Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Considerations to Make When Setting Up a Guest WiFi Hotspot

b2ap3_thumbnail_wifi_guest_400.jpgYour business’s operations rely on wireless Internet in order to maintain optimal efficiency, and it’s normal to not want to share this private connection with just any stranger that wanders into your office. However, guests or potential clients that visit your office might want a piece of the action, too. It’s clear that you don’t want them accessing your private network, so the natural solution is to integrate a guest wireless hotspot that gives visitors the luxury of Internet without compromising your connection’s security.

Continue reading
0 Comments

Time to Go Mobile: 3 Mobile Device Tethering Options

b2ap3_thumbnail_wireless_signal_400.jpgMobile WiFi is an imperative part of how you get things done while you’re out and about, but did you know that you can use your mobile device as a hotspot? This is one of the many features that modern smartphones come equipped with that are designed to help you remain as productive as possible. There are three ways of tethering your device to your smartphone to take advantage of a mobile WiFi hotspot, but which one is the most efficient?

Continue reading
0 Comments

Tip of the Week: 5 Ways to Extend Your WiFi Signal

b2ap3_thumbnail_wifi_extention_400.jpgToday, having a strong WiFi signal is critical. You need a reliable signal for every part of your home, office, and even outside the building. Is your wireless signal strong in some areas and spotty in others? Would your life be immensely easier if your signal extended for just one or two more rooms? For this week’s tip, here’s how you can extend your WiFi signal.

Continue reading
0 Comments

Hairballs and WiFi Data are What the Cat Dragged In

 

warkitten_on_the_loose_400.jpgFor Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

Actually, this cat isn't a real danger to anybody. In fact, you're more at risk of getting fleas from the neighborhood strays than you are of getting hacked by them ...or at least that's what the cats want us to think. In the case of Coco, this wasn't an act of sabotage (or catotage) from the feline uprising, but rather, it's an experiment in network security by Gene Bransfield, an experiment Gene humorously calls "WarKitten."

The collar worn by Coco was outfitted with firmware, a WiFi card, an SD memory card, and a GPS module. Coco was then allowed to roam the neighborhood and he encountered a variety of different WiFi networks. Upon Coco's return, Gene was provided with data containing the names and locations of area WiFi networks, along with the networks' security settings--plus a dead bird.

The threat posed by having poor WiFi security is very real. WarKitteh can obtain important information, like whether a network is using WPA encryption or WEP keys for its security settings. WEP is an older form of WiFi security that an amateur hacker can access, and much to Gene's surprise, WarKitteh yielded him with the names and locations of several WiFi networks in his neighborhood using the outdated WEP security. Equally surprising was the fact that one-third of the WiFi networks from the WarKitteh used WEP.

While it's not likely that Coco will be showing up in your backyard, there's a good chance that a hacker could pull off the same feat. In fact, it's a common practice for hackers to harvest WiFi network information by simply driving past homes in vehicles equipped with the same data collection technology.

After the data is crunched, hackers can then breach WiFi networks by bypassing WEP security, and then use the IP addresses and for nefarious purposes. In fact, there are several stories where this happens and SWAT teams follow the connection to a hacked household, storm the perimeter, and subdue the residents, only to later discover that the innocent party had their WiFi hacked. This is exactly how the cats plan on turning us against each other.

Having strong WiFi security for your business is important. A hacker that can penetrate your network via WiFi can do a lot of damage. A PC Geek can protect your business by assessing the security of your company's network, and equipping you with an enterprise-level security solution that not even the cleverest cat can hack. Call us today at (469) 567-0181 to cat-proof your company's network!

 

Continue reading
0 Comments

Is WiFi Service a Burden or an Investment for Your Business?

b2ap3_thumbnail_do_you_offer_free_wifi_400.jpg"Free WiFi Zone." You see the sign advertised in the window of a new coffee shop. You've got a lot of work to do and you want a change of scenery, so you pack up your laptop and pay them a visit. The coffee is great, but the WiFi service is lousy. In fact, the spotty WiFi service is so poor that you get frustrated and leave, vowing to never shop there again.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Holiday Server Network Data Quick Tips Smartphone Email Virtualization Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Apps Office Disaster Recovery Android Chrome Small Business Employer-Employee Relationship Social Ransomware Facebook WiFi Identity Theft Mobility Antivirus The Internet of Things Application Big Data Managed Service Provider Best Practice Microsoft Office Analytics History Search Gmail Saving Time Browser Current Events Lithium-ion battery Government Printer Information Technology Spam Law Enforcement BYOD Bandwidth Office Tips Unified Threat Management Password Hacking Tablet Passwords USB Users intranet Net Neutrality Telephone Systems Firewall iPhone Collaboration Laptop Humor Recovery Streaming Media Education Network Security Hard Drives Maintenance Automation User Error Fraud Computers Disaster Avoiding Downtime Phone System Wireless Router Encryption Apple Money Data Management Work/Life Balance Remote Monitoring Gadgets Tech Support Smartphones communications IT Consultant Customer Service Fax Server Telephony Flexibility Outlook Data Loss Printer Server Virtual Reality Google Drive Wearable Technology DDoS Marketing Proactive IT Benefits Administration Online Currency Office 365 Content Filtering Point of Sale Cybercrime Risk Management PowerPoint Cost Management Private Cloud Retail Managing Stress BDR Wireless Technology Entertainment Personal Information Update Mobile Office VPN Budget Managed IT Services Transportation Shortcut App Business Intelligence IT Solutions Internet Exlporer Biometrics Wi-Fi Social Engineering Computing Keyboard Data storage Cameras Human Resources Near Field Communication PDF Politics Data Theft Prodcuctivity Uninterrupted Power Supply Hiring/Firing Scalability Online Backup Text Messaging Experience CloudSync Computer Accessories Bloatware Internet of Things Applications How To IT consulting Programming Artificial Intelligence Distributed Denial of Service Music Compliance Mouse Display Sports Touchpad Branding eWaste Books Inbound Marketing Network Congestion Emails Audit Operating Sysytem Black Market WIndows 7 OneNote Television Electronic Medical Records Twitter Storage Two-factor Authentication HaaS Files Bluetooth Instant Messaging OneDrive RAM Trending Safety Website Ebay Customer Relationship Management Bring Your Own Device Chromecast SharePoint Battery Paperless Office User Workplace CPU Amazon Emergency Blogging Excel Administrator Reputation Teamwork Automobile Miscelllaneous Best Available Slow Smart Phones Cleaning Presentation Access Meetings Worker Commute HIPAA Hosted Solution Save Time Travel Windows 8 Science Regulations Video Games End of Support Running Cable Phishing ISP 3D Printing Hacker Vendor Management Robot Networking Legal Advertising

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code