Maximizing Your Chances for Data Recovery

The ideal way to do data recovery is to replace the lost or damaged file with a good version from your backup volume or remote backup. No fuss or bother. But in spite of our best intentions, we all sometimes find ourselves in a situation where we’ve lost a file, a directory, or maybe a whole volume and can’t get it back. Our recovery service can help you, but when you discover the failure, you can do certain things to give us the best shot at recovering everything. Maximizing your chances for data recovery is something that can only help, here’s how:

Maximizing Your Chances for Data Recovery

There are certain things you should never do. If you realize you’ve just done something bad, don’t turn off or unplug the computer in a panic. The computer’s faster than you; it’s already too late. Turning off a running computer without going through the normal shutdown procedure will leave the disk in an inconsistent state and make things worse.

However, do shut down gracefully as soon as you can. When a computer deletes a file, it doesn’t overwrite the data; it just marks its storage as unused. If you don’t do anything else, the chances are good that the data will still be there. A recovery service should be able to get the file, or most of it, back.

If you start seeing a lot of disk error messages, stop normal operations as quickly as possible and run the computer’s disk repair utility. Errors like these tend to cascade and can do increasing damage as time passes. If the repair utility can’t fix it, or if important files are still missing when it’s done and you can’t recover them from backup, then avoid doing anything else with that machine until a recovery service can look at it.

When you’re injured, proper first aid can save a trip to the emergency room, and if you still have to go it will give you the best chance for a quick recovery. The same applies whether you’ve got a broken arm or a broken file system. To learn more about our services, please contact us.

Networking 101: Building a Faster, Safer, More Secure Wireless Network

Thinking of replacing your aging home wireless network or building a new one? While this may be a daunting task, creating a safe, secure wireless network is actually quite simple and will quickly pay for itself in speed, security, and convenience. This is especially the case if you are still stuttering along at 54mbps with an old wireless B router or using an older, less secure wireless security protocol such as WEP for your wireless network,

Networking 101: Building a Faster, Safer, More Secure Wireless Network

Here are a few tips to get you started:

Buy the Router You Need for Next Year, Not Today

The use and popularity of wireless devices are exploding and with it the need for more and more wireless bandwidth in our homes. Where five years ago most homes may have had a laptop that needed wireless access, today’s families typically have multiple devices that need wireless access: computers, laptops, tablets, cell phones, gaming consoles, security cameras, streaming multimedia systems, and so on. And this will only get worse as more and more devices gain wireless connectivity. That’s why it is important to buy a wireless router with sufficient bandwidth and range to connect every device in your home for not just today but for the foreseeable future. Do your research and take the time to get the right router for your home.

Security Should Come First

The first step in setting up a wireless router is to set up a secure administrator account password on the router. Why is this important? The default administrative password on many routers is as simple as admin, meaning anyone who can access your network can login as the router administrator and network settings on the router at will.

The next step is to set up at a WPA2 security with at a minimum seven character password, preferably one that mixes letters (upper and lower case), numbers, and special characters. This is the password you will use to connect devices to your wireless network and will help you control who connects to your network. The more secure your password is, the less likely your network will have uninvited guests.

Sharing is Good, but Security is Better

You may occasionally have guests in your home who will need wireless internet access whom you do not necessarily want to have full access to your network or to other devices on your network. This is where a secure guest network can save the day.

Most wireless routers offer an option to set up a completely separate guest network, with its own password and security settings. Guest networks can be configured to give your guest access to the internet and nothing else, or you can choose what level of access guest will have to your network.

Control Your Traffic

Most modern routers offer a feature called Quality of Service (QOS), which allows you to shape bandwidth usage based on what type of data is flowing around your network and out to the internet. What this means is that the router can intelligently route data traffic based on which data should have high priority, such as Voice Over IP (VOIP) calls, streaming media or gaming services. This may be off by default but should be turned on if you use any of those services.

Need help? Feel free to contact us for more tips and tricks on setting up and maximizing your wireless network.

The Most Common Ways to Get a Computer Virus

Virus removal is a common reason why people seek professional computer repair services. As computer protection becomes more robust, the methods hackers and malicious programmers use to infect a computer also becomes increasingly tricky to detect and prevent. Here are the most common methods for contracting a computer virus. An awareness of these will help you avoid potentially dangerous file downloads on your computer.

The Most Common Ways to Get a Computer Virus

Security Vulnerabilities

Hackers are constantly looking for ways to infiltrate a system. As these vulnerabilities are discovered, software and computer systems release updates to patch these flaws. Unfortunately, these only work when the update is initiated. To ensure that you have the latest protection, run updates as soon as you are prompted. It’s easy to ignore those pesky system update prompts, but doing so may leave you vulnerable to a computer virus.

Infected Email

Hackers use a method called email spoofing to convince users to click on malicious links or download and install viruses. Spoofing consists of sending an email that appears to be from a reputable source such as a bank, popular shopping website, or even the IT department for your place of employment. Hackers know you are more likely to open an email that appears to be from a legitimate source. Never click on anything or download attachments unless you are absolutely sure you know who sent it. Companies will never send you unsolicited emails regarding recent purchases, your account, or your password. These are common ploys used by hackers.

Nefarious Websites

The Internet has many dark corners filled with dangerous and malicious websites. Be cautious when browsing and be sure to keep your anti-virus software up to date. This is your first line of defense if you find yourself browsing a malicious website. Also, keep in mind that a dangerous site may be linked to from some place that you know is safe. For example, just because a link is posted on Facebook or in the comments section of a reputable news website does not necessarily mean it is safe to click.

As hacking methods become harder to prevent, it is also becoming increasingly difficult to spot potentially dangerous sources online. In the event that you do get a computer virus, we can help. Contact us to learn about our affordable repair and removal services.

What to Do if Your Computer Has a Virus

Do you suspect your computer has a virus? If so, it’s important to take immediate action, but do you know what to do? Many people encounter a virus and realize they aren’t quite sure what to do next. Here are a few basic things you should do to make sure the virus doesn’t cause any more damage.

What to Do if Your Computer Has a Virus


Generally, the first thing you should do is to disconnect from the internet, and from any other network you are attached to, especially if you are connected to an office network. This will prevent the spreading of the virus.

Safe mode

Next, you may want to put your computer in safe mode. Although not a requirement, safe mode is much more likely to prevent the virus from causing more damage while you look for it.


Use your anti-virus software to scan your entire machine for the virus. The goal is that the anti-virus software will find everything, and you’ll be able to delete anything that isn’t supposed to be there. If your anti-virus software isn’t able to find anything you have two options. You might want to consider a different anti-virus program or seek the help of a professional virus removal company.


Once the virus is gone, you’ll probably have to reconfigure a few things. Hopefully, there won’t be much, but be prepared to have to fix your home page, or change a password or two.


Although virus prevention should happen constantly, this is a good time to do a quick audit. Is there anything you can do to make your computer safer?

If you are at a loss and need professional virus removal please contact us, we are always happy to help.

The Three Most Lethal Computer Viruses of All Time

Hopefully, you are able to read this and smile rather than gritting your teeth and shaking your fist at the screen as you remember the time one of these killers infected your PC. Chances are, however, if you were unlucky enough to fall victim to one of these, your computer suffered serious damage that only a truly gifted IT service professional with some serious virus removal skills would be able to remove. The following is a list of three of the deadliest computer viruses of all time.

The Three Most Lethal Computer Viruses of All Time

  1. I Love You – How could those three words so synonymous with human devotion be so completely destructive in the computer world? Anyone who experienced the effects of this monster most likely still asks themselves this question today. It was a self-replicating virus that infected your system through email and managed to crash systems all over the world. It was unleashed by opening an attachment, which emailed it to 50 contacts in your address book. Total estimated damage worldwide exceeded $10 billion!
  2. Melissa – Attention Allman Brothers fans, this was no “Sweet Melissa.” No, this bug was similar to the “I Love You” virus because it also emailed itself to 50 contacts in your address book. This one, however, was based on MS Word Macro and resulted in some of the fastest and most widespread PC damage of all time.
  3. Doom – Definitely more ominous sounding than either of the previous two on this list, but not quite as damaging overall. Still, the Doom virus was a tricky criminal mastermind because it disguised itself with an email heading that read, “Mail Transaction Failed.” Unsuspecting users figured it was an email alerting them of a bounced email. When they opened it, however, a brutal denial of service attack was sent to email addresses.

“PC Geeks” has an army of virus removing field generals ready to battle for you and your computer anytime you need them. We provide a full litany of computer services including setup, repair, networking, and data recovery as well. Please contact us today for more information.

Trust the Experts With Your Office Computer Setup

Your small business would be difficult to run without your computer. Can you imagine what it would be like trying to conduct your day-to-day operations with just a pen and paper? It would be difficult, to say the least. This is why it’s important not to neglect proper computer setup for your business.

Trust the Experts With Your Office Computer Setup

Proper and complete computer setup is an important aspect of running your business. In terms of security, operations, payroll, resources, budgeting, logistics, and so on, working with a professional on your company’s computer setup is an incredibly important aspect of running your business.

Here are four reasons for trusting a professional with your business’s PC or Mac setup.

– No setup or configuration hassles. From the beginning of the process to the end, we ensure that your computer setup is complete and without worry for you.

– Installing the right software. There are many software choices that you can make for your business, so how do you know which one is right for you? We’ll help you with all of your software setup needs.

– Numbers don’t matter. We’ll set up one, two, or even a dozen computers if you need us to. We specialize in all things related to computers, so amounts don’t scare us.

– We can configure your network. With all of those computers, you’ll need a network solution that fits your needs. Well, we can do that too. We will ensure that your computer network operates agreeably with all of your computers, and we’ll help you understand how it all works.

If you need help setting up your office computers, we’re here to assist you.

For additional information on how we can help you with your small business, please contact us today.

PC Geeks is the premier computer repair company throughout Collin County and beyond.

Power Adapter Issues? Call PC Geeks!

With so many advancements in computer technology, one might feel overwhelmed by the lack of consistency in newer laptop models. Updating your software, antivirus, and browsers offer the best experience for any type of laptop user. If your laptop won’t turn on, it might not be a hard drive issue at all it could just be a power adapter issue.

Power Adapter Issues? Call PC Geeks!

Diagnosing Power Adapter Problems

The power adapter charges your laptop to reach its maximum performance. Since every laptop has different voltage requirements and a multitude of power adapter choices to choose from, it can get confusing trying to figure out what’s going on with your laptop. You might also have a hard time understanding the language of do-it-yourself laptop repair tutorials. Loose wiring inside the laptop is a common culprit, especially if you have an internal battery. Internal batteries are harder to test when it comes to tackling power supply problems.

Here are a few signs of power adapter/DC Jack malfunctions:

  • Charger light doesn’t come on when you connect your laptop to the adapter.
  • The laptop turns on, but it can’t take charge. Sometimes, the laptop’s charger light will flicker with sporadic charging.
  • Some outlets in your house have a higher supply of power than others. If you have to position your power chord at a certain angle in order to receive charge from a specific outlet, you might have an internal disconnection inside the laptop or the charger is failing.

Buying a new laptop charger is expensive and a waste of money when you haven’t properly diagnosed the specific issue. More importantly, you want to get a few more years out of your favorite laptop. Contrary to popular belief, computer repair costs less than a brand new laptop and has more value than a new power adapter that you might not need.

Contact us today for on-site repair services!

5 Actionable Office Network Security Tips

Your office benefits greatly from a solid and easily accessible network. When all of your office staff can access important data and documents, it helps your office run smoothly and without problems.

5 Actionable Office Network Security Tips

However, for those with existing office networks, do you know if your network is secure? Are you certain that outsiders can’t access your network without your knowledge?

To assist you with your office network security, here are five tips to ensure that your office is safe and protected.

1. Keep it encrypted. WiFi and wireless signals don’t come automatically encrypted through your router. Keep your network protected by setting up a 63 character password, mixed with upper and lower case letters, special characters, and numbers.

2. Secure internal equipment. While trusting your employees with sensitive data is fine, remember that many network security problems stem from internal breaches. Secure ports, access points, and switches hidden from guests and clients alike.

3. Educate and train employees. When your office staff is educated about security and security issues, they are more likely to identify and rectify potential problems.

4. Limit access. Shared folders are great for passing data between employees. But when everyone has access, bad things are bound to happen. Remedy this by adding encryption procedures to important shared folders.

5. Work with a professional. If you are uncertain about your office network security levels, allow a networking professional to take a look for you. Oftentimes, an expert in network security can help you find problems that you didn’t know existed.

Don’t let your office network security fall by the wayside, and work with an expert today.

For additional information on how we can help you with your small business network security solutions, please contact us today.

PC Geeks is the premier computer repair company throughout Collin County and beyond.

Save Money & Hire A Skilled Computer Repair Company

Save Money & Hire A Skilled Computer Repair CompanyWhen something begins to go wrong with your computer, do you panic? Do you feel concerned that you will have to replace the computer, and does the cost of that scare you? If so, then it is time for you to consider computer repair. There are many instances when a repair is all that you need to get your computer running well again.

Save Money With Computer Repair

Making the decision to repair your PC as opposed to purchasing a brand new one will not only save money but it will allow time and energy for other priorities.  Most likely your PC will operate like new and you will be pleased with the outcome.

Hire A Qualified PC Repair Company

Locating a local computer repair company is easy. Ask questions, get a clear understanding as to what is wrong and the steps it will take to get the PC repaired. Get a quote and an estimated date of pick-up, if they meet your expectations then you have found the best company for your PC Repair.

Get Them On The Job And Relax

After handing over your PC to a trusted company your final step is to relax with ease. Once it’s ready you will be glad you took the time to research your options. We all know peace of mind is priceless.

When you are in need of PC Repair, put us to the test.  Contact PC Geeks today and we will exceed your expectations and demonstrate exactly what a skilled PC Repair Company is capable of.

In Need Of Computer Repair? Call PC Geeks!

In Need Of Computer Repair? Call PC Geeks!If you work on your computer all day long, or use it often for enjoyment, then you most likely have a bond with it. So, when you notice things starting to go wrong with it, you start to worry. But there is no need for you to fear when you have a good computer repair company.

Local DFW Computer Repair

Choose to go with a local DFW company that knows computers, and that has experience fixing them, and then you will feel relaxed as they are working on it. Your computer means a lot to you, and choosing the right company to work on it will leave you feeling good.

Computer Repair Will Save You Money

Not only will having your computer repair done allow you to keep your computer instead of having to adjust to a new one, but it will also save you money. Having it fixed instead of replaced is a smart choice. The repairs won’t cost nearly as much as a new computer, and your wallet will thank you!

Choose A Reputable Computer Repair Company

PC Geeks can take care of your computer repair needs and even handle virus removal issues. If you have been looking for the right company to take care of your computer repair needs, then you should contact us today!