Phoenix, Arizona has it all: Warm weather, strong population growth, and a business-friendly economy making it one of the best places in America to own and operate a business. If you own a business in the Phoenix area you most likely depend on your computers for most of your day to day operations. It is important to protect your computers and important business data from viruses by hiring an experienced computer technician. Your Phoenix area business can count on my PC Techs, a local IT and computer repair company, to keep your computers and important data safe.
Most computer owners think all that is necessary to prevent viruses is a good antivirus program. While an antivirus program is a good start, hackers have elaborate methods for bypassing these safeguards. This means that spyware, malware, ransomware, rootkits, adware, Trojan viruses, and more might wind up infecting even the most cautious of computer users. To protect sensitive data, avoid infections from crafty viruses, and thwart ransomware viruses like Cryptolocker, seek a professional. Effective virus prevention usually involves user training, special software configurations, and routine monitoring from a professional computer technician.
Beyond prevention, virus removal is another area where you’ll want to enlist the help of a professional to be safe. In some extreme cases, a single virus infection that is not properly cared for can result in all of your computer data being lost forever. Even if everything seems fine at the moment, a computer can have a virus on it that is well-hidden. Rootkits, spyware, malware, adware, and trojans can slip by many virus software filters, wind up on a hard drive unnoticed, and endanger computer data.
Even seemingly “simple” to remove viruses like pop-ups from a fake virus infection require a professional to clean. If a computer is already infected, removing and cleaning the known virus or malware infection may involve a deeper look at the computer to find and remove associated viruses hidden from plain sight.
Our professional computer repair technicians are here to help protect your Phoenix, Arizona business computers and data. Our virus removal and prevention methods will help eliminate those pesky pop-ups and keep you safe from potentially costly ransomware infections such as Cryptolocker. After all, a well-protected computer is a happy computer.
Whether you need immediate computer help or regular computer services, contact us. The computer experts at my PC Techs provide expert computer maintenance and computer repair for your computers, networks, and servers. Servicing Phoenix, Scottsdale, Tempe, Chandler, Gilbert and surrounding areas, call (602) 456-0150.
Don’t unplug, we come to you! The award winning technology team at my PC Techs makes it easy for your Phoenix or Scottsdale area business to save money and increase productivity by delivering superior technology solutions. Call now to schedule a visit from your own dedicated computer expert: (602) 456-0150 or click here to email us.
How frustrating is it to be at your computer, just trying to get your work done, when all of a sudden you’re attacked by intrusive pop-ups? Sure, you might learn about the next big deal on hair removal products, but these distracting windows can prevent you from getting the job done.
If you are getting annoying little popups while you work there’s a good chance your computer has a virus or malware. This intrusive and often dangerous software should be removed by a computer expert. Like the ones at my PC Techs.
We provide Expert Technology Solutions You Can Trust.
You don’t have to know much about computers, all you need is our number. We can help!
Call my PC Techs at 602.456.0150 and get your work done faster.
Do you have a need to frequently access folders and files on a laptop or other computer that is not turned on 24/7? If this is you, you’ll know that you usually have to turn on the laptop and wait for it to boot to a state that allows you to access the data. This could be as quick as two minutes or as long as 10 minutes, depending on the age of your hardware. Even worse, if your battery is low and no ac power is available to plug in the laptop you may have to wait even longer.
You don’t have to wait anymore, there is a solution to your data accessibility problems! You can copy those folders and files to a usb memory stick and, not only will you be able to access to the data from another computer, you will also have a “live” backup just in case something ever happens. On a small memory stick with a small amount of data it is possible to perform the data copy operations and keep the data synchronized manually. As your data grows however, the process will eventually become difficult to manage in an effective way. Just the need to answer “Yes” or “No” to every overwrite dialog could make a regular copy operation turn into a nightmare.
Fortunately, Microsoft provides a free tools called SyncToy which will help minimize the time it takes to keep files in sync between folder pairs on your laptop and thumb drive. Download SyncToy here: http://www.microsoft.com/en-us/download/details.aspx?id=15155
You will need the proper download based on your existing operating system, your choices are x64 or x32 bit versions. To find out what version you need, click Start, right click on the computer icon, and select Properties. Half way down the page you’ll see the “System” Header, now find “System Type” and look to see if your system requires 32-bit or 64-bit software. Download and install SyncToy then run it, which will bring up the following screen:
To begin, you need to create a folder pair. This pair is how SyncToy manages keeping your files syncronized between the left and right folders. When you click on the Create Folder Pair button you start the process of joining the folder pairs. It is easiest if you browse to the location for each pair:
For this example we will use a “Test” folder with the “left” folder on the local hard drive and the “right” folder on a thumb drive. If a folder does not exist on the right folder destination, SyncToy allows you to create the folder as needed. Once you have folders set, you will be given a choice to Synchronize, Echo, or Contribute. For most applications you should Synchronize. You should carfully consider each option to get the best result. Here are the definitions of the options.
Synchronize: New and updated files are copied both ways. Renames and deletes on either side are repeated on the other.
Echo: New and updated files are copied left to right. Renames and deletes on the left are repeated on the right.
Contribute: New and updated files are copied left to right. Renames on the left are repeated on the right. No deletions.
Choose your Sync
Now name your pair. This should be a simple name, yet descriptive of the pair.
Name your pair
That is all there is to creating folder pairs:
The First Pair
The simpler you keep your pairs, the easier it will be to maintain them. Now you simply need to run the pair(s) as needed, or put them on a schedule, but that is a topic for a future blog post.
my PC Techs provides expert computer consultants to your Arizona business. Let us help your business save money and increase productivity. Call today (602) 456-0150 for a free consultation.
When we repair a computer at my PC Techs, one of the first items on our list of work to perform is dust removal. In Arizona, dust is a big problem and coats everything. When a new computer comes into our shop we never really know just how much dust we are going to see! It’s always a surprise when you “pop the case” of a computer for the first time.
Here are a few pictures of the inside of a case that recently came into our workshop.
Over time, dust accumulates inside your computer case
Over time, dust can cause internals components to overheat, due to lack of air circulation
Dust is a slow computer killer. Dust prevents normal air circulation through the computer case. The case draws cooler air from outside the case through the various airflow openings of the case. The lack of circulation caused by dust will often result in internal component overheating and failure. These include video cards, hard drives, computer processor and other internal hardware.
Common intake openings of the case include the front and the sides of the case, while exit openings include fans usually mounted in the rear of the case and the power supply.
Keeping these openings clear of debris can help to maintain the proper airflow around the case. A good practice is to also maintain four to six inches of clearance from the computer to any object which could block airflow.
In conclusion, dusting out your case every month can help to extend the life of your computer – instead of it suffering the fate of death by dust.
A hard drive is a small box inside of computer equipment that may contain sensitive information such as usernames, passwords, credit card information, social security numbers, etc. If you are upgrading to a new computer (desktop computer, laptop, office copier, etc.) always remove and destroy the hard drive before selling, donating, or recycling any computer equipment! Failure to destroy the hard drive before giving the computer away could result in sensitive information ending up in the hands of the new owner, who will then be able to copy old files and go through your personal information stored there.
There are many options available if you are looking to dispose of an old hard drive. Some professional destruction methods include:
Shredding it using a local shredding company
Taking it to a computer recycling company
Mailing it to a hard drive destruction specialist
Bringing it in to a local computer shop that will dispose of it
These methods are ideal, but they usually cost money. Professional destruction of a hard drive could cost $70 or more in some areas! So what is a low cost method to dispose of the hard drive and keep your personal data safe if you are low on funds? Considering you have all the right tools, this method won’t cost you a dime and is a very secure way to get rid of a hard drive while keeping your data secure.
Step 1: Wipe it! Wiping a hard drive in essence destroys the data by writing over it with random characters. There are many free utilities to help, a good one is Active@ KillDisk. You can download the free utility from their website, click: Active@ KillDisk. This free software overwrites all of the data on your old hard drive with random characters and WILL DESTROY ALL OF YOUR DATA! Be sure you have performed a complete backup and have transferred the data from your old hard drive to your new system before wiping it.
Step 2: Remove it! Physically remove the hard drive from the system. This is usually the easy part, you’ll just need a screwdriver and a little patience. Keep in mind that you will still be able to sell or donate the old computer without a hard drive missing, just be sure to let the new owners know in advance that they will need a new hard drive and operating system.
Step 3: Drill it! If you plan on using the old hard drive again, skip this step. Otherwise it’s best to physically destroy the old hard drive just to be 100% certain that the old data is completely destroyed. This step is not only fun, depending on how much personal data you had on the old drive it can also help you sleep better at night.
Wearing protective goggles, gloves, and a dust mask for your mouth and nose take a drill and a metal drill bit to the drive. You’ll want to drill through the drive completely from one side to the other, and you’ll want to do this multiple times. Two important areas for you to drill through are the platters and the controller board. See examples in the below images.
Hard drive from an old computer, data already moved to new computer and ready for destruction.
A few things you should have. Drill bits, eye protection, gloves, mouth and nose protection.
A drill
Hard drives contain many round platters inside that store the data. Drill through them.
In this example, the drive has been drilled through one side to the other. You can see the light behind it coming through.
Close up of the hole drilled through the hard drive
The green area is the controller board. Drill through that as well.
Don’t stop with just one hole, drill several times through the drive.
The last hard drive was a 3.5″ desktop drive. You can drill 2.5″ laptop hard drives the same way.
This laptop hard drive has a much larger controller board on the bottom, but is easier to drill through.
Multiple drill holes through a 2.5″ laptop hard drive
WE WORK HARD FOR YOU, BUT DON'T JUST TAKE OUR WORD FOR IT! We've helped over 1,000 satisfied businesses throughout the Phoenix valley, click here to view some of their testimonials:
Managed IT and Computer Repair services for these Arizona cities: Ahwatukee, Carefree, Cave Creek, Chandler, Chandler Heights, Fountain Hills, Gilbert, Glendale, Higley, Laveen, Mesa, Paradise Valley, Peoria, Phoenix, Scottsdale, Tempe
To learn how Managed IT and Computer Repair services can help your Phoenix area business save money and increase productivity, click here to visit Phoenix Computer Repairs.
my PC Techs | Expert IT and Computer Repair Solutions You Can Trust | (602) 456-0150