer in the process by executing something claiming to be, say, a “Scarlett Johansson private porn movie” when it’s really a virus.  Sheesh.)

I started searching for info on these people after this event occurred, and that’s when the really interesting tidbits started popping up…

A Google search for “getty images letter” yields ~856,000 results.  They’ve been damned busy.  Most of it is forum postings, but the real gem was this website that says it all, and I’ll leave you with a delicious excerpt from it:

Why is This Being Called “Legalized Extortion” and an “Extortion Letter Scheme”?

This is a descriptive term for Getty Images’ deliberate, malicious, bullying, and presumptuous letter campaign that engages in what is tantamount to legalized extortion. The letter in its entirety is both well-worded and well-constructed. It has been clearly been well thought out. Because of the deliberate construction and planning that goes into this letter campaign, it qualifes as a Scheme.

The Letter automatically presumes guilt of the recipient. The letter recipient is expected to provide proof of their innocence. In effect, the letter recipient is presumed guilty unless they prove their innocence.

Although the letter does provide for the possibility that the letter recipient was unaware and unintended of the alleged infringement, the Letter takes a heavy-handed and unforgiving approach of stating that they are responsible for all alleged “damages and liability”. The Letter automatically presumes Getty Images has been “damaged” whether or not that is actually true or proven.

Because this scheme relies heavily on the letter recipients ignorance of due legal process and people’s inherent fear of legal conflict as a result of that ignorance, it is considered by many as legal extortion.

That’s all, folks.  On that site, you can find a lawyer who will represent you for $150 an hour against Getty Images, should you receive a nasty letter from them and feel the need to respond.  Note that Getty Images has not filed one single lawsuit against ANY recipients of their extortion letter. This is no different than the RIAA extortion scheme attempting to sue “file sharers” even though no proof of actual sharing (and thus no damages) exist.

Do not conduct business with Getty Images or any of its surrogates, such as iStockPhoto.com, because this kind of abuse should not be rewarded.  If you have received a “settlement letter” from these scumbags, you can probably ignore it.  I would recommend (A) removing the alleged infringing images anyway, (B) removing all copies of your site from archive.org’s Wayback Machine, and (C) waiting for Google’s cache of your website to refresh or vanish, before you initiate contact with Getty Images again, if you do so at all.  You can also add entries to your robots.txt file to disallow the Internet Archive’s bot from caching up and archiving your site, and you can add META tags to each page that disallow ALL caching by robots; this will effectively reduce the chance that some third party can verify that the images ever existed, and give you plausible deniability:  “I’m sorry, but no such image exists or has ever existed on this website.  You did an excellent job of mocking up a screenshot, though; we appreciate your need to locate customers, but you are in error and we do not wish to license images from you if you choose to approach us this way.”

Normally I’m against copyright infringement, but the presumption of intentional malicious infringement and including a settlement bill is insanely unethical and does indeed amount to “legalized extortion.”  If a third party misrepresented the licensing status of the delivered product to the site’s owner, how is that the site owner’s fault in any way?  Such a situation would be similar to claiming that a publisher is engaged in copyright infringement for publishing a book: they’re making money off of it and distributing the material, so isn’t it their fault?  NO.  The CONTENT GENERATOR is at fault for misrepresenting the facts to the next link in the chain, and the content generator should be held responsible for their failure to comply with copyright laws.

Beyond that, though, this is a decency issue when it all boils down.  It’s always possible that the infringing party is not doing so intentionally and does not know that the image is licensed; indeed, on the Internet, much content is reproduced without copyright statements attached, and it’s easy to err.  A POLITE cease and desist request would have been more than sufficient to stem the infringement for good and cause the business owner to “wise up.”  Instead, these jerks chose to bully up my client, and that’s flat-out stupid, because someone like myself sees this stuff as a third party and blogs about it, generating NEGATIVE PUBLICITY.  I wish I could give them MORE bad publicity for trying to screw my client out of egregious sums of money that just so happen to be less than the cost of a lawsuit, but far more than the license value of the images.  They do not deserve to be in business if this is their idea of B2B relations.  Interestingly enough, they only seem to go for small business owners, not big ones that can fight back!  I can’t explain how despicable Getty Images is for behaving like this, and I strongly urge you to never give them a cent again.

On a side note, this is why you should choose a reputable United States-based firm to design websites instead of outsourcing that work to India or other countries that are known for their rampant copyright violations.  My client almost got bitten by something he did before meeting me–make sure you don’t fall into the same trap.  Get either licenses for the images or a statement from the designer that all material on the site they’ve designed is properly licensed for your site or is an original work that they have the rights to license to you directly.  Prevention is important, and copyright infringement IS generally a bad thing, so take the proper steps and avoid this issue entirely.

Apparently, Corbis Images is doing the same exact thing.  Avoid them as well.  In fact, search for ANY stock photo company you do business with followed by the word “letter” and see if they’re actively threatening people before you pay them one red cent.  Do your part to discourage bad business practices and we may very well see this kind of crap end one day.

An excellent resource to read letters like these is the Chilling Effects Clearinghouse.

I’d also like to point out that this page also does a great job of talking about the misbehavior of Getty Images and what to do about them.

Why I love my (original) Sylvania G netbook (and how to fix its “issues” easily)

UPDATE: THIS IS NOT ABOUT THE UNDER-$200 NETBOOK WITH WINDOWS CE, WHICH IS A TOTAL PIECE OF JUNK. Please don’t ask me about those. They’re junk.

My Sylvania G netbook.
My Sylvania G netbook.

If the tips in this entry help you, please send me an E-mail message letting me know!  I GREATLY appreciate feedback!

A lot of professional reviewers out there seem to have nothing but bad comments on the original (non-Meso) Sylvania G netbook.  I bought one of these puppies for $300 and felt like I was getting quite the steal.  Then again, I’m a Linux user, so I feel more “at home” with a Linux laptop (though my primary line of work is obviously fixing all the problems under Microsoft’s OS every day of my life).  I love my Sylvania G.  It’s tiny, light, the battery lasts forever, people look at it and think I’m watching a DVD on a portable DVD player rather than computing, its wireless actually works far better than I expected…the list goes on.  Granted, it lacks some software that I’d like, but for its primary purposes (Internet browsing, light office apps, maybe an MP3 here and there), it does the job beautifully.  I wish it had all the shortcuts to all the control panels available, but they’re not there because the 800×480 WVGA screen can’t handle them vertically; I’ll tell you how to bypass the vertical issue in a minute.

The main reason I’m writing this is not to explain why my G is so awesome, but rather how to make it that way.  The number one complaint about the G is its postage-stamp sized mouse trackpad, and believe it or not, the laptop comes with the tools needed to fix the insane acceleration that it comes with by default (no more “buy a USB mouse if you’re going to buy this laptop” complaints!)  The biggest advantage of the G over the practically identical Everex Cloudbook (which the G is basically a rebranded version of) is that unlike the Cloudbook, with its moronic “mouse buttons on the left side of the unit, mouse trackpad on the right” layout, the G has the touchpad assembly below the keyboard, WITH THE BUTTONS IMMEDIATELY BESIDE THE PAD.  That leaves the excessive tracking speed (where you can just lift your finger off the pad and the mouse moves two inches across the seven-inch LCD) as the only remaining issue, and HERE IS HOW TO FIX THE SYLVANIA G NETBOOK POINTER TRACKING SPEED, STEP BY STEP!

(This section has been moved to the Tritech Computer Solutions page called Sylvania G Netbook Tips and Tricks.)

For $300, and with my tips above, the original Sylvania G is an absolute gem.  You simply can’t beat its value unless you drop another $100 on an Acer Aspire One (what I originally wanted but couldn’t justify purchasing.)  Once you slow down the mouse and add some launchers for some helpful applications, the G starts to look far better than it may have on display in the store.  I don’t know about the Meso, but I don’t care, because I’ve found the perfect laptop for my needs and that’s the end of the story!  I absolutely LOVE my G!

Once again, please send me feedback if this helps you out!

Why you shouldn’t trust big box store clerks…

UPDATE: The TigerDirect store being referenced is under new management.  I have spoken with the management about this issue; he already took care of it.  Turns out their commissioning model before the new manager arrived was causing employees to reach return rates of 30%-40%, which is egregiously high, because they would up-sell too much garbage to make the commission.  He also fired half the staff there; the people that I have worked with recently have proven to be a delight.  The store in Durham, North Carolina is the one I was previously referencing, and I’d encourage anyone in the NC Triangle proper to visit there, because good management means a good business.  The salespeople know they make some kind of minimal commission on their sales, but they aren’t made privy to the details and so they don’t know what to “push,” meaning they just do their jobs right and they make more money–as it should be!

I received the following E-mail today, and it bothered me enough to bring about a nifty little anecdote about why clerks at major chains generally can’t be trusted.  Note that I frequently shop at TigerDirect and send clients there quite often as well (with a warning to be careful about the advice from the salespeople), but one can’t deny problematic business models, and this irked me enough to open my big fat mouth.

————————

Hey Jody.

Everything seems to be working well. I was able to return the CA software to Tiger Direct, but they gave me a big hassle.

The guy said CA is better than Avast. Is that true?

Thanks,

[CENSORED]

————————

My response (true story):

————————

A little hint…

I overheard some TigerDirect employees in the [CENSORED] store talking one night before they closed up.  They were discussing how successful each of them had been making sales that day, and they discussed it in terms of how many COMMISSIONED ITEMS they sold, along with some “best of” stories from their sales history as well.

Guess what they get commissions for selling?

You got it:

* CA products
* PC Pitstop Optimize
* WaCa extended warranty/service plans

All three of which I strongly discourage the purchase of.  If you know of Clark Howard (consumer advocate and personal finance radio host), you know how much he hates extended service plans, too.

I have literally hundreds (as in triple-digits, probably to the tune of at least 200) customers on Avast as their only virus protection.  Most of these customers have been repeat customers for at least one additional session, and it has served all of them well enough that I have had single-digit rejections of Avast long-term in favor of other products–usually because of the customer’s bias (I am thinking of one specific customer who MUST have Norton or bust, in fact) rather than the product itself.  It does better than Norton, and unlike Norton it does not do so at the expense of your machine’s performance and stability.

Yes, CA is better than Avast.

If you’re making a commission selling it.

————————

If a representative from TigerDirect corporate wishes, they may contact me and I will gladly explain and elaborate.  Having commissioned salespeople is a great way to chase off customers, primarily because when they discover that they’ve been played like a fiddle and up-sold one too many times, they don’t typically stick around.  In all honestly, I only send customers there because they have great prices.  If they want to go somewhere where the staff is much more knowledgeable and the salespeople are not commissioned, I send them over to Intrex instead.  (I don’t worry about either store taking away my service/repair clientele–I overhear pretty long turn-around estimates from their repair counters measured in weeks, whereas my business is measured in hours or days at the worst!)

While I’m poking at specific players in the computer field, I have to say what every other computer technician already seems to know:  Best Buy’s “Geek Squad” is the worst computer service provider in existence on all counts.  Extremely high prices, a plethora of customer complaints, duplicating customers’ private data for personal purposes, disastrous complaint handling (as seen in the hateful remarks of a certain “Agent Orange“), and if you don’t believe a word of it, check out the ten-page confession from a former employee that resulted in a lawsuit being filed against the company.  Or two.

Oh, and don’t let me start talking about Circuit City’s “Firedog.”  They have their own insider employee confessionals as well.

This is what happens when you engage in a race to the bottom, hiring salespeople that are morphed into “computer technicians” that will accept the lowest pay imaginable in a skilled trade while still getting the job done just barely good enough to shut the customer up, and if they get a few of the customer’s private nude photos to add to their collection (or a video of the customer showering), so much the better.  I guess the notions of “privacy” and “paying people what they’re worth” and “hiring experienced employees” and “making the customer happy” don’t matter when it’s all about the quarterlies, baby!

Honestly, I’m surprised that those two big box stores stay in the computer service business at all, given the horrible track records they’re developing.  I used to debate starting yet another computer service business until I came to the realization that these stores aren’t even close to being called my “competitors.”  After all, how much competing does Tritech really have to do when the biggest and best-known “competitors” are in the process of self-destruction?  It’s half depressing and half exciting, but one thing is for sure:  because of their failures, the door has been opened wide for the success of companies like mine that haven’t developed a disconnect from the customer’s needs in favor of the almighty dollar.

The ultimate irony?  Geek Squad and Firedog, in their attempts to gain as much money as possible while paying out as little as possible, actually lose more money to their poor customer service than they would to hiring good people and paying them what they’re worth.

If you are from Best Buy and would like to hire me as V.P. of customer relations while simultaneously preventing me from slowly eroding your business due to my superior philosophies on customer service and strict ethics enforcement, please email jody@nctritech.com with what you have to offer.  Thanks!

How to Fix/Rebuild a Very Corrupt Outlook .PST File

There’s a very well-hidden program called “scanpst.exe” stuffed in an obscure folder (For Outlook 2000, Outlook XP, Outlook 2003, and older, it’s at “C:\Program Files\Common Files\System\MAPI\1033”) that will check and repair a damaged .pst file, and sometimes save your bacon when Outlook complains about a busted .pst file and won’t start. However, in one case we received at Tritech, the scanpst.exe tool detected no issues, yet Outlook XP continued to report “2,847 unknown errors sending” for one item in the outbox that, strangely enough, could not be moved, sent, or deleted. When something like this happens, it’s good evidence that there’s something screwy with the .pst file and you might need to move to a new one. But how to accomplish this feat?

  • Step 1: Close Outlook. Completely. That means it has to be 100% NOT open; sometimes Outlook actually takes a little while to close after it disappears. If in doubt, press Control+Alt+Delete to pull up Task Manager, hit the Processes tab, click on every “OUTLOOK.EXE” listed and hit [End Process] for each.
  • Step 2: Open the “Mail” control panel. Click on “Data files.” You will see a list of Outlook data files that are currently loaded into the mail subsystem in Windows. You need to create a new data file, and be sure to give it a name other than “Personal Folders” at the top, so you won’t get confused in the next steps. The other options you pick really don’t matter; you can accept the defaults for everything and it’ll be fine. Don’t set a password for the .pst file unless you want to make your life painful, though!
  • Step 3: After you see your new data file appear in the list, hit OK or Close to return to the Mail control panel. Hit the first button (it should say something about E-mail accounts), and if you get another screen asking what it is you want to do with E-mail accounts rather than just getting the list, hit the button for managing existing accounts and click Next. At the bottom, under the list of mail accounts, there is a drop-down box for the “default mail delivery location.” CHANGE THIS to match the name of the new file that you created earlier. (If you have two “Personal Folders” entries, you didn’t name it earlier, so choose the LAST file in the list and it should be the correct one.) Then click OK or Close.
  • Step 4: Click on [Data files] again, and the new data file should have an indication that it is now the “default mail delivery location.” This will then allow you to remove the old data file from the list, which is safe to do, so go ahead and toss it now to prevent possible confusion later. Click OK or Close after you’ve removed the old file from the list.
  • Step 5: Close the Mail control panel. Open Outlook again. You may receive warnings about the things you’ve just changed; this is normal and you can simply click through them. You should now have a new, empty set of folders, with no contacts or mail whatsoever. The last step is to bring all of your old mail, contacts, tasks, etc. into the shiny new empty folders file. Go to File, then Import and Export. Choose to import from another program or file, and click Next. In the list, choose to import an Outlook personal folders file (.pst), and click Next again. If you are asked about how to import duplicates, choose to “replace duplicates with items imported” (though technically it shouldn’t matter which you pick). When you finally receive a blank in which to specify the file to import, click Browse.

If you don’t immediately see a file or set of files called something like “Outlook,” “Archive,” “outlook.pst,” “archive.pst,” or similar, you’ll need to manually specify where the file is located, but in my experience you are usually placed in the correct folder without having to fish for it. Choose the original file (highly likely to be “outlook” or “outlook.pst” as that is the default) and click OK. Once you click Next, you’ll get a list of folders and some more import options; the defaults are OK, so click Next (or Import or OK). Voila! You’ve successfully moved your mail from the damaged .pst file to a new one! You could say that you’ve rebuilt the PST database from scratch.

If you need help locating the Outlook folder where these .pst files are stored, it is located in the following path on a typical installation: “X:\Documents and Settings\your_user_name\Local Settings\Application Data\Microsoft\Outlook” where X: is replaced with your system drive letter (98% of the time it’s “C:”) and your_user_name is replaced with your Windows login name. Local Settings is a hidden folder, so when you browse to your user name folder, you may have to type (with the quotes included) “Local Settings” into the File blank to proceed further. It can be tricky, but if you are persistent, you should be able to locate it. The Windows search tool in the Start menu may also be helpful; just be sure to set the option “search hidden files and folders” if you use it.

The worst kind of computer virus to catch…

Today I ran into two very troublesome situations.  One was a failing hard drive on a long-time client’s laptop, chock full of important information, but luckily the failure was gradual enough to cause serious speed issues and force them to call me before the whole thing could become a toaster.  The other was a far more difficult scenario: another returning client who uses the computer to run his business had somehow managed to pick up the worst class of computer virus I can think of: an executable-infecting virus.

You see, what these horribly nasty viruses do to your computer renders them essentially incapable of being repaired and returning to “like it never happened” functionality.  In case you don’t know, an “executable” is a term for the actual file that your icons run to start the program of your choice.  Essentially, they are the program.  A virus that infects executables will insert the virus code into the actual program file that you run to start software…including Windows itself.  I’ve only seen two infections before today that involved this class of virus, and the first one completely latched into everything, forcing a total wipe and reinstall.  The second one was not quite as “zealous” and didn’t infect things as readily, so I was able to recover that system from pending doom.  Today, however, is the second time I have encountered this type of infection to a point that I was incapable of repairing it.  My clients can tell you that I don’t play around on the computer: I know what I’m doing and I boast extremely high success rates where other “technicians” fail miserably.  I’d estimate that out of a random sample of 50 jobs, I have to do some sort of Windows reinstall on only about 1-2 of them.

Despite having six years of all-day-every-day experience tirelessly working to find every imaginable way to repair every computer problem under the sun without “major surgery” like reinstalling Windows, today I had to give in to the reinstallation machine that I so dreadfully despise, but I don’t regret doing so.

You must come to understand that even Windows itself is composed of hundreds of executable files.  They are often hidden behind the scenes and carry names such as “winlogon.exe” and “svchost.exe” and “ctfmon.exe” and “userinit.exe” and “logonui.exe,” and none of these should really ring a bell in your mind because you’re not supposed to know that they’re floating back there.  However, every single one of these files can be infected with a virus like this one.

Let’s put it this way: when you boot your computer, Windows loads a bunch of drivers, this thing called the HAL, and the NT kernel.  Basically, a bunch of really critical core stuff that makes everything else in the machine tick.  Once the pretty blue background pops up, however, those executables start firing off one by one.  svchost.exe starts in the background numerous times so that your sound card, automatic updates, Internet connectivity, and other system services can start working.  When you log in, logonui.exe runs, and then userinit.exe kicks in as well.  The ever-popular explorer.exe loads and shows you your icons and Start menu.  Any software you have installed may have startup items, such as the Adobe Reader Speed Launcher (reader_sl.exe) or the various America Online core services.

To bring all that irrelevant-sounding blah-blah-blah into perspective, nearly every single thing that runs in the list above gets infected with this kind of virus almost immediately once your machine is compromised. That means that Windows becomes a living virus.  The system is infected everywhere.  You can’t even boot halfway without running the virus itself, which then reinfects anything you may have cleaned.  Got Adobe Creative Suite?  They’re probably all toast–infected with the virus.  Hearts?  Infected.  Solitaire?  Infected.  Norton 360?  Infected.

I hope that this admittedly lengthy explanation brings you to appreciate the skills of a good computer technician (as well as the skills of the virus authors, who we’d all probably love to strangle one day), and the true importance of practicing good security habits when using your computer.  When I originally wrote the spyware and viruses page on the company website, my intent was to help you jump-start your computer security knowledge (and break some of the misinformation that exists today), and I hope you’ll read it now if you haven’t done so already.

I need to add this detail to said page, but I will dispense it here so that it will be clear: once your computer is compromised, you have NO SECURITY AT ALL!!! Modern viruses use rootkit-like technologies to hide themselves from virus scanners and bypass security measures such as software firewalls.  If you are compromised, security software is essentially rendered useless. Prevention should be your goal, not mitigation after compromise.  Don’t click on anything or say “yes” to anything unless you are 120% certain that it is legitimate.  Get Mozilla Firefox to avoid the plethora of security holes in Internet Explorer.  Take the time to find out what can get you in deep doo-doo when browsing the Internet (“free porn” searches are the biggest culprit, though many wouldn’t admit it–see that “.exe” at the end of the file name?!  It’s amazing how easy it is to infect a computer when the user is desperately looking for free porn and will download and run anything to get it.)  Most importantly, if your computer seems to be slower than usual, or pausing more frequently than is normal in your daily experience, do not hesitate to call a verifiably experienced computer technician to diagnose the problem.  If your water heater sprung a tiny water leak, would you hesitate to call a plumber, or would you try to patch it up until the pressure caused the leaking part to explode?

I can’t even begin to explain how frustrating it is to walk into a loyal client’s house to discover that the problem actually started months ago, and became disastrous because they chose to “live with it” and let it grow and compound rather than call me up and ask for a little bit of free assistance.  (Any computer business worth their salt will take five minutes to talk to you at no charge.  It’s called “customer service” and it gets left out a lot with many large businesses these days.)  When I perform computer services, it is a very personal matter for me, because the results of my work (short- and long-term) define what people think of me and my skills, and I can’t do my job for someone properly if they don’t tell me that there’s a problem.

If you take anything away from reading this post, (A) learn how to avoid danger on the Internet in the first place, and (B) don’t hesitate to call an expert when things may be getting beyond your control.