Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

USB is a popular technology in all modes of today’s society. You’d be hard-pressed to find a modern piece of technology that’s not compatible in some way, shape or form with USB. Thumb drives, chargers, and even portable drives all use this common technology. However, this also means that hackers can take advantage of its popularity to spread malware and other problems.

Continue reading

Kindle Users May Not Like the Latest Windows 10 Upgrade

Kindle Users May Not Like the Latest Windows 10 Upgrade

If you happened to plug your Kindle into your computer and get a blue screen of death, you aren’t alone. Many Kindle users have discovered that the Anniversary update to Windows 10 has caused an issue when attempting to use USB to charge the device or transfer books. It would seem that, within moments of connecting the Kindle to a Windows 10 device, the device will lock up and display the dreaded Blue Screen of Death before rebooting.

Recent comment in this post
Olivia Fellows
Latest windows are installed for the running of the system of the man in good manner. The features of the windows and https://www.... Read More
Saturday, 20 July 2019 02:32
Continue reading
1 Comment

New Security Threat: Don’t Get Jacked While Juicing!

b2ap3_thumbnail_usb_security_tips_400.jpgHackers today are trying every approach possible to steal your device's data, including the hijacking of public USB ports. This technique is known as "juice jacking," and with this new threat, you should think twice about charging your device using a public USB charging kiosk, or even the USB port on a friend's computer.

Continue reading

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Server Network Smartphone Data Quick Tips Email Holiday Virtualization Save Money Remote Computing Going Green Business Continuity Operating System Social Media Mobile Device Management Upgrade Saving Money Office Apps Disaster Recovery Alert Android Chrome Small Business WiFi Best Practice Identity Theft Employer-Employee Relationship Ransomware Antivirus The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office Social Application Facebook Current Events Saving Time Government Lithium-ion battery Information Technology Printer Spam Bandwidth Unified Threat Management Hacking BYOD Tablet Passwords Law Enforcement Office Tips Analytics History Search Gmail Password Browser Streaming Media Education User Error communications Work/Life Balance Computers Disaster Hard Drives Maintenance Telephone Systems Fraud Humor Avoiding Downtime Phone System Router Recovery Apple Network Security Automation Encryption Gadgets Smartphones Users USB Remote Monitoring Tech Support intranet Net Neutrality Firewall iPhone Money Wireless Data Management Collaboration Laptop Transportation Shortcut Business Intelligence Wearable Technology Managed IT Services Content Filtering Proactive IT Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Customer Service Online Currency Cost Management Telephony Retail Virtual Reality BDR Wi-Fi Google Drive Entertainment DDoS Flexibility Benefits Mobile Office VPN Cybercrime Risk Management IT Solutions Office 365 Private Cloud Managing Stress App Wireless Technology Outlook Printer Server Update IT Consultant Fax Server Personal Information Data Loss Marketing Budget Administration Cleaning Online Backup End of Support Running Cable Phishing Inbound Marketing Worker Commute Robot Save Time Emails Networking Audit Display Advertising Video Games Twitter OneNote Data storage Hacker Human Resources Near Field Communication PDF Legal OneDrive Uninterrupted Power Supply Keyboard Bring Your Own Device Text Messaging Paperless Office Computer Accessories Bloatware Workplace Internet of Things Politics Applications Hiring/Firing RAM IT consulting Website Ebay Artificial Intelligence Distributed Denial of Service Scalability Miscelllaneous Mouse Sports Experience Touchpad CPU Branding Amazon Blogging eWaste How To HIPAA Network Congestion Travel Music Operating Sysytem Slow Regulations WIndows 7 Smart Phones ISP Television Storage Two-factor Authentication 3D Printing Files Books Bluetooth Windows 8 Trending Black Market Customer Relationship Management Chromecast Electronic Medical Records Cameras SharePoint HaaS User Vendor Management Instant Messaging Data Theft Excel Administrator Safety Reputation Teamwork Best Available Computing Battery CloudSync Presentation Access Emergency Meetings Prodcuctivity Programming Hosted Solution Automobile Compliance Science

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...