Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

USB is a popular technology in all modes of today’s society. You’d be hard-pressed to find a modern piece of technology that’s not compatible in some way, shape or form with USB. Thumb drives, chargers, and even portable drives all use this common technology. However, this also means that hackers can take advantage of its popularity to spread malware and other problems.

Continue reading

Kindle Users May Not Like the Latest Windows 10 Upgrade

Kindle Users May Not Like the Latest Windows 10 Upgrade

If you happened to plug your Kindle into your computer and get a blue screen of death, you aren’t alone. Many Kindle users have discovered that the Anniversary update to Windows 10 has caused an issue when attempting to use USB to charge the device or transfer books. It would seem that, within moments of connecting the Kindle to a Windows 10 device, the device will lock up and display the dreaded Blue Screen of Death before rebooting.

Recent comment in this post
Olivia Fellows
Latest windows are installed for the running of the system of the man in good manner. The features of the windows and https://www.... Read More
Saturday, 20 July 2019 02:32
Continue reading
1 Comment

New Security Threat: Don’t Get Jacked While Juicing!

b2ap3_thumbnail_usb_security_tips_400.jpgHackers today are trying every approach possible to steal your device's data, including the hijacking of public USB ports. This technique is known as "juice jacking," and with this new threat, you should think twice about charging your device using a public USB charging kiosk, or even the USB port on a friend's computer.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health Communication User Tips IT Support VoIP Business Management Email Holiday Virtualization Server Network Smartphone Data Quick Tips Saving Money Office Apps Disaster Recovery Alert Save Money Remote Computing Going Green Business Continuity Operating System Mobile Device Management Social Media Upgrade Android Chrome Small Business Managed Service Provider Microsoft Office Social Application Mobility Facebook WiFi Best Practice Identity Theft Employer-Employee Relationship Antivirus Ransomware The Internet of Things Big Data Passwords Law Enforcement History Office Tips Analytics Search Gmail Password Browser Current Events Saving Time Government Lithium-ion battery Information Technology Printer Spam Bandwidth Unified Threat Management BYOD Hacking Tablet Encryption Gadgets Smartphones Remote Monitoring Users USB Tech Support intranet Net Neutrality Firewall Data Management Money iPhone Collaboration Laptop Streaming Media Education User Error communications Hard Drives Maintenance Computers Wireless Disaster Telephone Systems Fraud Humor Avoiding Downtime Phone System Router Work/Life Balance Recovery Apple Network Security Automation Private Cloud Managing Stress App Wireless Technology Outlook Update Printer Server Fax Server IT Consultant Office 365 Marketing Budget Data Loss Administration Wearable Technology Transportation Shortcut Business Intelligence Content Filtering Proactive IT Internet Exlporer Point of Sale Personal Information Biometrics PowerPoint Social Engineering Online Currency Telephony Customer Service Cost Management Retail Virtual Reality BDR Google Drive Entertainment Managed IT Services DDoS Mobile Office Benefits Wi-Fi VPN Cybercrime IT Solutions Risk Management Flexibility Politics Storage ISP Television Files Hiring/Firing Two-factor Authentication 3D Printing Windows 8 Bluetooth Scalability Trending Experience Chromecast Customer Relationship Management User Vendor Management Cameras SharePoint How To Music Data Theft Excel Administrator Best Available Computing Reputation Teamwork Books CloudSync Access Presentation Prodcuctivity Meetings Black Market Hosted Solution Electronic Medical Records Compliance Science Programming HaaS Online Backup Phishing End of Support Running Cable Instant Messaging Safety Inbound Marketing Robot Emails Networking Audit Advertising Display Battery Emergency Twitter OneNote Data storage Human Resources Near Field Communication PDF Automobile Uninterrupted Power Supply Cleaning OneDrive Bring Your Own Device Paperless Office Computer Accessories Text Messaging Worker Commute Internet of Things Save Time Bloatware Workplace Applications Website Video Games RAM IT consulting Miscelllaneous Mouse Artificial Intelligence Ebay Distributed Denial of Service Sports Hacker Amazon Touchpad Blogging Branding Legal CPU HIPAA Network Congestion eWaste Keyboard Travel Smart Phones Operating Sysytem Regulations Slow WIndows 7

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...