Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everything up. However, the recent hacking attacks behind the group Anonymous have evolved the persona of the typical hacker into something very different.

Continue reading
0 Comments

A Fascinating Look at How the Internet Has Changed the Stock Market

A Fascinating Look at How the Internet Has Changed the Stock Market

When you think about the stock market, one vibrant image that comes to mind is the chaotic trading floor of the New York Stock Exchange, with traders climbing over each other and barking orders. Today, the NYSE trading floor is much more subdued, a testimony to just how much technology has changed the financial marketplace.

Continue reading
0 Comments

3 Ways the Internet Makes Things Easier, But Not Necessarily Better

3 Ways the Internet Makes Things Easier, But Not Necessarily Better

Do you remember the days where you didn’t have the the Internet? Remember going to the library to research information, or using a phone book to find contact information for an important contact? These are only a few ways that the Internet has changed society.

Continue reading
0 Comments

How and Why Cyber Crime is so Effective

b2ap3_thumbnail_cyber_crime_is_the_new_norm_400.jpgThe Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s case, it’s used for anonymous illegal activity, like drug trafficking or selling data on the black market.

Continue reading
0 Comments

The Overlooked Side of The Internet of Things May Be the Most Important

b2ap3_thumbnail_internet_of_things_400.jpgWhen one thinks about The Internet of Things, new and fantastic devices come to mind, like smart homes, smart cars, mobile devices, and more. While innovations like these are fueling the excitement behind the IoT, it’s actually the smaller, behind-the-scenes IoT devices which are poised to bring about the most significant change to our connected society.

Continue reading
0 Comments

Why Google Fiber is a Game-Changer for the Internet

b2ap3_thumbnail_google_fiber_400.jpgWe all know how important an Internet connection is to the success of any business. In fact, it takes an exceptionally powerful cabling protocol to ensure that your business’s Internet connection remains constant. While many businesses take advantage of big cable companies like Time Warner Cable and Comcast for their Internet needs, a select few have the option of Google Fiber.

Continue reading
0 Comments

How One Snip From Sebastian the Crab Could Cripple the Global Economy [Video]

b2ap3_thumbnail_connecting_the_world_400.jpgHave you ever wondered how the Internet is capable of connecting countries on the other side of the world? You may already be aware of this, but the Internet’s cables run deep underneath the ocean’s surface, all around the world. In fact, you might wonder how we could even keep these cables safe when they’re submerged underneath such an immense amount of water.

Continue reading
0 Comments

For Cyber Security Month, Take Extra Care Not to Overshare

b2ap3_thumbnail_oversharing_400.jpgOctober is Cyber Security month. We want to bring attention to this very important issue affecting every person and organization connected to the Internet. When discussing cyber security, we often talk about computer viruses and malware, but these threats are only part of the cyber security equation. It’s just as important that you, your staff, and even your family, are mindful to not overshare information online that can compromise your organization’s security and personal identities.

Continue reading
0 Comments

Using a Camera With Chicken Grease on Your Hands is a Bad Idea, But Don’t Tell KFC That [VIDEO]

b2ap3_thumbnail_curious_use_of_technology_400.jpgWe’ve seen some pretty incredible technology developed in the past several years, but all of it pales in comparison to the epitome of the Internet of Things: the KFC Memories Bucket. Why? Because nothing says “the future,” like printing your family’s photos out of a family meal chicken bucket.

Continue reading
0 Comments

Check with Your Doctor if “Telemedicine” is Right for You

b2ap3_thumbnail_remote_doctor_400.jpgRemote technology is constantly changing the face of all industries thanks to the versatility and efficiency it provides for its users. Did you know that even doctors are starting to take advantage of it to administer consultation care for their patients in never before seen ways?

Continue reading
0 Comments

The Internet of Things is Changing the Way Businesses View Online Threats

b2ap3_thumbnail_internet_of_things_400.jpgWhen you think of the Internet of Things, does your mind immediately wander into the realm of connected devices that change the way we interact with each other? Or, does it consider the security issues that can potentially become a threat to your entire network and technology infrastructure? Hopefully it’s a little of both, with an emphasis placed on security.

Continue reading
0 Comments

Hackers Shop for Vulnerabilities at Online Black Markets

b2ap3_thumbnail_black_market_peddler_400.jpgJust like Silk Road (the illegal online black market designed to smuggle drugs around the world), there exists an online trade for zero-day exploits. Unsurprisingly, hackers find it exceptionally lucrative to sell these exploits for profit. Now, there’s a new marketplace where hackers can get their hands on these vulnerabilities, and it’s all thanks to the anonymity of the Darknet.

Recent comment in this post
Byron Guy
The black market is the market of the things which are robbed from somewhere and brought here for selling purpose. The article is ... Read More
Monday, 10 June 2019 23:53
Continue reading
1 Comment

Has the Internet Murdered Society’s Attention Span? [VIDEO]

b2ap3_thumbnail_too_long_did_not_read_400.jpgWhen it comes to challenges, there’s no better place to turn to than the Internet. However, the Internet is also saturated with useless, time-wasting videos and articles that are meant to stimulate the mind and destroy boredom. In the face of all of this media, a lone CollegeHumor video challenges a user to endure boredom for a measly three minutes.

Continue reading
0 Comments

Is Your Favorite Search Engine Showing You Malicious Websites?

b2ap3_thumbnail_search_malware_400.jpgMost search engines are pretty good at keeping malicious websites out of your search results, but just like any other piece of software on your computer, some search engines do a better job of keeping these threats out of your immediate access. According to TV-Test, a German independent testing lab, there’s a huge difference between the security of the world’s top search engines, like Bing and Google.

Continue reading
0 Comments

Pluto Mail Makes it Possible to Unsend an Email

b2ap3_thumbnail_pluto_mail_flexibility_400.jpgFor those with weak stomachs, it’s not recommended to go back and read an email that was just sent. In doing so, a spelling or grammar error is likely to be found, which will cause one’s stomach to turn and fill with regret. If only there was a do-over button. Thanks to the new app called Pluto Mail, there is one.

Recent comment in this post
Paige Telfer
Pluto can make it possible that was unsent email among the ell formation it was useful on this that was good. I need to have the a... Read More
Tuesday, 18 June 2019 02:03
Continue reading
1 Comment

One Failed Restaurant Shows Us Why it’s Vital to Be Listed Correctly on Google Places

b2ap3_thumbnail_google_places_400.jpgWhen a dining establishment goes out of business, it usually doesn’t make the news. After all, running a restaurant is a risky endeavor. However, for one Washington D.C. eatery, it’s blaming its failure a Google Places mishap, which makes you think twice about how important it is for your business to have its online information properly displayed.

Continue reading
0 Comments

Darkcoin: Anonymous Cryptocurrency for the Paranoid… and the Criminal

b2ap3_thumbnail_darkcoin_400.jpgThe world of online currency is a strange, bizarre realm. While it’s designed for online transactions, it has gone from the somewhat useful (Bitcoin) to just plain silly (Dogecoin). However, there’s now an anonymous cryptocurrency available for use called Darkcoin, which attempts to make online transactions more difficult to trace.

Continue reading
0 Comments

The Internet of Things Might Invoke Murder, Ransom, and More

b2ap3_thumbnail_internet_of_things_death_400.jpgWith the Internet of Things connecting more devices to the Internet, these devices can potentially be turned to nefarious use. Despite all of the benefits of the Internet of Things, like big data analytics, anything connected to the Internet is threatened by cyber crime to at least some degree. In fact, some professionals believe that the Internet of Things will usher in an era of new types of cyber crime; murder included.

Continue reading
0 Comments

3 Big Data Solutions for Modern Businesses

b2ap3_thumbnail_big_data_help_400.jpgBig Data is an important part of any business. Without understanding trends in the consumer populace, how can you hope to sell your product? Unfortunately, many companies don't know how to handle big data, and this holds back their earning potential significantly.

Continue reading
0 Comments

Even Farmers Can Take Advantage of the Internet of Things

b2ap3_thumbnail_big_data_farmer_400.jpgThe Internet of Things is on its way, and we are seeing new applications for web-connected devices every day. Perhaps one of the most interesting ways to use Internet of Things technology is its integration into agriculture, or more specifically, artichoke growing at Ocean Mist Farms in Salinas Valley, California.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Computing IT Services Health Mobile Devices Communication IT Support User Tips VoIP Business Management Email Virtualization Holiday Server Network Data Quick Tips Smartphone Disaster Recovery Office Apps Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Android Chrome Small Business Managed Service Provider Microsoft Office Application Social WiFi Facebook Best Practice Identity Theft Employer-Employee Relationship Ransomware Antivirus The Internet of Things Big Data Mobility Passwords Law Enforcement Office Tips Password History Analytics Search Gmail Saving Time Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Remote Monitoring Tech Support Gadgets Smartphones Users USB intranet Net Neutrality Firewall iPhone Data Management Money Wireless Collaboration Laptop Streaming Media communications Work/Life Balance Hard Drives Education Maintenance Telephone Systems User Error Fraud Humor Computers Disaster Recovery Avoiding Downtime Phone System Network Security Router Automation Apple Encryption Update IT Consultant Fax Server Personal Information Outlook Data Loss Printer Server Budget Transportation Wearable Technology Shortcut Business Intelligence Marketing Managed IT Services Administration Internet Exlporer Proactive IT Biometrics Social Engineering Content Filtering Telephony Online Currency Customer Service Point of Sale PowerPoint Wi-Fi Virtual Reality Google Drive Cost Management DDoS Flexibility Retail Benefits BDR Entertainment Mobile Office Cybercrime VPN Risk Management Office 365 Managing Stress Private Cloud IT Solutions Wireless Technology App Chromecast Electronic Medical Records ISP Customer Relationship Management Vendor Management 3D Printing User SharePoint HaaS Instant Messaging Excel Administrator Safety Best Available Reputation Computing Teamwork Battery Cameras Data Theft Access Emergency Presentation Prodcuctivity Meetings Hosted Solution Automobile Science Online Backup CloudSync Cleaning Phishing End of Support Running Cable Worker Commute Compliance Robot Save Time Programming Networking Display Advertising Video Games Inbound Marketing Data storage Hacker Human Resources Near Field Communication Emails PDF Audit Legal Uninterrupted Power Supply Twitter Keyboard OneNote Computer Accessories Text Messaging Internet of Things Politics Bloatware RAM Applications Hiring/Firing OneDrive Website IT consulting Scalability Ebay Mouse Artificial Intelligence Bring Your Own Device Distributed Denial of Service Paperless Office Sports Experience CPU Touchpad Amazon Workplace Branding Blogging eWaste How To Network Congestion Miscelllaneous Music WIndows 7 Slow Operating Sysytem Smart Phones Television Storage HIPAA Files Books Two-factor Authentication Travel Bluetooth Windows 8 Trending Black Market Regulations

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code