Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Considerations to Make When Setting Up a Guest WiFi Hotspot

b2ap3_thumbnail_wifi_guest_400.jpgYour business’s operations rely on wireless Internet in order to maintain optimal efficiency, and it’s normal to not want to share this private connection with just any stranger that wanders into your office. However, guests or potential clients that visit your office might want a piece of the action, too. It’s clear that you don’t want them accessing your private network, so the natural solution is to integrate a guest wireless hotspot that gives visitors the luxury of Internet without compromising your connection’s security.

Continue reading
0 Comments

Time to Go Mobile: 3 Mobile Device Tethering Options

b2ap3_thumbnail_wireless_signal_400.jpgMobile WiFi is an imperative part of how you get things done while you’re out and about, but did you know that you can use your mobile device as a hotspot? This is one of the many features that modern smartphones come equipped with that are designed to help you remain as productive as possible. There are three ways of tethering your device to your smartphone to take advantage of a mobile WiFi hotspot, but which one is the most efficient?

Continue reading
0 Comments

Tip of the Week: 5 Ways to Extend Your WiFi Signal

b2ap3_thumbnail_wifi_extention_400.jpgToday, having a strong WiFi signal is critical. You need a reliable signal for every part of your home, office, and even outside the building. Is your wireless signal strong in some areas and spotty in others? Would your life be immensely easier if your signal extended for just one or two more rooms? For this week’s tip, here’s how you can extend your WiFi signal.

Continue reading
0 Comments

Hairballs and WiFi Data are What the Cat Dragged In

 

warkitten_on_the_loose_400.jpgFor Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

Actually, this cat isn't a real danger to anybody. In fact, you're more at risk of getting fleas from the neighborhood strays than you are of getting hacked by them ...or at least that's what the cats want us to think. In the case of Coco, this wasn't an act of sabotage (or catotage) from the feline uprising, but rather, it's an experiment in network security by Gene Bransfield, an experiment Gene humorously calls "WarKitten."

The collar worn by Coco was outfitted with firmware, a WiFi card, an SD memory card, and a GPS module. Coco was then allowed to roam the neighborhood and he encountered a variety of different WiFi networks. Upon Coco's return, Gene was provided with data containing the names and locations of area WiFi networks, along with the networks' security settings--plus a dead bird.

The threat posed by having poor WiFi security is very real. WarKitteh can obtain important information, like whether a network is using WPA encryption or WEP keys for its security settings. WEP is an older form of WiFi security that an amateur hacker can access, and much to Gene's surprise, WarKitteh yielded him with the names and locations of several WiFi networks in his neighborhood using the outdated WEP security. Equally surprising was the fact that one-third of the WiFi networks from the WarKitteh used WEP.

While it's not likely that Coco will be showing up in your backyard, there's a good chance that a hacker could pull off the same feat. In fact, it's a common practice for hackers to harvest WiFi network information by simply driving past homes in vehicles equipped with the same data collection technology.

After the data is crunched, hackers can then breach WiFi networks by bypassing WEP security, and then use the IP addresses and for nefarious purposes. In fact, there are several stories where this happens and SWAT teams follow the connection to a hacked household, storm the perimeter, and subdue the residents, only to later discover that the innocent party had their WiFi hacked. This is exactly how the cats plan on turning us against each other.

Having strong WiFi security for your business is important. A hacker that can penetrate your network via WiFi can do a lot of damage. A PC Geek can protect your business by assessing the security of your company's network, and equipping you with an enterprise-level security solution that not even the cleverest cat can hack. Call us today at (469) 567-0181 to cat-proof your company's network!

 

Continue reading
0 Comments

Is WiFi Service a Burden or an Investment for Your Business?

b2ap3_thumbnail_do_you_offer_free_wifi_400.jpg"Free WiFi Zone." You see the sign advertised in the window of a new coffee shop. You've got a lot of work to do and you want a change of scenery, so you pack up your laptop and pay them a visit. The coffee is great, but the WiFi service is lousy. In fact, the spotty WiFi service is so poor that you get frustrated and leave, vowing to never shop there again.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health Communication User Tips IT Support VoIP Business Management Email Holiday Virtualization Server Network Smartphone Data Quick Tips Office Disaster Recovery Apps Alert Save Money Remote Computing Going Green Operating System Business Continuity Social Media Mobile Device Management Upgrade Saving Money Android Chrome Small Business Employer-Employee Relationship Microsoft Office Ransomware Social Facebook WiFi Identity Theft Antivirus Application The Internet of Things Best Practice Big Data Mobility Managed Service Provider Analytics History Search Gmail Browser Current Events Saving Time Government Lithium-ion battery Law Enforcement Printer Information Technology Office Tips Spam Bandwidth Password Unified Threat Management Hacking BYOD Tablet Passwords Smartphones Telephone Systems Remote Monitoring Users USB Humor Tech Support Wireless Recovery intranet Firewall Net Neutrality iPhone Network Security Automation Collaboration Laptop Streaming Media Work/Life Balance Education User Error Maintenance Computers Disaster Hard Drives Fraud Avoiding Downtime Phone System Money Data Management Router Apple communications Encryption Gadgets Virtual Reality App Google Drive Personal Information Outlook DDoS Printer Server Benefits IT Consultant Fax Server Marketing Data Loss Managed IT Services Administration Cybercrime Risk Management Wearable Technology Content Filtering Proactive IT Private Cloud Point of Sale Managing Stress Wi-Fi Wireless Technology PowerPoint Cost Management Online Currency Flexibility Retail Update BDR Entertainment Budget Mobile Office Transportation Shortcut Business Intelligence Office 365 Internet Exlporer VPN Biometrics Social Engineering IT Solutions Telephony Customer Service Windows 8 PDF Instant Messaging Uninterrupted Power Supply Safety Computer Accessories Vendor Management Cameras Text Messaging Battery Internet of Things Emergency Bloatware Data Theft Applications IT consulting Computing Mouse Artificial Intelligence Distributed Denial of Service Automobile Sports Cleaning CloudSync Touchpad Branding Worker Commute Prodcuctivity Network Congestion eWaste Programming Save Time Compliance Online Backup Operating Sysytem Video Games WIndows 7 Storage Television Files Hacker Two-factor Authentication Inbound Marketing Emails Audit Bluetooth Legal Display Trending OneNote Chromecast Keyboard Customer Relationship Management Twitter SharePoint User Politics Excel OneDrive Administrator Hiring/Firing Bring Your Own Device Reputation Teamwork Scalability Best Available Experience Paperless Office Workplace Access Presentation Website RAM Meetings How To Hosted Solution Music Science Ebay Miscelllaneous Phishing Blogging CPU End of Support Running Cable Amazon Books HIPAA Travel Robot Networking Regulations Slow Advertising Black Market Smart Phones ISP Electronic Medical Records Data storage 3D Printing Human Resources HaaS Near Field Communication

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code