If you’ve noticed your home internet experience declining recently, with Netflix frequently buffering, lag in online games, or spotty Wi-Fi coverage throughout the house, it may be time for an upgrade.
Before you get frustrated with the slowdowns and dropouts, let’s evaluate if a new router could resolve these issues. A modern model designed to handle today’s bandwidth-heavy demands may be just what you need to restore fast, seamless Wi-Fi where you need it most.
Slowing Performance as the Network Grows
In the last 5–10 years, home networks have seen exponential growth in connected devices. Where households once had only a computer or two, it’s now common to have 10 or more devices simultaneously using the router for streaming media, Web browsing, online gaming, and more.
This increased bandwidth demand stresses older routers that are not designed for high-traffic networks. They have less powerful processors, less memory, and less advanced chipsets than newer models. Over time, an aging router may struggle to keep up, resulting in lagging or buffering issues.
Frequent Disconnections and Requiring Reboots
If you’ve noticed your Wi-Fi signal cutting out regularly, forcing you to reboot the router to get reconnected, this is a telltale sign that the router may be on the way out.
Outdated Wireless Standards
The Wi-Fi standards supported by routers have advanced rapidly in the last five years alone. Older models may be capable of only slower legacy standards such as 802.11b/g or 802.11n, while newer devices take full advantage of the increased speeds that standards such as 802.11ac (Wi-Fi 5) and 802.11ax (Wi-Fi 6) provide.
It also leaves you vulnerable, as older standards have known security flaws that newer protocols have addressed.
Missing Security Updates
Wireless router manufacturers typically support a device with firmware security updates for around five years after its release. But after that point, if new exploits are discovered, your older router model may no longer receive patches, leaving it open to hacks and malware.
By upgrading to a currently supported model, you can ensure the latest bug and vulnerability fixes for years to come, keeping your home network protected as threats evolve.
Feeling left behind by your ISP router?
If your current router was supplied by your internet service provider (ISP) as part of the connection package, it was likely a very basic and low-cost model selected to meet the minimum functionality requirements.
While “free” at the time, these OEM routers are often underpowered for today’s needs. An independently purchased router gives you complete control to choose a model tailored to your specific usage scenarios, such as whole-home coverage, fast speeds, or robust parental controls, ensuring you get the most out of your broadband home network.
Is it time for an upgrade?
If any of the issues above seem familiar or you want a faster, more reliable network throughout your home, an upgrade to a new, higher-performance router is well worth the investment.
Give us a call today at (651) 456-8655 or visit our Contact page, and one of our experts can recommend the right model for your needs while also handling hassle-free installation.
Reasons to Rethink Your ISP-Provided Router (10/25/2023)
When you sign up with your internet service provider (ISP), you may also get a modem and router combination. It could be free, a rental, or something you buy outright. Before assuming that this is the best device for your needs, weigh up these considerations.
Many ISPs provide you with a proprietary router and modem. Your internet service plan may include it for a rental fee, or you might have to pay over time to buy the device. If that’s the case, find out how much the modem and router would cost to buy outright. You might be able to buy a higher-quality device at a better price.
Other times, ISPs offer free modems and/or routers included with your plan. The price is reasonable, sure, but you could be getting a low-quality device. You might want to upgrade to a better option for not much more money.
What you need to know about modems and routers
Your home network requires a modem, router, or combination device. The latter are becoming more common.
The modem connects your home to your ISP through a physical connection. This device translates ISP data into a format your home network devices can use.
The router creates a local area network (LAN), connecting your devices to your modem. This allows your computers, laptops, tablets, and smartphones to connect to the internet. You’ll have either a wired or wireless router.
In summary, the modem sends and receives internet signals, while the router distributes them to your devices.
What to look for in a router
Before relying on an ISP router, consider the benefits of store-bought devices.
If parental controls are important to you, shop for a router offering those features. You may have parental control apps on your devices, but having the controls on the router can be more effective.
Encourage a safer online environment for children with features such as:
website filtering
content filtering
time restrictions
safe search
device management
reports and alerts
remote management
You can also improve network security with a router that allows you to set up a separate guest network. Provide guests with internet access without worrying they can access your private network.
You can also look for a router that supports Quality of Service (QoS). This feature allows you to allocate internet bandwidth to different devices or applications. For example, you can prioritize a work computer with more bandwidth than a gaming console.
Don’t settle for the ISP’s equipment
We’ve given you plenty of reasons to rethink your ISP’s router, yet choosing an alternative could overwhelm you. We can help you identify the right solution for your specific needs. Contact us today at (651) 456-8655 or visit our Contact page.
Keeping Kids Safe on Discord and Online Platforms – 9/25/2023
You might remember setting up a “telephone” with a friend made with cups and a string. Or feel nostalgic for the novelty of having your own phone line in your home growing up. Meanwhile, we’re raising the digital generation. They game online, chat online, stream TV online…everything is online. One popular channel for kids’ conversations? Discord. Here’s help keeping your kids safe on this and other online platforms.
Discord is a popular communication platform connecting communities of people online. It’s particularly popular with gamers. But kids use it for real-time voice and video calls, screen sharing, and group or private chats.
Ultimately, Discord is a versatile and powerful platform. That means it’s important to guide young users in using it responsibly.
Keeping Kids Safe on Discord
Discord requires its users to be at least 13 years old, but this is not enforced. Protecting your kids requires communication, as well as an understanding of the platform’s safety features.
Discord users can share text messages, images, GIFs, videos, and links in their channels. That means your child may encounter inappropriate content.
Reduce the probability by setting up Family Center to connect your account with your child’s:
Open Discord.
Tap on Family Center.
In user Settings, toggle the Enable Family Center tab.
Scan the QR code under your child’s Connect with Your Parent option in their Family Center tab.
Once you’re connected, you’ll be able to see friend requests, who they make calls to, and who they have messaged, although you won’t be able to see the content of those calls and messages. You can also track which servers (think of it like a text thread) they take part in. You can also receive weekly recaps via email.
It’s also a good idea to:
Encourage your child to accept friend requests only from people they know in real life;
Review their friend list to ensure no unfamiliar users are added;
Set up Safe Direct Messaging, which prevents direct messages from users not on the friend list;
Review and adjust privacy settings to enable content filters and to control who can send friend requests, see their online status, and more.
Enable two-factor authentication (2FA) on the account for added security.
Online Safety for Kids
Controls can help, but you probably want to pair online safety with giving autonomy.
Communicate with your child about online safety. Teach them about not sharing personal information and reporting any uncomfortable situations. Remind them that someone may not be who they say they are. Warn them of the risks of meeting up with someone they meet online.
Setting screen time limits can also help curtail your child’s online activity. This encourages them to set boundaries and continue to develop other interests.
Lead by example by limiting your own online time and treating others with kindness. Encouraging critical thinking can also help your child’s digital literacy. Ask them to think about a cyberbully’s motives, or discuss why taking responsibility for online activity is important.
Finally, let them know they can come to you with concerns or uncomfortable situations. Online safety is an ongoing process. Stay involved in and updated about your child’s online activities.
Need help understanding new technologies your child is using? Our IT experts can help set up a safer online environment for your entire family. Call us today at (651) 456-8655 or visit our Contact page.
“What’s that password again? Wait, I changed it… Harrumph. I don’t remember!” We’ve all been there, sometimes many times a day. Password autofill on our Web browsers felt like the sun was shining on our online activity again. Sorry to tell you, but this convenience may not be entirely safe.
Most browsers will ask after you’ve entered a new password into a site or changed a password if you want it stored for you. That way, when you revisit that site, the browser can autofill the access credentials for you. It saves you the struggle of trying to keep all your passwords straight.
The problem is that some sites, including legitimate sites, can be compromised with a hidden form. You’ll never see it, but your browser will. So, it will autofill that form, and in clear, unencrypted text. This allows bad actors to capture your username and password without your knowledge.
Another risk? Irresponsible digital marketers may use hidden autofill forms to track your online activity. That’s done without your consent.
Using browser autofill with a password manager can also cause confusion, especially if your browser autofills, whereas the manager asks before filling in forms. Using both at the same time you also run the risk of duplicating passwords, which could make it difficult to track your passwords and increase the risk of security breach.
How to disable autofill
You can protect your passwords by disabling autofill on any browser you use:
On Microsoft Edge, go to Settings, then Profiles, then Passwords, and disable “Offer to save passwords.”
On Google Chrome, go to Settings, then Passwords, and disable “Offer to save passwords.”
On Firefox, open Settings, then Privacy & Security, then Logins and Passwords, and “Autofill logins and passwords.”
On Safari, from the Preferences window, select and turn off Auto-fill.
Can I keep using password managers?
A password manager, such as LastPass or 1Password, typically provides more security than browser autofill. Password managers have strong encryption algorithms to protect your login credentials, which means that even if your device is compromised, your passwords are safe.
Still, if the manager autofills your credentials, you face the same risks. Most password managers have autofill disabled by default. That’s good. Leave preemptive autofill off. You might see it called “Autofill on page load.” Keep that turned off, too.
Our advice? Use a password manager that requires you to click a box before it fills in your credentials. This action avoids your information from automatically populating a hidden form.
Securing your online activity is an ongoing challenge. Our experts can help identify ways you can protect your privacy and data online. Contact us today at (651) 456-8655 or visit our contact page.
Mobile apps let us play, teach us, give us social media or music, and more. No wonder there were more than 142 billion downloads in 2022! Going to Google or Apple’s mobile stores to find the app you want feels safe, but even these heavy hitters can’t guarantee you’re downloading something secure.
Google and Apple do their best, but they are vetting many thousands of new apps submitted monthly. The vast majority of their offerings aren’t a threat, but some malicious apps can make it through.
What do malicious app downloads do?
Apps downloaded from mobile stores are typically more secure than your Web activity. On an app, you’re within a contained system, whereas on the Web, you click through various links and visit websites which could have viruses or malware.
Still, a malicious app can infect your smartphone and cause several issues:
Ad fraud. The app runs in the background and sends ad clicks to different websites. This runs down your battery and slows your phone activity.
Data theft. If you give a malicious app permission to cross the app/data divide, it could lead to information being stolen.
Browser hacking. The app may open website browsers that put you at risk of sharing sensitive data.
Apps access all your information (SMS, camera, contacts) and take control of your device.
Keep your mobile phone safe
When looking to download a mobile app, do your research. Look at the ratings and how many downloads it has had. Application reviews can also help you verify the credibility of the app. Check the logo and the name of the creator, too. You don’t want to install something from Microsaft instead of Microsoft.
Keep your mobile device’s operating system current. Installing the manufacturer’s updates can help cut your vulnerabilities.
Also, take a moment to review the permissions for that new app. There’s no reason a calculator app needs access to your entire address book and camera. If the app asks for too much access, it can be a good idea to delete it and look for another option.
Be wary if you decide to download an app directly from a website other than the app store. This is a greater risk. Plus, know that illegally pirating software or media is a real risk for viruses.
Also, keep an eye out for common signs of a virus on your phone such as:
other apps taking longer than usual to open or install;
phone battery running down faster than normal;
your monthly data usage increasing;
your contacts receiving odd messages from you via email, text, or social media.
Worried you may have a virus on your device? We can check and see. We can also help backup your data and, if necessary, wipe a compromised phone. Call us today at (651) 456-8655 or visit our Contact page.
Deepfake Voice Scams: Don’t Fall for Them, 5/8/2023
Deepfake has gone mainstream. You’ve probably seen a movie or TV show with a character complaining about images or videos that look real. You should also be wary of deepfake voice scams.
Deepfake is a mashup of the words deep learning and fake. The technology uses artificial intelligence and machine-deep-learning algorithms. This can create convincing representations of people for special effects or silly videos, but these fake videos or images can also be more dangerous.
Malicious deepfakes spread false information or can defame or scam people. That’s what we want to talk about in more detail here: fake voice scams.
What is a “deepfake voice” scam?
This type of scam manipulates synthesized speech to convince you that someone is saying something they didn’t actually say. This increasingly common scam tricks you into providing sensitive information or sending money.
Criminals first record a voice sample from their victim. They might use speeches, TikTok or YouTube videos, podcasts, or phone conversations. Then, they turn to a tool such as ElevenLabs, Resemble, Overdub, ReadSpeaker, or Voice.ai. These platforms analyze speech patterns and create a voice mimicking the original. The bad actors can then generate a new speech that sounds like the original speaker said it. They script it, and the Ai voice says it.
Examples of deepfake scams include creating a voice that mimics a family member. They’ll script a request for help in an emergency situation. Or you might get a call from a lawyer claiming to need payment to help defend a family member.
You might also hear from a celebrity who wants you to donate to their charity. The fake voice might also ask for sensitive information, such as banking details. After all, who wouldn’t trust Liam Neeson if he called personally?
A tech support scam is another common one. The scammer creates a voice for a customer support representative from a prominent company. They request remote access to your computer to “fix” a non-existent problem. Instead, they’ll steal sensitive information, such as login credentials, or install malware.
How do I defend against deepfake scams?
This technology does a good job, and the scam can be very convincing. Be cautious of unexpected requests for personal information or money made by phone. Be especially suspicious if the request makes an emotional appeal to you to act now.
Confirm before you share sensitive data or transfer money. For example, if you’re asked to pay a lawyer to help your grandson in an accident, check in with him first. Or, if someone calls from your internet service provider, use a trusted phone number to confirm their authenticity.
We can help you combat deep-fake scams. We can install email and Web filtering, multi-factor authentication (MFA), and endpoint protection. Our IT experts can also watch networks for signs of attack and respond to minimize potential damage. Call us today at (651) 456-8655 or visit our Contact page.
Tech Tips Everyone Should Know – 4/16/2023. There are billions of computers in the world today. In fact, 286 million computers shipped globally in 2022, and that was a 16% drop! Those figures make it obvious how many of us have access to computers, yet that doesn’t mean we all know the simple shortcuts available to us. This article rounds up top tech tips that can benefit every user.
Tech Tips #1: Search Google smarter
Google is the market leader with over 85% of Web search traffic. But did you know you can search this popular online engine even easier? When you know you are looking for something on a particular site, you can narrow your search. Go to the Google search bar as normal, then, in the search box, type “site: www.website.com” (without quotes) with your search term. This refines your search.
So, if you wanted to find an article on coaching on the Forbes website, you would search “site: forbes.com and coaching.” You’ll see that all the responses you get back come from the Forbes domain.
Tech Tips #2: Undo your mistakes
We all make mistakes while working on our computers. Here are some ways to undo the common ones.
“Unsending” an email is possible in Gmail. Go to Settings and set up the Undo Send section to give yourself 5, 10, 20, or 30 seconds. Then, save your changes, and you’ll have this option enabled in the future. It doesn’t technically “unsend” the email but delays sending it for a few seconds so you can stop it if need be.
You can also reopen a closed browser tab by using Ctrl+Shift+T on your PC or Command+Shift+T on your Mac. This reopens the last tab you closed. If you closed a bunch at once, you can also reopen them from your browser’s History dropdown menu.
Then, there’s Ctrl + Z for just about everything else. Pressing the control button and Z key together undoes your action in many Web browsers and operating systems. It will depend on your application and how far you can go back with this shortcut.
Tech Tips #3: Capture your screen
Some modern PC keyboards come with a “print screen” key, which you can use to get a screenshot of the desktop windows. If you want to crop that screenshot, on Windows 10, go to Start and type Snipping Tool in the Search bar. You’ll get a box you can drag to any shape over your screen.
You can also take a screenshot on a Mac by pressing Command + Shift + 4. To crop the screenshot size and shape, you’ll press Command + Shift + 5.
One more little secret
How many times do you find yourself picking up your USB cable and trying to put it in the wrong way? You can stop doing so by looking for a symbol on the cable near where you’ll plug it in. It’s only found on one side, and it’s not for decoration. The symbol should be facing you when you plug in the USB. This will get it in the first time, whether you’re plugging in a vertical or horizontal cable.
These tech tips can help you be more efficient and effective with your technology, but you may still want help in other areas. Reach out to our IT experts today. We’re here to help. Call us at (651) 456-8655 or visit our Contact page.
Content Creation – Choosing the Right Laptop 3/27/2023
Are you an influencer? Or do you aspire to join the more than 50 million people making content for YouTube, TikTok, or Instagram? If you want to be a content creator, don’t struggle with a computer that isn’t up to the task. Considering these factors can help you land the best laptop for your needs.
Yes, the average person can take a video on their smartphone and post it for friends to enjoy, but when you’re serious about your video editing or creating high-quality, long-form content, you’ll need more.
To make your content look professional, pay attention to these factors. It will help you choose the laptop that sets you up to be the next Spielberg.
Video card
Pay attention to the video card. Also known as a graphics card, this is the piece of the computer that renders images on the display.
A laptop typically has a less robust video card than a desktop. That’s because laptops are often thinner. For the benefit of mobility, you compromise on the space available for a beefier graphics card. The card may also run slower because the card needs to be efficient without setting the laptop on fire.
So, when selecting a laptop with plans to edit video, do your research. You can easily find rankings for “laptops with good graphic cards” online. You can get away with an RTX 2080 (that’s a few generations old). Ideally, though, you’ll want the RTX 3080 or Intel Iris Xe.
Processing power
The laptop’s processing power can also play a role in your video editing success. A lot of video editing software needs multi-core processors. You can think of it as having many arms to get different things done at once.
For a PC laptop, go for at least an Intel i9 CPU. For Mac, a modern MacBook Pro with an M2 Pro CPU is a good choice.
Memory
For your laptop to be able to do many things at once, you also need powerful memory. Random access memory (RAM) is what you’ll be comparing here. RAM loads the operating system, runs video editing software, and performs other background functions.
At minimum, you’ll want 16GB of RAM, but the more you have, the better. Obviously, the budget will factor in here.
Storage
Your storage capacity also impacts how efficiently you can do all that you want to do.
If you’re working in Full HD (1920×1080), you could have some big project files to move around. The more storage you have, the easier this will be.
You’ll be choosing between hard disk drives (HDDs) and solid-state drives (SSDs). SSDs are good for working on the fly. They can run faster, as they don’t use any mechanical parts, but they can cost more.
A good idea is to work off your SSD for your current editing needs. Meanwhile, you can store archived videos and completed footage on a second hard drive. This can be on the laptop if there’s space, or you can attach an external HDD.
Display
Whether you are the star of your content or someone else is, you’ll also want to consider laptop display size. There are two main display types: Twisted Nematic (TN) and In-Plane Switching (IPS) panels.
TN panels cost less, but you can lose color accuracy on angles. The IPS panels give you more color at more angles, but they cost a little more.
Connectivity
You might want to attach an external HDD or connect to a larger desktop monitor. In that case, look for accessory ports and external display connectivity.
Need help deciding on the laptop that best suits your content creation needs? Our experts are here to help. Connect with us today at (651) 456-8655 or visit our contact page.
Custom PCs Built by Twin Cities PC Repair – 3/24/2023. We have another happy customer coming to pick up their custom built PC!
Whether you are a home user, a business, a gamer, or a specialist such as a photo and video editing company… We can build a PC for you – really, no matter what your specific requirements are, we can make sure you get the best machine to match your productivity requirements. In conjunction with your hardware requirements, we can determine the software that you need as well. We will ensure that we don’t clutter and slow down your new PC with unwanted programs. Often times, ‘out-of-the-box’ computers are heavily loaded with software including trial software that you will never use which can slow down the performance of your machine.
You will be dealing with the same custom PC builder during the consultation and build process. You will also be dealing with us for any support that you may require. We are experienced PC builders and we can provide references from past clients who attest to our expertise and approachable manner.
Custom Built Computers With Affordable Computer Repairs And Service
Save yourself time and hassle in trying to choose between the mass-manufactured PCs on the market.
You can be assured that your machine has quality, stable, hardware components and configuration.
You won’t be paying for software/hardware that you don’t need or want.
Your machine won’t be slowed down by space hungry software that you won’t use.
You will be paying for a machine that will do what you want it to do… Quickly too!
Here’s our most recent build configuration (Pictured):
Intel Core i5-13600K 14-Core CPU.
Integrated Wi-Fi.
16GB DDR4 3200 (PC4-25600 Memory.
1TB PCIe Solid State Hard Drive.
500W Power Supply.
Black Mid-Tower Case w/ Top USB Ports.
27” Eye Care Monitor Full HD (1920 x 1080) IPS 75Hz Adaptive-Sync HDMI D-Sub Frameless.
Windows 11 Home 64-Bit.
Open Office Productivity Software.
Adobe Reader.
12 Month Warranty.
We are experienced in building custom computers to meet your specific needs using quality, stable components at an affordable price. Our custom PCs are built to last. If you are interested in a new screaming PC, please call us at (651) 456-8655 or visit our Contact page.
You drop your computer in the bathtub, or your basement home office floods and the desktop is under water. Or you spill your tea across the keyboard. If any of this happens, you can guess right away that you’ll be dealing with liquid damage. Only it’s not always that obvious. Knowing the common signs to look for can help you diagnose liquid damage in your devices.
If you are right there when your computer is exposed to liquids, unplug it immediately. Wet components can short-circuit and cause issues for your motherboard, hard drives, and more.
Still, you might not know immediately that liquid damage is to blame. You might live in an area with high humidity. Or maybe someone in the family watches Netflix while in a steamy bathroom. That’s when you look for signs that there’s moisture inside your computer.
Signs you can see yourself
Liquid spilled inside your keyboard can make keys or the trackpad stop working. Even a few liquid droplets can cause the keyboard or trackpad to start responding to your touch erratically.
You might also experience screen issues. This depends on where the liquid penetrates your laptop. Look out for:
images not displaying properly;
pixel discoloration;
a display that won’t turn on.
These are pretty obvious signs that you need to get help. You might also see some discoloration on the outside of the computer. The white or green residue is not a good sign.
Another scary indicator? The computer won’t turn on at all. That suggests that internal components are damaged, and you’ll need to take action.
Signs that repair shops can see
Most people should not be opening up computers on their own. Even if you think there might have been liquid damage, it’s safer to take the computer to a trained expert. That way, you won’t do more damage trying to see what’s wrong in the first place.
At a computer shop, the person doing the repairs will look inside for corrosion around connectors and your motherboard. They’ll be looking for that white or green residue you were hoping not to see on the exterior.
Another sign? The liquid damage indicator shows exposure to water or liquids. The indicator is a small device inside the computer that’s used by manufacturers to deny warranty coverage (despite the consumer’s protests, the laptop never got wet).
What to do with a wet computer
Unplug it. Get help. The sooner you take a liquid-damaged computer in for repair, the more likely it is to recover. Work with a professional IT repair shop to diagnose and repair your device issues. We’re here to help. Call us at (651) 456-8655 or visit our Contact page. Check out our additional laptop services HERE.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments