Archive for October, 2011


Advertising companies use browsing information to create personalized ads.

Websites may be leaking browsing information to third parties

Regardless of how many spyware removal programs computer users install, they may not be totally protected from internet threats, as some websites may be ...Read More

Leave a Comment

Businesses use firewalls to protect entire networks of computers from security breaches.

Firewalls on the front line of cyber defense

The Department of Homeland Security (DHS) has declared October National Cyber Security Awareness Month. In the ongoing 21st century war against computer hackers, one of the first lines of defense is a strong firewall. Networks that lack a firewall...Read More

Leave a Comment

Some individuals are turning away from external hard drives and toward cloud storage.

Information storage: Local or cloud?

Saving information to a computer's hard drive was once all users needed to do to keep their data safe. For the most part, they did not have to worry about their data being compromised by a virus or a hacker. Those times have changed, but users...Read More

Leave a Comment

Impostors posing as Microsoft employees contact users with unsolicited phone calls and emails.

Security alert: Microsoft impostor scam

Computer owners in Canada, Great Britain, South Africa and the United States are among the most recent victims of an elaborate scam that uses the Microsoft brand name as a ruse to steal information from unsuspecting computer users. In some instanc...Read More

Leave a Comment

Windows error messages may refer to RAM deficiencies, which users can fix.

Blue screen does not necessarily mean end of computer

Seemingly only appearing at the most inopportune times, Windows users have for years endured the sudden arrival of a blue screen with white text declaring that the their computer will soon reboot.

This error, known colloquially as the "...Read More

Leave a Comment

Many businesses require their employees to encrypt data before they share it.

Encrypted files provide security, hinder thieves

Everyone owns files whose information must be kept secret from prying eyes, but few are aware of how to protect them. Most computers provide users the ability to encrypt files, which is done through an algorithm that scrambles the data. The risks ...Read More

Leave a Comment

Mac users are especially vulnerable to compatibility issues.

Exploring PC and Mac basic compatibility problems

Why can't they just get along?

Microsoft's PC and Apple's Mac may collectively dominate the American computer market, but that doesn't mean their reign is collaborative. Those who use both models to regularly transfer inform...Read More

Leave a Comment

Laptops can be locked externally or through software to prevent theft.

Software can help relieve fears of laptop theft and misplacement

Laptop computers, smartphones and tablets are becoming more popular among American consumers, which suggests an increased risk that these devices could be lost or stolen. The cost of replacing these products is high, but Read More

Leave a Comment

Placing a laptop on an uneven surface can lead to overheating.

How to fix an overheating laptop (and how to prevent it from overheating in the first place)

When a laptop turns off without warning, becomes hot to the touch or emits a steady whine, many users fear their computers are experiencing their death throes. But, by implementing a few simple Read More

Leave a Comment

Users have a few options if their Mac seems beyond repair

Steps to take if your Mac is teetering on the brink

Most users have likely experienced that uncertainty and panic that comes when a computer seems to be on its last legs. Consumers often spend more time worrying about what will happen to their files and documents than they do actually preparing for...Read More

Leave a Comment

Geeks On-site Computer Repair Service | (240) 426-6691 | (877) 433-5766 | 10908 Barn Wood Lane | Potomac, MD 20854