If you have a current contract with us always feel free to call or submit a ticket if you need 3rd party vendor support, as we can confirm correct contact information for you.
Small Business 1-800-456-3355
1-866-951-7679 (consumer only, non-business products)
Microsoft Store Sales and Customer Support: 1-877-696-7786
Technical Support: 1-877-696-7786
Microsoft Direct for Businesses and Large Orders: 1-866-425-4709
Microsoft products bought elsewhere and online Answer Desk: 1-800-642-7676
Internet Service: 1-877-348-9005
Phone Service: 1-877-348-9007
Prism TV Service: 1-866-314-4148
Installing updates is often a hassle, but it is one of the most effective strategies in the prevention of viruses and other types of malware. Frequently used items such as Adobe Flash Player and Java constantly are the target of unscrupulous evildoers and if you fail to update these programs regularly, then your computer system can become a target. One of our services for computer repair in Portland includes installing both Microsoft and third party security updates. This is one of the steps that customers opt for, our Accelerate and Protect My PC service option.
This service also includes optimization of Windows startup and shutdown processes as well as cleaning up your desktop, enabling anti-phishing controls, blocking pop-up ads, getting rid of any unused or unwanted programs and ensuring that your hardware and software are functioning properly. All of these procedures are part of this package for computer repair in Portland. Once we have finished, it is important that you continue to update programs and allow Windows update to keep your computer in top shape.
Another important part of computer repair is ensuring that you or another user do not download malware onto the computer. Often we unsuspectingly download a virus or Trojan or other type of malware without meaning to do so. For instance, maybe you clicked on a link in an email from a friend or perhaps downloaded a “free” game. It’s unwise to click on any link in an email unless you are sure that it is safe. Usually the email will look a bit odd, perhaps it just says “take a look at this,” or “here’s a great story,” without really being written as a proper email. When in doubt, contact the sender with a new email and ask if they sent the link.
When it comes to free downloads, there are plenty of safe, free downloads on the web, but there are even more that you shouldn’t be placing on your computer. Never download anything unless you are absolutely sure that the source is trustworthy. We have many clients who call us for computer repair in Portland to rid their computer of a virus or a browser hijacker such as Trovi or some other type of malware.
Another important task for all computer users is the process of backing up your important files. You can use a cloud-based backup service or backup to disks. So often computers crash and the owner has not backed up any of their files and they end up losing important work documents as well as precious family photos and much more. It is wise to schedule regular back-ups as well as remembering to back up your tablets and smart phones. All of this will prevent many problems down the line and give you a greater peace of mind if your computer or other device crashes. If your computer does crash, don’t panic, simply give us a call and we can troubleshoot the problem or problems.
If you need computer repair in Portland, computer repair in Gresham, computer repair in Hillsboro or any other town in the Portland area, we can help. We also can help with printer problems, network problems and internet issues, and often your computer repairs can be solved using our Virtual House Call service. We can connect to your computer via the internet and solve a problem remotely. This can be a quick and easy way to fix computer issues without having to wait around for a repair technician.]]>
If you are searching for something very specific, it helps to place the most important words inside quotes. For instance, perhaps you are searching for the name of a specific song, but all you know is one bit of the lyrics. Rather than typing in the lyrics and hitting search, place the words in quote marks. This will yield searches that feature only those words in that specific order. This can be good if you are searching for a specific person as well, as if you type in Todd Smith Portland, you will get all sorts of results, but “Todd Smith Portland” is more likely to provide you with a list of people named Todd Smith that live in Portland.
Sometimes when you are searching, it is helpful to exclude what you don’t want. For instance, if you are looking for information about mustang horses, but aren’t looking for a snappy new car, type in mustang then add a space and –car. The minus the word or don’t want will exclude most listings that are about mustang automobiles. You can do this with multiple words, such as mustang –car –vehicle –automobile, to further define the search.
Often we aren’t quite sure exactly what we want to find precisely, we just have a general idea. To provide some interesting options, consider search with the ~ symbol. For instance, maybe you are looking for an interesting dessert for a birthday party, by searching for birthday ~desserts, you will receive a list of searches beyond just birthday cakes. Basically Google searches for synonyms matching the word after the ~ symbol. If you are looking for a specific type of website, Google can do that as well. For instance, if you type related:amazon.com, your results will be websites selling products similar to those found at Amazon.com.
Shopping online is handy, but you can get better results if you use some of the aforementioned tips as well as searching within a range of prices. For instance if you wish to buy a pre-lit Christmas tree but don’t want to spend more than $200, search for pre-lit Christmas trees $50..$200, this will provide natural search results that fit your criteria. You can use those double dots for other ranges as well, such as a range of years. For instance if you search Dodger pitchers, you will receive many results, mostly about current pitchers. If you search Dodger pitchers 1970..1973, you will receive hits specifically for those years.
These are just a few helpful tips that can help you enjoy better Google search results. If you’ve been searching up issues such as computer repair or how to speed up a slow computer or how to protect your computer, the staff at GeeksAKnockin’ can help. We offer Portland, Oregon computer repair as well as Hillsboro computer repair, Beaverton computer repair and computer support throughout the Portland metro area. We can even handle many issues remotely with our Virtual House Call technology.]]>
Many sites, particularly email sites, offer two-step verification but many of us simply don’t use this service. This simply means you have to enter your phone number and your password when you login to email or other specific sites. When you enter your phone number, a code is sent immediately to your cell phone and then you type that code into the system in order to gain access. While this might seem too time-consuming, it is an excellent security feature and for many of us, our emails are filled with crucial information, so why not use the extra protection?
Passwords, in general, can increase or decrease your security. It is always best to create strong passwords with upper and lower case letters, special characters, numbers or capital letters mixed in. It is also wise to have a different password for every site that stores important personal information, such as credit card information or important documents. Of course, it can be tricky to remember all of those passwords. You can either write them all down or you can use an online password management service.
Facebook is used by millions of Americans every day, and it is definitely wise to improve your Facebook security. Again, it all begins with a strong password that is different from all of your other passwords. Take a look at your privacy settings on Facebook and consider updating it to make it more secure. There is a quite a bit of important personal information available on Facebook, and you probably don’t want some random person seeing all of it. The same is true of sites such as MySpace, Ello, Pinterest, Instagram and other social media.
Many services, such as Apple and Dropbox, use cloud-based systems to store a great deal of personal information. For many of us, thousands of our personal photos are stored in the cloud. To keep those photos secure, use a combination of a strong password and the two-step verification process. Another option, of course, would be to not use the cloud to store photos and instead back them on to an external hard drive and then store them in a fire-safe box or safe. However, many people enjoy the convenience of loading up photos into the cloud for storage and easy retrieval.
In addition to passwords and verification, be careful about what you click on and download. If something is sent to you and you did not ask for it, don’t click on it. If it seems to be coming from a friend, simply send them a text or a separate email and ask if they sent it before you click on it. Don’t download anything onto your computer unless you know the source.
Keep all of your software updated, and make sure your computer is protected with a firewall and a virus detection program. While this all takes some time, dealing with security hacks and viruses definitely takes more time and if your credit card information or personal info is stolen, this can have serious consequences.
At GeeksAKnockin’, we can help you maximize the security of your computer or your computer network. We can remove all malicious software, run all necessary security updates, install a firewall and anti-virus program and much more. We offer Portland computer support and repair, Beaverton computer repair and support, Hillsboro computer repair and full computer support throughout the Portland metro area.]]>
First of all, there are many clouds and they can be private, public or a sort of hybrid mix of the two. All it really means is that a group of remote servers are networked together to provide users with a centralized spot for data storage as well as providing access to services, applications and data-processing tasks.
Many companies use cloud-based programs to manage their information. This allows employees to access all sorts of work-related items anywhere where there is an internet connection. Your documents and email can be accessed at home, at the office or even at hotel anywhere in the world or on your smartphone.
For the individual user, the cloud offers you a secure place to store all sorts of things. Most of us use it to store music and books, but many also load their precious family photos up to a cloud-based photo storage service. This means your photos are stored at a remote server with constant backups in place. While this keeps your information secure, it also keeps your hard drive from getting bogged down. Music and photos can take a lot of space on your computer hard drive or smartphone, and using the cloud can be a way to keep everything you want without sacrificing hard drive space.
Of course, you might be worried about security; after all, you will be loading up your private information. These huge online data storage servers are encrypted, but there is always a risk that these systems can be hacked. To protect yourself, do some research about the cloud services you are using. Some services are simply more secure than others, so choose the best possible services. This is especially important if you are storing corporate information or personal information such as bank account numbers, social security numbers and other highly sensitive material.
In general, if you don’t want the world to see your stuff, don’t load it up into the cloud. Nothing is 100% secure, but if you don’t put important documents or incriminating photos in the cloud, then you certainly lower your risk of having these items procured by an evil hacker.
At GeeksAKnockin, we can help you improve your computer security whether you have a home computer system or manage a corporate computer network. We offer full IT support in Portland and the surrounding area. We can help with computer repair in Beaverton, computer support in Gresham, computer repair in Hillsboro or anywhere in the Portland metro area.]]>
Malware is a huge source of problems these days, and Geeks A Knockin can help with spyware and virus removal often via our Virtual House Call service. We access your PC remotely and remove all malicious software. From there, we perform a security audit to identify any areas that are potentially vulnerable. We ensure that all necessary security patches and updates have been installed and complete an evaluation of your system to make sure it is performing normally.
Software installation is supposed to pretty straightforward, but often that just isn’t the case. We can install all types of software programs and create desktop and quick launch icons for the software and troubleshoot any problems you might be having with your software. We even offer instruction for the basic use of many software programs, which can be helpful if you are a first-time user.
Hardware installation and repair can be even trickier, so it is definitely a good idea to call a computer service to make sure that all of your new hardware is installed correctly and running properly. This includes installing and repairing internal components such as graphics cards, hard drives and RAM. We also can help with the installation of external features such as printers and scanners.
Sometimes your computer is working but it isn’t working well, and it can be hard to troubleshoot precisely what is wrong. In these cases, it is usually wisest to contact an expert. Usually we can determine the problem and fix the computer within 90 minutes or less, saving you time and frustration. Geeks A Knockin provides computer repair in Portland, computer repair in Gresham, computer repair in Beaverton, computer repair in Hillsboro and throughout the Portland metro area.]]>
If you have a 3G or 4G connection, you are able to connect to the web at any time provided there is coverage in the area where you are. However, whenever possible, it is best to connect to a Wi-Fi network. This saves power because the device isn’t roaming for a signal.
If you are in a spot where Wi-Fi signal is hard to come by, but you still wish to access items such as music, books, apps and your camera, it is best to go to settings and change your phone or tablet to airplane mode. Your device won’t be searching for signals or accessing the internet, and this also saves power.
Your screen brightness also affects the battery charge. If you lessen the brightness of your screen, this can help lengthen the life of a battery charge. You would be surprised to find how much brightness can affect the battery charge.
Many apps ask for your location, and you’ve probably seen those annoying pop-ups as you access this app or that app. You can go to Settings and under the Privacy section, you will find Location Services. You can turn off Location Services for all applications or just for certain applications and this can help preserve battery life. You can also turn off Push Notification and this can save a bit of battery as well. As with Location Services, you can turn off notifications for all apps or keep it for some and turn others off, whatever best suits your needs.
Your phone or tablet also might be continuously searching for new emails and alerts, and this takes away from the battery, as well. You can keep the device from fetching mail as often by going to the Mail settings manually.
Making recommended updates might seem time consuming, but not only does a software update increase security and fix bugs, it also can install improvements that make the device work more efficiently and thus your battery life will be extended further.]]>
For instance, at the very top edge of your Microsoft Word page, you will see a few icons. The first is a capital W and if you look to the right, you will see a down arrow with a bar on top of it. If you click on this arrow, it allows you to create a custom toolbar at the top of your page. For instance, you can select the spellcheck shortcut key or perhaps add a shortcut for print preview and print. There are several other options and you can customize it anyway you like.
One thing that many people find distracting is the built-in spellchecker in Word. Sure it’s handy, but when words start becoming underlined in red, it often slows us down and pauses work as we backspace and try to spell a word correctly. You can turn off this auto spellcheck by going up to that special arrow at the very top, clicking on it and selecting the “More Commands” tab. Then on the left, select “Proofing.” You will see a bunch of customizations that you can make including a section entitled “When correcting spelling and grammar in Word.” Just uncheck the tabs you don’t want, such as “Check spelling as you type.” You can still go up to the Review tab and do a spellcheck later, but those red underlines will be gone.
If you are typing something and wish to make a specific word bold or begin typing in bold face, you probably know that you can select the word and then go up to the area under the Home tab and click on the B. However, it’s much easier to simply hit CTRL B. This will allow you to quick start typing in boldface. Hit CTRL B again, and you will go back to typing normally.
It might seem like you have to type in the date on many pages during the day, but rather than physically typing the date, hit Alt-Shift-D and the date will be added automatically. This is a great tip for students as they often have put the date in at the top of their papers.
Often we type something and then accidentally select it and erase it. Don’t panic, just hit CTRL Z and what you just erased will reappear. In fact, this undo command can undo several of your last actions if needed. If you “undo” a step too far, don’t worry, simply hit CTRL Y and it will restore that last undo command.
These are just a few of the many shortcuts available in Microsoft Word. There are hundreds more features within this program that can be quite helpful. You can print mailing labels, insert footnotes, number pages, create columns, insert citations and much more.]]>
That is why sometimes you don’t have to type in your name and address on some websites, they already know who you are. Cookies also are used to gather information about how you surf the web, such as what types of pages you frequently visit. It might all sound ominous, but these cookies are only storing information that you already have provided. They cannot access your computer and steal information.
You can clear cookies as well as your browsing history, but typically, unless you are on a shared computer, it usually isn’t necessary to do this. In general, when you provide information such as credit card data or other personal info, it is best to do this only on our personal computer or device.
We are all worried about web security, but there are better ways to protect yourself from harm than worrying about cookies. For instance, use different passwords for every website where you store financial information, such as your credit card. Make sure the passwords contain a mix of capital and lower-case letters as well as numbers and possibly symbols.
Be sure to have a good anti-virus program installed on your computer and have a firewall in place to protect your computer network. Be savvy about what you download when you are on the computer. Only download items that you are sure are from trustworthy sources. Don’t open suspicious emails; simply put them in the trash. Anytime you see a file in an email or on a web page with an extension on it such as Document.exe, be wary of clicking on it and downloading whatever is on it.
Sometimes, these emails can come from people in your contact list. You might be tempted to trust an email from a friend, but it is possible that the friend has been hacked. Often these emails with have (RE:) in the subject line or have no subject at all. If you are unsure if an email is unsafe, create a new email and ask your friend if they sent the email or if they have been hacked.]]>
A virus is a type of malware that most computer users have heard about and probably have had end up on their computer. This is a bit of code that replicates and attaches to file, programs or your hard drive. You can get a virus from a corrupted email link, from clicking on a pop-up ad or from downloading software from the Internet. Viruses can slow down the speed of your computer, corrupt files, steal space from your hard drive or harm programs installed on your computer.
A worm is another type of malware and like a virus it can replicate itself, but it doesn’t have to attach to anything in order to replicate. With a virus, you have to activate and executable file in order to download the virus. So if you open an email, but don’t click on or run the file you won’t get the virus. Worms can spread without an executable file. Worms have been used to crash Web servers and computer networks as well as to gain control of a computer remotely.
Surprisingly, viruses and worms are not the most common type of malware out there. The Trojan horse accounts for nearly 70% of malware. A Trojan is similar to a virus in that this too is a string of malicious code, but a Trojan does not self-replicate. Instead it carries out a specific action, which is determined by the person who wrote the code. It’s called a Trojan horse because it is usually disguised as something useful or fun, such as computer game. You download the game, but what you are really receiving is malware. Some malware creators use Trojan horses as backdoors into a computer system. Once the backdoor is open, they can access your system and steal crucial data, passwords, financial information and more.
Spyware is yet another type of commonly seen malware. This is a type of software that gathers up information about you or a company or a computer network without anyone’s knowledge. A Trojan horse can be a type of spyware. Spyware doesn’t replicate and isn’t set up to destroy or corrupt your files, but instead seeks to gain information about you, such as your browsing history, your credit card numbers and other personal information for identity theft. The recent cyber-attack on Target is an example of how dangerous spyware can be.
In order to prevent malware attacks on your own computer or computer network, it’s best to construct a good defensive plan. For instance, never download something from the Internet unless you trust the source and have run the file through your anti-virus software. If you see one of those ominous pop-ups that claim your computer has a virus or your files have been corrupted, open up your task manager and shut down the pop-up. These are scam ads designed specifically to download viruses or Trojans to your computer and they are not coming from your anti-virus software.
Your email is a hotbed of virus activity as well, so be careful what you click on. Virus emails often come from a source not listed in your contact. Often our spam filter will catch the email, but not always, so if you see an odd-looking sender, chances are it’s someone trying to infect your computer. However, our friends and our contacts sometimes accidentally download a virus and the virus immediately replicates and sends itself to you via email. If a contact sends you a link that seems odd, maybe it has a weird subject line or perhaps no subject or the text of the email is odd and asks you to click on a link, it’s almost always a scam. If you don’t click on the link, you won’t get the virus, so just delete the email.
It’s also wise to install anti-virus software, preferably with a firewall. You only need one anti-virus program for your computer. You won’t be better protected if you have two or three virus programs, just research the software available and select one with top reviews. Be sure to allow the program to make updates, as these updates increase your overall level of security. In general, all updates help increase security, so when Firefox or Explorer asks you to make an update, this will help make you a more secure Internet user.
If your computer is already corrupted, simply contact GeeksAKnockin today and we can set up a time to come out and remove all the malicious software on your computer or network. Not only will we remove the malware, we will perform a comprehensive audit of your computer or network to find areas of vulnerability. This can help you prevent malware infection in the future. We also evaluate your computer to verify that it is performing normally and that security patches have been installed.]]>