Why Pirated Software Isn’t Worth the Risk – 4/28/2025
You’ve probably heard about pirated software before, maybe from a friend or an online forum where someone mentions getting expensive software for free. And let’s be honest, in a home setting, it might feel like the chances of getting into trouble are pretty slim.
But there’s another side to the story.
It’s not just about avoiding legal issues. The real concern is what pirated software can do to your computer and your privacy. Let’s walk through it together.
Cracks and Patches Can Open the Door to Malware
To get pirated software working, people often use something called a crack or a patch. This is a tiny program that edits part of the software to skip the normal checks that make sure it’s a paid, legal copy.
Sounds clever, right?
But here’s the thing: that little crack is literally rewriting the program’s code. And once it’s doing that, it can just as easily add something nasty while it’s at it, such as malware or spyware.
You might not even notice at first. Your software may seem to work fine. But in the background, your computer could be silently leaking data, running slower, or being used as part of a bigger network of infected machines.
We’ve seen computers come in with antivirus completely disabled, all because of a dodgy patch file.
Key Generators Often Come with a Hidden Surprise
Some software uses license keys – a long mix of letters and numbers – to prove it’s genuine. Pirates often bundle in a key generator (sometimes called a “keygen”) that claims to create a valid key for you.
But think about this: whoever made that keygen knows you’re probably going to run it. They know you’re expecting a pop-up window and a bit of code. And they know you’re more likely to click “Allow” if your computer asks whether it can run.
It’s the perfect opportunity for someone to slip in a virus. And because the file was downloaded from an unofficial source, your computer doesn’t know if it’s safe or not until it’s too late.
Torrents Don’t Just Download: They Upload Too
If you’re using torrents to get pirated software, there’s something you might not know. Even if your download is only 10 percent complete, your computer is already sharing that 10 percent with others.
That’s how torrents work; they’re built to share pieces of files between users. But it also means your IP address (your internet connection’s unique label) is visible to anyone else downloading the same file.
Some software companies monitor these torrents. They track IP addresses and send copyright infringement letters through internet providers. You might never get one, but some home users do.
And even if you’re not caught, you’re still uploading copyrighted material to other people. That’s a risk many people don’t realize they’re taking.
You Never Know What’s Been Changed
Let’s say you’ve downloaded the pirated software and patched it, and everything seems to work just fine.
But here’s the uncomfortable truth: you don’t know what else has been changed under the hood.
Modern software is complex. It can do hundreds of things in the background, such as checking for updates, connecting to cloud services, or storing temporary files. If someone’s gone in and changed how the software checks its legitimacy, what’s stopping them from changing what data it sends out?
We’ve seen pirated programs that quietly install browser hijackers, pop-up ads, cryptocurrency miners, and even full-on backdoors that allow someone else to poke around your system without you knowing.
And most of the time, the damage isn’t obvious right away.
A Safer Way Forward
We’re not here to lecture you – everyone wants to save a bit of money – but when it comes to software, cutting corners can backfire in ways that aren’t worth the risk.
We’re more than happy to help you find legal, affordable software options that don’t break the bank. In fact, there are many free and low-cost alternatives that do the job just as well as the big-name programs.
We can also check your system for suspicious software, clean it up if something seems off, and help set up safe apps that fit what you actually need, without any shady patches or keygens.
Need Help or Just Want a Chat?
Whether your computer’s already acting up or you just want someone to point you in the right direction, we’re here to help. Give us a call at (651) 456-8655 or shoot us a message on our contact page.
No pressure, no tech-speak, just real help from someone who knows what they’re doing.
Do You Really Need Antivirus Software These Days? – 12/2/2024
Antivirus software has been a standard recommendation for computer users for decades. But in 2025, with advancements in built-in protection, you might wonder if you still need antivirus software. Let’s break it down together and see what makes sense for your home computer setup.
The Threat Landscape: What Are We Up Against?
Before diving into specific antivirus programs, let’s take a look at the types of threats lurking out there. It’s more than just old-fashioned viruses these days:
Viruses and malware These are the classic threats that most people think of. Malware includes everything from traditional viruses that replicate to malicious software that can steal your data or even lock you out of your own files (such as ransomware).
Phishing and scam websites Phishing attacks trick you into giving away personal information such as passwords or credit card numbers by pretending to be trustworthy sites or emails. Antivirus software often helps by blocking these sites.
Spyware and keyloggers Spyware hides in the background, watching what you do. Keyloggers are even sneakier, keeping track of what you type, which can put your passwords and sensitive information at risk.
Zero-day threats and exploits These threats take advantage of security holes in software that the developers haven’t yet patched. Good security software can help catch these vulnerabilities before they become a major problem.
Windows Defender vs. Commercial Antivirus: What Should You Choose?
Now that we know what we’re up against, the next question is: Is the built-in Windows Defender enough, or should you invest in a commercial antivirus program? Let’s compare.
Windows Defender: The Built-In Protector
Windows Defender, which comes free with Windows, has come a long way. It’s built right into your computer and runs in the background without much fuss. Here are the benefits:
No extra cost. It comes with Windows, so you don’t need to pay extra.
Simple and minimal. It’s easy to use, with no confusing pop-ups or renewal reminders.
Integrated protection. Because Microsoft makes it, it fits in seamlessly with your system and is regularly updated.
However, Windows Defender isn’t without its limits. While it’s a solid basic defense, it might fall short when it comes to more advanced threats, such as sophisticated phishing scams or newer forms of malware that commercial packages catch sooner.
Commercial Antivirus: Extra Security, Extra Features
Commercial internet security packages often offer more comprehensive protection. Here’s what they bring to the table:
Advanced threat detection. These programs usually have more advanced tools for detecting newer threats, including AI-based detection.
Additional features. Many offer extra features, such as password managers, VPNs for privacy, and parental controls, which can be handy for families.
Better phishing protection. They tend to excel in blocking fake websites that try to steal your personal information.
Of course, these extras come at a price. You need to pay for a yearly subscription, and they can sometimes slow your computer down a bit more than Windows Defender.
What Protection Do You Really Need?
The right level of protection depends on how you use your computer. Let’s look at a few typical situations:
Casual browsers and email users If you mainly use your computer for Web browsing, emailing, and light activities, Windows Defender might be enough. It offers decent security for day-to-day use, especially if you already practice safe habits such as not clicking on suspicious links.
Families and shared computers If you have kids or multiple people using the same computer, a commercial antivirus might be a better choice. Additional protection and parental controls can add peace of mind, particularly if younger family members are clicking on things they shouldn’t.
Heavy online shoppers and work-from-home users If you shop online frequently, handle sensitive work information, or store a lot of important data on your computer, the extra security features of a commercial antivirus package might be worthwhile. They tend to have more sophisticated threat detection and privacy tools that can help protect your information.
Final Thoughts: Do You Still Need Antivirus Software These Days?
Antivirus software is still important, even with built-in protection such as Windows Defender. The type of antivirus you need depends mainly on how you use your computer and how much peace of mind you want. Windows Defender is great for basic protection, but if you want more features or stronger defenses, a commercial package could be worth the investment.
Now we could sell our clients a typical, heavily commercialized, residential computer security product, but why settle for less? Here at Twin Cities PC Repair, we have tested several computer security products and have arrived to the conclusion that most are riddled with bells and whistles you simply don’t need. What does this mean? It means that the products slam your system performance by heavily utilizing system resources such as memory, CPU and hard drive.
What are we offering?
A simplified, yet powerful, product known as Emsisoft Business Security! Emsisoft’s ideal is a malware-protected world, a place where home and business computer security is engineered to perfection. Emsisoft produces innovative anti-malware solutions that are efficient, powerful, unobtrusive, and minimalistic. Emsisoft’s software effectively detects new threats before your computer is compromised. All of their products do their job perfectly; keeping your digital world safe. Emsisoft Business Security leaves your computer’s power where it belongs: with you.
Let’s Discuss Key Features…
FINDING AND REMOVING MALWARE
Dual-engine virus and malware detection – Emsisoft (A) and Bitdefender (B) engines work together to detect all types of malicious software, including viruses, ransomware,
trojans, bots, keyloggers, spyware and more. Signatures for double-detections are avoided for memory use and speed optimization.
Super fast system scans (1-2 min) – Scan your device quickly and thoroughly using our efficient dual-engine scanner. Scan time varies depending on which scan type you
select.
PUP/Potentially Unwanted Programs detection – Alerts you of potentially unwanted programs (adware, browser toolbars, system optimizers, etc.) that can affect your device’s
performance.
Advanced infection cleaning – Smart operation processes ensure the safety and stability of the computer during system cleaning. Checks 70+ autorun/loading
points including hidden ones used by rootkits and restores default values if they have been overwritten by malware.
There’s More! – Click HERE to download a full feature list in PDF format.
PREVENTING NEW INFECTIONS
Multi-layered real-time protection – We use diverse technologies and multiple layers of security to maximize our solutions’ protection capabilities.
Web Protection – Blocks access to known dangerous websites using a frequently updated block list. Web Protection is host-based and works across all
programs, even if the transferred web data is encrypted.
Anti-phishing – Blocks access to known fraudulent websites that try to steal online banking passwords or identity details.
Browser security – Browser extension/addon for Chrome, Firefox and Edge that blocks access to dangerous websites on a URL level. Uses a privacyconscious design that doesn t track your browsing history or break your SSL encryption chain.
There’s More! – Click HERE to download a full feature list in PDF format.
CENTRALIZED MANAGEMENT
Management Console – Centralized security management has never been easier. As part of our daily client endpoint monitoring duties (Included in your subscription), we monitor the protection status of your devices and we’ll reach out to you immediately if we notice any areas of concern. This also includes system performance monitoring such as, memory performance, hard drive performance and any Windows generated errors. Your security and privacy are of utmost importance! We do not have the ability to monitor your file system or any personal information on your device(s).
Windows & Third-Party Patching – Also, included in your monthly subscription, we review and deploy Windows and third-party software patches to your device(s). We test & review all patches before deployment, ensuring your have a healthy and up-to-date system!
There’s More! – Click HERE to download a full feature list in PDF format.
If you’d like to subscribe, request additional information, or are looking for a free consultation of your PC’s current security status, please call our security professionals at (651) 456-8655 or send us an email by visiting our Contact page! Only $9.99/mo/device. No contract. Cancel anytime.
How to Choose Home Computer Repair (11/10/21). It’s upsetting when a home computer breaks down: “My whole life is on there!” Then, you have to trust someone to take care of your device. It’s a lot to ask, and that’s why we’re sharing these five tips to help you feel better about your choice of repair person.
#1 Avoid the Big Brands
The big-box stores have name recognition, which may make you feel more secure, but the reason they advertise on TV and have big storefronts is to sell stuff. Their people are salespeople first, and their staff are not going to be as experienced with computer and device repair.
For tricky jobs, the big-box stores send your device to a remote, centralized location. That’s where the experienced staff are, so it’s good in that way. Yet you’ll now have to wait for your computer to ship to and from that location, which can mean a couple of weeks when you don’t know where your computer is or who is working on it.
#2 Consult Customer Reviews
You’ll probably start out by asking family, friends, and co-workers to suggest someone they’ve worked within the past. When you’re looking around for computer repair, read online reviews. Customer reviews can help you gauge whether you can trust the service promises. Feel free to check out our Google reviews HERE.
You may also learn about any after-service support. It will help to have someone you can ask questions of in the future.
#3 Research Types of Support
It may help you to make your decision knowing that any work on your device is going to be done on-site. If they come to you, you’ll get to meet the person doing the work and keep an eye on them if you want.
Another option may be to have the IT tech remote into your computer to help solve your problem.
Then, there’s the option of drop-off and pickup from that repair shop’s own brick-and-mortar store. If you take this route, you might want to ask whether your device will remain on-site at all times.
You’ll also want to find out if that computer repair person has a particular area of expertise. Some companies specialize in working with certain brands, whereas others can handle all types of models or brands.
Who doesn’t love a bargain? But the cheapest computer repair may not actually be a better deal. Taking the budget approach, you could get an inexperienced tech with slightly more know-how than you. On the other hand, going for the most expensive repair company doesn’t guarantee the greatest service either. Ask the computer business what their experience is.
Our IT experts are here to help you repair any computer issues. We can work on-site, remote in, or you can bring your device to us for the professional attention it needs. Call us today at (651) 456-8655 of visit our Contact page HERE!
Two-Factor Authentication, How Hackers Get Around SMS – Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe.
With billions of usernames and passwords leaked, access credentials everywhere are at risk, especially if you are reusing your log-in information on more than one site (don’t do it!).
Business websites want to offer a secure user experience, so two-factor authentication (2FA) has become the norm. It’s meant to help stop automated attacks in which bad actors use the leaked usernames and passwords.
Still, if the site you’re visiting uses short message service (SMS) to send a one-time code to your phone, you could still be at risk.
Hackers, using information they have from a data leak, can call your telephone company. They use your name, date of birth, and other identifiers available on the Dark Web, to impersonate you. Then, say you’ve lost your phone, they transfer your phone number to a device with a different SIM card.
That means when the one-time SMS code gets sent your phone number, the message will instead go to their device.
Android Users Also Beware
On Android devices, hackers have an easier time getting access to text messages. If they have access to your leaked Google credentials, they can log into your Google Play account. From there, it’s simply a matter of installing a message-mirroring app on your smartphone.
The app synchronizes notifications across your different devices. It’s for when you really need to be connected, and you’ll be able to see your phone’s SMS alerts on your tablet!
The app won’t work unless you give it permission when prompted to do so, but too many people don’t stop to read alerts from their own accounts: they assume it’s another necessary update and go on with their day. Otherwise, the hacker might call you in a social engineering ploy pretending to be a legit service provider. They’ll be familiar to you, so you’re more likely to listen when they ask you to give permission.
Again, when the one-time SMS code gets sent to your phone, because of the message-mirroring app, the hacker’s device will also receive the code.
What Can You Do to Protect Yourself?
It starts with using unique passwords for all sites you visit. Worried you’ll forget them? A password manager can keep all your access credentials in one secure place for you.
You should also confirm that your credentials haven’t been compromised. If you use Google’s password service, you can head to the password manager site and tap “check passwords” to see if there are any issues. On Firefox, head to the Firefox Monitor page and “Check for Breaches.” On Safari, click on Preferences, and then on Passwords to see what recommendations they have for your security.
Change any passwords that have been involved in a leak!
To avoid the SMS concern specifically, avoid using one-time SMS codes to verify your identity. Instead, you can use a non-SMS authentication tool such as Google authenticator, which provides two-step verification services within the app itself.
Here’s some additional information you may find helpful:
Need help learning if your credentials have been leaked? Or want assistance setting up more security for your online activity? We can help. Contact our IT experts today at (651) 456-8655 or visit our CONTACT page.
5 Tips to Protect Your Laptop from Physical Damage
A laptop can hold your life. If you’re working from home, it’s essential to your income. For students, it’s where you keep all your notes and essays. Plus, there are the personal photos and videos. And you sometimes use it to stream your TV shows, or to video chat with friends and family. You may even make music, create art, or be writing the next bestselling novel on your laptop. So, you want to keep it in great shape. Here are five tips to protect your laptop.
#1 Don’t drop it
Or throw it, or stand on it, or expect it to withstand any serious impact. OK, that’s pretty obvious. You also don’t want to use your laptop in the bathtub or at the pool. Even a simple water spill on a laptop can damage the circuitry. If you do get your laptop wet, immediately turn it off and unplug everything attached to it.
#2 Open carefully
Laptops are getting thinner in every iteration. Some now even have foldable screens. The thinner and more flexible screen may look sleek and cool, but it’s also less rigid, which makes it more prone to damage. Especially on lower-cost laptops, the screen can flex if you open the computer up from just one side.
Yet, many of us hold a laptop in one hand and open the lid with the other. This can cause the screen to twist. Use both hands to open the laptop. Or get into the habit of opening your laptop from the center to avoid flex.
#3 Don’t bedazzle your keyboard or screen
Alright, maybe you weren’t planning on putting faux rhinestones on the screen or keyboard. Still, reconsider any decorations you have thought of adding. Even a keyboard protector (to prevent dust or spills getting into the circuitry) or camera privacy sticker could damage some of the new super-thin laptops. It’s just that there is now so little clearance between the keyboard and the screen.
If you really must have your stickers, put them on the protective sleeve that you get for your laptop.
#4 Disconnect carefully
Your laptop needs a consistent power source. If you damage the power cord connection, you’re done. So, make sure you pull the power cord out straight. Yanking it out sideways could damage the port.
Also be aware of where your power cord is connecting to the wall outlet. If you leave the cord trailing along the floor, someone could trip over it, or it could get caught on a rolling chair. This could not only damage the charging port but even pull the entire laptop onto the floor. That brings us back to #1, don’t drop the laptop!
#5 Keep it cool
No, you don’t have to store it into a refrigerator (please don’t!), but heat isn’t good for your laptop. You’ll want to keep your computer away from external sources of heat.
Again, as the laptops get thinner, they are more vulnerable to internal overheating. Ensure that the laptop’s intake ports are unblocked so that air can flow through and cool the circuitry. You might also blow dust out of the vents using canned air.
Also, avoid placing your laptop on very soft surfaces. A soft, uneven surface is more likely to block the internal fans. This leaves your device unable to regulate its temperature. You could even buy a laptop cooling stand, which provides extra fans to improve air circulation.
Average laptop lifespan will vary between two to five years. Keep your laptop on the longer side of that by taking these tips to heart.
If something does happen to your laptop, give us a call at (651) 456-8655. Our IT experts are here to help you find the best laptop for you, upgrade and secure your laptop, or fix your laptop when you need it. You may also send us a message from our Contact page.
Setting Your Scholar Up for Online Learning – Schools around the world have closed their doors during the COVID-19 crisis, students from kindergarten through graduate school are being asked to learn online. It’s a change for everyone, but having the right technology in place can help with the transition.
Your student may have been using the Microsoft Office suite of software at school. If you don’t have Microsoft Word, Excel, and PowerPoint at home, check if your school is providing licenses or free software.
If not, buying a subscription to the online Microsoft 365 package allows you to pay monthly or yearly, and it’s much more affordable than in the past. One month is about the cost of two cafe coffees.
Otherwise, your student may be able to get work done using Google’s suite of tools. Teachers may accept links to Google Docs, Sheets, or Slides. These free options are also useful when your student needs to work on a group project. People can collaborate online in real-time using the G-Suite software.
Teleconferencing with Teachers and Peers
Your student is likely to need to download teleconferencing software such as Zoom or Skype. Beware! Cyber-criminals take advantage of every opportunity. Noticing the increased demand for these services, they’ve set up bogus sites. Make sure that you are downloading from the legitimate sources: www.skype.com or www.zoom.us.
While we’re talking about teleconferencing, you might pass on these best practices:
Use headphones to limit audio distractions.
Join calls from a low-traffic setting with simple backgrounds.
Ask others at home to avoid downloading, streaming, or backing up while the student is live online.
Connect to the router with a network cable, or at least be as close to the wireless router as possible during the call.
Considering Cyber-security
In addition to setting up fake teleconferencing sites, cyber-criminals have other ways to exploit the situation.
Remind any students learning from home that they need to keep their username and password private. This is a lesson that never gets old.
Are you still using Windows 7 on a home computer? This popular operating system (OS) reached the end of its life in January 2020. Yes, it may still work, but it is no longer receiving security updates from Microsoft, and the bad guys know Windows 7 is vulnerable. Continuing to use this OS puts you at risk. Without new upgrades, you’re no longer protected from vulnerabilities or exploits.
You probably already know to avoid using public wireless networks. Although your students can’t go to a coffee shop or public library right now to get online, reminding students to secure their online activity is critical.
This is a good time to review your WiFi setup. Too many homeowners don’t change the default username and password on their routers. Big mistake. You should also:
hide your WiFi network from public view;
set your network up to encrypt transmissions;
update router software regularly.
A Focus on Learning
There’s one more thing parents and guardians might consider. At school, the computers prevent students from going to certain sites or downloading files, but you may not have the same blocking and filtering set up on your home devices. This can be addressed in settings.
If you have to share a computer, set up a student-specific user profile to:
prevent your student from getting distracted during learning;
limit exposure to malware and cyber-threats;
avoid them accessing any of your work files.
You may feel isolated during the coronavirus quarantine, but you’re not alone. Our tech experts can help you set up and secure your technology for work or school from home. Give us a call today at (651) 456-8655 or visit our Contact page.
Steer Clear of Coronavirus Scams (4/9/2020) – With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the Coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.
The last thing you want to read right now is that there’s another threat out there – sorry, but it’s true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around Coronavirus is their mission.
So far, several Coronavirus-related attempts to cyber-scam people have been reported. There are examples of:
emails that appear to come from government health departments;
offering a tax refund to get people to click on malicious links;
memos to staff that appear to come from large employers;
COVID-19 test offerings from private companies;
fake websites promising to sell face masks or hand sanitizer;
soliciting donations to help fund a vaccine.
What to Watch Out For
Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim’s computer with malware.
You may get an email promising the attached information offers Coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ).
In another example, an email impersonating a healthcare company’s IT team asked people to register for a seminar “about this deadly virus.” Anyone who didn’t question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers.
What to Do
Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:
be wary of anything that tries to play on your emotions and urges immediate action;
question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
hover over links before clicking them to see where they will take you – for example, in the WSJ example, the Web address was for the “worldstreetjournal”;
avoid downloading anything you didn’t ask for;
doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
ignore any communications requesting your personal information;
don’t be suckered by fraudulent pleas for charity.
Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.
If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.
While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.
We hope you’ll take care and stay healthy both physically and online in these tough times.
Need help installing security software and keeping your technology safe? Our cyber-security experts can give your home a tech immunization. Contact us today at (651) 456-8655 or visit our Contact page!
Requesting Service During Minnesota’s COVID-19 Shelter-in-Place Order – Minnesota Governor, Tim Walz, has ordered Minnesotans to stay home except for essential needs during the period of March 27th – April 10th. Department of Homeland Security CISA has classified IT Support Providers as Essential Critical Infrastructure Workers.
During this unprecedented time, your home PC is considered an essential tool. Many are using their home PCs to work from home, for child education, home banking, shopping, paying bills, etc. That being said, Twin Cities PC Repair will remain open to serve our clients in the event you have issues with your PC..
For more information on Essential Critical Infrastructure Workforce, visit the DHS HERE.
Due to limited secretarial staffing at our offices, If you require sales or support, we are asking our clients to do one of the following prior to visiting our offices:.
1.) Call our office at (651) 456-8655 to arrange a pick up, drop off or remote support session.
Thank you for your business and the opportunity to serve you. I wanted to personally share an update on our efforts to help keep our operations up and running during the Coronavirus (COVID-19).
Twin Cities PC Repair is closely monitoring the latest reports from the Centers for Disease Control (CDC) and the World Health Organization (WHO) and we are taking a number of precautionary measures for the health and safety of our customers and associates. Our goal is to do everything we can to help you keep your computers up and running and people safe during this unprecedented and evolving situation.
We are taking extra precautions to maintain a clean & safe work environment. This includes the wearing of protective gloves as well as thoroughly disinfecting your device before and after we work on it.
We are continuously disinfecting all tools, equipment and work surfaces within our offices.
We have implemented a ticket workflow triage process to determine if a device can be diagnosed and repaired via our secure remote access tools. This could potentially prevent a trip to our office.
All residential onsite visits will be evaluated on a case by case basis before they are scheduled. We reserve the right to halt onsite service calls until the pandemic is under control.
As for now, it’s business as usual until further notice. We certainly don’t want to prevent you from visiting our office. We believe that by following the recommendations of the CDC and our medical professionals, we can all work together to prevent the spread of the Coronavirus (COVID-19). Please take precaution, practice extra personal hygiene measures, and be safe out there.
This crisis is demonstrating that online capabilities are more critical than ever – and so is the high level of support you’ve come to expect from us. If you have any questions or concerns pertaining to our COVID-19 precautionary measures, please don’t hesitate to call (651) 456-8655 or visit our Contact page.
Sincerely,
Patrick Jensen
Owner/Technician
Twin Cities PC Repair
860 Blue Gentian Rd.
Suite 200
Eagan, MN 55121 www.twincitiespcrepair.com
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments