If your trusty home PC has started showing its age, with more issues cropping up lately, you may be wondering if it’s finally time to say goodbye to your old friend. Or could some TLC in the form of repairs get it back in the game?
We are often asked to help clients make this decision. Several important factors must be considered when determining the best path forward.
How Old Is It Really?
While it may seem like you just bought it yesterday, some computers have relatively short lifespans in technological terms. If your machine is more than 10 years old, it’s likely well past its prime. Parts can become difficult to source, and repair costs may exceed the original value.
What Issues Are Cropping Up?
Minor glitches that cause annoyance but don’t hamper use, such as a stubborn virus or faulty keyboard, can often be fixed for $50 – $150. On the other hand, multiple hardware failures, a dying motherboard, or other major component replacements indicate deeper underlying issues. For problems of that magnitude, repairs may cost 50% – 75% the price of a new comparable model.
Will Parts Be Readily Available?
Specific key components may go out of production after a few years, especially with aging laptops. If it’s determined that your motherboard, screen, or other vital piece needs swapping out, there’s a good chance we won’t be able to get a replacement. This significantly increases repair costs and turnaround time, due to custom orders or used-part sourcing.
How’s the Performance Over Time?
Modern computing demands continue to grow exponentially with each passing year. If your PC has been steadily slowing down over the last 6–12 months and is struggling to run even basic tasks, it may be time for an upgrade.
What’s Your Budget Situation?
For clients on a tight budget, we’re always willing to thoroughly diagnose issues and provide affordable repair options to squeeze out a little more usability from an older machine. However, if an attractive new model is realistically within your means, an upgrade may give you several more years of smooth sailing.
Let’s Diagnose Your Situation
Rather than taking guesses, we always recommend bringing your computer for a thorough diagnosis. We can carefully assess its overall condition, identify any underlying problems, provide repair estimates, and help you weigh up the costs and benefits of fixing versus upgrading based on your unique needs and budget.
With the right solution, you’ll be back to enjoying your computer for many more years to come! Call us today at (651) 456-8655 or visit my Contact page to send me a message.
Keeping Kids Safe on Discord and Online Platforms – 9/25/2023
You might remember setting up a “telephone” with a friend made with cups and a string. Or feel nostalgic for the novelty of having your own phone line in your home growing up. Meanwhile, we’re raising the digital generation. They game online, chat online, stream TV online…everything is online. One popular channel for kids’ conversations? Discord. Here’s help keeping your kids safe on this and other online platforms.
Discord is a popular communication platform connecting communities of people online. It’s particularly popular with gamers. But kids use it for real-time voice and video calls, screen sharing, and group or private chats.
Ultimately, Discord is a versatile and powerful platform. That means it’s important to guide young users in using it responsibly.
Keeping Kids Safe on Discord
Discord requires its users to be at least 13 years old, but this is not enforced. Protecting your kids requires communication, as well as an understanding of the platform’s safety features.
Discord users can share text messages, images, GIFs, videos, and links in their channels. That means your child may encounter inappropriate content.
Reduce the probability by setting up Family Center to connect your account with your child’s:
Open Discord.
Tap on Family Center.
In user Settings, toggle the Enable Family Center tab.
Scan the QR code under your child’s Connect with Your Parent option in their Family Center tab.
Once you’re connected, you’ll be able to see friend requests, who they make calls to, and who they have messaged, although you won’t be able to see the content of those calls and messages. You can also track which servers (think of it like a text thread) they take part in. You can also receive weekly recaps via email.
It’s also a good idea to:
Encourage your child to accept friend requests only from people they know in real life;
Review their friend list to ensure no unfamiliar users are added;
Set up Safe Direct Messaging, which prevents direct messages from users not on the friend list;
Review and adjust privacy settings to enable content filters and to control who can send friend requests, see their online status, and more.
Enable two-factor authentication (2FA) on the account for added security.
Online Safety for Kids
Controls can help, but you probably want to pair online safety with giving autonomy.
Communicate with your child about online safety. Teach them about not sharing personal information and reporting any uncomfortable situations. Remind them that someone may not be who they say they are. Warn them of the risks of meeting up with someone they meet online.
Setting screen time limits can also help curtail your child’s online activity. This encourages them to set boundaries and continue to develop other interests.
Lead by example by limiting your own online time and treating others with kindness. Encouraging critical thinking can also help your child’s digital literacy. Ask them to think about a cyberbully’s motives, or discuss why taking responsibility for online activity is important.
Finally, let them know they can come to you with concerns or uncomfortable situations. Online safety is an ongoing process. Stay involved in and updated about your child’s online activities.
Need help understanding new technologies your child is using? Our IT experts can help set up a safer online environment for your entire family. Call us today at (651) 456-8655 or visit our Contact page.
Mobile apps let us play, teach us, give us social media or music, and more. No wonder there were more than 142 billion downloads in 2022! Going to Google or Apple’s mobile stores to find the app you want feels safe, but even these heavy hitters can’t guarantee you’re downloading something secure.
Google and Apple do their best, but they are vetting many thousands of new apps submitted monthly. The vast majority of their offerings aren’t a threat, but some malicious apps can make it through.
What do malicious app downloads do?
Apps downloaded from mobile stores are typically more secure than your Web activity. On an app, you’re within a contained system, whereas on the Web, you click through various links and visit websites which could have viruses or malware.
Still, a malicious app can infect your smartphone and cause several issues:
Ad fraud. The app runs in the background and sends ad clicks to different websites. This runs down your battery and slows your phone activity.
Data theft. If you give a malicious app permission to cross the app/data divide, it could lead to information being stolen.
Browser hacking. The app may open website browsers that put you at risk of sharing sensitive data.
Apps access all your information (SMS, camera, contacts) and take control of your device.
Keep your mobile phone safe
When looking to download a mobile app, do your research. Look at the ratings and how many downloads it has had. Application reviews can also help you verify the credibility of the app. Check the logo and the name of the creator, too. You don’t want to install something from Microsaft instead of Microsoft.
Keep your mobile device’s operating system current. Installing the manufacturer’s updates can help cut your vulnerabilities.
Also, take a moment to review the permissions for that new app. There’s no reason a calculator app needs access to your entire address book and camera. If the app asks for too much access, it can be a good idea to delete it and look for another option.
Be wary if you decide to download an app directly from a website other than the app store. This is a greater risk. Plus, know that illegally pirating software or media is a real risk for viruses.
Also, keep an eye out for common signs of a virus on your phone such as:
other apps taking longer than usual to open or install;
phone battery running down faster than normal;
your monthly data usage increasing;
your contacts receiving odd messages from you via email, text, or social media.
Worried you may have a virus on your device? We can check and see. We can also help backup your data and, if necessary, wipe a compromised phone. Call us today at (651) 456-8655 or visit our Contact page.
Tech Tips Everyone Should Know – 4/16/2023. There are billions of computers in the world today. In fact, 286 million computers shipped globally in 2022, and that was a 16% drop! Those figures make it obvious how many of us have access to computers, yet that doesn’t mean we all know the simple shortcuts available to us. This article rounds up top tech tips that can benefit every user.
Tech Tips #1: Search Google smarter
Google is the market leader with over 85% of Web search traffic. But did you know you can search this popular online engine even easier? When you know you are looking for something on a particular site, you can narrow your search. Go to the Google search bar as normal, then, in the search box, type “site: www.website.com” (without quotes) with your search term. This refines your search.
So, if you wanted to find an article on coaching on the Forbes website, you would search “site: forbes.com and coaching.” You’ll see that all the responses you get back come from the Forbes domain.
Tech Tips #2: Undo your mistakes
We all make mistakes while working on our computers. Here are some ways to undo the common ones.
“Unsending” an email is possible in Gmail. Go to Settings and set up the Undo Send section to give yourself 5, 10, 20, or 30 seconds. Then, save your changes, and you’ll have this option enabled in the future. It doesn’t technically “unsend” the email but delays sending it for a few seconds so you can stop it if need be.
You can also reopen a closed browser tab by using Ctrl+Shift+T on your PC or Command+Shift+T on your Mac. This reopens the last tab you closed. If you closed a bunch at once, you can also reopen them from your browser’s History dropdown menu.
Then, there’s Ctrl + Z for just about everything else. Pressing the control button and Z key together undoes your action in many Web browsers and operating systems. It will depend on your application and how far you can go back with this shortcut.
Tech Tips #3: Capture your screen
Some modern PC keyboards come with a “print screen” key, which you can use to get a screenshot of the desktop windows. If you want to crop that screenshot, on Windows 10, go to Start and type Snipping Tool in the Search bar. You’ll get a box you can drag to any shape over your screen.
You can also take a screenshot on a Mac by pressing Command + Shift + 4. To crop the screenshot size and shape, you’ll press Command + Shift + 5.
One more little secret
How many times do you find yourself picking up your USB cable and trying to put it in the wrong way? You can stop doing so by looking for a symbol on the cable near where you’ll plug it in. It’s only found on one side, and it’s not for decoration. The symbol should be facing you when you plug in the USB. This will get it in the first time, whether you’re plugging in a vertical or horizontal cable.
These tech tips can help you be more efficient and effective with your technology, but you may still want help in other areas. Reach out to our IT experts today. We’re here to help. Call us at (651) 456-8655 or visit our Contact page.
You drop your computer in the bathtub, or your basement home office floods and the desktop is under water. Or you spill your tea across the keyboard. If any of this happens, you can guess right away that you’ll be dealing with liquid damage. Only it’s not always that obvious. Knowing the common signs to look for can help you diagnose liquid damage in your devices.
If you are right there when your computer is exposed to liquids, unplug it immediately. Wet components can short-circuit and cause issues for your motherboard, hard drives, and more.
Still, you might not know immediately that liquid damage is to blame. You might live in an area with high humidity. Or maybe someone in the family watches Netflix while in a steamy bathroom. That’s when you look for signs that there’s moisture inside your computer.
Signs you can see yourself
Liquid spilled inside your keyboard can make keys or the trackpad stop working. Even a few liquid droplets can cause the keyboard or trackpad to start responding to your touch erratically.
You might also experience screen issues. This depends on where the liquid penetrates your laptop. Look out for:
images not displaying properly;
pixel discoloration;
a display that won’t turn on.
These are pretty obvious signs that you need to get help. You might also see some discoloration on the outside of the computer. The white or green residue is not a good sign.
Another scary indicator? The computer won’t turn on at all. That suggests that internal components are damaged, and you’ll need to take action.
Signs that repair shops can see
Most people should not be opening up computers on their own. Even if you think there might have been liquid damage, it’s safer to take the computer to a trained expert. That way, you won’t do more damage trying to see what’s wrong in the first place.
At a computer shop, the person doing the repairs will look inside for corrosion around connectors and your motherboard. They’ll be looking for that white or green residue you were hoping not to see on the exterior.
Another sign? The liquid damage indicator shows exposure to water or liquids. The indicator is a small device inside the computer that’s used by manufacturers to deny warranty coverage (despite the consumer’s protests, the laptop never got wet).
What to do with a wet computer
Unplug it. Get help. The sooner you take a liquid-damaged computer in for repair, the more likely it is to recover. Work with a professional IT repair shop to diagnose and repair your device issues. We’re here to help. Call us at (651) 456-8655 or visit our Contact page. Check out our additional laptop services HERE.
When looking to buy a laptop, one of the main things you have to decide is how much storage you need. That’s a challenging question for many of us to answer. Let’s discuss the factors that matter and how to decide.
The short answer, for many people, is that you don’t need much laptop storage. Having 512 GB available is often enough for a regular user, but it’s going to depend on how you’re using the laptop.
For example, if you use cloud email, your account likely comes with cloud storage. Using cloud-based applications such as Google Docs also saves storage space.
If you’re using the laptop to stream videos on TikTok or YouTube, or watching your series or movies on Netflix or the like, you’re also taking advantage of the cloud. Very little data is actually stored on your computer.
Even so, remember to account also for your operating system. Microsoft and Apple recommend 32 GB of storage space to accommodate their OSs. Otherwise, you could encounter performance issues.
Also, if you edit videos or work in graphic design, you’ll likely want a lot more available storage.
How storage space impacts your computer use
Storage space is the capacity your computer uses to store files and data. So, when you have a lot of data, images, or video to hold and work with, more storage helps the PC recall them more quickly.
If you are a digital hoarder, that can also factor into your storage needs.
When thinking about storing photos, you’d have to have many albums to make a dent. If the average image size is about 4 MB, it would take 1000 photos to use up 4 GBs of space. But video eats up a lot more space. An hour-long 1080 p video could occupy 10,000 MB (10 GB).
If you regularly download new apps and games, you can quickly fill up your storage space. Purging unused files and apps consistently frees up space.
Considering the cost of laptop storage
More storage can mean a bigger price tag, so you’ll want to balance your storage needs against your budget constraints.
If you can spend freely, go ahead and get more storage. Otherwise, you’ll want to weigh hard disk drive (HDD) and solid-state drive (SSD) upgrades.
HDDs offer more storage for less cost, but slower reading and writing. SSDs can be three to four times as expensive, but you do get greater speed. SSDs are also typically quieter, more durable, and consume less energy.
One option is to buy a laptop with a smaller SSD and get an external HDD to meet both your speed and storage needs. HDDs can be better for data recovery and for storing large amounts of data you’re not accessing often.
Need help making decisions about your laptop purchase or storage needs? Our IT experts have the answers you need. Contact us today at (651) 456-8655 or visit our Contact page.
News of data breaches is all too common. This company apologizes for six million accounts breached. That company acknowledges hackers accessed 35,000 users’ personal identifiable information. But the question that probably matters most: Is your data breached, too?
The company should contact you if your information is in a data leak, but you can’t rely on that. You can also find out if your phone number or email address has been leaked by visiting https://haveibeenpwned.com/.
HaveIBeenPwned has uploaded various breaches and consolidated the information to make searching easy. Enter your address and get a list of breaches that compromised that email. You’ll get a summary paragraph as well as a description of data compromised in each breach.
It is not uplifting reading!
Next, the question is what to do about your breached information.
Steps to Better Security
First, change your passwords for those breached accounts. If you use that same password to access other accounts, change those passwords, as well, even if they are not listed as leaked.
Always avoid reusing passwords. Yes, it can be a hassle to remember many different access credentials, but you risk exposing many accounts if you keep reusing one email address and password combo over and again.
Make using unique passwords for all accounts easier by using a password manager. A manager can store your many passwords in one place and generate strong ones to use. You can often download an app to your mobile device, which gives you the convenience of filling in your credentials when you’re on the go, too.
The next step is to use two-factor authentication (2FA).
Understanding 2FA
This adds a layer of difficulty for hackers trying to access your accounts. Even if they had your username and password, they would need a second way to verify your identity.
Using 2FA requires you to provide one of the following before you can gain access:
something you know (e.g. the answer to a secret question);
something you have (e.g. your smartphone);
something you are (e.g. your fingerprint).
A bad actor would need to have not only your leaked credentials but also your other “something.”
A common approach to FA is an SMS text message or voice-based authentication. You enter your credentials, then the site follows up with a text or phone call providing a separate code you must then enter. This is not the best method, however. Scammers can hack the SIM card associated with your device, and then use your number to make and receive calls and texts.
Software tokens for 2FA are a safer solution. You’ll download and install an application on your phone (e.g. Google Authenticator, Authy or Okta Verify). It can generate a unique verification code that is valid only for 30-60 seconds.
Want to learn more about password management and soft-token 2FA. We’re here to help. Contact us today at (651) 456-8655 or send us a message from our Contact page.
Gaming on Laptop Dust: Life and Performance- 1/24/2023
Let’s be real: most gamers rely on performance and higher usage frequency to achieve success and move on to the next level. These are two factors to take into consideration when discussing why a computer, specifically a laptop, should be periodically cleaned. And I’m not talking about PUPs, bloatware, viruses, or other software stuff. I’m talking about hardware and dust and debris accumulation. And you can “game” the accumulation of dust at some point!
Here’s an example case
Last week I had a client come in with a high-end ASUS ROG gaming laptop. He complained about higher than normal operating temperatures, especially under higher than normal GPU loads. In my process of diagnosis, I opened up his laptop and noticed both the CPU and GPU fans were caked with dust, and the GPU fan was not spinning. My conclusion was that rather than clean the fans and heatsinks, the best plan of action, being that the GPU fan was bad, was to replace both the GPU and CPU fans. Most fans have a lifecycle, and it’s my belief that if a laptop has two fans, it’s always best to replace them both at the same time. They are rather inexpensive. This saves you the cost and effort of replacing the other fan shortly down the road. The client agreed, and we proceeded with the quotation for the work to be performed. In terms of fan replacement, traditional productivity laptops are fairly straightforward. However, higher-end gaming laptops are a bit more difficult and involved. There are multiple theories we can come up with as to why the GPU fan failed, but two theories come to mind in this case. 1.) The fan simply reached the end of its lifecycle. 2.) The buildup of dust and debris caused excessive heat and resistance on the fan. I’m more apt to think #2 was the case here based on the overall age of the laptop.
Not every case is the same
Now, I’m not saying that every case will require fan replacement. In most cases, you’ll only need thorough dust removal within the chassis. Taking a can of compressed air and blowing it through the laptop vents is absolutely the wrong approach. This just moves the dust around the inside of your computer, which blankets the motherboard. It can also cause dust to wad up in the fan’s spin zone, causing an obstruction. Doing the job the right way involves opening up the laptop chassis and disassembling down to the motherboard level, removing the fan(s), cleaning the fan(s), removing the heatsink, cleaning the fins on the heatsink, and removing and reapplying thermal grease to the GPU and CPU. We then reassemble the laptop and run it through a benchmark test to monitor temperature levels.
If you are experiencing excessive operating temperatures or fan noise and are unsure of the inner-workings of your computer, feel free to contact the professionals at Twin Cities PC Repair at (651) 456-8655 or send us a message from our Contact page.
Now we could sell our clients a typical, heavily commercialized, residential computer security product, but why settle for less? Here at Twin Cities PC Repair, we have tested several computer security products and have arrived to the conclusion that most are riddled with bells and whistles you simply don’t need. What does this mean? It means that the products slam your system performance by heavily utilizing system resources such as memory, CPU and hard drive.
What are we offering?
A simplified, yet powerful, product known as Emsisoft Business Security! Emsisoft’s ideal is a malware-protected world, a place where home and business computer security is engineered to perfection. Emsisoft produces innovative anti-malware solutions that are efficient, powerful, unobtrusive, and minimalistic. Emsisoft’s software effectively detects new threats before your computer is compromised. All of their products do their job perfectly; keeping your digital world safe. Emsisoft Business Security leaves your computer’s power where it belongs: with you.
Let’s Discuss Key Features…
FINDING AND REMOVING MALWARE
Dual-engine virus and malware detection – Emsisoft (A) and Bitdefender (B) engines work together to detect all types of malicious software, including viruses, ransomware,
trojans, bots, keyloggers, spyware and more. Signatures for double-detections are avoided for memory use and speed optimization.
Super fast system scans (1-2 min) – Scan your device quickly and thoroughly using our efficient dual-engine scanner. Scan time varies depending on which scan type you
select.
PUP/Potentially Unwanted Programs detection – Alerts you of potentially unwanted programs (adware, browser toolbars, system optimizers, etc.) that can affect your device’s
performance.
Advanced infection cleaning – Smart operation processes ensure the safety and stability of the computer during system cleaning. Checks 70+ autorun/loading
points including hidden ones used by rootkits and restores default values if they have been overwritten by malware.
There’s More! – Click HERE to download a full feature list in PDF format.
PREVENTING NEW INFECTIONS
Multi-layered real-time protection – We use diverse technologies and multiple layers of security to maximize our solutions’ protection capabilities.
Web Protection – Blocks access to known dangerous websites using a frequently updated block list. Web Protection is host-based and works across all
programs, even if the transferred web data is encrypted.
Anti-phishing – Blocks access to known fraudulent websites that try to steal online banking passwords or identity details.
Browser security – Browser extension/addon for Chrome, Firefox and Edge that blocks access to dangerous websites on a URL level. Uses a privacyconscious design that doesn t track your browsing history or break your SSL encryption chain.
There’s More! – Click HERE to download a full feature list in PDF format.
CENTRALIZED MANAGEMENT
Management Console – Centralized security management has never been easier. As part of our daily client endpoint monitoring duties (Included in your subscription), we monitor the protection status of your devices and we’ll reach out to you immediately if we notice any areas of concern. This also includes system performance monitoring such as, memory performance, hard drive performance and any Windows generated errors. Your security and privacy are of utmost importance! We do not have the ability to monitor your file system or any personal information on your device(s).
Windows & Third-Party Patching – Also, included in your monthly subscription, we review and deploy Windows and third-party software patches to your device(s). We test & review all patches before deployment, ensuring your have a healthy and up-to-date system!
There’s More! – Click HERE to download a full feature list in PDF format.
If you’d like to subscribe, request additional information, or are looking for a free consultation of your PC’s current security status, please call our security professionals at (651) 456-8655 or send us an email by visiting our Contact page! Only $9.99/mo/device. No contract. Cancel anytime.
SIM Jacking, What is it and Why Should You Care? – 12/27/2022
If you play the popular SIMS life-simulation video game, you could think SIM jacking means someone takes over your characters, but the reality is even worse. SIM jacking is a type of identity theft targeting your real-life identity via your phone.
In SIM jacking a bad actor uses the subscriber identity module (SIM) card associated with your cellphone number to make calls, send texts, and use data. This has several potential negative outcomes:
Your phone bill goes off the charts with international calling and data usage fees.
They might impersonate you by sending texts to scam your friends and family.
They can sign up for new email and social media accounts using your phone number.
Most importantly? They can use your phone number and SIM card to sign into your personal accounts. Many of us use text messaging for authentication. That’s when a site, say your bank, sends a code to your phone to confirm it’s you.
Now, imagine the criminal has access to your bank account through a leaked password. Whereas they couldn’t get in before because of two-factor authentication, they now have your SIM card, too. That means the SMS to authenticate your account also goes to them. They’re in, and you’re out.
How Does SIM Jacking Work?
Typically it starts, as so many cyberattacks do, with phishing. You might get a text or email that looks like it is from the cellphone carrier that asks you to click on a link. It might tell you there’s been suspicious activity on your account or that your bill is past due. It’s usually something that will make you anxious and feel the need to act urgently.
You’re taken to a fake website where you provide your name, address, cell phone number, and date of birth. With the right information, the scammer contacts your phone carrier and asks for a new SIM card. Once they have that in hand, they access your account and take over your cellphone. If they pair that with leaked credentials, they can really do damage.
If you’ve been SIM jacked, you’ll find out after the fact. You will no longer have a signal connection, so you won’t be able to send texts or make or receive calls. You may also have difficulty signing into the hacked accounts.
If you do think you’ve been SIM jacked, contact your carrier ASAP. Also, change your passwords and let your friends and family know. Otherwise, they might fall victim to a malware attack that appears to come from you.
Protect Yourself from SIM Jacking
Be careful with your personal information. Be wary of any requests to share your sensitive information online. Avoid taking action based on text messages or emails from people you don’t know and trust.
Protect yourself by using an authentication app such as Google Authenticator or Authy. Do this instead of using text messages to authenticate yourself online.
Always update the applications on your smartphone. Yes, it seems like there are constantly new updates, but they can be protecting you from vulnerabilities.
You might also get a request to restart your phone. This is a common sign your SIM card has been hacked. If you do it, you’ll lose control of your SIM card. So, call your carrier first.
It’s also a good idea to regularly review your phone bills for any charges that you don’t recognize.
Want to protect your online activity? Our IT experts can help update your applications and identify any vulnerabilities. Contact us today at (651) 456-8655 or email us from our Contact page.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments