Imagine it: Late one night, while you’re chilling on the couch with your laptop in your lap – where, given the name “laptop” you would think it belongs – watching the latest season of “Supernatural” and you begin to think to yourself that the special effects in this episode are more realistic than normal, because just as the Winchester Brothers light up the latest corpse it seems that you can actually feel the heat on your legs. Unfortunately, that is not Netflix setting your lap on fire, that is your computer overheating.
Overheating is one of the main reasons that people end up losing the use of their laptop and Netflix buddy. I will say this as gently as possible: Fellas, if you let an overheating laptop sit on your lap too long, studies have shown that it can cause infertility also.
Fortunately for us engineers are working on a way to prevent this overheating issue through nanoelectronics. Unfortunately for us, this breakthrough is a few years away.
Luckily, there are a few simple ways that you can keep your laptop from setting your pants on fire:
1) Keep it clean
Inside your lap top is a huge PC tower slimmed down and shoved into a tiny area. Dust, dirt, and worst of all animal hair collect inside and have no way out. Get this gunk cleaned out on a regular basis can do a lot toward keeping it cool.
If you’re using an older laptop odds are that it has an old mechanical hard drive (HDD). Replacing it with a Solid State Drive (SDD) can help bring those temperatures down a bit. Less moving parts means less heat generation.
3) Cooling Pad
These are nifty little devices that lift up your computer for better air circulation, some even come with fans to help move the air along. There are many different varieties of cooling pads available, all for about what you’d pay going out to dinner and a movie.
Don’t get burned, if you have any questions, your friends at Tech Force in Racine are here to help you (and your laptop) stay cool.
#computerhelpracine , #computertips, #computerupgraderacine, #laptoprepairracine
We all love our Google, quickly finding everything we need on the Internet. It’s replaced dictionaries, encyclopedias, instruction manuals, newspapers and in many cases, even doctors. However, sometimes your search results aren’t the real thing and can be downright malicious. Here’s how to search safely:
Pay attention to the URL in Google
Below every result title there’s a URL in green. No matter what the title says, this URL is where your click will take you. Unfortunately, cyber-criminals will often list their site with a familiar and trusted title but link you to their scam/malware pages.
For example, the title could be your bank name (eg, Example Bank), which seems legitimate, but the URL could be www.baabpjhg.com which is obviously not your bank. Sometimes they’ll attempt to trick you by putting the real site into the link too, eg www.baabpjhg.com/examplebank.com which makes it even more likely to catch you when skimming through results quickly. When you visit the page, it might look exactly like your bank’s site and ask for your login details, which are then harvested for attack. While jibberish in the link is pretty easy to spot, sometimes they’ll take advantage of a small typo that you can easily miss. For example, www.exampebank.com (missing the letter L).
Notice Google search results vs paid ads
Google does a pretty good job at making sure the most relevant and legitimate sites are at the top of the list. However paid ads will usually appear above them. Most of the time, these paid ads are also legitimate (and you can quickly check the URL to verify), but occasionally cybercriminals are able to promote their malicious site to the top and catch thousands of victims before being removed.
Believe Google’s malicious site alerts
Sometimes Google knows when something is wrong with a site. It could be a legitimate site that was recently hacked, a security setting that’s malfunctioned, or the site was reported to them as compromised. When this happens, Google stops you clicking through with a message saying “this website may be harmful” or “this site may harm your computer”. Stop immediately, and trust that Google has detected something you don’t want in your house.
Turn on safe search
You can filter out explicit results by turning on Google Safe Search. While not strictly a cyber-security issue, it can still provide a safer Google experience. Safe Search is normally suggested as a way to protect browsing children, but it also helps adults who aren’t interested in having their search results cluttered with inappropriate links, many of which lead to high-risk sites. Switch Safe Search on/off by clicking Settings > Safe Search.
Need some help securing your system? Contact Tech Force here.
In the good ol’ days, keeping track of your small business was simple. Piles of paper scattered about the office, a couple of typewriters for document making, some pencils and ledgers to keep the books tidy, and a row of file cabinets along the south wall to keep it all safe and sound behind a door locked every night.
Now all that mess is crammed into the office computer. In fact, most small business have multiple computers, many times each with their own user.
Not to mention that the bookkeeper is terrible at updating her computer, and the sales guy has an internet browser history that dates back to the previous decade, making both these computers a huge security risk and potential liability to your business.
Sometimes it can be a bit tempting to put a computer geek on the payroll to keep a watchful eye on your office computers.
As tempting as it may be, it still seems a little silly for a smaller business to hire its very own full-time IT guy to sit around the office to monitor and maintain just a few computers.
But, let’s face it, you can’t be expected to monitor your employee’s computer usage every minute of every day yourself.
Fortunately there is another, more cost-effective solution.
A Computer Maintenance Plan keeps this high-tech headache taken care of for you: Software stays up-to-date, antivirus protecting and periodically scanning for trouble, hardware monitored for potential issues before they become a problem. Your computers will always have top notch protection that your employees can not “accidentally” delete or otherwise bypass. A Maintenance Plan doesn’t break the budget, saves you time, and keeps your business running smoothly.
To learn more about our Small Business Maintenance Plans, or to schedule an on-site consultation, call Tech Force today!
#Computer Repair, #computer security, #Small Business Computer Services
It is one of the many components inside the unit that is required in order for our computer to actually go. Many of us have seen the “blue screen of death”, possibly because our computers just couldn’t keep up with the amount of information that we were pushing through the RAM. However, do you really know what RAM actually is, and why it’s needed?
What exactly is it?
Our computers actually use two types of memory, but for the sake of keeping this simple we will start with RAM, or Random Access Memory. RAM is an actual physical component that is removable and upgradable on most models of computer.
These awesome little chips are what dictates to our processor and screen how fast we can work and how many dialog boxes, or “windows,” we can have open, and how much can be displayed in those boxes. For the old timers, do you remember when we had to save a document after every sentence just to make sure we didn’t lose our work? Now we no longer have to do that, and can have 3 web browsers with 7 tabs open in each, going the background as we work. RAM is what allows us to do this.
How does it do that?
When we run software, or open a file, it is loaded temporarily from the hard drive into our RAM. Once loaded into RAM, we are able to access it quickly. RAM storage is volatile, temporary. Once the computer is turned off anything that was loaded on the RAM is erased. Comparing computer storage to the human brain, RAM works like short term memory while hard drives resemble our long term.
Running out of RAM will cause our operating system to begin dumping some of the open programs and files to the paging file, also known as virtual memory. This can be bad as the paging file is stored on the much slower hard drive.
Running out of virtual memory will increase the chances of us seeing a “blue screen of death.” Some symptoms that this may be occurring are; slow loading times, stuttering and general unresponsiveness; especially if you have a mechanical hard disk drive.
Now you know!
Of course, this was only a short and simple explanation of a vastly more complex topic, but you now have a good basic knowledge of what RAM is, what it does, and why it’s an important part of your computer.
If you have any questions, want to learn more, or want to upgrade the RAM on your computer give the helpful folks at Tech Force a call!
Computer Consulting Racine, WI , Computer Help Racine, WI, Computer Upgrade Racine WI
It’s almost vacation time again! That awesome time of year when a lot of us like to travel. Whether it’s off to visit relatives or just heading somewhere where we can relax in a different setting for a bit. Of course that means bringing your laptop and cell phone along. Most hotels, coffee shops, and even restaurants offer the use of free WiFi. The big question is, “How do I keep my info safe out there?”
Without getting too into the horrors of what can happen when using public wifi to access and surf the internet, just know that it is a scary movie you definitely don’t want to see. So here are a few pointers to help you stay a little safer while traveling the world this summer.
1. Make sure that your OS, browser, and antivirus are all patched and up to date.
Before you head off on your adventure, be sure to make sure your computer is ready to go with you.
2. Turn off sharing.
For Windows Vista and 7 use the following to turn off public sharing:
3. Turn on your laptops personal firewall.
Windows Firewall is always on by default, so if you’ve turned it off for some reason, it would be a good idea to turn it back on.
4. Use a VPN
A VPN, Virtual Privacy Network, is typically a paid service that keeps your web browsing secure and private over public Wi-Fi hotspots. There are a ton of awesome options, so if you need help choosing one, let us know.
5. Use secure websites for sensitive information.
The best way to see if the site is secure is to check if it has an “https” address. The “s” stands for “secure socket layer,” meaning the site is encrypted.
Another thing to look for is the “green” padlock on your browsers address bar.
6. Consider using a secure browser.
There are actually several very good and reliable browsers out in the data stream that can give you automatic encryption. If it is needed. For more info on the latest and greatest, give us a buzz.
7. Read the “Terms and Conditions” of using the free access carefully
Some wifi setups are actually placed not by the owner, but by their PR firm, and allow you to use it in exchange for you email address and phone number. To get around this you can use your handy dandy “alternative” email address.
8. Disconnect from the public WiFi when you’re done using it.
This is not only courtesy, to keep from using more bandwidth than you need, but it also keeps “sniffers” from getting access. Bonus, this will also help your battery life.
9. Just don’t!
You are on vacation! Take some time to do something you wouldn’t do at home. Relax and enjoy sometime away from the virtual world.
Tech Force will be here when you get back, and is always ready to help should anything go wrong with your equipment while you’re away!
#computerconsulting #computerhelp #computertips
The invention of Wi-Fi has been a science fiction dream come true. We can use our laptops anywhere in the house, our phones are using home internet instead of sucking down our cellular data, and our gadgets are all communicating. It’s essentially the backbone of the smart tech boom for home and business alike. Most networks are password-protected with an encryption called “WPA2” and this has been safe and secure, until now.
Recently, a security flaw called KRACK was discovered that allows hackers to break into Wi-Fi networks – even the secured ones. Your laptop, mobile phone, gaming console and even your smart fridge are possibly vulnerable as a result.
How KRACK works: The Key Reinstallation AttaCK isn’t a problem with your device or how it was set up. It’s a problem with the Wi-Fi technology itself. The attack gets between your device and the access point (eg router) to reset the encryption key so hackers can view all network traffic in plain text. Since we rely on Wi-Fi so much, this might mean hackers have a front row seat to your credit card numbers, passwords, chat messages, emails, photos and more.
NOTE: The hacker must be in physical range of your Wi-fi to exploit this flaw, it doesn’t work remotely like other attacks we’ve seen recently. Given most Wi-Fi ranges extend well past your own home/business, this is small comfort, but important to know.
How to protect yourself
Run your updates: Software updates are being released which fix the flaw. Microsoft has already released one for Windows, Apple has one coming in a few weeks. Take a few minutes to make sure you’re up to date with all your patches on any device that uses Wi-Fi (your smartphones, laptops, tablets, PCs, game consoles, etc). Unfortunately, some devices may be slow to get an update, or if they’re older, may not get an update to fix this issue at all. If possible, consider using a cabled connection on those older devices or upgrade to one with support.
Be very careful with public Wi-Fi: While your local business center, library or school campus has expert IT professionals keeping guard over your security, it’s a very different matter at your local coffee shop. It’s unlikely small locations such as this will be on top of security patches. Remember, a hacker exploiting this flaw only needs to be in the same Wi-Fi area as you, so be careful you don’t give them a dollop of private information with their coffee.
Check your browser security: Before sending anything secure over the internet, check you’re using a HTTPS site. You’ll know these by the little padlock you see next to the URL, and the address specifically begins with HTTPS. Major sites like Facebook, Gmail and financial institutions already use HTTPS.
If you need help updating your devices, or want us to check if you’re safe, contact us.
No matter how careful we like to think we are, this can happen to any of us. It only takes a split second to make this catastrophe happen. SPLASH! That mug of coffee, cup of water, or glass of wine is all over your beloved laptop.
Here’s what to do if you find yourself in this mess:
First, take a deep breath, now is not the time to panic, every second really does count.
Next, if your laptop is on, turn it off, unplug it, and remove the power cord.
Now, if you can, detach the battery. If your model doesn’t allow for removal of the battery you can skip this step.
Then, in a well-ventilated room, tent the laptop over a towel or some absorbent surface, like a microfiber cloth, or stack of paper towels or napkins. This allows any liquid that managed to find its way into your laptop to drain out.
Now begin removing all peripherals: mouse dongle, external hard drives, flash drives, if you have an external wireless card take that little fella out too. Basically, if you plugged it in to your laptop, remove it.
It is important that you not remove your laptop from this tent position for at least 48, preferably 72 hours.
(Warning: Turning a laptop on before it has had a chance to completely dry increases the chances of shorting the components inside. Also, while it might seem a good idea at the time, do not use a blow dryer to try and dry your laptop out faster. This dry heat can severely damage some of the internal components.)
Okay, now you can panic… Just kidding. There really is no need.
Tech Force has seen this a thousand times, and can get you set straight in no time at all.
If you’ve spilled something on your laptop, follow these simple steps, then give us a call.
#techforce #computerrepairracinewi #computer #repair #localbusiness #smallbusiness #it #techsupport
#laptoprepairracinewi #computerhelpracinewi #racinewi
Sometimes computers do wacky things that ring alarm bells and make us dive for cover. Next thing you know, you’re running scans on repeat and demanding everyone come clean about their browsing habits. Fortunately, not all weird occurrences are caused by viruses – sometimes your computer is simply overloaded, overheating or in desperate need of a reboot. Here are the tell-tale signs of a malware attack:
1. Bizarre error messages
Look for messages popping up from nowhere that make no sense, are poorly worded or plain gibberish – especially if they’re about a program you don’t even have. Take note of anti-virus warnings too, check the warning is from YOUR anti-virus software and looks like it should. If a message pops up that isn’t quite right, don’t click. Not even to clear or cancel the message. Close the browser or shut down the computer instead, then run a full scan.
2. Suddenly deactivated anti-virus/malware protection
You know the best way to get past the guard? Send him for a coffee break! Certain viruses are programmed to take out the security systems first, leaving you open to infection. If you reboot and your protections aren’t back on the job, you are more than likely under attack. Attempt to start the anti-virus manually and you’ll know for sure.
3. Social media messages you didn’t send
Are your friends replying to messages you never wrote? Your login details might have been hacked and your friends are now being tricked into giving up personal information or money. Change your password immediately, and advise your friends of the hack.
4. Web browser acting up
Perhaps you’ve noticed your homepage has changed, it’s using an odd search engine or opening/redirecting unwanted sites. If your browser has gone rogue, it’s definitely a virus, usually one intended to steal your personal or financial details. Skip the online banking and email until your scans come up clear and everything is working normally again.
5. Sluggish performance
If your computer speed has dropped, boot up takes an eternity and even moving the mouse has become a chore, it’s a sign that something is wrong. But not necessarily a virus. Run your anti-virus scan and if that resolves it, great. If not, your computer likely needs a tune-up or quickie repair.
6. Constant computer activity
You’re off the computer but the hard drive is going nuts, the fans are whirring, and the network lights are flashing like a disco? It’s almost like someone IS using the computer! Viruses and malware attacks use your computer resources, sometimes even more than you do. Take note of what’s normal, and what’s not.
There has been a ton of talk about the cloud. Cloud this, cloud that. But what actually IS the cloud? It’s okay if you don’t know, most people don’t understand it and even some tech people tend to wave their hands towards the sky when trying to explain it!
Since it actually has nothing to do with the white fluffy things in the sky, let’s lay it all out:
Cloud computing is about storing and retrieving your data (personal or business) within your own piece of the internet. It’s so you can access it from anywhere, just like you do a web page, and it won’t matter if your office is closed and you’re squeezing in a little work on your phone at midnight. Everything will be saved and ready to pick up when you get back to your desk. Colleagues in different locations can even collaborate on documents in real time.
If that all sounds a bit futuristic, think about how an email service like Gmail works. None of your emails are actually being stored on your hard drive or device, they’re stored on the Gmail server and you can access them anytime you like.
Your read/send/receive changes are applied instantly, remembered for next time you log in. This is a form of cloud computing. So is Netflix, where you can stream movies and TV shows on demand. All the video is actually stored on a computer somewhere else in the world and sent to your device in tiny pieces as you watch it. Netflix remembers what you watched, where you got up to, and even if you’re hopping immediately from one device to another, it still has it all ready to go.
Where is ‘cloud’ data stored?
Good question. And it’s why the term ‘cloud’ causes so much confusion. The data absolutely must be physically stored somewhere. Companies who offer cloud storage have huge warehouses dedicated to holding servers whose sole job is to send and receive data all day. And by huge, we mean HUGE.
You could get lost walking the rows of servers, just box after box for what seems like forever. The biggest server farms or ‘cloud campuses’ are still growing, but to give you an idea: they can be upwards of 1million square feet. It’s big business, literally.
In terms of location, the US and UK are popular server farm locations, but the company could also have copies of your data stored elsewhere in the world. This is so they can fulfill their redundancy guarantees – if disaster hits one location, the other still has a copy.
Having additional locations and copies also increases the speed of access. With some companies, you can choose your preferred location so that data doesn’t have to travel quite as far across the world, increasing speed even further, which of course, saves time and money. Collaboration, security, redundancy, AND savings? We’d call that a win.
Ready to take advantage of cloud computing? Give us a call at 262-515-9499.
With the crazy weather we’re seeing, natural disasters on the rise and cyber terrorism echoing for years, it’s not a case of ‘if’ a disaster will strike your business, but ‘when’. Surprisingly, it’s not the scope and scale of the event that influences how deeply your business is impacted, it’s your business continuity plan.
Put simply, this is the all-important set of precautions and pre-planned responses to an event, laid out in bullet-proof detail and implemented with one driving focus: keeping your business running with little or no downtime. Think about what would happen if your business was hit by a natural disaster tomorrow. Would it survive? How much downtime would it take to push you into dangerous territory?
According to an IBM study of all the companies that had a major loss of data, 43% never reopen, 51% close within two years and just 6% will survive long-term. For a fraction of those survivors, business even continued as usual thanks to their ‘failsafe’ business continuity plan. It’s more than disaster recovery, it’s full preparedness that bypasses the need for 2+ weeks of downtime, financial ruin, wasted salaries and reputation loss – but it does require a higher level of planning…in advance.
Recommendations to put you in the surviving 6%
Prioritize: You’ll need to plan exactly what you’ll recover first and know who’s in charge of making it happen. It goes beyond jotting down a checklist of things to do, it’s taking an analytical, process-based approach to recovery for each unique business perspective. But it’s also realistic: there’s no point dedicating precious time to reviving the email system if your customer data is leaking onto the internet, even if email did rank as your top communication priority!
Backup: Of course, the most critical part of your business continuity is having full backups in three places. Why three? One copy locally which you use each day, a backup on another (disconnected) device in the same location, and one in the cloud. That local backup is your life-saver for system crashes, cyber-attacks and the like; the cloud backup comes into play when your business has taken a major physical hit, perhaps from fire or flood. Some businesses can run entirely location-independent when using cloud systems like Office365, which can be enough to put them in that 6% of disaster survivors.
Test: Make sure all employees know what the plan is if something goes wrong, and their specific roles in these scenarios. You can test, prepare and rehearse your continuity plan under simulated disaster conditions, which will uncover new obstacles, priorities and additional threats.
As your IT environment becomes more complex, carrying more responsibility and risk, so does the importance of a robust business continuity plan. The best BC plans look beyond disaster recovery, taking into account scalability of your system and scope of your individual business, to create strong battle lines that will keep your business operational, both now and for the long term.
Tech Force Blog
We provide you with important, practical tips and insight for your technology and networks for both home and business.