Category: Uncategorized

Laptop Swelling

It’s uncommon to see, but laptops can get swollen. If you ever think your laptop is swelling, then you need to address a problem with its battery, stat!

laptop swelling

Usually, the laptop’s battery is a boring little brick that stays in one shape. But a manufacturing defect, extreme age or abuse could cause acid leakage, inside the battery’s main casing. If this happens, the rupture is usually still contained, but that boring brick will change shape. It may start to resemble a wallet or a beanbag.

If this ever happens to you, you’ll start to notice that your laptop is warping. Perhaps the keyboard is arcing upwards, or the sides of the laptop are starting to gap. You may have trouble closing the lid because things just don’t fit anymore. And it could be that the distended tech feels warmer than usual.

Again: this is not common, but if you notice this, you do need to take prompt action. Ignoring a turgid laptop is a risk to your computer’s lifespan and your personal safety! Shut off the laptop and disconnect the power cord. Take your computer to a repair store, and they’ll know how to safely replace your battery.

Alternatively, if the laptop is no longer needed, you can take it to a computer recycler.

The Girl Scout Cookie Scam

There’s always another scam just around the corner. And with these jokers in Scamdinavia, nothing is sacred. Please watch out for the Girl Scout Cookie Scam, circulating on Facebook and possibly other social media.

The Scam

You might already know this scam, but it’s still worth broadcasting. Because the Girl Scout brand is so endearing and trustworthy, some people are getting fooled by this nonsense. Check out these examples of the scam I’ve collected from Facebook:

Let me be clear: These posts are not legitimate, not endorsed by The Girl Scouts of America and not created by anyone in this country. People in Kenya or Pakistan have created sock puppet accounts on Facebook, stolen a bunch of photos with kids and cookies in them, and are simply posing and fishing for quick money.

Anyone who messages these schemers will be asked to pay for their cookies using Paypay, Venmo, CashApp, etc.. The poster collects the money and pretends to take down the address, and asks the victim to wait a couple of weeks for delivery. When the delivery day passes and no cookies arrive, the crook will be long gone.

What’s Scammy and What’s Legit?

Once you know what to look for, it’s easy to get your Girl Scout Cookies from a safe source. Here’s what to look out for:

  • A legitimate Girl Scout Cookie post will offer specific details, like:
    • A URL to the Cookie Finder, or a personalized website for ordering, beginning with “”
    • The time and location where the kiddos will be setting up to sell their cookies in-person
    • A variety of payment options, and no sense or urgency (pay when the cookies arrive)
  • A scam post will seem fishy, if you take notice:
    • the child’s name or troop is not mentioned
    • the cookie prices are wrong or too low
    • the posting account is no one you know and you have no mutual Facebook friends with them
    • the post has commenting turned off

If you see a scam post on Facebook, report it to the group’s admin or moderator. You can report it to Facebook, too, but they are unlikely to do anything.

For more info on how to get these delicious cookies, check out the Girls Scouts Cookie Program website.

Rogue Chromium Browsers

Everyone is free to choose what web browser to use on their computer. Many people use Edge or Safari, because it came as part of the operating system on the computer. Others opt for Chrome or Firefox. But what is worrisome and worth warning about is the use of rogue Chromium browsers. I hope I can teach you what these are, so you can recognize and avoid these.

Let me clearly state: Google Chrome is a good browser to use. If you use Google Chrome, please continue to do so! Chromium browsers are different. A Chromium browser is essentially a modified version of Chrome that has different abilities or behaviors. Many of these tweaks can lead to harm.

Examples of Rogue Chromium Browsers

The first Chromium browser that spread to average computer users was labeled Chromium, and had a blue-tinted icon, very similar to the classic Google Chrome icon.

rogue chromium browsers

This open-source version of Chrome was meant to be used by developers, programmers and other technical experts. To my eye, it really stands out when I find it on a layperson’s computer, and is often my first clue that I’m going to find other unwanted software…

Wave Browser is an example of a modern-day rogue Chromium browser. It is polished, has a classy logo/icon, and appears to be professional and fast to open. Those who use this may feel right at home, because its menus and behavior closely resemble Google Chrome. I’ll get to the devil in the details, though, in the next section.

OneLaunch is another rogue to watch out for. But this one is easier to spot, as it comes with a special bar that permanently eats up the top half-inch of your screen. OneLaunch will function as well as any other browser, but let me describe more of what’s under the hood here:

Detriments of Using a Rogue Browser

Sketchy Search Engine: These browsers often steer their users into using a modified version of the Yahoo search engine. This engine is not anything I would ever use. It’s been altered to include more ads and paid placement than the usual Yahoo engine. Many of the top results you get from this are promotions, malicious links and phishing sites.

I searched for “Xfinity phone number” in a variety of search engines, just now. Google, Bing, DuckDuckGo all returned solid results and the safe trustworthy phone number for Comcast. also gave me good info. But when I use Onelaunch and WaveBrowser to do the same search, the results were riddled with ads and websites I would never want to visit. I can see this behavior leading some users to scams and false information and phishing websites.

Modified Start Page: When I test these rogues out, I notice the Start Page has been customized, to show a lot of strange things. Some are salacious news articles. Others are gross advertorials about health conditions. And even others are lures to bogus antivirus messages.

Eating Up Screen Real-Estate: Some of these browsers take a lot of liberty with your computer. OneLaunch installs a bar of icons across the top of the computer, and it remains up there, even after you close the browser!

Empty Promises: In some of these browsers, I see them boast that they offer Camera Privacy and better ad-blocking. I just can’t even with this nonsense. People desiring camera privacy simply turn off their camera. Close the shutter on their camera. Disconnect their camera. Slap a Band-Aid over their camera! Whatever your concerns might be about webcam surveillance, you should not be turning to a mystery app to solve them.

Constant Nags: These browsers may have various popups, trying to convince you to set them as your Default Browser, try out their extra products and more.

Who Really Makes These Browsers?: It can be hard to tell who’s behind these programs. I went looking into Wave Browser’s pedigree. It’s created by a company called Wavesor. That turns out to be the trade name for Polarity Technologies. Which is a subsidiary for Genimous Technology, a Chinese firm that has been investigated and criticized by our government officials.

What Else Came With This Program?: These rogue browser are downloaded and installed, often without the computer user understanding how or even when it happened! They can be sneaky like that. And if this app showed up unexpectedly, chances are good that they came with other potentially unwanted programs. I often find other adware to remove when I service computers with rogue browsers on them.

Moving Back to a Mainstream Browser

The good news is that if you want to reverse course and go back to your previous browser, that should be easy. Uninstall the rogue app, and your other browser(s) should still be there. These rogues don’t harm or delete anything from your system.

After that, you may want to run a few scans on the system. There could be some junkware, separate from the browser, that needs to go. Your antivirus is just the first tool to consider. I like to run specific tools, like ADWCleaner or Norton Power Eraser, to look for hidden nasties.

If you are struggling with this cleanup and feel in-over-your-head, please know that I deal with this everyday, and can help you in restoring things. Reach out to me if you feel like your computer is still acting “off”, or if any computer task is “above your paygrade.”

© 2024 BlueScreen Computer

Theme by Anders NorenUp ↑