Patrick, owner of Twin Cities PC Repair, has decided to do his Flash Labor Sale yet again!!
With the cost of goods & services ever increasing, Patrick has decided it’s time he gives his customers a little break on the pocketbook… You’ll receive the same great responsive service at a discount of 25% off his normal $85/hr carry-in labor rate. This brings our labor rate down to $63.75/hr, that’s $21.25 off per hour!
Just book your device drop off anytime between 3/2/2023 – 3/23/2023 and we will automatically apply the discount to your estimate & invoice.
To book your device drop-off, simply click the button below or click HERE. For more information on our services or Flash Labor Sale, call (651) 456-8655, or visit our Contact page.
Better than the Big Box Boys – Certified Techs, Fast Turnaround: PC Computer Repair, Virus Removal – Bloomington Location – Remote Services Available
You’ve found the best place in town for responsive, reliable, friendly, and effective residential computer repair. Our expert technicians are trained on the latest techniques to solve your technology problems.
Too often, computer users get lured into the marketing of big box stores and franchise chains that care only about their bottom line! We strive to create real lasting relationships with our customers so you know you can count on us as your go-to computer shop.
Aspects of our business that set it apart from the rest:
Accurate & honest labor billing Guaranteed satisfaction or you don’t pay us Friendly, honest communication, no “geek-speak” Professional, experienced, and certified technicians Locally owned and operated
Microsoft Windows PC Computer Repair
Apple iMac and MacBook Computer Repair
Data Recovery
Viruses, Malware, Adware and Ransom-ware Removal
Cracked and Broken Laptop Screen Replacements
Open Monday through Friday 9:00 AM – 5:00 PM & Afterhours by Appointment
Vertical Monitors – What are the Benefits? – March 2023
Horizontal is the norm when we’re thinking about televisions or computer monitors. Yet vertical monitors are an option. Consider these advantages of going vertical.
On a horizontal monitor, there is more width than height. The usual 16:9 horizontal monitor is great for watching movies, but when it comes to other processes, there’s a lot of wasted space. If you have a vertical monitor setup, you can enjoy a better viewing experience.
You’ll find it’s easier to scan websites, view search engine results, and read online content or long blocks of code. If you’re big into cryptocurrency, you might enjoy displaying data in an easy-to-read form, plus, you’ll be able to react more quickly.
You can also have a full view of photographs or a project if you’re trying to design something with a vertical layout.
Vertical screens can also reduce eye strain. With this setup you reduce the range of movement, which can save your eyes from getting as tired.
Further, you might be able to save space with a vertical monitor if you have less room on your desk.
A vertical monitor can be appealing if you use two monitors at once. Having dual monitors can increase productivity. You enjoy added viewing space to multitask, browse the Web, watch videos, or games. If you’re working from home, you may also find it easier to collaborate with colleagues with a second screen. When you set up one screen to be vertical, you can benefit from the best of both worlds.
Going vertical is Easy
You don’t have to buy a special monitor to take advantage of a vertical setup. While many screens are only capable of a horizontal display, you may be able to adjust the way it is mounted. You can get a stand or mount that allows you to easily rotate the screen. As long as it is a VESA-compatible monitor, you can easily make the choice of horizontal or vertical. Then, you can change the layout in the operating system’s display settings. Windows, MacOS, and Linux all support vertical screen rotation.
Some monitors have mounts that allow physical rotation, which is a good way to test drive the vertical monitor. That way you can see how it compares to a horizontal layout for your needs. Keep in mind, though, that this repositioning of the monitor will affect your stereo speakers. You’ll need to attach an external pair of speakers to have them work with the new orientation.
Vertical monitors aren’t for everybody; if you game a lot or want to watch movies or do 3D modeling, you might prefer the horizontal screen. Many computer games, for example, are programmed for horizontal play, and opening that game up on a vertical rotation can cut off or compress your visuals.
One other common criticism of vertical screens is that they catch glare from nearby light sources more easily. So, if you don’t want to deal with glare, stick with horizontal.
Our IT experts are here to consult on your computer needs. We can advise you on your screen choices and so much more. Contact us today at (651) 456-8655 or visit our Contact page.
Our phones can recognize our faces. Digital watches can detect that we’ve been in an accident. We can put on a virtual reality headset and feel as if we’re swimming with dolphins. With all this technological innovation, why are home printers still so frustrating? This article explains why and how to make the most of the situation.
Hewlett-Packard released its home DeskJet inkjet printer in 1988. These printers spray liquid ink onto the page through printheads. Home laserjet printers followed shortly after. They use lasers to create static electricity to attract and melt toner onto the paper.
And here we are, thirty-five years later, with pretty much the same printer technology. Although now, you might also consider a multifunction (all-in-one) printer. These print documents and can often also scan, copy, fax, and email documents.
But we’re still saddled with clogged inkjets and leaking ink cartridges, plus paper jams, or a printer that can’t recognize the paper that you’ve now taken in and out of the tray 16 times in a row. Why?
Manufacturer priorities for printers
Printer manufacturers often lose money selling you the printer. Printer technology is quite complicated, but you’re getting the device for the price of parts. That’s because the manufacturer banks on making their money back on the sale of the ink.
Because they’re looking to make money off ink sales, printer users now endure:
ink cartridges that run out quickly – yes, they’re putting less ink in their cartridges these days;
printers designed not to work as well if you use off-brand cartridges;
having to perform printer maintenance that uses up more ink.
Even if you do invest in top-quality, on-brand ink, you could still encounter problems. Connectivity issues or error messages when you change paper are common.
That’s because the internal workings of the printer can be outsourced to the lowest bidder. Printer longevity is not the goal, so there’s less incentive to develop robust networking components or print drivers.
Plus, printing is hard
It’s not all down to printer manufacturer choices. Printing is a complicated process. Many moving parts need fine-tuning to apply the right pressure and position the ink. Plus, people could be using glossy photo paper one minute and recycled paper the next. At the same time, humidity or air that is too dry can also impact the paper and how the printer can move it around.
So, what can you do? Prefer a laser printer, which uses dry powder, if you’re going to print mostly in black and white. You’ll pay more upfront, but you’re no longer hostage to the ink-cartridge dilemma. If you need to do color prints, you might find it’s cheaper to actually go to your local print shop or big-box store.
If your Wi-Fi connectivity conks out, connect the USB cable that shipped with the printer. It may not be as pretty, but it will get the job done.
Want to save hours of your life troubleshooting your printer woes? We can help. Contact our experts today at (651) 456-8655 or visit our Contact page to send us a message.
We also carry a full line of remanufactured ink cartridges and can save you some money on ink & toner refills!
News of data breaches is all too common. This company apologizes for six million accounts breached. That company acknowledges hackers accessed 35,000 users’ personal identifiable information. But the question that probably matters most: Is your data breached, too?
The company should contact you if your information is in a data leak, but you can’t rely on that. You can also find out if your phone number or email address has been leaked by visiting https://haveibeenpwned.com/.
HaveIBeenPwned has uploaded various breaches and consolidated the information to make searching easy. Enter your address and get a list of breaches that compromised that email. You’ll get a summary paragraph as well as a description of data compromised in each breach.
It is not uplifting reading!
Next, the question is what to do about your breached information.
Steps to Better Security
First, change your passwords for those breached accounts. If you use that same password to access other accounts, change those passwords, as well, even if they are not listed as leaked.
Always avoid reusing passwords. Yes, it can be a hassle to remember many different access credentials, but you risk exposing many accounts if you keep reusing one email address and password combo over and again.
Make using unique passwords for all accounts easier by using a password manager. A manager can store your many passwords in one place and generate strong ones to use. You can often download an app to your mobile device, which gives you the convenience of filling in your credentials when you’re on the go, too.
The next step is to use two-factor authentication (2FA).
Understanding 2FA
This adds a layer of difficulty for hackers trying to access your accounts. Even if they had your username and password, they would need a second way to verify your identity.
Using 2FA requires you to provide one of the following before you can gain access:
something you know (e.g. the answer to a secret question);
something you have (e.g. your smartphone);
something you are (e.g. your fingerprint).
A bad actor would need to have not only your leaked credentials but also your other “something.”
A common approach to FA is an SMS text message or voice-based authentication. You enter your credentials, then the site follows up with a text or phone call providing a separate code you must then enter. This is not the best method, however. Scammers can hack the SIM card associated with your device, and then use your number to make and receive calls and texts.
Software tokens for 2FA are a safer solution. You’ll download and install an application on your phone (e.g. Google Authenticator, Authy or Okta Verify). It can generate a unique verification code that is valid only for 30-60 seconds.
Want to learn more about password management and soft-token 2FA. We’re here to help. Contact us today at (651) 456-8655 or send us a message from our Contact page.
Gaming on Laptop Dust: Life and Performance- 1/24/2023
Let’s be real: most gamers rely on performance and higher usage frequency to achieve success and move on to the next level. These are two factors to take into consideration when discussing why a computer, specifically a laptop, should be periodically cleaned. And I’m not talking about PUPs, bloatware, viruses, or other software stuff. I’m talking about hardware and dust and debris accumulation. And you can “game” the accumulation of dust at some point!
Here’s an example case
Last week I had a client come in with a high-end ASUS ROG gaming laptop. He complained about higher than normal operating temperatures, especially under higher than normal GPU loads. In my process of diagnosis, I opened up his laptop and noticed both the CPU and GPU fans were caked with dust, and the GPU fan was not spinning. My conclusion was that rather than clean the fans and heatsinks, the best plan of action, being that the GPU fan was bad, was to replace both the GPU and CPU fans. Most fans have a lifecycle, and it’s my belief that if a laptop has two fans, it’s always best to replace them both at the same time. They are rather inexpensive. This saves you the cost and effort of replacing the other fan shortly down the road. The client agreed, and we proceeded with the quotation for the work to be performed. In terms of fan replacement, traditional productivity laptops are fairly straightforward. However, higher-end gaming laptops are a bit more difficult and involved. There are multiple theories we can come up with as to why the GPU fan failed, but two theories come to mind in this case. 1.) The fan simply reached the end of its lifecycle. 2.) The buildup of dust and debris caused excessive heat and resistance on the fan. I’m more apt to think #2 was the case here based on the overall age of the laptop.
Not every case is the same
Now, I’m not saying that every case will require fan replacement. In most cases, you’ll only need thorough dust removal within the chassis. Taking a can of compressed air and blowing it through the laptop vents is absolutely the wrong approach. This just moves the dust around the inside of your computer, which blankets the motherboard. It can also cause dust to wad up in the fan’s spin zone, causing an obstruction. Doing the job the right way involves opening up the laptop chassis and disassembling down to the motherboard level, removing the fan(s), cleaning the fan(s), removing the heatsink, cleaning the fins on the heatsink, and removing and reapplying thermal grease to the GPU and CPU. We then reassemble the laptop and run it through a benchmark test to monitor temperature levels.
If you are experiencing excessive operating temperatures or fan noise and are unsure of the inner-workings of your computer, feel free to contact the professionals at Twin Cities PC Repair at (651) 456-8655 or send us a message from our Contact page.
Now we could sell our clients a typical, heavily commercialized, residential computer security product, but why settle for less? Here at Twin Cities PC Repair, we have tested several computer security products and have arrived to the conclusion that most are riddled with bells and whistles you simply don’t need. What does this mean? It means that the products slam your system performance by heavily utilizing system resources such as memory, CPU and hard drive.
What are we offering?
A simplified, yet powerful, product known as Emsisoft Business Security! Emsisoft’s ideal is a malware-protected world, a place where home and business computer security is engineered to perfection. Emsisoft produces innovative anti-malware solutions that are efficient, powerful, unobtrusive, and minimalistic. Emsisoft’s software effectively detects new threats before your computer is compromised. All of their products do their job perfectly; keeping your digital world safe. Emsisoft Business Security leaves your computer’s power where it belongs: with you.
Let’s Discuss Key Features…
FINDING AND REMOVING MALWARE
Dual-engine virus and malware detection – Emsisoft (A) and Bitdefender (B) engines work together to detect all types of malicious software, including viruses, ransomware,
trojans, bots, keyloggers, spyware and more. Signatures for double-detections are avoided for memory use and speed optimization.
Super fast system scans (1-2 min) – Scan your device quickly and thoroughly using our efficient dual-engine scanner. Scan time varies depending on which scan type you
select.
PUP/Potentially Unwanted Programs detection – Alerts you of potentially unwanted programs (adware, browser toolbars, system optimizers, etc.) that can affect your device’s
performance.
Advanced infection cleaning – Smart operation processes ensure the safety and stability of the computer during system cleaning. Checks 70+ autorun/loading
points including hidden ones used by rootkits and restores default values if they have been overwritten by malware.
There’s More! – Click HERE to download a full feature list in PDF format.
PREVENTING NEW INFECTIONS
Multi-layered real-time protection – We use diverse technologies and multiple layers of security to maximize our solutions’ protection capabilities.
Web Protection – Blocks access to known dangerous websites using a frequently updated block list. Web Protection is host-based and works across all
programs, even if the transferred web data is encrypted.
Anti-phishing – Blocks access to known fraudulent websites that try to steal online banking passwords or identity details.
Browser security – Browser extension/addon for Chrome, Firefox and Edge that blocks access to dangerous websites on a URL level. Uses a privacyconscious design that doesn t track your browsing history or break your SSL encryption chain.
There’s More! – Click HERE to download a full feature list in PDF format.
CENTRALIZED MANAGEMENT
Management Console – Centralized security management has never been easier. As part of our daily client endpoint monitoring duties (Included in your subscription), we monitor the protection status of your devices and we’ll reach out to you immediately if we notice any areas of concern. This also includes system performance monitoring such as, memory performance, hard drive performance and any Windows generated errors. Your security and privacy are of utmost importance! We do not have the ability to monitor your file system or any personal information on your device(s).
Windows & Third-Party Patching – Also, included in your monthly subscription, we review and deploy Windows and third-party software patches to your device(s). We test & review all patches before deployment, ensuring your have a healthy and up-to-date system!
There’s More! – Click HERE to download a full feature list in PDF format.
If you’d like to subscribe, request additional information, or are looking for a free consultation of your PC’s current security status, please call our security professionals at (651) 456-8655 or send us an email by visiting our Contact page! Only $9.99/mo/device. No contract. Cancel anytime.
SIM Jacking, What is it and Why Should You Care? – 12/27/2022
If you play the popular SIMS life-simulation video game, you could think SIM jacking means someone takes over your characters, but the reality is even worse. SIM jacking is a type of identity theft targeting your real-life identity via your phone.
In SIM jacking a bad actor uses the subscriber identity module (SIM) card associated with your cellphone number to make calls, send texts, and use data. This has several potential negative outcomes:
Your phone bill goes off the charts with international calling and data usage fees.
They might impersonate you by sending texts to scam your friends and family.
They can sign up for new email and social media accounts using your phone number.
Most importantly? They can use your phone number and SIM card to sign into your personal accounts. Many of us use text messaging for authentication. That’s when a site, say your bank, sends a code to your phone to confirm it’s you.
Now, imagine the criminal has access to your bank account through a leaked password. Whereas they couldn’t get in before because of two-factor authentication, they now have your SIM card, too. That means the SMS to authenticate your account also goes to them. They’re in, and you’re out.
How Does SIM Jacking Work?
Typically it starts, as so many cyberattacks do, with phishing. You might get a text or email that looks like it is from the cellphone carrier that asks you to click on a link. It might tell you there’s been suspicious activity on your account or that your bill is past due. It’s usually something that will make you anxious and feel the need to act urgently.
You’re taken to a fake website where you provide your name, address, cell phone number, and date of birth. With the right information, the scammer contacts your phone carrier and asks for a new SIM card. Once they have that in hand, they access your account and take over your cellphone. If they pair that with leaked credentials, they can really do damage.
If you’ve been SIM jacked, you’ll find out after the fact. You will no longer have a signal connection, so you won’t be able to send texts or make or receive calls. You may also have difficulty signing into the hacked accounts.
If you do think you’ve been SIM jacked, contact your carrier ASAP. Also, change your passwords and let your friends and family know. Otherwise, they might fall victim to a malware attack that appears to come from you.
Protect Yourself from SIM Jacking
Be careful with your personal information. Be wary of any requests to share your sensitive information online. Avoid taking action based on text messages or emails from people you don’t know and trust.
Protect yourself by using an authentication app such as Google Authenticator or Authy. Do this instead of using text messages to authenticate yourself online.
Always update the applications on your smartphone. Yes, it seems like there are constantly new updates, but they can be protecting you from vulnerabilities.
You might also get a request to restart your phone. This is a common sign your SIM card has been hacked. If you do it, you’ll lose control of your SIM card. So, call your carrier first.
It’s also a good idea to regularly review your phone bills for any charges that you don’t recognize.
Want to protect your online activity? Our IT experts can help update your applications and identify any vulnerabilities. Contact us today at (651) 456-8655 or email us from our Contact page.
You may not think about it much, but your computer needs a graphics processing unit (GPU). The GPU allows you to see multimedia content and renders the graphics of your video games. It can also accelerate high-performance computing. The good news? It’s no longer as difficult to get a new graphics card at a reasonable price.
A global shortage of GPUs in 2021 made it challenging to obtain new graphics cards. That could stall repairs and upgrades. Plus, people who wanted to build their own computers struggled to do so. If you did find a GPU available, you could expect to pay much more than usual. Scalpers were also buying the chips up and charging exorbitant prices.
One problem was that major chip manufacturers were struggling to source silicon. It’s needed for the semiconductor functionality of GPUs. The pandemic slowed and even stopped production at some of the largest silicon manufacturers.
It didn’t help any that cryptocurrency miners were buying up GPUs, too. They needed the processing power to mine efficiently.
Why the GPU shortage is over
Fortunately, the GPU storage is ending. GPU manufacturers continued developing chips while waiting for the silicon semiconductors they needed. Now that those are back online, the graphics card companies can quickly make up for lost time.
At the same time, GPUs are no longer the best option for cryptomining. Instead, they have been replaced by more efficient application-specific integrated circuits (ASICs).
What happens next?
Actually, a surplus of older GPUs is expected, as a new generation of GPUs has arrived.
A new GPU series means manufacturers and computer parts stores will look to clear inventory. They’ll want to sell off older GPUs to make room for the new product.
This can be good news. You can expect prices of the previous generation of technology to come down. Plus, you can take advantage of the GPU surplus to replace a failing GPU. Or you can now upgrade your graphics card more affordably.
Get in the GPU Game
Want help upgrading your GPU or evaluating if your computer can handle the new GPUs coming in a few months? Our experts can help. Call today (651) 456-8655 or check out our contact page and send us an email. One of our technicians will reach out to you!
Attention Gamers! Christmas is almost here!! Looking for a way to spend that gift money? Trust the professional systems builders at Twin Cities PC Repair… We can source any or all compatible PC gaming components and build you a sweet gaming pc. Skip the bloatware and get exactly what you need…. A powerfully fast gaming PC!
Big-box stores have big names and aisles of computers on offer. They post tempting deals on pre-built computers. But how does buying one of those computers compare to purchasing a custom-built one?
When you shop in a big-box store, you are one of the many people those salespeople are going to work with in a day. If you’re lucky, you may get to speak with someone actually assigned to the computer area on a regular basis.
Working with us to customize a computer, you get individualized expert service. Our specialists know computer users have different needs. You deserve a computer that matches what you’re trying to do. You might want to run the latest-and-greatest games at full graphic quality. Someone else wants something basic to support only email and Web surfing. Or how about a stock day trader who doesn’t need a fast computer but wants to run six screens at once?
It may be easier to walk into a big-box store and walk out with a desktop computer, but the big-box computer aims to appeal to everyone; it isn’t customized to each of these different aims.
Problems with Pre-Built Computers
The computers sold for less in big-box stores have cut corners to bring down costs. They can use lower-quality parts. There’s also limit to upgradability of the parts. Prebuilt brand-name systems often use proprietary parts unique to that manufacturer. This makes it difficult and expensive to replace a part.
You could end up saving money by paying for a system that has only 4 GB of RAM. Sure, the sticker price was lower, but your computer won’t run as well. Today, you need a computer with at least 8 GB of RAM. Depending on how you plan to use the computer, we might even suggest 16 GB.
The big-box stores sell computers from brand-name manufacturers pre-loaded with bloatware. The manufacturer keeps prices down by installing unwanted software in return for kickbacks. So, you paid less, but your computer runs slower from day one because it’s brimming with software you didn’t want. A customized computer comes only with what you need.
Our specialists can explain the benefits of the processing, power supply, and other parts. Picking every part of your computer, you can also count on high-quality parts that are easy to upgrade.
A Personal, Expert Relationship
Another selling point for big-box stores is the warranty. This is one more way they’re making money off the sale of your computer. But keep in mind that most of these stores aren’t going to fix your computer on-site. You explain your problem to a retail employee – again, maybe someone knowledgeable about computers (fingers crossed). Then you wait as the computer gets sent into a central repair base, where someone you haven’t spoken with is working on your computer. Then you wait for the computer to come back, hopefully fixed. Something that would take our experts 30 minutes to fix has you waiting a week. That’s a big deal if you depend on that computer on a daily basis.
When you buy from computer specialists, you’re working with a qualified computer technician. You’re building a relationship with someone who knows you and your computer, and you’ll always know where your computer is during the repair process. Additionally, since all parts are hand-picked, you might enjoy individual part warranties.
Building your own computer in the past was expensive, but today there are many more high-quality parts available. Your computer customizer can offer you affordable, reliable cases, RAM, hard drives, fans, GPUs, CPUs, and cooling, and they can help you weigh the benefits of each.
Whether you’re looking for an entry-level or high-end gaming machine, we can customize the best computer for you.
Why settle for a standard, pre-built option made to appeal to the largest number of people? Contact our experts today to start putting together your purpose-built, personalized gaming PC. Call (651) 456-8655 or visit our contact page HERE.
Click HERE to learn more about our custom PC’s.
What You Need to Know About Browser Extension Risks – 12/6/2022
With “Googling it” now a common expression, it’s safe to say you do a lot online. To do it all you’re using a Web browser (such as Chrome, Edge, Firefox, etc.). To do it all more efficiently or effectively, you could be using browser extensions, but this article is going to warn you against doing so.
To clarify, browser extensions are code add-ons that you connect to your browser. You can use them to personalize your surfing experience, and they accomplish many different things, including:
saving time (e.g. Scribe, Evernote, StayFocusd);
checking your grammar (e.g. Grammarly);
managing your passwords (e.g. Keeper, LastPass);
securing your online activity (e.g. DuckDuckGo, Ghostery)
Even though we’ve just said they can help secure your online activity and manage your passwords, the problem is that they are also risky.
Consider the fact that we said this represents added code. Now, how much coding do you know? Most will say “not a lot.” That means you’re blindly trusting that browser extension.
If you download a malicious one, that code can wreak havoc. Suddenly, your default search engine gets changed, or you get redirected to a start page with malware on it. You might face an onslaught of pop-ups or ads. They can also track your browsing history without you knowing it.
That’s just the beginning
Many browsers today want to keep you safe from malevolent extensions. They’ll have permissions in place before allowing access. Yet you still end up giving that extension a lot of access. For example, an extension modifying google.com needs access to all your Google activity. That means your Gmail, too.
Browser extensions access everything you’re doing online. So, a malicious extension could also function as a keylogger capturing passwords or credit card details.
A browser extension can also be sold to or hijacked by a bad actor. Then, it’s easy enough for them to push out an update that turns your trusted extension into malware.
What to do about this issue
Does this mean you should do without browser extensions? There are even browser extensions out there to block other browser extensions, but abstinence from extensions is not your only solution.
Instead, we’d recommend reviewing the safety and credibility of that extension. This means you should:
Check to see who published the extension.
Look at the reviews. A high number of positive reviews is a good sign. Thousands of people are unlikely to give five stars to a malicious extension.
Pay attention to the permissions required. If an extension claims to modify only one website, check that it accesses that site only.
Protect yourself with a good antivirus solution.
Keep your antivirus solution and other software updated.
It’s also easier to stay safe by limiting the number of installed extensions you use. If you have browser extensions that you aren’t using, uninstall them. This can cut your exposure to potential threats.
Another way to secure your online activity? Work with our IT experts. We can check permissions and review your extensions. We’ll also ensure your antivirus and software are up to date. Contact us today at (651) 456-8655 or visit our Contact page.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments