Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Find a Way to Take Over Smartphones Using Google Now and Siri

b2ap3_thumbnail_wireless_hacking_400.jpgMobile exploits are just as common as those found on legitimate operating systems like Windows, but many people just don’t understand this simple fact. However, this hasn’t stopped some folks from being cautious when using their devices. The latest exploit making the rounds, which takes advantage of the iPhone’s Siri or Android’s Google Now, will leave you speechless.

Continue reading

Tip of the Week: How to Remotely Wipe Your iPhone or iPad

b2ap3_thumbnail_wipe_clean_ios_400.jpgWith the new iPhone 6 release just a few short weeks ago, many users are excited to ditch their old devices and get the flexible new piece of hardware. Unfortunately, these users might not take into account that their phones could potentially hold private information which should be deleted before forking over the device.

Continue reading

Apple’s iPhone 6 and iPhone 6+ Bend Expectations

b2ap3_thumbnail_iphone_6_and_6_plus_400.jpgApple is back with another iPhone! The Silicon Valley-based hardware and software manufacturer has released the new versions of their extremely popular iPhone series of devices. The two-headed approach that Apple took with their second incantation of the iPhone 5 (the 5s and 5c), is replicated this time out as well. After being surpassed by Samsung over the past two years, does the iPhone 6 and its larger version, the iPhone 6+, have what it takes to get Apple back on top?

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Windows 10 Workplace Tips Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication IT Support User Tips Business Management VoIP Email Holiday Server Network Data Quick Tips Virtualization Smartphone Office Going Green Business Continuity Mobile Device Management Save Money Saving Money Remote Computing Operating System Disaster Recovery Apps Social Media Alert Upgrade Android Small Business Chrome Managed Service Provider Mobility WiFi Microsoft Office Identity Theft Employer-Employee Relationship Ransomware Social Facebook Antivirus Application The Internet of Things Big Data Best Practice Passwords Saving Time Lithium-ion battery Analytics History Search Printer Gmail Browser Current Events Government BYOD Information Technology Law Enforcement Spam Office Tips Bandwidth Unified Threat Management Password Hacking Tablet Collaboration Laptop Gadgets communications Smartphones USB Telephone Systems Users Humor Hard Drives Maintenance Fraud Recovery Wireless Streaming Media Network Security Automation Education User Error Work/Life Balance Disaster Computers Encryption Remote Monitoring Avoiding Downtime Phone System Tech Support Router Money Data Management Apple intranet Firewall Net Neutrality iPhone Office 365 Biometrics Social Engineering Wearable Technology Telephony Customer Service Proactive IT Outlook Virtual Reality Google Drive Online Currency Printer Server DDoS Personal Information Benefits Marketing Administration Managed IT Services Content Filtering Cybercrime Risk Management Point of Sale PowerPoint Private Cloud Cost Management Managing Stress VPN Wireless Technology Retail BDR Wi-Fi Entertainment Update Flexibility App Mobile Office Budget IT Consultant Fax Server Shortcut Business Intelligence Transportation Data Loss IT Solutions Internet Exlporer Networking ISP Robot Advertising 3D Printing Online Backup Books Human Resources Black Market Near Field Communication Data storage PDF Electronic Medical Records HaaS Cameras Display Uninterrupted Power Supply Instant Messaging Data Theft Text Messaging Safety Computer Accessories Bloatware Internet of Things Applications Battery IT consulting CloudSync Artificial Intelligence Distributed Denial of Service Emergency Mouse Sports Touchpad Branding Automobile Compliance Programming Website eWaste RAM Cleaning Network Congestion Ebay Operating Sysytem Worker Commute WIndows 7 Inbound Marketing Amazon Audit Blogging Television CPU Save Time Storage Emails Two-factor Authentication Video Games Files Bluetooth Twitter OneNote Smart Phones Trending Slow Hacker Customer Relationship Management Legal Chromecast SharePoint User OneDrive Bring Your Own Device Windows 8 Keyboard Excel Paperless Office Administrator Workplace Reputation Teamwork Politics Best Available Vendor Management Hiring/Firing Scalability Presentation Miscelllaneous Access Meetings Experience Computing Hosted Solution Science How To HIPAA End of Support Running Cable Music Phishing Travel Regulations Prodcuctivity

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...