Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Read the Fine Print Before Downloading Adware

Why You Should Read the Fine Print Before Downloading Adware

Has this ever happened to you? You come across a free app online that seems interesting, entertaining, or helpful so you decide to download it? However, as soon as you click the download button you regret it as it begins to install browser toolbars, adware, and other annoying (and potentially dangerous) software onto your device? How can you keep this “crapware” from getting too out of hand, and why is it so popular in the first place?

Continue reading
0 Comments

DroidJack Malware is Super-Effective Against Impatient Pokémon Go Users

DroidJack Malware is Super-Effective Against Impatient Pokémon Go Users

Augmented reality is a growing trend in the technology industry, and perhaps one of the best known uses of it today can be found in the extremely popular mobile device app, Pokemon Go. However, hackers have seized the opportunity to infect players who want to “catch ‘em all” with a backdoor called DroidJack - something that certainly won’t help gamers “be the very best.”

Continue reading
0 Comments

Microsoft Now Pushing Into the Technology as a Service Market

Microsoft Now Pushing Into the Technology as a Service Market

One of Microsoft’s latest moves to appeal to business owners has been to establish a Technology as a Service program, allowing small businesses to purchase Surface products, accessories, and support by subscribing to a monthly payment plan. What’s more, when time comes to upgrade, customers can do so, although some fees may apply as dictated by the lease.

Continue reading
0 Comments

3 Talk-to-Text Apps that are Well Worth the Money

3 Talk-to-Text Apps that are Well Worth the Money

The development of mobile platforms have led to the development of hundreds of apps that give users the ability to capture websites, take notes, and do just about anything else as it pertains to a person’s daily business tasks. Some users of modern smartphones (and other mobile devices) routinely complain about the reliability of the on-screen keyboard interface, as communication is as important to the development and outcome of projects as ever. For this reason, some developers have begun creating applications that allow users to dictate to their devices; turning spoken words in to text. Here are three of the most reliable options to turn your voice into text.

Continue reading
0 Comments

Alert: Users of 7-Zip Should Immediately Upgrade to the Latest Version

Alert: Users of 7-Zip Should Immediately Upgrade to the Latest Version

One of the latest vulnerabilities in open-source software can be found in 7zip, a file archiver and decompresser. 7zip has been found to have several security vulnerabilities which have software developers rushing to fix their products. The damage done extends far beyond 7zip, reaching both people who use 7zip itself, and developers who have used the technology in the creation of their own tools and software.

Continue reading
0 Comments

40 Microsoft Software Titles to Reach End of Life/Extended Support in July 2016

40 Microsoft Software Titles to Reach End of Life/Extended Support in July 2016

All business owners should be aware of which Microsoft products they use. It’s one of the many complex and confusing parts of managing your technology. Of course, all great things must eventually come to an end, and the same applies to your mission-critical applications and operating systems. When your solutions can no longer be considered secure and are no longer supported by the developer, you know it’s time to move on and upgrade to something better.

Continue reading
0 Comments

Tip of the Week: Master the GIF and Rule the Internet

b2ap3_thumbnail_make_animated_gifs_400.jpgUsing GIFs in your digital communications is a great way to enhance them. A GIF (Graphics Interchange Format) is an image that loops a few seconds worth of animation and it’s a great way to grab someone's attention. If you don’t know how to make a GIF, then we’ll show you how in this week’s tip!

Continue reading
0 Comments

Find Out What’s Lurking In “the Shadows” of Your IT

b2ap3_thumbnail_risks_of_shadow_it_400.jpgImplementing proper IT solutions is challenging for the average SMB, and it’s difficult without the aid of a proper IT department. Organizations that can’t afford a full in-house IT department sometimes resort to less savory methods of managing their technology, which can be dangerous for business continuity, data storage compliance, and security.

Continue reading
0 Comments

It Pays to Have an Upgrading Strategy for Your Computers

b2ap3_thumbnail_what_to_upgrade_400.jpgIf there’s one thing that our extremely technical society has evolved into, it’s one where technology is always striving to improve itself. This is especially important for businesses that are looking to maximize the return on investment they get from their hardware and software. Do you know where your organization concentrates its resources for tech upgrades?

Continue reading
0 Comments

Tip of the Week: Use Screenshots to Better Communicate PC Problems

b2ap3_thumbnail_screenshots_400.jpgHave you ever tried describing a PC issue on the phone to tech support, and you get nowhere because you’re having such a difficult time describing the problem? To be sure, this is a frustrating experience. By taking a screenshot, you can send an image of the exact problem you’re experiencing, which will really help clear things up.

Taking a screenshot is as easy as using the right keystrokes. Here’s how you do it.

Continue reading
0 Comments

Tip of the Week: A Clever Way to Make Your Computer Talk to Itself

b2ap3_thumbnail_talking_computer_400.jpgComputers can feel one dimensional, requiring the user to read and type. Humans don’t naturally interact like this. We communicate best with our voices and our ears. One day, our PCs will have artificial intelligence and we will be able to communicate with them as if we were talking to a person. Until this technology becomes mainstream, these two audio features will have to make do.

Continue reading
0 Comments

This History of the Autocorrect is as Fascinating as it Sounds

b2ap3_thumbnail_automated_corrections_400.jpgHow often does autocorrect breathe down your neck when you type out emails or documentation? We might have it now, but before autocorrect was introduced, every little mistake had to be resolved manually, without the help of technology. So, we salute you, autocorrect; saving us from the grammar police since the early 90s.

Continue reading
0 Comments

A New Concept Might Take Reverse-Engineering to the Next Level

b2ap3_thumbnail_software_development_400.jpgEven the most innocent Internet user can fall victim to the stray hacking attack, and it’s all thanks to the manner in which malware reverse-engineers software. This process is how a hacker finds vulnerabilities in software. However, a new security concept might be able to protect software from the reverse-engineering method used by hackers.

Continue reading
0 Comments

DecryptCryptoLocker Provides Fix for Nasty Ransomware

b2ap3_thumbnail_decryptolocker_400.jpgA few months ago, we mentioned that a ransomware called CryptoLocker was spreading at a dangerous rate due to the GameOver Zeus malware. The ransomware would lock down files on victims' computers until a fee was paid, but not anymore. Now, with the help of FireEye and Fox-IT, a solution has been created called DecryptCryptoLocker.

Continue reading
0 Comments

ITaaS: Transform Your IT Department Into a Service!

b2ap3_thumbnail_managed_services_provider_400.jpgWhat are managed IT services all about? You've heard about how businesses are saving on their IT costs by outsourcing their technology needs, but how does this service work? The money-saving answer comes from this radical new approach to treating IT as a Service!

Continue reading
0 Comments

ALERT: Back Off! New Point-of-Sale Malware Threatens Businesses

b2ap3_thumbnail_point_of_sale_malware_400.jpgIf your business purchases hardware or other supplies from a retailer, or if you are your own point-of-sale, your company might be targeted by a new type of Point-of-Sale malware known as Backoff. The malware is capable of stealing credit card information from unsuspecting victims, and should be a cause for concern for those unprepared to fight against it.

Continue reading
0 Comments

Google Strengthens Zero-Day Exploit Research

b2ap3_thumbnail_google_research_400.jpgWith all of the zero-day exploits popping up lately, such as the GameOver Zeus malware and Heartbleed bug a few months ago, it only makes sense to step up research on how and why it occurs. Google is doing just that with its new research program, rightfully dubbed Project Zero.

Continue reading
0 Comments

5 Mobile Apps to Help You Translate the World Cup

b2ap3_thumbnail_translation_applications_400.jpgWhether you're watching the World Cup or going on a business trip overseas, you will experience foreign cultures and run into what's known as "the language barrier." Thanks to technology, you can quickly and easily make sense of World Cup statistics, or make your way around a city where English isn't the norm.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Computing IT Services Health Mobile Devices Communication IT Support User Tips VoIP Business Management Email Virtualization Holiday Server Network Data Quick Tips Smartphone Disaster Recovery Office Apps Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Android Chrome Small Business Managed Service Provider Microsoft Office Application Social WiFi Facebook Best Practice Identity Theft Employer-Employee Relationship Ransomware Antivirus The Internet of Things Big Data Mobility Passwords Law Enforcement Office Tips Password History Analytics Search Gmail Saving Time Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Remote Monitoring Tech Support Gadgets Smartphones Users USB intranet Net Neutrality Firewall iPhone Data Management Money Wireless Collaboration Laptop Streaming Media communications Work/Life Balance Hard Drives Education Maintenance Telephone Systems User Error Fraud Humor Computers Disaster Recovery Avoiding Downtime Phone System Network Security Router Automation Apple Encryption Update IT Consultant Fax Server Personal Information Outlook Data Loss Printer Server Budget Transportation Wearable Technology Shortcut Business Intelligence Marketing Managed IT Services Administration Internet Exlporer Proactive IT Biometrics Social Engineering Content Filtering Telephony Online Currency Customer Service Point of Sale PowerPoint Wi-Fi Virtual Reality Google Drive Cost Management DDoS Flexibility Retail Benefits BDR Entertainment Mobile Office Cybercrime VPN Risk Management Office 365 Managing Stress Private Cloud IT Solutions Wireless Technology App Chromecast Electronic Medical Records ISP Customer Relationship Management Vendor Management 3D Printing User SharePoint HaaS Instant Messaging Excel Administrator Safety Best Available Reputation Computing Teamwork Battery Cameras Data Theft Access Emergency Presentation Prodcuctivity Meetings Hosted Solution Automobile Science Online Backup CloudSync Cleaning Phishing End of Support Running Cable Worker Commute Compliance Robot Save Time Programming Networking Display Advertising Video Games Inbound Marketing Data storage Hacker Human Resources Near Field Communication Emails PDF Audit Legal Uninterrupted Power Supply Twitter Keyboard OneNote Computer Accessories Text Messaging Internet of Things Politics Bloatware RAM Applications Hiring/Firing OneDrive Website IT consulting Scalability Ebay Mouse Artificial Intelligence Bring Your Own Device Distributed Denial of Service Paperless Office Sports Experience CPU Touchpad Amazon Workplace Branding Blogging eWaste How To Network Congestion Miscelllaneous Music WIndows 7 Slow Operating Sysytem Smart Phones Television Storage HIPAA Files Books Two-factor Authentication Travel Bluetooth Windows 8 Trending Black Market Regulations

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code