Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: iPhone Too Full? Try Renting a Movie! Seriously.

Tip of the Week: iPhone Too Full? Try Renting a Movie! Seriously.

Like many mobile devices, iPhones don’t have a slot for an external memory card, which means the device can easily become too full to use. When this happens, pictures can’t be taken and some apps just won’t work. If you’re experiencing this issue with your iPhone, just rent a movie. It works. Seriously.

Recent comment in this post
Ivory Velazquez
On the iPhone there is the movie that looks so interesting and people love to use it. Somehow there are https://www.topratedessays... Read More
Wednesday, 11 September 2019 23:03
Continue reading
1 Comment

Apple’s iPhone 6 and iPhone 6+ Bend Expectations

b2ap3_thumbnail_iphone_6_and_6_plus_400.jpgApple is back with another iPhone! The Silicon Valley-based hardware and software manufacturer has released the new versions of their extremely popular iPhone series of devices. The two-headed approach that Apple took with their second incantation of the iPhone 5 (the 5s and 5c), is replicated this time out as well. After being surpassed by Samsung over the past two years, does the iPhone 6 and its larger version, the iPhone 6+, have what it takes to get Apple back on top?

Continue reading

New iPhone Vulnerability: Lock Screen Can Leak Your Contacts!

b2ap3_thumbnail_ios_siri_400.jpgThink your data is safe when you lock your phone? Thanks to a newly discovered vulnerability with iOS 7.1.1 (the latest version), a hacker has the ability to bypass your lock screen and easily access your contact information.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips IT Support Communication Business Management VoIP Data Quick Tips Virtualization Smartphone Email Holiday Server Network Mobile Device Management Saving Money Save Money Remote Computing Disaster Recovery Apps Operating System Alert Social Media Upgrade Office Going Green Business Continuity Small Business Chrome Android The Internet of Things Application Big Data WiFi Managed Service Provider Best Practice Identity Theft Microsoft Office Employer-Employee Relationship Social Ransomware Antivirus Facebook Mobility Government Information Technology Spam Bandwidth Law Enforcement Unified Threat Management Office Tips Hacking Password Tablet Saving Time Passwords Lithium-ion battery Printer Analytics History Search Gmail Browser BYOD Current Events Network Security Education Automation User Error Encryption Computers Disaster Wireless Remote Monitoring Tech Support Avoiding Downtime Phone System Router intranet Work/Life Balance Firewall Apple Net Neutrality iPhone Data Management Money Collaboration Laptop Gadgets Smartphones communications Users USB Maintenance Hard Drives Telephone Systems Humor Fraud Streaming Media Recovery Content Filtering Cybercrime Point of Sale VPN Risk Management PowerPoint Cost Management Personal Information Managing Stress Retail Private Cloud BDR Wireless Technology App Entertainment Update Managed IT Services Mobile Office IT Consultant Fax Server Data Loss Budget Wi-Fi Business Intelligence Transportation IT Solutions Wearable Technology Shortcut Internet Exlporer Proactive IT Flexibility Biometrics Social Engineering Telephony Online Currency Customer Service Outlook Printer Server Virtual Reality Google Drive DDoS Marketing Office 365 Benefits Administration Amazon Branding Electronic Medical Records Blogging CPU Touchpad Inbound Marketing eWaste Network Congestion HaaS Emails Audit Instant Messaging Smart Phones Safety WIndows 7 Slow Operating Sysytem Twitter OneNote Television Storage Files Two-factor Authentication Battery Bluetooth Emergency Windows 8 OneDrive Trending Bring Your Own Device Chromecast Customer Relationship Management Automobile SharePoint Cleaning Vendor Management User Paperless Office Workplace Excel Worker Commute Administrator Computing Teamwork Save Time Best Available Miscelllaneous Reputation Video Games Presentation Access Prodcuctivity Meetings Hacker HIPAA Travel Hosted Solution Science Legal Regulations Online Backup End of Support ISP Running Cable Keyboard Phishing 3D Printing Networking Politics Robot Advertising Hiring/Firing Display Scalability Human Resources Experience Near Field Communication Cameras Data storage PDF Data Theft Uninterrupted Power Supply How To Music Text Messaging Computer Accessories CloudSync Internet of Things Bloatware Books Website IT consulting RAM Applications Compliance Artificial Intelligence Programming Distributed Denial of Service Ebay Mouse Sports Black Market

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...