Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Find a Way to Take Over Smartphones Using Google Now and Siri

b2ap3_thumbnail_wireless_hacking_400.jpgMobile exploits are just as common as those found on legitimate operating systems like Windows, but many people just don’t understand this simple fact. However, this hasn’t stopped some folks from being cautious when using their devices. The latest exploit making the rounds, which takes advantage of the iPhone’s Siri or Android’s Google Now, will leave you speechless.

Continue reading

Tip of the Week: How to Remotely Wipe Your iPhone or iPad

b2ap3_thumbnail_wipe_clean_ios_400.jpgWith the new iPhone 6 release just a few short weeks ago, many users are excited to ditch their old devices and get the flexible new piece of hardware. Unfortunately, these users might not take into account that their phones could potentially hold private information which should be deleted before forking over the device.

Continue reading

Apple’s iPhone 6 and iPhone 6+ Bend Expectations

b2ap3_thumbnail_iphone_6_and_6_plus_400.jpgApple is back with another iPhone! The Silicon Valley-based hardware and software manufacturer has released the new versions of their extremely popular iPhone series of devices. The two-headed approach that Apple took with their second incantation of the iPhone 5 (the 5s and 5c), is replicated this time out as well. After being surpassed by Samsung over the past two years, does the iPhone 6 and its larger version, the iPhone 6+, have what it takes to get Apple back on top?

Continue reading

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Computing IT Services Health Mobile Devices User Tips Communication IT Support VoIP Business Management Email Virtualization Holiday Server Network Data Quick Tips Smartphone Office Apps Disaster Recovery Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Android Chrome Small Business Mobility Managed Service Provider Microsoft Office Social Application WiFi Facebook Identity Theft Best Practice Employer-Employee Relationship Antivirus Ransomware The Internet of Things Big Data Passwords Law Enforcement Office Tips Password Analytics History Gmail Search Saving Time Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Remote Monitoring Tech Support Gadgets Smartphones Users USB intranet Net Neutrality Firewall iPhone Collaboration Laptop Wireless Data Management Money Streaming Media communications Hard Drives Education Maintenance Work/Life Balance User Error Telephone Systems Fraud Computers Disaster Humor Avoiding Downtime Phone System Recovery Router Network Security Apple Automation Encryption App IT Solutions Managing Stress Private Cloud Wireless Technology Update IT Consultant Fax Server Outlook Personal Information Printer Server Data Loss Budget Wearable Technology Marketing Proactive IT Business Intelligence Transportation Administration Shortcut Managed IT Services Internet Exlporer Online Currency Biometrics Content Filtering Social Engineering Telephony Customer Service Point of Sale PowerPoint Cost Management Wi-Fi Virtual Reality Google Drive Retail DDoS Flexibility BDR Entertainment Benefits Mobile Office VPN Cybercrime Risk Management Office 365 Regulations Files Books Two-factor Authentication Bluetooth ISP Trending Black Market Vendor Management 3D Printing Chromecast Electronic Medical Records Customer Relationship Management SharePoint HaaS User Instant Messaging Computing Excel Cameras Administrator Safety Data Theft Teamwork Best Available Reputation Battery Prodcuctivity Presentation Access Emergency CloudSync Meetings Online Backup Hosted Solution Automobile Science Cleaning Compliance Running Cable Programming Phishing End of Support Worker Commute Display Robot Save Time Networking Inbound Marketing Video Games Advertising Emails Audit Near Field Communication Data storage Hacker Human Resources Twitter Legal OneNote PDF Uninterrupted Power Supply Keyboard Text Messaging OneDrive Computer Accessories Website RAM Internet of Things Politics Bring Your Own Device Bloatware Ebay IT consulting Applications Hiring/Firing Paperless Office Artificial Intelligence Distributed Denial of Service Scalability Amazon Workplace Mouse Blogging CPU Sports Experience Branding Touchpad Miscelllaneous eWaste How To Smart Phones Network Congestion Slow Music WIndows 7 Operating Sysytem HIPAA Travel Television Storage Windows 8

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...