What’s the Slowdown?

What’s the Slowdown?Slow-Computer

Take a moment and compare the amount of hours you spend on your computer with the amount of hours you spend in your car.

I read one recent study that claimed the average adult spends 4 to 6 hours daily on their computer.  I’d be willing to bet that most of us don’t spend even close to that amount of time in our cars yet we take our vehicles in for maintenance on a fairly regular basis.  We know that by doing so, we will get the longest life out of our vehicles.

So why do most of us fail to do the same thing with our computers?  We seem to get angry and are surprised when something goes wrong on the very thing we spend 4 to 6 hours a day on.…

Phishing for Your Data

Phishing for Your Data

There is an old scam that has made its way to our area. It has been around for some time but seems to have become quite widespread in our area code recently. It is called phone phishing.what-is-phishing

The way it works is someone official sounding calls you and tells you that your computer is infected. They are able to make you think they are somehow affiliated with Microsoft. Usually they convince you by walking you through a few things on your computer. Typically they point you to your event viewer which is a log of all the errors that occur in your computer. These are errors and not infections. These errors can occur from every single piece of software and hardware inside of your computer and we don’t even realize they are occurring most of the time.…

To Pay or Not To Pay

To Pay or Not To Pay

One of the number one questions we are asked when someone is purchasing a computer from us is, “Does it come with Microsoft Office?”kingsoft20office20suite202012-11319051

A long time ago computer systems often seemed to come bundled with Microsoft Office but that is sort of deceiving.  Yes, systems would have Office installed on them but usually it was either a trial version of Office or you actually purchased it when you purchased your system either on purpose or on accident. The only thing Microsoft ever gave away for free that was similar to Office is Works, which had two versions:  One had a generic word processor in it and the other actually had Microsoft Word included in it.…

Getting Scammed?

Getting Scammed?

We just finished doing another segment on Good Day Sacramento.  We had a customer bring in their laptop to our Riverbank store.  She was experiencing a scamware popup that was telling her that gooddayshe was infected and would have to pay $69.99 to have the infection removed.

This is a very common type of malware.  We call it scamware because it is software that gets on your computer from various methods and prevents you from being able to use your computer like you are used to. It essentially holds your computer hostage until you get it removed professionally. If you pay them the $69.99 (or whatever the fee is for that particular infection) it does nothing…and now they have your credit card information!…

Frogs In Your Computer?

Frogs In Your Computer?

I recently did a live TV segment talking about what a dirty computer can do to its performance and longevity.  The guy doing the interview actually brought his computer to me andfrog3 opened the side for the first time on live TV and was amazed at how dirty it was inside. After I watched the segment later, I realized that the camera didn’t do it justice. The cameraman didn’t focus on any of the fans.

This is a great topic because most computer users do not realize what a clogged fan can do to both the performance of the computer and to its life. If a fan is not able to do its job properly, it is very likely that the component it is supposed to cool is going to get too hot. If that gets too hot  the computer will slow down and ultimately die an early death.…

What Is Software Piracy

What Is Software Piracy

According to Webopedia, software piracy is, “The unauthorized copying of software.”  Did you realize that most every piece of software that we purchase as consumers is meant for only one computer?SoftwarePiracy When we purchase the software, we don’t fully become the owner of it…meaning we can’t do whatever we want with it.  We are a licensed user of the software. We are agreeing to the software distributor’s terms and conditions when we install it, and usually that means that we are agreeing not to install it in multiple computers or give to one of our friends or family members.

One of the very common forms of software piracy is through leaked product keys. Take Microsoft Office for example. Many times Microsoft will make a single product key to work for multiple activations.  This is mainly for large corporations. But often those keys get into the hands of individuals and passed around from person to person.…

Securing Your Personal Data Before Tossing Your Gadget

Securing Your Personal Data Before Tossing Your Gadget

You have an older iPhone and the newest one is looking great to you.  You finally are up for an upgrade and decide you want to pass the old one down to your kid. Or maybe you have a  laptop that is HardDrive1slower than you want it to be so you decide it is time to upgrade to a new laptop and sell this one to a relative.

The common denominator in each of the above scenarios is that you need to decide what to do with your personal data. Both gadgets have important personal information that you’d rather not get into the hands of someone you don’t know. …

Top 20 Free Android Apps

Top 20 Free Android Apps

If you aren’t familiar with “Android” then it is likely you do not have a smartphone or a tablet…yet! Android is the popular alternative to the iPhone and is owned by Google. In the computer world you Android-application-developmentbasically have three players: Microsoft Windows, Apple Mac OS, and Linux. It is very similar in the mobile world. Soon Windows will be unveiling its new Operating System that will span across all types of devices.  Microsoft owns Windows and Apple owns the Mac OS.…

How Your Smartphone Photos Put You At Risk

How Your Smartphone Photos Put You At Risk

If you are like me, you use your smartphone to do everything. This also includes taking photos of just about everything including my kids! But did you know that by doing this, you are putting yourself geoand possibly your kids at risk? I’m not the type to attempt to make people scared when they shouldn’t be, but this is something that we all should be alarmed about.…

10 Ways to Be On Your Best Behavior…Email Style

10 Ways to Be On Your Best Behavior…Email Style

Email is a very substantial aspect of most everyone’s life. It is such a great way to communicate so many different things.  Whether you use it to send family updates, daily jokes, Email-Logoes-Montagebusiness correspondence, or newsletters, it is cheap and quick!  But there are some things that people either don’t know or just don’t think about when sending out their emails.  Hopefully we can tackle some of those things in this list.…