Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Considerations to Make When Setting Up a Guest WiFi Hotspot

b2ap3_thumbnail_wifi_guest_400.jpgYour business’s operations rely on wireless Internet in order to maintain optimal efficiency, and it’s normal to not want to share this private connection with just any stranger that wanders into your office. However, guests or potential clients that visit your office might want a piece of the action, too. It’s clear that you don’t want them accessing your private network, so the natural solution is to integrate a guest wireless hotspot that gives visitors the luxury of Internet without compromising your connection’s security.

Continue reading
0 Comments

Time to Go Mobile: 3 Mobile Device Tethering Options

b2ap3_thumbnail_wireless_signal_400.jpgMobile WiFi is an imperative part of how you get things done while you’re out and about, but did you know that you can use your mobile device as a hotspot? This is one of the many features that modern smartphones come equipped with that are designed to help you remain as productive as possible. There are three ways of tethering your device to your smartphone to take advantage of a mobile WiFi hotspot, but which one is the most efficient?

Recent comment in this post
Destiny Wagner
Aspire tech is the news base forum which is provide the information of the news from whole over the world as well as this is the b... Read More
Saturday, 12 October 2019 03:26
Continue reading
1 Comment

Tip of the Week: 5 Ways to Extend Your WiFi Signal

b2ap3_thumbnail_wifi_extention_400.jpgToday, having a strong WiFi signal is critical. You need a reliable signal for every part of your home, office, and even outside the building. Is your wireless signal strong in some areas and spotty in others? Would your life be immensely easier if your signal extended for just one or two more rooms? For this week’s tip, here’s how you can extend your WiFi signal.

Continue reading
0 Comments

Hairballs and WiFi Data are What the Cat Dragged In

 

warkitten_on_the_loose_400.jpgFor Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

Actually, this cat isn't a real danger to anybody. In fact, you're more at risk of getting fleas from the neighborhood strays than you are of getting hacked by them ...or at least that's what the cats want us to think. In the case of Coco, this wasn't an act of sabotage (or catotage) from the feline uprising, but rather, it's an experiment in network security by Gene Bransfield, an experiment Gene humorously calls "WarKitten."

The collar worn by Coco was outfitted with firmware, a WiFi card, an SD memory card, and a GPS module. Coco was then allowed to roam the neighborhood and he encountered a variety of different WiFi networks. Upon Coco's return, Gene was provided with data containing the names and locations of area WiFi networks, along with the networks' security settings--plus a dead bird.

The threat posed by having poor WiFi security is very real. WarKitteh can obtain important information, like whether a network is using WPA encryption or WEP keys for its security settings. WEP is an older form of WiFi security that an amateur hacker can access, and much to Gene's surprise, WarKitteh yielded him with the names and locations of several WiFi networks in his neighborhood using the outdated WEP security. Equally surprising was the fact that one-third of the WiFi networks from the WarKitteh used WEP.

While it's not likely that Coco will be showing up in your backyard, there's a good chance that a hacker could pull off the same feat. In fact, it's a common practice for hackers to harvest WiFi network information by simply driving past homes in vehicles equipped with the same data collection technology.

After the data is crunched, hackers can then breach WiFi networks by bypassing WEP security, and then use the IP addresses and for nefarious purposes. In fact, there are several stories where this happens and SWAT teams follow the connection to a hacked household, storm the perimeter, and subdue the residents, only to later discover that the innocent party had their WiFi hacked. This is exactly how the cats plan on turning us against each other.

Having strong WiFi security for your business is important. A hacker that can penetrate your network via WiFi can do a lot of damage. A PC Geek can protect your business by assessing the security of your company's network, and equipping you with an enterprise-level security solution that not even the cleverest cat can hack. Call us today at (469) 567-0181 to cat-proof your company's network!

 

Continue reading
0 Comments

Is WiFi Service a Burden or an Investment for Your Business?

b2ap3_thumbnail_do_you_offer_free_wifi_400.jpg"Free WiFi Zone." You see the sign advertised in the window of a new coffee shop. You've got a lot of work to do and you want a change of scenery, so you pack up your laptop and pay them a visit. The coffee is great, but the WiFi service is lousy. In fact, the spotty WiFi service is so poor that you get frustrated and leave, vowing to never shop there again.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Windows 10 Miscellaneous Workplace Tips Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Email Network Holiday Data Quick Tips Virtualization Operating System Social Media Upgrade Going Green Office Business Continuity Mobile Device Management Saving Money Apps Disaster Recovery Alert Save Money Remote Computing Chrome Small Business Android Identity Theft The Internet of Things Mobility Antivirus Big Data Managed Service Provider Microsoft Office Social Application Facebook Best Practice Employer-Employee Relationship WiFi Ransomware Unified Threat Management Lithium-ion battery Hacking Tablet Printer Passwords BYOD Law Enforcement Office Tips Analytics History Gmail Search Password Browser Current Events Government Information Technology Spam Saving Time Bandwidth Avoiding Downtime Phone System Router Hard Drives Recovery Maintenance Apple Network Security Automation Fraud Gadgets Smartphones Users USB Wireless Encryption Data Management Money Remote Monitoring Work/Life Balance Tech Support Streaming Media Education User Error communications intranet Net Neutrality Firewall Computers iPhone Disaster Laptop Telephone Systems Collaboration Humor Mobile Office Benefits Office 365 Online Currency Cybercrime IT Solutions Risk Management Personal Information Private Cloud Managing Stress Wireless Technology Outlook VPN Printer Server Update Managed IT Services Marketing Budget Administration App Transportation Shortcut Business Intelligence Content Filtering Internet Exlporer Wi-Fi Point of Sale IT Consultant Biometrics Fax Server PowerPoint Social Engineering Flexibility Telephony Customer Service Data Loss Cost Management Retail Wearable Technology Virtual Reality BDR Google Drive Entertainment DDoS Proactive IT Internet of Things Bloatware Music Workplace Applications Display IT consulting Miscelllaneous Mouse Artificial Intelligence Distributed Denial of Service Sports Books Touchpad Branding HIPAA Network Congestion Black Market eWaste Travel Electronic Medical Records HaaS Operating Sysytem Regulations WIndows 7 Storage Instant Messaging ISP Television Files Two-factor Authentication Website Safety RAM 3D Printing Bluetooth Ebay Battery Trending Chromecast Amazon Customer Relationship Management Blogging Emergency CPU Cameras SharePoint User Data Theft Excel Automobile Administrator Smart Phones Cleaning Slow Reputation Teamwork Best Available CloudSync Worker Commute Access Windows 8 Save Time Presentation Video Games Meetings Hosted Solution Compliance Science Programming Vendor Management Hacker Phishing Legal End of Support Running Cable Inbound Marketing Robot Computing Emails Networking Keyboard Audit Advertising Twitter Politics OneNote Data storage Prodcuctivity Human Resources Hiring/Firing Near Field Communication Scalability PDF Uninterrupted Power Supply Experience OneDrive Online Backup Bring Your Own Device Paperless Office Computer Accessories How To Text Messaging

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code