Sure enough, his operating system is refusing to boot, looping round in never ending circles but never getting anywhere. Long story short, I take the hard drive home and connect it to my test machine running Windows 7 but no matter what I do, I am unable to access the hard drive in any way – just a whole lot of errors and “access denied” messages. Goodness knows how he has managed to get it in this state, I’ve never seen anything like it.
It soon becomes apparent that the only viable solution is a fresh install but my friend then informs me that he has lost his installation media. That’s not a problem on its own but, unfortunately, the product key was on a label affixed to the box the disc came in and that’s gone as well. So, I advise him to take the machine back to the computer shop where he bought it from in the hope that they may have his product key on record.
I can hear his wife in the background talking with the so-called Avast rep on the other phone, which they must have had on speaker. This person, whoever it might be and speaking with a distinctly “offshore” accent, is aggressive and insistent. A horrible thought then enters my head, I ask my friend…”you didn’t allow them remote access did you?” When he replies in the affirmative I tell him, with some urgency, to shut down the computer and switch off the router immediately.
I pop round to my friend’s house the following morning and scan the machine with a couple of reputable malware detection and removal tools – thankfully, all clear. They were lucky they called me right away, I’m guessing we terminated the remote session early on in the piece.
There are three important lessons to be learned from my friend’s experience:
1) Backup Personal Files
Undoubtedly, the worst aspect of all this was that my friends had failed to heed my constant advice to backup and subsequently lost all their personal files. Computers are machines, machines break. Backing up personal files is not a luxury, it is an absolute necessity!
2) Allowing Remote Access
We should always be extremely cautious about who we allow to remotely access our system, and never, under any circumstances, allow remote access to anyone who initiates the contact.
3) The Elderly are Particularly Vulnerable
If you have elderly folk in your lives, which I’m assuming most would, take some time to educate them on the dangers of being overly trusting with their computer and important data. Let them know that you are there for them. We can learn a lot from their years of experience and wisdom but, when it comes to computers and technology, the roles are often reversed and the younger ones must become the educators.
**My references to the elderly are generalizations and I mean no disrespect. I realize there are elderly folk out there who are computer and technology savvy – I am nearing 70 years old myself.