Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Darkcoin: Anonymous Cryptocurrency for the Paranoid… and the Criminal

b2ap3_thumbnail_darkcoin_400.jpgThe world of online currency is a strange, bizarre realm. While it’s designed for online transactions, it has gone from the somewhat useful (Bitcoin) to just plain silly (Dogecoin). However, there’s now an anonymous cryptocurrency available for use called Darkcoin, which attempts to make online transactions more difficult to trace.

Continue reading

Be Wary of Bitcoin Fraud

b2ap3_thumbnail_bitcoin_400.jpgOn May 7, 2014, the U.S. Securities and Exchange Commission (SEC) released a news alert declaring Bitcoin, and all other virtual currencies insecure and unsafe. Due to a rise in Bitcoin popularity, many investors and business owners like to use it for worldwide transactions. But, how safe is it, and how likely are you to run into a Bitcoin fraud scheme?

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Email Network Holiday Data Quick Tips Virtualization Remote Computing Operating System Social Media Upgrade Going Green Office Business Continuity Mobile Device Management Saving Money Disaster Recovery Apps Save Money Alert Chrome Small Business Android WiFi Application Identity Theft The Internet of Things Big Data Best Practice Mobility Antivirus Managed Service Provider Microsoft Office Employer-Employee Relationship Ransomware Social Facebook Bandwidth Office Tips Saving Time Password Unified Threat Management Hacking Tablet Lithium-ion battery Printer Passwords BYOD History Analytics Search Gmail Browser Current Events Government Information Technology Spam Law Enforcement Collaboration Laptop Avoiding Downtime Phone System Router Data Management Money Apple Maintenance Hard Drives Fraud communications Gadgets Smartphones Telephone Systems Users USB Humor Wireless Encryption Recovery Streaming Media Network Security Automation Remote Monitoring Education Tech Support Work/Life Balance User Error intranet Computers Disaster Net Neutrality Firewall iPhone Update Entertainment Wearable Technology Mobile Office Proactive IT Budget Online Currency Business Intelligence Transportation Shortcut Office 365 IT Solutions Internet Exlporer Biometrics Social Engineering Telephony Customer Service Outlook Virtual Reality Personal Information Printer Server Google Drive DDoS VPN Benefits Marketing Administration Managed IT Services App Content Filtering Cybercrime Risk Management Point of Sale PowerPoint Managing Stress IT Consultant Fax Server Private Cloud Cost Management Wi-Fi Wireless Technology Retail Data Loss Flexibility BDR Politics Excel Bring Your Own Device Paperless Office Online Backup Administrator Hiring/Firing Teamwork Scalability Best Available Workplace Reputation Experience Presentation Miscelllaneous Access Meetings How To Display Hosted Solution Music Science HIPAA Running Cable Phishing Travel End of Support Books Regulations ISP Robot Networking Black Market Advertising 3D Printing Electronic Medical Records HaaS Near Field Communication Website RAM Data storage Human Resources Instant Messaging Ebay PDF Uninterrupted Power Supply Safety Cameras Blogging Data Theft CPU Amazon Battery Computer Accessories Text Messaging Internet of Things Emergency Bloatware IT consulting CloudSync Slow Applications Smart Phones Distributed Denial of Service Automobile Mouse Artificial Intelligence Sports Cleaning Windows 8 Compliance Programming Touchpad Branding eWaste Worker Commute Network Congestion Save Time Video Games WIndows 7 Vendor Management Inbound Marketing Operating Sysytem Television Storage Emails Audit Files Hacker Two-factor Authentication Legal Twitter OneNote Bluetooth Computing Trending Chromecast Keyboard Customer Relationship Management Prodcuctivity User OneDrive SharePoint

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...