#Security Your Internet

#Security Your Internet

How to Watch Adult Swim Abroad (outside the US) with a VPN

Posted: 03 Jul 2019 09:33 AM PDT

How to watch Adult Swim outside the US with a VPN

Adult Swim has some great shows such as Rick & Morty, American Dad, and Robot Chicken. Most of its content is totally free to stream as long as you log in with a US IP address. Otherwise, you'll be greeted with the following error message:

"This video is not available in your region."

To unblock Adult Swim shows from virtually anywhere in the world, you'll want to connect to a Virtual Private Network (VPN) first. This software will route your device's traffic through an encrypted tunnel and a server that you choose, tricking host websites and apps into thinking you're in your chosen locale.

When you connect to a VPN server in the US, you are assigned a local IP address. Websites like Adult Swim, as well as others like Netflix, will operate under the assumption that you're physically in the United States. As a bonus, the encryption factor of VPNs means its impossible for hackers and snoopers to determine what you're doing on the web. If you simply want a summary, here's our list of the best VPNs to access Adult Swim:

Best VPNs to Stream Adult Swim

  1. ExpressVPN: A superior VPN option and our top choice to access Adult Swim. It's fast and reliable, and can unlock many streaming sites including Netflix and BBC iPlayer.
  2. NordVPN: Best budget VPN for Adult Swim. Boasts an expansive server network with lots of options in the US. Affordable, fast, and adept at unblocking geo-restricted media.
  3. CyberGhost: Suited for beginner users as it ships with well-designed apps. Fast speeds and solid privacy are included. Works with Adult Swim.
  4. IPVanish: High number of simultaneous connections coupled with incredible privacy-evading tech. Lots of servers in the US.
  5. Surfshark: Nifty provider that's well-suited for privacy and streaming.
  6. PrivateVPN: Intuitive apps and a clean user interface. Excellent ability to unblock geo-restricted media such as Netflix, Hulu, and more.

How to watch Adult Swim outside the US with a VPN

Follow these simple steps to be able to stream Adult Swim shows abroad:

  • Register with one of the VPNs we've recommended. Our top choice is ExpressVPN.
  • Once the payment formalities are out of the way, download and install the relevant VPN apps for your device, either directly from the provider's site or official app marketplaces.
  • Restart your device.
  • Once rebooted, connect to a server in the US.
  • Proceed to the Adult Swim page. You should now be able to stream all the content you want.
  • If it doesn't work immediately, don't panic. Just clear your browser's cache and cookies to remove old location identifiers and try again.

There are, quite literally, hundreds of VPNs to choose from, but they don't all exhibit the same qualities. As such, we've based our recommendation of the top VPNs to unblock Adult Swim on the following criteria:

Criteria for selecting the best VPNs for Adult Swim

  • Unblocks geo-restricted sites
  • Offers a fast and stable connection
  • Incorporates a large number of servers in the US
  • Supports HD streaming with minimal buffering
  • Offers strong privacy and encryption features so your location is hidden
  • Has friendly customer support
  • Allows multiple simultaneous connections

Best VPNs to Stream Adult Swim

Here's our list of the best VPNs you can use to watch your favorite Adult Swim shows from anywhere:

1. ExpressVPN

Express VPNJul 2019unblocks adult swimTested Jul 2019

ExpressVPN is our top choice to stream Adult Swim outside the US. The service has more than 3,000 servers in 94 countries including options in America. We tested four US server locations and all of them granted access to Adult Swim.

This provider is fast, ships with military-grade encryption protocols, and offers customer support around the clock. All web traffic is secured with 256-bit AES encryption. It includes DNS and IPv6 leak protection, an internet kill switch, and split tunneling. It doesn't store any logs that could potentially identify a user.

Other than Adult Swim, ExpressVPN is proven to unlock many streaming services including Netflix US, Amazon Prime Video, Hulu, BBC iPlayer, ESPN, and more. Minimal, well-designed apps are on offer that makes it very easy to set up the VPN connection.

Customer support is available via both live chat and email. A single account allows for three connections at one time. Apps for Windows, MacOS, Linux, Android, iOS, and a few select routers are included.


  • Fantastic speeds for downloading and streaming
  • Guaranteed security with military-grade encryption
  • Unblocks all major streaming services
  • Offers 24/7 live chat
  • Substantial network across 94 countries and with over 3,000 servers


  • Power-users may find the advanced options limited

BEST VPN FOR ADULT SWIM:ExpressVPN is our #1 choice. It's fast, reliable, and secure, and is great for streaming Adult Swim and other services from anywhere in the world. Try it risk-free with a 30-day money-back guarantee.

Read our full ExpressVPN review.

ExpressVPN Coupon

Special Offer - get 3 months extra FREE

Coupon applied automatically

2. NordVPN

NordVPNunblocks adult swimTested Jul 2019

NordVPN is known as a 'no-logs' provider due to its refusal to store user data of any nature. What's more, it has a huge server network which totals more than 5,000 across 60 countries. The United States has 1,561 options so it's a straightforward task to stream Adult Swim.

NordVPN has very fast speeds; in our user review it was able to stream HD video without any buffering. The provider gives you the option to pick servers customized for streaming and unblocking as well as other features like double encryption. NordVPN can unblock Netflix, BBC iPlayer, and Amazon Prime Video.

Security and privacy features are top-notch. Web traffic is secured by way of 256-bit AES encryption, DNS leak protection, and an internet kill switch.

Apps for Windows, MacOS, Linux, Android, and iOS are available. You can make use of Chrome and Firefox browser extensions. One paid account allows for six devices to connect simultaneously and there's 24/7 live chat support if you ever need any assistance.


  • Great low-cost alternative for streaming
  • Unblocks Hulu, Amazon Prime Video, and BBC iPlayer
  • Offers 24/7 live chat
  • Extensive range of international servers


  • Connections through the desktop app can be slow

BEST BUDGET OPTION:NordVPN is fast, efficient, and secure. It ships at a price that won't break the bank and can easily unblock Adult Swim. Try it with a 30-day money-back guarantee.

Read our full NordVPN review.

NordVPN Coupon

Save 75% with this limited deal on 3 year plans

Discount applied automatically

3. CyberGhost

Cyberghostunblocks adult swimTested Jul 2019

CyberGhost is headquartered in Romania and doesn't have to comply with any mandatory data retention laws, so that's a boost for user privacy. It has a fairly expansive server list that's touching 3,700 options, including over 680 in the US alone.

This provider operates one of the fastest VPNs we've tested. Its well-designed apps help set up the task of unblocking streaming media services effortlessly — a testament to the fact that they're conceptualized with novice users in mind. Unblocking Adult Swim won't pose any problems as CyberGhost is proven to work with Netflix US, Hulu, Amazon Prime Video, and more.

User traffic and privacy is safeguarded with the use of 256-bit AES encryption, DNS leak protection, an internet kill switch, anti-malware defense, and an ad-blocker. Unlimited bandwidth is also on offer.

Apps are available for Windows, MacOS, Android, iOS, and Amazon Fire Stick. A single account allows for seven simultaneous connections and customer support is available around the clock.

EASY FOR BEGINNERS:CyberGhost has a simple, intuitive user interface and offers hundreds of servers in the United States. You can expect fast and consistent streaming of Adult Swim. Try it with a 45-day money-back guarantee.

Read our full CyberGhost review.

CyberGhost Coupon

Flash Sale - save 79% on the 3 year plan

Discount applied automatically

4. IPVanish

IPVanishunblocks adult swimTested Jul 2019

IPVanish is based in the United States and hosts hundreds of servers in the North American country, comprising a large portion of its global network of over 1,300 servers. We mentioned earlier how it has sophisticated location-evading tech; that's mainly due to its decision to own and operate all servers in-house as opposed to the industry standard of renting space in server farms.

This provider also refrains from logging any user data on its servers, so your digital footprint is hidden. It tops this up with best-in-class encryption standards — 256-bit AES — as well as perfect forward secrecy, an internet kill switch, and DNS and IPv6 leak protection.

IPVanish is able to unblock several popular streaming services including Netflix US and BBC iPlayer, so accessing Adult Swim will be a walk in the park. Fast speeds are guaranteed, along with reliable uptime.

Apps are available for Windows, MacOS, Android, and iOS, and customer support is ready to help 24/7.


  • Operates a network of more than 1,300 servers from 75 city locations around the globe
  • Keeps no logs whatsoever
  • Very fast speeds


  • Customer service is limited to an email form on its website

VERSATILE:IPVanish checks all the boxes for a modern, reliable VPN service. Streaming Adult Swim will be a hassle-free experience. Try it with a 7-day money-back guarantee.

Read our full IPVanish review.

IPVanish Coupon

Comparitech Exclusive - save 60% on the 1 year plan

Discount applied automatically

5. Surfshark

SurfShark VPNunblocks adult swimTested Jul 2019

Surfshark is a relative newcomer to the VPN industry, but it's already carved out a name for itself. Its standout feature is that it offers an unlimited number of simultaneous connections with each plan so you can liberally share with friends and family.

At the time of writing, Surfshark has more than 800 servers in 50+ countries including the United States. This isn't a static figure as more servers are added constantly. All user traffic is protected with 256-bit AES encryption in conjunction with 2,048-bit DHE-RSA keys.

Additional features include perfect forward secrecy, an internet kill switch, and DNS, IPv6, and WebRTC leak protection. You can make use of an ad and malware blocker, a split tunneling option, multihop servers, and traffic obfuscation.

Streamers and torrenters will be pleased with the fact that Surfshark offers unlimited data and allows P2P filesharing. Other than Adult Swim, Surfshark is able to unblock Netflix, BBC iPlayer, and Hulu.

Apps are available for all major platforms — iOS, Android, Windows, and MacOS.


  • Provides a secure, encrypted connection
  • Unblocks Netflix US, UK, and others
  • Keeps no logs


  • The server network is relatively small compared to many competitors

ALL-ROUNDER:Surfshark packs a punch. It'll help you stream Adult Swim and keep you secure on the internet in the process. Try it with a 30-day money-back guarantee.

Read our full Surfshark review.

Surfshark Coupon

Special Deal - save 83% on the 2 year plan

Discount applied automatically

6. PrivateVPN

PrivateVPNunblocks adult swimTested Jul 2019

PrivateVPN focuses on the quality of connections rather than tons of server options. It's a proven performer for both speed and unblocking geo-restricted media. Its roster of servers is smaller than the other providers on this list — with about 150 options in 60 locations — but it gets the job done.

The United States hosts nine servers so unblocking Adult Swim shouldn't pose a problem. PrivateVPN is also able to unblock Netflix USAmazon Prime VideoBBC iPlayer, and more.

Security features include 256-bit AES encryption, protection against DNS and IPv6 leaks, and an internet kill switch. It's a 'no-logs' provider as it refrains from storing any user data. PrivateVPN's apps are intuitive and help you get started fairly easily.

Support for all the major platforms — Android, Windows, iOS, and MacOS — is included. Customer support is helpful and can assist you remotely if you wish. A single account allows six devices to connect simultaneously.


  • Faster than many other providers
  • Works with a wide range of streaming services
  • Servers in 9 US cities achieve good streaming speeds


  • Live chat is not around the clock
  • Kill switch only on Windows app

STREAMING VPN:PrivateVPN has been tested to be a reliable performer with many geo-restricted media services. Try it with a 30-day money-back guarantee.

Read our full PrivateVPN review.

PrivateVPN Coupon

Special Deal - save 83% on the 2 year plan

Discount applied automatically

Should I use a free VPN to stream Adult Swim?

Free VPNs aren't all they're made out to be. The fact of the matter is that these services have several disadvantages when compared to paid options. Let's take a closer look at them.

Lack of server options

Free VPN providers don't offer hundreds of servers the same way that paid providers do. You might be able to find servers housed in the US, but they won't be optimized for speed or security. Expect frequent interruptions to your connection.

Bandwidth throttling and network congestion

Free VPN providers are in the habit of taking on far more users than their existing network capacity can support. This means you might have to endure wait times to connect to a server. Plus, speeds will be throttled as servers can't keep up with all the requests. Paid providers, on the other hand, aren't plagued by similar concerns.

Lack of data privacy and security

Lots of free VPN solutions mine user data and browsing habits to sell to third-party advertisers. Others have been known to piggyback on idle bandwidth to build botnet armies and attack rival sites. And that's not all — a 2016 survey of free VPN apps found that over one-third contained malware.

Paid providers put user interests first and won't sour your browsing experience or privacy needs. If you sign up with a free VPN, you should be aware of the inherent risks involved.

That's why we maintain that unblocking Adult Swim from abroad is only a hassle-free experience if you choose to go with a paid VPN provider. Such services provide consistent speeds, high uptime, and robust customer support to troubleshoot your problems.

What's more, all the ones we've recommended in this article have a money-back guarantee — this gives you the flexibility to try the service for a few weeks. If it doesn't meet your requirements, you'll get your money back.

What can I watch on Adult Swim?

Adult Swim is a cult classic when it comes to cartoons. Some of the popular titles on the platform are:

  • Rick and Morty
  • American Dad
  • Black Jesus
  • Bob's Burgers
  • Bushworld Adventures
  • Final Space
  • Family Guy
  • The Jellies

What else can I do with a VPN?

Other than streaming television shows and movies, VPNs can make your life simpler in a variety of ways.

As we mentioned before, VPNs set up an encrypted tunnel through which your web traffic travels, making your connection virtually uncrackable. Encryption means all would-be hackers and snoopers are safely at bay, and even your internet service provider can't figure out what you're doing online.

Things like accessing public wifi are now a hassle-free endeavor. Public wifi networks — the ones you find at airports, coffee shops, and malls — can come with security risks. A VPN can protect your connection to these networks and keep hackers and other snoopers at bay.

Another nifty use case is when you try to access your online bank account while traveling. The last thing you want is your bank account to be frozen due to a fraud alert warning — that's definitely possible if you log in from an obscure city or town. However, if you use a VPN first and connect to a server in your home location, your local bank or financial institution will assume it's business as usual.

L'article How to Watch Adult Swim Abroad (outside the US) with a VPN est apparu en premier sur Comparitech.

How to watch the FIFA 2018 World Cup live online in Spanish

Posted: 03 Jul 2019 08:43 AM PDT

The highly anticipated 2018 World Cup is fast approaching. In this article, we explain how you can stream every single World Cup match live online for free, and in HD. We'll also show you how to use a Virtual Private Network (VPN) to watch from home or abroad, so you don't have to worry about regional restrictions getting between you and the year's biggest sporting event. A VPN will enable you to access FIFA World Cup 2018 live matches online from the US, Canada, Australia, and anywhere else in the world.

How to watch the Fifa 2018 world cup live online

This article is only going to cover official live streams. While there will undoubtedly be unofficial World Cup streams, there's really no reason to use them as there are plenty of free and low-cost, entirely legitimate ways to watch. When you consider that unsanctioned streams are prone to sudden takedowns and often only available in standard definition, they become far less attractive.

FIFA World Cup 2018 live streaming: use a VPN

If you’re traveling from your home country this year or looking to access some free World Cup matches legally, you do have options through a virtual private network, or VPN. A VPN will connect you to a server in the country of your choice, allowing you to bypass geographic content restrictions put in place for live streams online.

We recommend using ExpressVPN to watch the 2018 World Cup. It offers a huge selection of high-speed servers so you can stream without any noticeable buffering or lag. 

ExpressVPN offers a 30-day money-back guarantee, which will cover most of the World Cup schedule.

EXCLUSIVE DEAL: Get three months extra free with ExpressVPN's annual deal. It has a 30-day money-back guarantee, allowing you to trial the service with no risk.

Read our full review of ExpressVPN.

How to watch the 2018 World Cup in Spanish

Regardless of which country you’re in, you can watch World Cup matches live online and in Spanish.

The following TV networks will be broadcasting live matches of the 2018 World Cup through their websites and apps.


copa mundial en espanol

In Argentina, you can watch World Cup matches live on TV Pública, Telefe, DirecTV, TyC Sports.

To watch online, you’ll need to access either TV Pública or  TyC Sports through their live streaming options. TV Pública can be watched free from anywhere in the world, although they may block international viewers once the games begin. TyC Sports will require you to enter subscription information with a local cable provider, so you may not be able to watch internationally through that network.


Three networks have broadcast rights in Bolivia: Unitel, Red Uno, and DirecTV.

Unitel has a live stream section on their website, but it is unclear whether they will be broadcasting the World Cup matches live on the web. Red Uno does not appear to have a functional website, while DirecTV is a satellite TV option that will require a satellite and subscription to that service.

Your best option for Bolivia will be to wait to see if Unitel shows World Cup matches online through their live stream


In Chile, a large number of networks obtained broadcasting rights: Canal 13TVNMega, DirecTV, Movistar

Canal 13 has a region-locked live stream that comes in at a relatively poor quality, but it is a free stream. TVN, however, will have high-quality live streams available through its site, also for free. Mega also has a live stream on their website, but as that network is a private, pay-TV option, it’s unclear as to whether they will offer the live stream free on their website as well. Finally, Moviestar has streams available for anyone who is signed up for their pay-TV service, Moviestar Play.

Costa Rica

costa rica group e world cup

Given Costa Rica will be playing in the Group E matches for this year’s World Cup, access is going to be at a premium, especially in the country. While Teletica, Sky, and Movistar all have broadcast rights in the country, your best option to watch live online will be Teletica.

You can watch live through Teletica Canal 7.


The national TV network, ICRT, has the broadcasting rights in Cuba. However, there does not appear to be a live stream available on the website. Those currently in Cuba who want to stream live online may need to access live streams online made available by another country’s public broadcasting company. Otherwise, ICRT will be broadcasting via traditional methods.

Dominican Republic


Both Sky and Antena 7 have broadcasting rights in the Dominican Republic. However, Antena 7 will be showing the games live online and for free.


You have two options in Ecuador to watch the World Cup in Russia: RTS or DirecTV. As DirecTV requires both a satellite and a subscription, RTS is going to be the better option for you. You can watch live online from anywhere in the world without a VPN.

El Salvador

Sky and TCS both have broadcast rights in El Salvador, but neither is offering free streams online. You can watch on TCS through their app for cheaper than you can get with Sky, but neither have an easily accessible option. Those inside El Salvador looking for free streams will need to connect to a broadcaster from another country online.


Four broadcasters were awarded streaming rights in Guatemala: TV Azteca, Tigo SportsSky, and Movistar.

For Movistar and Sky, you will need a paid subscription in order to access streams. Streaming through their apps will work, but web browser options may exist for paid subscribers.

Your best options will be Tigo Sports and TV Azteca, however. Tigo Sports already has a live stream test page up and ready for action, while TV Azteca has a live stream available on their site that should be showing the World Cup when it begins.


As with many other Central and South American countries, in Honduras, Movistar and Sky have noted broadcasting rights, with access restricted to those with paid subscriptions. Movistar does not have a website indicating where Hondurans can sign up and watch the matches through its service, however. Sky has a clear sign-up page with information on how to gain access.

For free online streams, however, you’ll want to turn to Televicentro. They’ll have a live stream available on their website, or through the Honduras504 website.


In Mexico, Sky Mexico is a good paid option for World Cup games, but there are free opportunities you can utilize.

TV Azteca is going to be your best option for live streams online. Just make sure to tune into their live streaming page for World Cup. Televisa is also an official broadcaster, but it does not appear to have any free streams available online for football fans.


For Nicaraguans, there are three options to watch the World Cup: Movistar, Sky, and Canal 10 (owned by RATENSA). Your best option to watch live online in Nicaragua is through Canal 10, which should be broadcasting live online.


For those in Panama, there are four broadcasters showing the World Cup matches: RPC (via Medcom)TVMax (via Televisora), Sky, and Movistar. Both Movistar and Sky will require a paid subscription, while RPC and TVMax can both be streamed online for free.

TVN may also be broadcasting the games live online, so you may want to check there as well.


Four broadcasters obtained the streaming rights for World Cup matches in Paraguay: SNTTelefuturoTyC, and DirecTV. DirecTV is a not going to be a great option for anyone looking to stream free online as satellite equipment and a paid subscription are required.

SNT will be the best option to watch live online through their website, although streams are region-locked. Telefuturo (Canal 4) has a live stream on their website that is not region-locked, although the quality is not great. Meanwhile, the Argentinian network TyC Sports is going to be a good go-to option for anyone in Paraguay looking for a good quality live stream online.


Two broadcasters have rights to show the World Cup in Peru: DirecTV and Latina. Considering DirecTV is the pay-TV option for viewing, Latina is going to be the more favorable choice for watching live online. Latina streams its content online live and in a relatively good quality video.


Heading into the Group B matches, Spaniards will be able to watch their team and all other teams play through Telecinco and Cuatro, both Mediaset channels. The live streams through both options will be free.


For Uruguay, the following streaming options are available: Monte CarloCanal 10TeledoceTyC, DirecTV. 

To watch live games online for free, you’ll need to utilize a mixture of Monte Carlo, Canal 10, Teledoce, and TyC. All of these will have games broadcasting live online through their websites, but not all games are carried by each broadcaster. You’ll need to check with their broadcast schedules to find out which games they’ll have and when.


Those in Venezuela can enjoy the matches through a variety of streaming sources. VenevisiónTVesMeridiano TelevisiónDirecTV all have broadcasting rights in the country.

Venevisión has a live stream page on their website, but there appears to be no live stream available. Meridiano Televisión is the official sports-centric broadcaster in the country, but no live streams appear to be available live streaming either. TVes has a live stream that Venezuelans may be able to enjoy, and it does not require a VPN for those outside of the country either.

How to watch World Cup 2018 games live online with a VPN

  1. Choose a VPN designed for HD streaming. We've already mentioned ExpressVPN, but two other high-performing, low-cost options are NordVPN and CyberGhost.
  2. Register on the VPN provider's website.
  3. Download and install the VPN client. Make sure you choose the right version for your operating system.
  4. Select a suitable streaming site from the list below.
  5. Connect to a server in the correct location.
  6. Visit the streaming website. You should now be able to watch the game.

Best International channels for 2018 FIFA World Cup matches

This event is a worldwide attraction, so it's no surprise that it's being covered by major networks in almost every country. Below, you'll find the official World Cup 2018 broadcaster for various regions.


British flag - union jack

In the UK, both the BBC and ITV share broadcasting rights. This means that every FIFA World Cup 2018 game can be watched on either BBC iPlayer or ITV Hub. These services are free to use, although you will be asked if you have a valid UK TV License. Despite this, there are no verification measures in place.

The BBC has been trying hard to block as many VPNs as they can lately. As such, there are only a few providers left with the ability to unblock the iPlayer.

All commentary will be in English.


2018 fifa world cup online american-flag-2144392_1280

FOX Sports is one of the two official broadcasters in the United States. If this channel is included in your cable or Sling TV subscription, you can watch it for free online. Otherwise, you'll have to sign up for the FOXSoccerMatchPass at $19.99 a month. This includes a seven-day trial period, and you can cancel if it doesn't live up to your expectations.

The other broadcaster is Telemundo Deportes. It'll be making live streams available via NBC Sports. There's no FIFA World Cup 2018 pass available yet, but this will likely be released in the run-up to the first game.

FOX Sports offers English commentary while Telemundo Deportes will cover the games in Spanish.


Flag_of_France world cup live online

TF1 will be showing 28 of the 64 World Cup games for free on its website. This includes every game featuring the French national team. To view every game, French viewers can sign up to beIN Sports Connect. Prices start at €14 per month, but we'd recommend choosing the €15 subscription to avoid being locked into a year-long contract. Both TF1 and beIN Sports Connect will be providing French-language commentary.


2018 fifa world cup live online germany-flag

Both ZDF and ARD will be showing every game for free in standard and high-definition. If you'd like to watch in 4K, you'll need a Sky Sport subscription. This costs €29.99 per month, but day and week passes are also available. All three of these sources feature German commentary.


2018 fifa world cup live online Flag of Portugal

SIC and RTP have the rights to broadcast eight World Cup matches in Portugal. These will be available for free, but to watch the entire tournament, you'll have to subscribe to Sport TV. The basic service costs €9.99 per month but you can pay more to unlock 4K streams, additional channels, and a multi-screen feature. All commentary is in Portuguese.


I2018 fifa world cup live online ndia flag

SONYLIV will be showing the 2018 World Cup on its website as well as on terrestrial television. However, you'll have to subscribe in order to watch. Packages start at ₹99 a month, but also include on-demand TV shows and movies. TV broadcasts will be available in English, Hindi, Bengali, and Malayalam, but there are no indications yet as to whether the live streams will be available in all of these languages too.


2018 fifa world cup live online Australia world cup 2018 russia

SBS is going to be your best option in Australia. SBS is a free, live TV service, similar to the BBC in terms of its operation. Australian residents can enjoy over 20 World Cup matches using the SBS World Game website. Broadcasts will be available with English commentary for Australian sports fans, and those outside of Australia can also connect into the streams using a qualified VPN service.

Other locations

This event is going to be available to watch in almost every country. If we haven't covered your location specifically, you can check out the list of official FIFA World Cup 2018 broadcasters. Scroll down until you find your country, and try to find a source that's either free or which offers a free trial. You should note that not every source will have an online streaming service; some will only be showing the games on TV.

Confirmed World Cup 2018 Fixtures

ThursdayJune 14thRussia vs. Saudi Arabia
FridayJune 15thEgypt vs. Uruguay   
FridayJune 15thMorocco vs. Iran
FridayJune 15thPortugal vs. Spain
SaturdayJune 16thFrance vs. Australia
SaturdayJune 16thArgentina vs. Iceland
SaturdayJune 16thPeru vs. Denmark
SundayJune 17thCosta Rica vs. Serbia
SundayJune 17thGermany vs. Mexico
SundayJune 17thBrazil vs. Switzerland
MondayJune 18thSweden vs. South Korea
MondayJune 18thBelgium vs. Panama
MondayJune 18thTunisia vs. England
TuesdayJune 19thColombia vs. Japan
TuesdayJune 19thPoland vs. Senegal
TuesdayJune 19thRussia vs. Egypt
WednesdayJune 20thPortugal vs. Morocco
WednesdayJune 20thUruguay vs. Saudi Arabia
WednesdayJune 20thIran vs. Spain
ThursdayJune 21stDenmark vs. Australia
ThursdayJune 21stFrance vs. Peru
ThursdayJune 21stArgentina vs. Croatia
FridayJune 22ndBrazil vs. Costa Rica
FridayJune 22ndNigeria vs. Iceland
FridayJune 22ndSerbia vs. Switzerland
SaturdayJune 23rdBelgium vs. Tunisia
SaturdayJune 23rdSouth Korea vs. Mexico
SaturdayJune 23rdGermany vs. Sweden
SundayJune 24thEngland vs. Panama
SundayJune 24thJapan vs. Senegal
SundayJune 24thPoland vs. Colombia
MondayJune 25thUruguay vs. Russia
MondayJune 25thSaudi Arabia vs. Egypt
MondayJune 25thSpain vs. Morocco
MondayJune 25thIran vs. Portugal
TuesdayJune 26thDenmark vs. France
TuesdayJune 26thAustralia vs. Peru
TuesdayJune 26thNigeria vs. Argentina
TuesdayJune 26thIceland vs. Croatia
WednesdayJune 27thSouth Korea vs. Germany
WednesdayJune 27thMexico vs. Sweden
WednesdayJune 27thSerbia vs. Brazil
WednesdayJune 27thSwitzerland vs. Costa Rica
ThursdayJune 28thJapan vs. Poland
ThursdayJune 28thSenegal vs. Colombia
ThursdayJune 28thEngland vs. Belgium
ThursdayJune 28thPanama vs. Tunisia

You can view details of fixtures as they're announced by visiting the official World Cup schedule page.

Russia World Cup 2018 FAQs

Can I register for foreign streaming services?

Some services allow you to sign up from anywhere, although you might find that their content changes based on your location. Others prevent foreign users from registering by checking to see if their address or payment method is registered inside their broadcast area.

Unfortunately, unless you have a virtual credit card or someone in the required region that's willing to help, there's no easy way to sign up for these services. With the World Cup being shown in most countries, though, there's almost certainly going to be a service you can use.

How does the World Cup work?

209 national teams played through a knockout tournament in 2015 to see who would qualify for the World Cup. At the end of the qualifiers, 32 teams were left standing. These were then split into eight four-team brackets, named Group A through H.

Each team will now play against every other team in their group, gaining points for winning or drawing a game. The top two teams in each group will go through to another knockout stage until only one team remains.

L'article How to watch the FIFA 2018 World Cup live online in Spanish est apparu en premier sur Comparitech.

Common tech support scams: How to identify and avoid them

Posted: 03 Jul 2019 06:20 AM PDT

tech support scam
One of the big scams running the rounds lately doesn’t start with an email. This one usually begins with a phone call. A computer tech claiming to represent a large, reputable firm, like Microsoft, calls their potential victim and tells them that their computer has been identified as having been infected with several viruses.

Alternatively, the user gets a web page that pops up fullscreen, front-and-center, claiming that a virus or even several viruses have been detected on their computer. Both the webpage and the phone call can contain a threat to disable the user’s computer to prevent further spreading of the infection.

The webpage will not have the option to close it like a normal web browser window, even though it is only a web page. It is possible to close the page, but it takes a bit of tech know-how. This provides a bit of incentive for the unsuspecting victim to call the tech support number on the page.

Common tech support scam tactics

To legitimize their claim, a phone tech may use a few different tactics, which can include directing users to Windows Event Viewer, or claiming a fake customer service agent number.

These fake techs can also use various other technical tools built into Windows to trick their potential victim into believing that their computer is in need of support, or by directing users to install desktop sharing software to gain access to a victims’ computer and plant malicious files on the system.

They may even go so far as to threaten to have the user's computer disabled so as to prevent the spread of infection.

To prove their point, the fake tech may lead the user through the steps to access the Windows Event Viewer logs, the system monitor, the system's list of available services or any other technical tool that most users have never seen or even heard of:

  • Any errors in the log files will be used to prove that the operating system has been compromised by viruses
  • The peaks and valleys of the system's performance monitor are compared to an ECG of a human having a heart attack
  • Any services that are not running are described as infected or disabled due to infection
  • Many other technical tools built into the OS can be exploited by a scammer to convince a user that their system is infected
  • Even some of the standard features of the operating system can be used to convince a user that there are problems with their computer

The scammer may also walk the victim through steps intended to access the victim’s computer. This can include asking the victim to open a web page to download TeamView or LogMeIn’s GoToAssist desktop sharing software. From there, the scammer often asks to gain remote control of the computer.

Who's getting hit the hardest by tech support scams?

In the US, residents in Florida, California, New York and Texas appear to be the hardest hit by tech support scams.

windows tech support scams google trends states
Source: Google

Based on what we know about consumer behavior (that nearly half of all consumers impacted by these scams use search engines to seek out more information), Google Trends data appears to indicate that most other states are marginally impacted by comparison.

Worldwide, numerous countries are getting scam calls, but most individuals who receive them don't lose money to them. According to the 2018 Microsoft study on tech support scams, Japanese consumers were the least likely to lose money after receiving a scam attempt, while Indian consumers were the most likely to find themselves on the losing end.

windows tech support scams microsoft data
Source: Microsoft

Overall, tech support scams both in the US and worldwide appear to be on the decline, both in terms of how many get through to potential victims, and how many are ultimately successful at finalizing a payment.

Remote access

Once baited, the tech gets the user to download and install a remote access program like LogMeIn or TeamViewer. The tech then uses the same program on their computer to gain access to the user’s system, taking control of the computer remotely. The tech then has free reign to do as he wants. Users have reported infection by viruses, detection of keyloggers, trojans, worms, and even ransomware. As soon as the tech finishes, he demands payment for the “service” to the tune of anywhere from $100 to $600. Of course, once they have your credit or debit card information, they can, and often do, charge whatever they feel like charging, possibly multiple times.

The tech can then reconfigure the remote access software to automatically accept an incoming connection, allowing the fraudster to access that computer whenever they want. They can, and usually do, copy and install some files from their own computer to the victim’s computer containing all sorts of malware

  • Keyloggers are programs that record every click of the mouse, what was clicked on and every keystroke on the keyboard. These records are then uploaded to a server of the attacker’s choosing at regular intervals
  • Worms have also been installed by these fraudsters with their own nasty surprises for unsuspecting users. A worm is a type of virus that is self replicating. While it may not do as much harm, it usually eats up all of the available network bandwidth in the process of replicating itself to all of the computers that are connected to the infected machine.
  • They have also been known to install ransomware on their victims’ computers to extend their potential income from each and every tech support session. Ransomware encrypts all of the data on a device and demands ransom from the victim in exchange for a password to unencrypt it

One other side effect is the potential for identity theft. Like so many other types of scams, the attacker is after not just money, but saleable goods as well. The installation of a key logger on a computer allows them to see anything that is typed into the keyboard or anything that the mouse clicks on. If the user then clicks on a bookmark to their bank’s online banking website types in their username and password, that information is transmitted via the keylogger program to the fraudster, without the user ever knowing about it until it’s too late.

How to tell when it's a tech support scam

There are notable warning signs that exist that can help indicate when a webpage, pop-up, email, or phone call is a Microsoft tech support scam.

For scams that start with a phone call:

  • Microsoft and most other tech companies do not initiate tech support phone calls
  • Most tech scam calls come in with a robotic voice and leave a voicemail with a number for you to call back
  • Many calls now use neighbor spoofing methods that mimic a local number to get you to pick up. The call-back number will likely be different than the number from which the call was received

For tech support scams that start with a pop-up, webpage, or website redirect:

  • The URL for the webpage will likely be composed of gibberish or just numbers
  • The page may  automatically enter full-screen mode and block your access to your toolbar
  • There may be a computer-generated audio file that plays in the background of the webpage or pop-up, either with a warning tone, or an automated voice that warns of pornographic spyware and/or malware, hackers, or other threats. It may also warn you that your computer will be disabled and your IP reported to authorities if you close the window before calling their tech support number. Here's one such page we found below:

tech support scams scammer.info

The computer-generated background audio on this page stated the following:

Microsoft Spyware Alert.

Pornographic spyware/riskware detected.

Error number 0-80072EE7.

Your computer has alerted us that it is infected with a pornographic spyware or riskware. This spyware is sending your financial details, credit card details, Facebook logins and personal details to an unknown IP remotely.  Please call us immediately on the toll-free number listed so that our support engineers can walk you through the removal process over the phone.

If you close this page before calling us, we will be forced to disable your computer to prevent further damage to our network and will send a copy of this report to the concerned authorities to raise a complaint against your IP address.

  • The page or pop-up may attempt to automatically download malware onto your system or may try to prevent you from closing the page altogether

tech support scams malware file download

  • The page will always contain a phone number to call, but may also have a box for you to enter your Microsoft product or registration key, which the scammers could use to try to steal your legally-purchased copy of Microsoft Windows

For tech support scams that start with an email:

  • Most will be filtered to your spam email folder
  • Those that make it through to your email may not come from a "tech support agent", but could be pretending to come from a legitimate website, such as PayPal or a shopping site. Some may even sail past spam filters by abusing weak account validation security on legitimate websites
  • The email may state that a virus or cyber attack has been detected, or may lead you to click on a suspicious link to a phishing site similar to one mentioned above
  • Any links in the email will not match the link text
  • The sender name will likely not match the email address

Ultimately, whether contact is initiated via a spam call, email, or website page/pop-up, Microsoft Windows tech support scammers seek to get you on the phone and use verbal scare tactics to persuade you that your computer is infected, that your personal information and financial details are vulnerable, and that you need their technical assistance to remove the infection or network infiltration.

Microsoft does not operate tech support in this manner. If you run into a webpage warning of a computer hack or infiltration on your network, close the page and immediately run a virus scan on your computer. If you receive a phone call from Microsoft tech support, ignore it, and report the number to the FTC(US), CRTC (Canada), or ICO (UK).

For official Microsoft tech support questions, use the company's online tech support system.

After dozens of tech support scam calls, here's what we found

Tech support scammers vary in their methodology. Comparitech spent several months calling dozens of scam numbers. While most numbers failed to reach a target (the growing popularity of scambaiting has resulted in hundreds of netizens working around the clock to shut these scams down as soon as they arise), many numbers we called did result in a successful hit. Several also produced an extended phone interaction, revealing valuable information regarding how these scams operate.

windows tech support scam

When we successfully connected to tech support scammers, we pretended to be concerned and hapless computer users. We allowed the scammers to walk us through the scam up until they either determined we weren't biting fast enough, until they gave us the money pitch, or until they figured out we were actually scamming them into giving away their trade secrets and wasting their time.

What we found is that most (but not all) tech support scammers use two methods:

  • The scammer will claim your computer has a virus infection that needs to be cleaned (sometimes true if the scammer intentionally infected your computer)
  • The scammer will claim your network has been hacked and that the hackers' access to your computer and network needs to be removed

Scammers did not always try to gain remote access to our computer as part of the scam. In some instances, they simply claimed to be checking our computer's network connection after gathering basic information about the computer we used, put us on hold for a few minutes, and then stated what they believed to be the problem and the solution.

In every situation, Comparitech found tech support scammers gave us a significant amount of false information, to include:

  • An almost certainly fake name often suited to the country where the scam is targeting (such as a European- or Western-sounding name for American targets)
  • An assumed employee ID number
  • A fake support ticket number
  • False information about the problem that exists on your computer or network
  • Misleading information about the scammer's location
  • Misleading information about the effectiveness of other malware removal tools, such as Windows Defender
  • False information about why payment is necessary

Additionally, these scammers did not request payment via credit card during any of our interactions. Instead, they asked us to drive to our local grocery or convenience store and purchase a gift card (including Google Play Store gift cards) carrying the amount required to fix the problem.

The amounts requested varied but always added up to several hundred dollars per fix. In one instance, we were told our network was under attack by a dozen separate hackers, and it would cost us $50 per cyber attacker to fix the issue.

Importantly, the tech support scammers always requested payment before making any changes or "fixes". As one might expect, paying the requested amount will likely result in the call ending immediately.

That said, if a scammer sees an opportunity beyond just a digital payment, they will take it. If a tech support scammer can glean personal information from you, they will. If they can extract financial information, passwords, Social Security Numbers, and other personal information, they will, and will likely keep the call going as far as possible if they see an opening. This holds true for other types of tech support scams, such as BT tech support scams currently plaguing the UK.

Legitimate tools are being used to gain remote access to victims

One of the most striking details we uncovered has to do with how these scammers gain remote access to computers. Tech support scammers who do gain remote access to a computer will do so by using legitimate websites and applications instead of relying on malicious software to accomplish the mission.

We found the scammers we interacted with tended to prefer a legitimate service called FastSupport.

Side note: Although none of the scammers we reached used it, TeamViewer is also a known tool tech support scammers may use to gain remote access. One Reddit user described how his grandmother's computer was overtaken from a tech support scammer who used TeamViewer.

tech support scams teamviewer
Source: Reddit

FastSupport is powered by LogMeIn's GoToAssist (now RescueAssist) software and allows one computer to remotely connect to another over an internet connection. By using this legitimate website, Microsoft tech support scammers can have the appearance of running a legitimate operation.

The service has a reporting tool for abuse of its system that supposedly tracks the support key the scammers are using. However, it's unclear how effective this reporting tool is at stopping these types of scams.

microsoft tech support scam
Source: LogMeIn FastSupport

Comparitech would like to reiterate: LogMeIn and its FastSupport site, as well as TeamViewer, are fully legitimate companies whose hands are clean in the use of their software for criminal purposes. Both companies maintain pages warning users of tech support scams, but at present, both have a fairly open usage model for their software that makes it easy for scammers to abuse these systems.

How do scammers use LogMeIn's FastSupport?

LogMeIn is mostly unable to stop its FastSupport system from being used in tech support scams due to how it's operating the service. All a scammer needs to do is go to the GoToAssist website and quickly create an account using the 7-day free trial.

The only barrier to gaining access as a FastSupport user is the requirement of a business email address to sign up (e.g., it does not accept free email services, such as @gmail.com or @yahoo.com). A unique email address can easily and cheaply be created using a number of different email service providers, often with a free trial.

Within minutes, Comparitech was able to create a GoToAssist account and was immediately issued a support key. Scammers use that support key to direct victims to FastSupport. After entering the support key into FastSupport, the website prompts the user to download the remote login software. From there, the scammer has unfettered access to a victim's computer until the victim closes the connection.

tech support scams
Source: LogMeIn GoToAssist

As an example, I used this process to gain remote controlled access to my own computer (as it were, a trippy experience similar to a mirror-in-mirror reflection).

windows tech support scam gotoassist fastsupport remote connection

Once a scam operation has started, tech support scammers will attempt to make the remote login look more official and more technical by directing users to access Internet Explorer using the Windows Run Command box.

Here's the simple (and completely unnecessary) method they gave us:

    • Hit the Windows Key+R
    • In the Run command box and then type "/iexplore fastsupport.com"

From there, scammers who gained remote access to our virtual machine asked us to input a name and the support key. The webpage immediately redirects to a download which may automatically download the LogMeIn software. The software also asks the victim to give remote control of the system to the scammer, which is important as this is what allows scammers to make covert changes to a victim's machine.

Notably, GoToAssist gives the option for remote viewing. However, scammers prefer the option to take full control over a computer, and will always prompt victims to allow this level of control.

On the phone, the tech support scammer always guided us to say "yes" to everything happening without giving any information as to what we were agreeing to. We were never given an explanation regarding what the scammer was doing before and after remote access was given.

windows tech support logmein gotoassist remote connection
Source: LogMeIn GoToAssist

Once the scammer has remote access to your computer, he or she can take several routes. While we did not personally find any scammers who tried to install anything on our honeypot system after gaining control of it, it's important to note that this does happen and is one of many scam operations that exist.

According to this scam baiter, one tech support scam installed a fake and malicious file on his/her computer, then requested payment to remove it. Source: Scammer.info

In one case, after gaining remote access to our virtual machine, the scammer opened an instance of Notepad and simply typed in her credentials and an "assessment" of the problem:

scam bait windows tech support scam remote connection

She followed that with typing in the cost to "fix" the problem for me.

scam bait tech support scam remote connection

Others who gain remote access to the system may make it so that you cannot see what they are doing to your system, and may run an assessment on your system to try to make surreptitious changes to it (such as by installing keyloggers or other tracking malware), or may try to determine if you are who you say you are.

As we continued to run our scam bait operation over a few months, we increasingly discovered that tech support scammers are growing wary and suspicious of scambaiting, and have ultimately become quicker to hang up or question anything that looks suspicious on their end.

For example, in one instance, we were asked to prove our location by honking a car horn, and in another, we were questioned why the computer's details we gave didn't match what the scammer found after he gained remote access. Ultimately, we found scammers tend to hang up rather quickly if they feel the scam won't bear any fruit, which can happen within seconds of the call.

What to do when you've been scammed

If you have been scammed in this manner, all is not lost. But you do need to begin your damage control right away to minimize the amount of havoc the scammers can wreak in your life and on your system. First and foremost, disconnect your PC from the internet. Shut it down if you want, but make sure that it cannot access the internet when it boots up.

If you gave the scammer your credit card or financial information then you need to call your bank. Let your bank know that you’ve been conned and you would like to go over your recent charges, starting from the day you were scammed so that the bank can reverse any charges from the scammers. You might need to report the card as stolen depending on how much information you gave them. Talk it over with your banker and heed their advice.

If you have an attorney, let them know what's going on as well. Cleaning up identity theft can be a struggle without legal counsel. You might end up getting your local law enforcement and maybe the FBI involved in your case. Get as much help as you can with this process. If you don't yet have an attorney, you would do well to at least consult with one. The amount of legal legwork that goes into resolving a case of identity theft more than justifies the cost of retaining legal counsel.

To get your computer cleaned up, start with it disconnected from the internet. If you have an antivirus program already installed, run a full system scan, removing anything that it flags as a threat. Go into the control panel’s programs utility and remove the remote access software that the scammer had you install. While you’re in there, look for anything that you don’t recognize installing or that looks suspicious. If the date that it was installed or last accessed is the same date as your session with the fake tech, uninstall it. Finally, use another computer and a USB thumb drive to download another antivirus or antimalware program. Use the thumb drive to copy it from the other computer over to your compromised computer. Install and run it just in case your antivirus software might have missed something. Consider running a system restore to a restore point prior to installing the remote access software.

One of the big myths about anti-virus software is that your computer is safe from viruses when you run anti-virus software. The truth is that running antivirus software does make your computer safer, but nothing can make it 100 percent safe from infection. A new virus needs to be identified, analyzed and put into the anti-virus definition files before the anti-virus software can protect against it. The same applies to any other form of malware. The newer the virus, the lower the odds of anyone antivirus program recognizing it as harmful to your computer.

Assuming your computer is running fine at this point, it should be safe to reconnect it to the internet, update your antivirus software and finish your damage control. You will want to start changing all of your online passwords for everything from banking to email and social media accounts. Everything. Assume that the fake tech copied your entire list of online accounts with usernames and passwords from your web browser. Once you’ve taken care of all of that, you can sit back and keep a wary eye on your computer and your various online accounts.

As always, you will want to keep backups of all of your important files, run regular antivirus and antimalware scans and keep your operating system updated with all of the latest security updates. Use unique, complex passwords, especially for critical accounts like online banking, PayPal, eBay and any other site that can have a direct affect on your finances. That can get a bit taxing, so you might want to look into a good password manager.

Technical know how

For those of you who are interested in seeing some of the tools these con artists use, here are some of the more common ones, broken down by operating system:

Windows 7

Event Viewer

Possibly the tool most used by IT professionals and scammers is the Windows Event Viewer. Windows is setnup to keep track of just about everything that happens by logging different computer events. Below is just one set of instructions for accessing these logs. There are other ways to get to the same place, though.


  1. Click on the Windows Flag button at the bottom left of your screen to get the Start menu
  2. Right click on "Computer" in the column on the right of the menu
  3. Click on "Manage" to open the Computer Management tool
  4. In the column on the left, click on the small arrow next to "Event Viewer" to expand the list of logs
  5. The easiest one of these logs to exploit is the Application log, simply because it will normally have the most errors, so take a look at it first by clicking on "Application" in the left-hand column
  6. The right-hand side of the window will now populate with the list of event messages in the top and the details of the selected event in the bottom
Windows 7 System Log

Most of the events listed herein will be informative little notes that get written to the log all the time. However, there will be some errors recorded as well, and that's OK. Most of the time, these errors do not affect the operation of your computer at all. The errors are easily identified by the red stop sign shaped icon with an "X" in the middle of it.

Feel free to skim through the other logs as well. There are a few others dealing with the setup and installation of new device drivers, security audits for keeping track of successful and unsuccessful logins as well as logs for recording various system events like the starting and stopping of services.

Running Services

The Windows operating system relies on a bunch of different programs running in the background. Each of these programs provides a different service to the operating system, allowing it to do it's job, from maintaining the computer's internet connection to keeping the hard drive spinning.

However, a whole bunch of services may not be needed for your computer to properly work. From remote login capability to database servers, there are a whole bunch of things that most computers simply aren't being used for. The services are there in case they are needed, just not running.

To see the list of all the services on the computer, simply follow the above steps one through three to access the Computer Management tool. In the column on the left, click on "Services" to populate the right side of the window with the list of services.

The right-hand panel will contain the full list, sorted alphabetically by name. There will also be a description, status, startup type and login for each service.

Task Manager

Your computer does what it does because it has certain resources available to it. They are:

  • CPU – Central Processing Unit – This is what does all of the work of making sense of the operating system, device drivers and programs that are installed on your computer. It has its own small chunk of memory to hold things in while it works on them
  • RAM – Random Access Memory – This is where a big chunk of the currently running programs are stored, temporarily, while the CPU does its thing
  • Hard drive – This device is where everything lives on the computer. The operating system, all of the programs installed on the computer, your family vacation pictures and everything else

When your computer starts to run slow, it helps to know which of these resources is causing the lag. The task manager gives you a real-time view of how these resources are being utilized.

In Windows 7, press three keyboard keys at the same time: CTRL, ALT, and Delete. The menu that comes up will have "Start Task Manager" at the bottom of the list. Click on it.

The first tab shows what programs are running and what their current status is. If any of them have the status of "Not Responding" it means that the program is either very busy at the moment or it has crashed. To shut down any of them simply click on the program you wish to shut down and then click the "End Task" button at the bottom of the window.

The Processes tab lists each and every currently running program that allows Windows to function. Again, you have the ability to shut down individual processes, but as these are Windows-specific processes, it is inadvisable. This is one area that fake techs like to manipulate because shutting down crucial processes can make the computer behave erratically.

The same applies to the Services tab. This is a list of all of the currently running services and the resources they are using. As was explained earlier, not all of the services built into the Windows operating system are needed, so many won't be shown as running.

The Performance tab shows some graphs with usage levels of each of your CPU's cores and the computer's memory. As many as eight cores can be shown, each with their own graph. These graphs will spike each time that core performs any work. Seeing lots of spikes and valleys is perfectly normal. The only thing that is harmful to the computer is if one or more core's graph is pegged at 100 percent for several minutes.

The memory graph won't spike nearly as much as the CPUs, but rather will maintain a steady percentage of usage. The more programs you have running, the more memory is used. The more tabs you have open in your web browser, the more memory is needed to keep those web pages current. Again, the only danger sign is if the memory is pegged at 100 percent usage for any period of time, even if you close actively running programs.

Closing a program with the keyboard

At the beginning of this article, there was mention of a web page that doesn't close easily. Believe it or not, this is a feature of the web browser that makes it full screen and removes the close, minimize and maximize buttons. To get rid of one of these pages, hold down the ALT key on your keyboard (it's beside the space bar) and hit the F4 key in the top row. An alternative is to use the Task Manager described above to shut down the web browser with the "End Task" button.

Note that some laptop keyboards use the F keys for other purposes, such as volume control and screen brightness. In this case, you might need to press the Function key ("Fn" or something similar) in addition to Alt+F4.

Manipulating the command prompt

The command prompt, or command line, has been around since the first personal computers hit the market back in the 1980s. However, the only people that make use of it these days are IT people, both real and fake. Even the simplest commands in this tool can be used to con people into believing that their system has been heavily infected.

To access it, click the Windows Flag at the lower left of your screen and type three letters into the search box at the bottom of the menu: "cmd". As you type, the menu will change from your normal selection of programs to the search results. The top of the list will be "Command Prompt", so click on that.

The command prompt is keyboard-centric so ignore the mouse for the following commands. Type each command as displayed, without the quotes, to get the output that is described next to the command. You will need to press "Enter" after typing each command to activate its functionality:

  • "dir /s" – The command "dir" by itself simply lists the contents of the current directory or folder. Adding the "/s" switch to that command makes it list the contents of the current directory and the contents of all the folders inside that directory. A fake tech will claim that this command lists infected files on the computer's hard drive
  • "color 4" – This command changes the color of the text in the command prompt window to red. A fake tech will claim that the red text is an indication of the operating system or their software having detected a massive infection
  • "Ping" – Ping is quite often used to check a computer's connection to other computers, whether they be on the internet or a local area network. The numbers that follow the ping command are the digital address, or IP address, of the computer that you are trying to reach. A fake tech will put in an address that is most likely not a valid address in order to get an error from the user's computer. That error is then used to describe a problem that doesn't really exist
  • "netstat -an" – This command displays the current network status of the computer. Specifically, it lists all of the currently open network ports and their status. The port is just a number, but the status can be set to "listening", "established" or "closed". A fake tech will describe the status of "listening" as a hacker listening to everything your computer is doing

There may be other commands that these fake tech support people will use, simply because the command prompt is a powerful tool for running system diagnostics and various cleanup utilities. However, initial detection of viruses and malware is best left in the hands of programs that are running full time in the background, not one-off commands accessed through the command prompt.

Windows 8, 8.1 and 10

Event Viewer

windows event viewer
To get into the Event Viewer in the newer versions of Windows is a bit easier. From the desktop, simply right click on the Windows flag at the bottom left of the screen and select "Event Viewer" from the menu that comes up. Once it opens, you can click the arrow icon next to "Windows Logs" to see the list of log files. Clicking on any one of them shows the list of log messages on the top of the right side of the window. Clicking on any log message in that list displays the details of the event below the list.

Just like in previous versions of Windows, there are a few different logs for the different areas that Windows keeps logs for.

  • Applications, or the programs that are installed on the computer
  • Security log for tracking logins
  • The Setup log is mostly for recording what happened during the initial setup of the operating system and all of the device drivers
  • There is a System log for keeping track of the operating system's service related events
  • To record forwarded events, the computer has to be receiving event messages from another computer for remote monitoring purposes

Running Services

windows services
You may have noticed in the above section that when you right click that Windows flag, the menu has quite a few options. One of the more robust tools is the "Computer Management" option near the middle of the list.

The Computer Management window contains the event viewer, the device manager, the list of services and a few other important tech tools. There are way too many to cover in just this one article, so click on the Services option in the left-hand pane.

Just like in past versions of Windows, this list shows all of the available services listed alphabetically by name, a description of what the service does, it's current running status, it's startup type and the user login that it runs under.

Many of these will not be started as they are not needed for every PC. This is perfectly normal and nothing to panic about.

Task Manager

task manager windows 10
Accessing the task manager requires a simple right click on the Windows flag at the bottom left of your screen. The menu lists "Task Manager" near the bottom of the list. Clicking on that option gives you a window with up to seven tabs, each relating to the currently running programs and the resources in use by those resources.

  1. Processes – This tab gives you a list of currently running programs and what resources each one is using
  2. Performance – Here you see the graphs of utilization for each of the computer's resources
  3. App History – The total amount of computer resources used by each program is listed on this tab
  4. Startup – Each program is listed here along with it's startup settings. Most won't start when the computer does so will have a startup impact of "None"
  5. Users – Since the introduction of Windows 2000, PCs have had the ability to have more than one user logged in at a time. This tab shows what resources are being used by each of those users
  6. Details – This lists each of the currently running Windows processes, what user account the process is running under, how much attention it's getting from the CPU, how much memory it's using and a brief description of what the process is or what it does
  7. Services – Another place to view the currently running services along with what resources are being used by those services

The graphs in the Performance tab are supposed to have peaks and valleys. Those are simply signs of the computer doing its job. The only thing here that should be cause for concern is if the CPU or the memory are pegged at 100 percent for more than a couple minutes.

Keyboard command to close a running program

Just like in past versions of Windows, holding down the ALT key and pressing the F4 key in the top row of the keyboard is a keyboard shortcut to close the active program. If you run into one of those annoying web pages that fill the screen and doesn't have a close button, use this shortcut to get it out of your face. Alternatively, you could shut down the web browser using the Task Manager described above.

Using the Command Prompt

When Microsoft introduced the Windows 8 metro style, a lot of the old ways of doing things became a little difficult to find. Then again, some became really easy. If you simply start typing the letters "cmd", the search tool automatically comes up and you will see "Command Prompt" in the search results.

In Windows 10 you can use the key combination of the Windows flag key on your keyboard along with the letter "x". The menu that pops up will have "Command Prompt" as one of the options.

The command prompt is a very keyboard-centric tool. Type each of the following commands as displayed, without the quotes, to get the output that is described next to the command. You will need to press "Enter" after each command to activate its functionality:

  • "dir /s" – The command "dir" by itself simply lists the contents of the current directory or folder. Adding the "/s" switch to that command makes it list the contents of the current directory and the contents of all the folders inside that directory. A fake tech will claim that this command lists infected files on the computer's hard drive
  • "color 4" – This command changes the color of the text in the command prompt window to red. A fake tech will claim that the red text is an indication of the operating system or their software having detected a massive infection
  • "Ping" – Ping is quite often used to check a computer's connection to other computers, whether they be on the internet or a local area network. The numbers that follow the ping command are the digital address, or IP address, of the computer that you are trying t reach. A fake tech will put in an address that is most likely not a valid address in order to get an error from the user's computer. That error is then used to describe a problem that doesn't really exist
  • "netstat -an" – This command displays the current network status of the computer. Specifically, it lists all of the currently open network ports and their status. The port is just a number, but the status can be set to "listening", "established" or "closed". A fake tech will describe the status of "listening" as a hacker listening to everything your computer is doing


Simply put, if you did not initiate the tech support call due to a legitimate problem that you detected, then it’s a scam. If someone contacts you claiming to have detected a problem with your computer, either through a phone call or a webpage, you can safely ignore them and continue with your day.

The only companies that make their living this way are scammers. No legitimate company makes their money by selling tech support services to random people on the internet or over the phone. Legitimate tech support companies sell their support services via contracts, mostly to other companies, on either a monthly allotment of hours or on an on-call basis. Currently, the technology to identify an infected personal computer over the internet does not exist.

Houston, we have a headset…” by Robert Murphy licensed under CC BY-SA 2.0

L'article Common tech support scams: How to identify and avoid them est apparu en premier sur Comparitech.