Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everything up. However, the recent hacking attacks behind the group Anonymous have evolved the persona of the typical hacker into something very different.

Continue reading
0 Comments

A Fascinating Look at How the Internet Has Changed the Stock Market

A Fascinating Look at How the Internet Has Changed the Stock Market

When you think about the stock market, one vibrant image that comes to mind is the chaotic trading floor of the New York Stock Exchange, with traders climbing over each other and barking orders. Today, the NYSE trading floor is much more subdued, a testimony to just how much technology has changed the financial marketplace.

Continue reading
0 Comments

3 Ways the Internet Makes Things Easier, But Not Necessarily Better

3 Ways the Internet Makes Things Easier, But Not Necessarily Better

Do you remember the days where you didn’t have the the Internet? Remember going to the library to research information, or using a phone book to find contact information for an important contact? These are only a few ways that the Internet has changed society.

Continue reading
0 Comments

How and Why Cyber Crime is so Effective

b2ap3_thumbnail_cyber_crime_is_the_new_norm_400.jpgThe Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s case, it’s used for anonymous illegal activity, like drug trafficking or selling data on the black market.

Continue reading
0 Comments

The Overlooked Side of The Internet of Things May Be the Most Important

b2ap3_thumbnail_internet_of_things_400.jpgWhen one thinks about The Internet of Things, new and fantastic devices come to mind, like smart homes, smart cars, mobile devices, and more. While innovations like these are fueling the excitement behind the IoT, it’s actually the smaller, behind-the-scenes IoT devices which are poised to bring about the most significant change to our connected society.

Continue reading
0 Comments

Why Google Fiber is a Game-Changer for the Internet

b2ap3_thumbnail_google_fiber_400.jpgWe all know how important an Internet connection is to the success of any business. In fact, it takes an exceptionally powerful cabling protocol to ensure that your business’s Internet connection remains constant. While many businesses take advantage of big cable companies like Time Warner Cable and Comcast for their Internet needs, a select few have the option of Google Fiber.

Continue reading
0 Comments

How One Snip From Sebastian the Crab Could Cripple the Global Economy [Video]

b2ap3_thumbnail_connecting_the_world_400.jpgHave you ever wondered how the Internet is capable of connecting countries on the other side of the world? You may already be aware of this, but the Internet’s cables run deep underneath the ocean’s surface, all around the world. In fact, you might wonder how we could even keep these cables safe when they’re submerged underneath such an immense amount of water.

Continue reading
0 Comments

For Cyber Security Month, Take Extra Care Not to Overshare

b2ap3_thumbnail_oversharing_400.jpgOctober is Cyber Security month. We want to bring attention to this very important issue affecting every person and organization connected to the Internet. When discussing cyber security, we often talk about computer viruses and malware, but these threats are only part of the cyber security equation. It’s just as important that you, your staff, and even your family, are mindful to not overshare information online that can compromise your organization’s security and personal identities.

Continue reading
0 Comments

Using a Camera With Chicken Grease on Your Hands is a Bad Idea, But Don’t Tell KFC That [VIDEO]

b2ap3_thumbnail_curious_use_of_technology_400.jpgWe’ve seen some pretty incredible technology developed in the past several years, but all of it pales in comparison to the epitome of the Internet of Things: the KFC Memories Bucket. Why? Because nothing says “the future,” like printing your family’s photos out of a family meal chicken bucket.

Continue reading
0 Comments

Check with Your Doctor if “Telemedicine” is Right for You

b2ap3_thumbnail_remote_doctor_400.jpgRemote technology is constantly changing the face of all industries thanks to the versatility and efficiency it provides for its users. Did you know that even doctors are starting to take advantage of it to administer consultation care for their patients in never before seen ways?

Continue reading
0 Comments

The Internet of Things is Changing the Way Businesses View Online Threats

b2ap3_thumbnail_internet_of_things_400.jpgWhen you think of the Internet of Things, does your mind immediately wander into the realm of connected devices that change the way we interact with each other? Or, does it consider the security issues that can potentially become a threat to your entire network and technology infrastructure? Hopefully it’s a little of both, with an emphasis placed on security.

Continue reading
0 Comments

Hackers Shop for Vulnerabilities at Online Black Markets

b2ap3_thumbnail_black_market_peddler_400.jpgJust like Silk Road (the illegal online black market designed to smuggle drugs around the world), there exists an online trade for zero-day exploits. Unsurprisingly, hackers find it exceptionally lucrative to sell these exploits for profit. Now, there’s a new marketplace where hackers can get their hands on these vulnerabilities, and it’s all thanks to the anonymity of the Darknet.

Continue reading
0 Comments

Has the Internet Murdered Society’s Attention Span? [VIDEO]

b2ap3_thumbnail_too_long_did_not_read_400.jpgWhen it comes to challenges, there’s no better place to turn to than the Internet. However, the Internet is also saturated with useless, time-wasting videos and articles that are meant to stimulate the mind and destroy boredom. In the face of all of this media, a lone CollegeHumor video challenges a user to endure boredom for a measly three minutes.

Continue reading
0 Comments

Is Your Favorite Search Engine Showing You Malicious Websites?

b2ap3_thumbnail_search_malware_400.jpgMost search engines are pretty good at keeping malicious websites out of your search results, but just like any other piece of software on your computer, some search engines do a better job of keeping these threats out of your immediate access. According to TV-Test, a German independent testing lab, there’s a huge difference between the security of the world’s top search engines, like Bing and Google.

Continue reading
0 Comments

Pluto Mail Makes it Possible to Unsend an Email

b2ap3_thumbnail_pluto_mail_flexibility_400.jpgFor those with weak stomachs, it’s not recommended to go back and read an email that was just sent. In doing so, a spelling or grammar error is likely to be found, which will cause one’s stomach to turn and fill with regret. If only there was a do-over button. Thanks to the new app called Pluto Mail, there is one.

Continue reading
0 Comments

One Failed Restaurant Shows Us Why it’s Vital to Be Listed Correctly on Google Places

b2ap3_thumbnail_google_places_400.jpgWhen a dining establishment goes out of business, it usually doesn’t make the news. After all, running a restaurant is a risky endeavor. However, for one Washington D.C. eatery, it’s blaming its failure a Google Places mishap, which makes you think twice about how important it is for your business to have its online information properly displayed.

Continue reading
0 Comments

Darkcoin: Anonymous Cryptocurrency for the Paranoid… and the Criminal

b2ap3_thumbnail_darkcoin_400.jpgThe world of online currency is a strange, bizarre realm. While it’s designed for online transactions, it has gone from the somewhat useful (Bitcoin) to just plain silly (Dogecoin). However, there’s now an anonymous cryptocurrency available for use called Darkcoin, which attempts to make online transactions more difficult to trace.

Continue reading
0 Comments

The Internet of Things Might Invoke Murder, Ransom, and More

b2ap3_thumbnail_internet_of_things_death_400.jpgWith the Internet of Things connecting more devices to the Internet, these devices can potentially be turned to nefarious use. Despite all of the benefits of the Internet of Things, like big data analytics, anything connected to the Internet is threatened by cyber crime to at least some degree. In fact, some professionals believe that the Internet of Things will usher in an era of new types of cyber crime; murder included.

Continue reading
0 Comments

3 Big Data Solutions for Modern Businesses

b2ap3_thumbnail_big_data_help_400.jpgBig Data is an important part of any business. Without understanding trends in the consumer populace, how can you hope to sell your product? Unfortunately, many companies don't know how to handle big data, and this holds back their earning potential significantly.

Continue reading
0 Comments

Even Farmers Can Take Advantage of the Internet of Things

b2ap3_thumbnail_big_data_farmer_400.jpgThe Internet of Things is on its way, and we are seeing new applications for web-connected devices every day. Perhaps one of the most interesting ways to use Internet of Things technology is its integration into agriculture, or more specifically, artichoke growing at Ocean Mist Farms in Salinas Valley, California.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Holiday Server Network Data Quick Tips Smartphone Virtualization Email Going Green Save Money Business Continuity Remote Computing Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Apps Office Alert Android Chrome Small Business Ransomware Social WiFi Identity Theft Facebook Mobility Antivirus Application The Internet of Things Best Practice Big Data Managed Service Provider Microsoft Office Employer-Employee Relationship History Analytics Search Saving Time Gmail Browser Lithium-ion battery Current Events Printer Government Law Enforcement Information Technology Spam Office Tips BYOD Password Bandwidth Unified Threat Management Hacking Tablet Passwords Humor Net Neutrality Users Firewall USB iPhone Collaboration Laptop Recovery Network Security Automation Hard Drives Maintenance Streaming Media Education Fraud User Error Computers Disaster Wireless Avoiding Downtime Data Management Money Phone System Encryption Router Apple Work/Life Balance Remote Monitoring communications Tech Support Gadgets Telephone Systems Smartphones intranet Data Loss Google Drive DDoS Outlook Printer Server Wearable Technology Benefits Proactive IT Office 365 Marketing Administration Cybercrime Online Currency Risk Management Content Filtering Managing Stress Point of Sale Private Cloud PowerPoint Wireless Technology Personal Information Cost Management Update Retail BDR Entertainment Managed IT Services VPN Budget Mobile Office Transportation Shortcut Business Intelligence Internet Exlporer App Biometrics Social Engineering IT Solutions Wi-Fi Telephony Customer Service Flexibility IT Consultant Fax Server Virtual Reality Scalability Computer Accessories Experience Text Messaging Prodcuctivity Cameras Internet of Things Data Theft Bloatware IT consulting Online Backup How To Applications Distributed Denial of Service Mouse Music Artificial Intelligence Sports CloudSync Touchpad Branding eWaste Display Network Congestion Books Compliance Programming WIndows 7 Black Market Operating Sysytem Television Storage Electronic Medical Records HaaS Files Inbound Marketing Two-factor Authentication Instant Messaging Emails Bluetooth Audit Trending Safety Chromecast Twitter Customer Relationship Management OneNote User RAM Battery SharePoint Website Ebay Excel Emergency Administrator OneDrive Best Available CPU Automobile Reputation Amazon Teamwork Blogging Bring Your Own Device Paperless Office Cleaning Access Workplace Presentation Slow Worker Commute Smart Phones Meetings Hosted Solution Miscelllaneous Science Save Time Video Games Running Cable Windows 8 Phishing End of Support HIPAA Hacker Legal Robot Travel Networking Vendor Management Advertising Regulations ISP Keyboard Near Field Communication 3D Printing Data storage Human Resources Politics PDF Computing Uninterrupted Power Supply Hiring/Firing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code