Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everything up. However, the recent hacking attacks behind the group Anonymous have evolved the persona of the typical hacker into something very different.

Continue reading
0 Comments

A Fascinating Look at How the Internet Has Changed the Stock Market

A Fascinating Look at How the Internet Has Changed the Stock Market

When you think about the stock market, one vibrant image that comes to mind is the chaotic trading floor of the New York Stock Exchange, with traders climbing over each other and barking orders. Today, the NYSE trading floor is much more subdued, a testimony to just how much technology has changed the financial marketplace.

Continue reading
0 Comments

3 Ways the Internet Makes Things Easier, But Not Necessarily Better

3 Ways the Internet Makes Things Easier, But Not Necessarily Better

Do you remember the days where you didn’t have the the Internet? Remember going to the library to research information, or using a phone book to find contact information for an important contact? These are only a few ways that the Internet has changed society.

Continue reading
0 Comments

How and Why Cyber Crime is so Effective

b2ap3_thumbnail_cyber_crime_is_the_new_norm_400.jpgThe Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s case, it’s used for anonymous illegal activity, like drug trafficking or selling data on the black market.

Continue reading
0 Comments

The Overlooked Side of The Internet of Things May Be the Most Important

b2ap3_thumbnail_internet_of_things_400.jpgWhen one thinks about The Internet of Things, new and fantastic devices come to mind, like smart homes, smart cars, mobile devices, and more. While innovations like these are fueling the excitement behind the IoT, it’s actually the smaller, behind-the-scenes IoT devices which are poised to bring about the most significant change to our connected society.

Continue reading
0 Comments

Why Google Fiber is a Game-Changer for the Internet

b2ap3_thumbnail_google_fiber_400.jpgWe all know how important an Internet connection is to the success of any business. In fact, it takes an exceptionally powerful cabling protocol to ensure that your business’s Internet connection remains constant. While many businesses take advantage of big cable companies like Time Warner Cable and Comcast for their Internet needs, a select few have the option of Google Fiber.

Continue reading
0 Comments

How One Snip From Sebastian the Crab Could Cripple the Global Economy [Video]

b2ap3_thumbnail_connecting_the_world_400.jpgHave you ever wondered how the Internet is capable of connecting countries on the other side of the world? You may already be aware of this, but the Internet’s cables run deep underneath the ocean’s surface, all around the world. In fact, you might wonder how we could even keep these cables safe when they’re submerged underneath such an immense amount of water.

Continue reading
0 Comments

For Cyber Security Month, Take Extra Care Not to Overshare

b2ap3_thumbnail_oversharing_400.jpgOctober is Cyber Security month. We want to bring attention to this very important issue affecting every person and organization connected to the Internet. When discussing cyber security, we often talk about computer viruses and malware, but these threats are only part of the cyber security equation. It’s just as important that you, your staff, and even your family, are mindful to not overshare information online that can compromise your organization’s security and personal identities.

Continue reading
0 Comments

Using a Camera With Chicken Grease on Your Hands is a Bad Idea, But Don’t Tell KFC That [VIDEO]

b2ap3_thumbnail_curious_use_of_technology_400.jpgWe’ve seen some pretty incredible technology developed in the past several years, but all of it pales in comparison to the epitome of the Internet of Things: the KFC Memories Bucket. Why? Because nothing says “the future,” like printing your family’s photos out of a family meal chicken bucket.

Continue reading
0 Comments

Check with Your Doctor if “Telemedicine” is Right for You

b2ap3_thumbnail_remote_doctor_400.jpgRemote technology is constantly changing the face of all industries thanks to the versatility and efficiency it provides for its users. Did you know that even doctors are starting to take advantage of it to administer consultation care for their patients in never before seen ways?

Continue reading
0 Comments

The Internet of Things is Changing the Way Businesses View Online Threats

b2ap3_thumbnail_internet_of_things_400.jpgWhen you think of the Internet of Things, does your mind immediately wander into the realm of connected devices that change the way we interact with each other? Or, does it consider the security issues that can potentially become a threat to your entire network and technology infrastructure? Hopefully it’s a little of both, with an emphasis placed on security.

Continue reading
0 Comments

Hackers Shop for Vulnerabilities at Online Black Markets

b2ap3_thumbnail_black_market_peddler_400.jpgJust like Silk Road (the illegal online black market designed to smuggle drugs around the world), there exists an online trade for zero-day exploits. Unsurprisingly, hackers find it exceptionally lucrative to sell these exploits for profit. Now, there’s a new marketplace where hackers can get their hands on these vulnerabilities, and it’s all thanks to the anonymity of the Darknet.

Continue reading
0 Comments

Has the Internet Murdered Society’s Attention Span? [VIDEO]

b2ap3_thumbnail_too_long_did_not_read_400.jpgWhen it comes to challenges, there’s no better place to turn to than the Internet. However, the Internet is also saturated with useless, time-wasting videos and articles that are meant to stimulate the mind and destroy boredom. In the face of all of this media, a lone CollegeHumor video challenges a user to endure boredom for a measly three minutes.

Continue reading
0 Comments

Is Your Favorite Search Engine Showing You Malicious Websites?

b2ap3_thumbnail_search_malware_400.jpgMost search engines are pretty good at keeping malicious websites out of your search results, but just like any other piece of software on your computer, some search engines do a better job of keeping these threats out of your immediate access. According to TV-Test, a German independent testing lab, there’s a huge difference between the security of the world’s top search engines, like Bing and Google.

Continue reading
0 Comments

Pluto Mail Makes it Possible to Unsend an Email

b2ap3_thumbnail_pluto_mail_flexibility_400.jpgFor those with weak stomachs, it’s not recommended to go back and read an email that was just sent. In doing so, a spelling or grammar error is likely to be found, which will cause one’s stomach to turn and fill with regret. If only there was a do-over button. Thanks to the new app called Pluto Mail, there is one.

Continue reading
0 Comments

One Failed Restaurant Shows Us Why it’s Vital to Be Listed Correctly on Google Places

b2ap3_thumbnail_google_places_400.jpgWhen a dining establishment goes out of business, it usually doesn’t make the news. After all, running a restaurant is a risky endeavor. However, for one Washington D.C. eatery, it’s blaming its failure a Google Places mishap, which makes you think twice about how important it is for your business to have its online information properly displayed.

Continue reading
0 Comments

Darkcoin: Anonymous Cryptocurrency for the Paranoid… and the Criminal

b2ap3_thumbnail_darkcoin_400.jpgThe world of online currency is a strange, bizarre realm. While it’s designed for online transactions, it has gone from the somewhat useful (Bitcoin) to just plain silly (Dogecoin). However, there’s now an anonymous cryptocurrency available for use called Darkcoin, which attempts to make online transactions more difficult to trace.

Continue reading
0 Comments

The Internet of Things Might Invoke Murder, Ransom, and More

b2ap3_thumbnail_internet_of_things_death_400.jpgWith the Internet of Things connecting more devices to the Internet, these devices can potentially be turned to nefarious use. Despite all of the benefits of the Internet of Things, like big data analytics, anything connected to the Internet is threatened by cyber crime to at least some degree. In fact, some professionals believe that the Internet of Things will usher in an era of new types of cyber crime; murder included.

Continue reading
0 Comments

3 Big Data Solutions for Modern Businesses

b2ap3_thumbnail_big_data_help_400.jpgBig Data is an important part of any business. Without understanding trends in the consumer populace, how can you hope to sell your product? Unfortunately, many companies don't know how to handle big data, and this holds back their earning potential significantly.

Continue reading
0 Comments

Even Farmers Can Take Advantage of the Internet of Things

b2ap3_thumbnail_big_data_farmer_400.jpgThe Internet of Things is on its way, and we are seeing new applications for web-connected devices every day. Perhaps one of the most interesting ways to use Internet of Things technology is its integration into agriculture, or more specifically, artichoke growing at Ocean Mist Farms in Salinas Valley, California.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Network Email Holiday Data Quick Tips Virtualization Remote Computing Operating System Social Media Upgrade Going Green Business Continuity Office Mobile Device Management Saving Money Apps Disaster Recovery Alert Save Money Chrome Small Business Android WiFi Identity Theft The Internet of Things Best Practice Big Data Antivirus Managed Service Provider Employer-Employee Relationship Mobility Ransomware Microsoft Office Social Facebook Application Saving Time Bandwidth Unified Threat Management Lithium-ion battery Hacking Printer Tablet Passwords BYOD Analytics History Search Gmail Browser Current Events Government Law Enforcement Office Tips Information Technology Password Spam Money Data Management Avoiding Downtime Phone System Router Hard Drives Maintenance Apple communications Fraud Telephone Systems Gadgets Smartphones Humor USB Users Recovery Encryption Network Security Automation Wireless Remote Monitoring Streaming Media Tech Support Education intranet User Error Net Neutrality Work/Life Balance Firewall Computers Disaster iPhone Collaboration Laptop Entertainment Budget Proactive IT Flexibility Shortcut Business Intelligence Mobile Office Transportation Online Currency Internet Exlporer Biometrics Social Engineering Customer Service Telephony IT Solutions Office 365 Virtual Reality Google Drive DDoS Benefits Outlook VPN Printer Server Personal Information Marketing Cybercrime App Risk Management Administration Private Cloud Managed IT Services Content Filtering Managing Stress Wireless Technology Fax Server Point of Sale IT Consultant PowerPoint Cost Management Update Data Loss Retail BDR Wearable Technology Wi-Fi Bring Your Own Device Presentation Keyboard Access Meetings Paperless Office Workplace Politics Hosted Solution Science Hiring/Firing Display End of Support Scalability Running Cable Miscelllaneous Phishing Experience Robot Networking Advertising How To HIPAA Music Travel Data storage Regulations Human Resources Near Field Communication PDF ISP RAM 3D Printing Books Website Uninterrupted Power Supply Ebay Text Messaging Black Market Computer Accessories CPU Bloatware Amazon Electronic Medical Records Blogging Internet of Things Applications HaaS Cameras IT consulting Artificial Intelligence Instant Messaging Distributed Denial of Service Data Theft Mouse Slow Smart Phones Safety Sports Touchpad Branding Battery eWaste CloudSync Network Congestion Emergency Windows 8 Operating Sysytem WIndows 7 Programming Automobile Television Compliance Storage Two-factor Authentication Cleaning Vendor Management Files Bluetooth Worker Commute Trending Inbound Marketing Emails Customer Relationship Management Audit Computing Save Time Chromecast Video Games SharePoint User OneNote Twitter Excel Prodcuctivity Hacker Administrator Reputation Legal Teamwork Best Available OneDrive Online Backup

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code