Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Recent comment in this post
Clio Conrad
Key strokes have some of the parts that were possible through subscriber on this article you need to have some access on this. I w... Read More
Thursday, 11 July 2019 23:14
Continue reading
1 Comment

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Recent comment in this post
Ashton Brewer
Victims of the heart attack are found here or the comfort use of the offs for people. It is sorted for the movement of the https:/... Read More
Friday, 09 August 2019 00:12
Continue reading
1 Comment

Passwords Are on the Way Out. What’s Next?

Passwords Are on the Way Out. What’s Next?

Passwords are a critical security component of any online account. In many cases, they’re the fine line of defense against the horde of threats that exist on the Internet. The problem that many users have with passwords, however, is that good passwords are difficult to remember, and on their own, aren’t necessarily the most secure option. So, how can you make passwords both easier to use and more secure?

Continue reading
0 Comments

Why Small Businesses Need to Think Big When it Comes to Network Security

Why Small Businesses Need to Think Big When it Comes to Network Security

There are benefits to being a small business. Being small provides all sorts of flexibility, including the ability to make decisions quickly and without having to go through so many hoops. Plus, you have a smaller workforce, which makes for a more personal experience. However, this also leads to a rather unfortunate side-effect of believing that you’re immune to being hacked.

Recent comment in this post
Jamie Dethridge
Most of the hackers are attack the small business because they don’t have secure network and easily hacked. When I will make this ... Read More
Thursday, 08 August 2019 23:38
Continue reading
1 Comment

Sign Up for Our Newsletter

captcharefresh

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Workplace Tips Windows 10 Miscellaneous Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips Communication IT Support VoIP Business Management Network Data Quick Tips Smartphone Email Virtualization Holiday Server Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Apps Disaster Recovery Office Alert Chrome Small Business Android Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office Social Application WiFi Facebook Identity Theft Best Practice Antivirus Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Law Enforcement Office Tips Analytics History Search Gmail Password Saving Time Browser Current Events Lithium-ion battery Government Printer Computers Disaster Telephone Systems Humor Avoiding Downtime Phone System Router Recovery Apple Encryption Network Security Automation Remote Monitoring Tech Support Gadgets Smartphones Users USB intranet Net Neutrality Firewall iPhone Laptop Collaboration Money Wireless Data Management Streaming Media Hard Drives Education Maintenance communications User Error Fraud Work/Life Balance Retail Virtual Reality BDR Wi-Fi Google Drive Entertainment DDoS Flexibility Benefits Mobile Office VPN Cybercrime App Risk Management IT Solutions Office 365 Private Cloud Managing Stress Wireless Technology IT Consultant Fax Server Outlook Printer Server Data Loss Update Personal Information Wearable Technology Marketing Budget Administration Proactive IT Shortcut Business Intelligence Transportation Managed IT Services Content Filtering Online Currency Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Customer Service Cost Management Telephony Data storage Hacker Human Resources Near Field Communication PDF Legal OneDrive Website RAM Uninterrupted Power Supply Keyboard Bring Your Own Device Ebay Text Messaging Paperless Office Computer Accessories Bloatware Amazon Workplace Blogging CPU Internet of Things Politics Applications Hiring/Firing IT consulting Artificial Intelligence Distributed Denial of Service Scalability Miscelllaneous Mouse Smart Phones Slow Sports Experience Touchpad Branding eWaste How To HIPAA Network Congestion Travel Windows 8 Music Operating Sysytem Regulations WIndows 7 ISP Television Storage Two-factor Authentication Vendor Management 3D Printing Files Books Bluetooth Trending Black Market Customer Relationship Management Computing Chromecast Electronic Medical Records Cameras SharePoint HaaS User Instant Messaging Data Theft Excel Prodcuctivity Administrator Safety Reputation Teamwork Best Available Online Backup Battery CloudSync Presentation Access Emergency Meetings Programming Hosted Solution Automobile Compliance Science Display Cleaning End of Support Running Cable Phishing Worker Commute Inbound Marketing Robot Save Time Emails Networking Audit Advertising Video Games Twitter OneNote

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code