1 2 3 5

Cleaning Your Computer

This entry is part 2 of 2 in the series cleaning


Is your computer making noises or humming? Is dust collecting visibly on the external fan surface? Is your machine running hot or shutting itself down for no apparent reason? Have you gone more than two months without cleaning your machine? If you have answered yes to any of these questions it may be time to clean your machine.

Dust inside your computer can lead to component failureRead More, fan failure, and slow performance. Keep your machine running smoothly and safely by taking the time to dust the interior. Don’t wait until a fan dies and your machine overheats with possibly irreversible damage to your hard drive, video card or motherboard.

Most people take the maintenance of their software seriously, running virus scans and installing protective software to guard against viruses, malware and trojans. In fact we highly recommend Microsoft Security Essentials to all of our clients which is absolutely free, made to integrate with your Windows operating system and easy to use. But when it comes to the hardware most people do not think about it until it is too late or they are intimidated by the thought of taking their machine apart. Continue reading

How to Protect Your Computer During a Thunderstorm

This entry is part 13 of 13 in the series Education

Each year computer technicians are flooded with repair requests from customers whose systems have been damaged from thunderstorms, some of which will be irreparable. Damage during a thunderstorm can be prevented by anyone willing to take a few preventive steps.

Surge Protectors:
Surge Protectors contain a fuse or a breaker that is designed to blow or tripRead Morewhen coming into contact with an electric surge. With these devices you literally get what you pay for in protection-some surge protectors come with a guarantee to replace any items that are damaged by surges while plugged into the device. Invest in the best one you can afford.

UPS (Universal Power Supply):
A Universal Power Supply is a step up from a surge protector in terms of protection. UPS devices not only protect your computer from surges but also work to prevent unexpected shutdowns due to power dips and outages. For instance, if your computer were writing information to its’ hard drive when the power was suddenly shut off that information will not get saved-and your hard drive could be damaged by being interrupted during such a sensitive process. A case of data corruption may prevent Windows from being able to load, forcing you to reinstall your operating system and possibly lose precious files as well. Worse-case scenario can result in a failed hard drive as the sensitive drive electronics are interrupted during the write process. A universal power supply will not only protect your computer from power surges during a thunderstorm but will also enable you to gracefully save all of your open files and shut down your computer properly during a power outage, protecting your system from damage.

Knots in the Power Cord:
Some people have learned the hard way the damage that could be wreaked from thunderstorms. Here is one old tech trick. Tie five overhand knots in your power cords, spacing them an inch or so apart. Do the same thing for phone cords as well. The jolt of electricity will burn itself out traveling back over itself, frying the electric and phone cords but sparing your computer. I wouldn’t swear by this method but have heard of some people who have had a couple of scorched phone cords after thunderstorms but did not lost a single modem or computer. I honestly do not know the technicalities of how this one works; only that it is one tech trick that is could be rather effective.

Disconnecting your Computer:
The best way to protect your computer during a thunderstorm is to disconnect it entirely from the electrical system in your house. Unplug your computer from the wall outlet and make sure that any device that is attached to the computer is disconnected from the power as well. Disconnect your phone line/DSL/cable/satellite connection from your modem and power that device off as well. By literally severing the connection between power sources and computer you are removing the pathways for a surge and are insulating your system from any possibility of damage. Continue reading

CryptoLocker Update

This entry is part 8 of 8 in the series Viruses


Earlier this year, I wrote about what was then the newest and most widespread malware infecting computers worldwide, known as CryptoLocker. At the time I referred to it as “Game-Changing Malware.”

There have been quite a few developments along these lines since then, and this type of malware has become one of the most destructive threats of all time. Most of these developments have been of what we would have to consider a negative variety, but there is also a ray of good news thrown in for some victims of a CryptoLocker infection. First, here is a review of the evolution of encrypting ransomware over the past 10 months.

Evolution of encrypting ransomware, September, 2013 – August, 2014

Just about the time the original CryptoLocker was starting to make a significant impact (and a lot of money for its authors), a variation appeared that looked very much like the original. The infection methods were the same, the encryption was apparently done in the same way, and the message that showed up on the infected computer was almost identical to the original. There were only two obvious differences.

The original CryptoLocker initially set a price of $100 for the decryption key; this imitator demanded $300. But by that time the original authors had also raised their price to the same $300. The original gave the victim two options for paying the ransom – either a MoneyPak non-refundable debit card or payment in Bitcoin; the imitator would only accept payment via Bitcoin.

But on further analysis, several anti-virus vendors determined that this imitator was most likely produced by a totally different programmer or, more likely, programming team. They discovered that it was written in a different programming language from the original, and many other differences became apparent upon disassembly of the program and comparison to the original.

Since then, at least 6 similar programs have been released into the wild with a CryptoLocker-type payload. These are known generically as encrypting ransomware, and they continue to spread and evolve into even more-sophisticated threats. Most of these variants are obviously different programs, produced by different programming groups, each with its own twist on the distribution, payment amount and payment mechanism, and the message that is displayed after the user’s data files have been encrypted. Continue reading


This entry is part 1 of 1 in the series Kids


In their book, “Toddlers on Technology,” Patti Wollman Summers (early childhood educator and Head of the Parenting Program at the Mandell School), neuropsychologist Ann DeSollar-Hale, PhD, and Heather Ibrahim-Leathers explore the way today’s toddlers are interacting with technology. Is time spent with digital media helpful, harmful, or both?

According to a study released in October 2013 by Common Sense Media, “Zero to Eight: Children’s Media Use in America 2013”:

“Among families with children age 8 and under, there has been a five-fold increase in ownership of tablet devices such as iPads, from 8% of all families in 2011 to 40% in 2013.”

In spite of the American Academy of Pediatrics (AAP) recommendation that parents restrict access to media for children under the age of 2, Common Sense Media reports that “38% of children under 2 have used a mobile device for media (compared to 10% two years ago).”

While these statistics maybe alarming to the AAP, the writers of “Toddlers on Technology” insist that exposure to appropriate apps on a mobile touchscreen device actually has some significant benefits, even for young children. Continue reading

How to keep kids safe online.

This entry is part 1 of 1 in the series Kids Safety


If you have young children who use a PC at home there are a number of steps which you can take to keep them safe and which allow you to monitor the web sites that they are browsing. One of the easiest way is to set up ” Microsoft family safety” which is a suite of free programs which can help you restrict and monitor your children’s online activity. Continue reading

Recycle Bin Useage

This entry is part 1 of 1 in the series recycle bin

You see it there, lurking in the corner, but how does one exactly use the Recycle Bin? I am here to tell you how.

Normally when you delete a photo or a file it is not really deleted, first it really only goes to the recycle bin. This gives you a second chance to change your mind and fetch it back in case you deleted it by mistake. Continue reading

Need to upgrade you Ram??

This entry is part 1 of 1 in the series Memory

Computer Technical Service. Isolated 3D Image


Computerization in every field has become a need of the hour today. With the growing requirements of data storage facility by all professional, the computer also requires up gradation on regular intervals. Hardware & software like Computer RAM, USB memory, pen drives and flash drives require sophisticated & expert treatment.

Most of us are not very clear with the concept that helps in better performance of the computer. The quickest way to speed up your computer is by adding more computer RAM to your system.This will surely leave your data processor to run programs much faster as computer RAM is considered to be the primary storehouse of all information when you are applying it. Capacity like 128MB, 256MB and 512MB are considered to be outdated, but when you are looking for premium quality performance, your computer needs latest versions of memory modules which range from 1GB to 8GB RAM.

The two types of RAM available are DRAM (Dynamic Random Access Memory) and SDRAM (Static Random Access Memory). The process of storing data in these two Ram type is different. Though SRAM is considered to be much faster in processing and does not even require being refreshed again & again, DRAM is more popular in terms of usage because it is cheaper in cost.

As we all know now that Computer RAM is the largest storehouse of information in the computer, it is the temporary house for storing

current data which is in use, that is why the information can be loaded much faster. However, it is not the permanent storage of the information and the same is lost when the system is switched off. In case the information had to be read directly from the hard disk, it would have made the computer very slow. Continue reading

How Often Should You Clean the Dust Out Of Your Computer?

This entry is part 1 of 2 in the series cleaning


The frequency of how often you should clean the dust out of your computer (or laptop) may vary depending on the environment it is used in.

Annual or quarterly cleanings may be acceptable for most machines, while monthly cleanings may be better suited for computers used in areas where there are pets, smokers, a lot of dirt/dust, or if the computer is used on carpet or bed.

Benefits of Keeping Your Computer Dust-Free

Keeping your computer free of dust build up will ensure that your machine is getting the proper air-flow to keep cool.  Cleaning the dust out of your computer on a regular basis can help prevent (or resolve) overheating problems, reducing the chances of hardware failure stemming from cooling issues. Continue reading



GoDaddy customers, beware!

There is a new phishing scam making the email rounds this month. Here is an example of what to look for:

Subject: Status Alert: Your account contains more than [number] directories.


Your account contains more than [number] directories and may pose a potential performance risk to the server.

Please reduce the number of directories for your account to prevent possible account deactivation.

In order to prevent your account from being locked out we recommend that you create special tmp directory.

Or use the link below:

[innocuous-looking GoDaddy link which really points to a Russian domain]


If you happen to receive this email, don’t click any links inside it! You can contact GoDaddy directly through their website at GoDaddy.comor by calling them at GoDaddy Phone Number 480-505-8877. Continue reading


This entry is part 1 of 1 in the series Gadgets


As a self-professed Nerd, I can attest to one thing: technology is expensive. Now that many back-to-school lists include computers, mobile devices or parts to rehab an ailing family PC, the fall has become a good time to find tech bargains since stores compete to get your business. You can save a few bucks, if you know some “insider” tips.

1. Comparison shop.
There are some great bargain consolidation sites that gather all the best deals from across the Internet and post them in one place. Even if you have your heart set on getting the product at a local retailer, sites like SlickDeals.net and DealNews.com will at least let you know whether or not you’re getting a reasonable price at the “brick and mortar” store.

Users submit deals that they find to SlickDeals and when the post gets a high enough rating (by others confirming that the deal is legit) it gets moved up to the top of the page.

DealNews collects the best deals on Computers, Electronics, Home and Office and more and posts them in an easily searchable format. This is one reason I prefer this site to my old favorite, techbargains.com, which is a little scattered if you’re looking for something specific. Items are posted with photos and detailed descriptions, including any necessary coupon codes to get the deal, allowing you to quickly find what you’re looking for at a great price.

2. Go where the Nerds go.
Ask any Nerd where they buy computer equipment and gadgets and they will most certainly list two sites that you’ve probably never heard of (unless you’re a closet Nerd yourself): Newegg.com and TigerDirect.com. Continue reading

1 2 3 5
Blog Search
Blog Subscription
Email *
website security
Call Now- 678.913.3156
Mac & PC Services

Virus Removal 

Advanced Data Recovery

Laptop Screen Repair

Small Business Support

Wireless Set Up & Support

Web Site Design

Low Voltage Support

Remote Repairs

And Much Much More