Geek Computer Logo
Geek Computer
Creating better technological experiences!

Search [35]

Let us help you find what you need using our site's search feature. Some content may be filtered for members only accessible only after signing in.
1
How Does a Computer Work: A Definitive Guide
A computer is an electronic machine that acts as an information processor. It takes the raw information or data, stores it, works on it, and spits the result out. However, there is an entire process behind how the computer works.  A computer is desi...

Author: Tithi Raha

2
Internet Connection: Why Is My Internet So Slow
We all have experienced slow internet speeds in our homes. I will guide you on the best way you can speed up your home internet, how different factors affect your speeds, and getting the best internet plans for your home or office. I will also guide ...

Author: Faith Cheruiyot

3
How computers work: why is the processor important?
We have prepared this article with the sole aim of informing you what a processor is, it's components and how they function together in transforming data and instructions into useful information. , A CPU or processor is an electronic circuit found ...

Author: Gloria Mutuku

4
Cyberstalking and How to Protect Yourself From Identity Theft
Image: Internet Security Creating a better online experience in the data and communication field has become a non-negotiable topic. Given the current move into the digital space, advanced data platforms and new communication channels have been cre...

Author: Ian Musyoka

5
How to Play iPhone MOV Files on Windows 10?
MOV is a default multimedia format of Apple for iPhones, Macs, and iPads used for storing audio and video content such as music and movies. The format was primarily developed for native playback on iPhones, iPads, and Mac computers. It includes singl...

Author: Tithi Raha

6
How do I change the default destination for my downloads?
The default destination for downloads on computers running Microsoft  Windows Operating System (Windows 7, Windows 8, or Windows 10) is the C:/drive. The C:/drive is also the windows system drive where the operating system is located. For a computer ...

Author: Ujunwa Chibuzor

7
Can You Get a Keylogger Just by Visiting a Website?
Ever since malware and virus infections have started to increase at a rapid pace, the fear of getting a keylogger just by visiting a website is bothering many people. After all, a majority of internet users access a lot of websites on a daily basis. ...

Author: Tithi Raha

8
I can’t see my wireless network in the list?
It’s frustrating when you can’t find your Wi-Fi network in the list. There are several reasons why you can’t see your wireless network, which we will help you fix. Why Is My WIFI Not Showing Up on My Laptop? In general terms, these are the reason...

Author: Berts Njoroge

9
How to connect two Windows 10 computers wirelessly?
Connecting two computers is so important to share files. If you want to share files with your colleagues or friends, you will need to connect their computers with yours. There are several ways you can connect two windows 10 computers wirelessly, whi...

Author: Berts Njoroge

10
Is my computer worth fixing?
Constant computer breakdowns can be frustrating, and if you are a frequent visitor to the repair shop you might start thinking of buying a new computer. However, a computer technician can advise you on the condition of your machine and if it is likel...

Author: Gloria Mutuku

11
How to Factory Reset Windows 10 Without Logging In?
Sometimes a factory reset on your Windows 10 system is necessary. Perhaps, you want to wipe off the data before selling it. Or, maybe your system is too sluggish and continuously showing an error message. A factory reset is a solution to all these is...

Author: Tithi Raha

12
Does private browsing actually work?
With today's advanced technology, targeted ads and recommendation algorithms leave no space for privacy online. In line with this, you could expect your 'private' surfing through incognito mode to stay private, whereby you can remain anonymous. Howev...

Author: Collins Okoth

13
What types of cyber-attacks and how to prevent them?
Cyber-attacks are real problems that are here to stay, as long as the internet. It doesn’t matter whether you are an individual, organization, or business. Cybersecurity risks will catch up with you, now or soon. With the spread of connectivity relia...

Author: Faith Cheruiyot

14
How does Chromecast work technically?
Chromecast is a small disc-shaped device from Google that plugs into the High-Definition Multimedia Interface (HDMI) port of your television. It streams content through the Wi-Fi connection of your mobile device or computer, from streaming services s...

Author: Ujunwa Chibuzor

15
How to Check If an Email Is Legit?
“Phishing” is a popular term among hackers and hacking sites. These phishing emails are sent with the primary purpose of stealing valuable information or taking control of your networks.  It’s reported that every day nearly 3.4 billion phishing emai...

Author: Tithi Raha

16
Can My Employer Monitor My Work Computer At Home?
An employer has every right to monitor the work computers of their employees at home. The employer will do so for various reasons: they will need to ensure their employees' productivity. It is also for the protection of the organization's software ...

Author: Gloria Mutuku

17
How to Backup Computer Windows 10?
Backing up your computer windows 10 isn’t optional but a necessity.  The process starts by clicking on the “start” button on your Windows 10 system, navigating to the “setting” page, then to the “update & security” section, clicking on “backup,” and...

Author: Tithi Raha

18
Why Do We Need Ethics for Internet Users?
With the introduction of computers globally in the 1990s, the entire approach of working, communicating, and storing important information has changed. I mean, who would have thought that a machine can make one convey a message at any corner of the w...

Author: Collins Okoth

19
A Detailed Guide to Removing Ransomware in Windows 10
One of the main problems faced by internet companies today is Ransomware. For this reason, cybersecurity has continued to grow as an industry in general. Unfortunately, players on both sides can easily be described as the bad guys and the good guys. ...

Author: Collins Okoth

20
What is Ransomware How it Works and How to Remove it
Ransomware has grabbed the attention of many internet users, governments, and internet companies in recent years. Although Ransomware has been in existence for a long time, its effects have continued to be felt. Ransomware is short for Ransom Malware...

Author: Collins Okoth

21
How to Take a Screenshot on a Widows Computer
Taking screenshots has been a common necessity in recent years; it offers device users a unique way of sharing specific information on their screens. Screenshots have particularly been popular among mobile phone users; however, computer users may occ...

Author: Collins Okoth

22
Best Solutions to Computer Overheating
Overheating in computers is often experienced by users when playing games. Even though it can be disturbing, the situation can be fixed. Overheating of the computer when playing games can be greatly attributed to insufficient cooling. It can make the...

Author: James Fleming

23
What Are the Signs a Website Has Been Hacked?
If you own a business, you likely depend a lot on your website. From eCommerce to marketing,  your website is the backbone of your transactions and everything in between. Without its help, you could face a lot of setbacks. Nevertheless, many business...

Author: Ian Musyoka

24
How do Wi-Fi Hotspots Work
A hotspot can be described as a locale or area that has an accessible wireless network. Wi-Fi hotspot is commonly used to refer to the available wireless connections in public places such as airports, restaurants, and coffee shops. Depending on your ...

Author: Collins Okoth

25
How Does Cloud Sharing Work
Whether you are a business dealing with loads of information or an individual saving personal files, data is an integral part of day-to-day activities. Handling data is a standard process, and as you collect, save, and share information, it is essent...

Author: Njuguna Eunice

26
How to Get Rid of Computer Pop-Ups
If you have had the chance to encounter pop-ups when working with your computer, you understand how frustrating and irritating it can get. They will slow down your device and even create a gateway for other malware to infect your computer. No compute...

Author: Cate Greff

27
How To Replace a Broken Laptop Screen
A laptop screen is a delicate part of a computer. Having a broken laptop screen can be catastrophic to the user. Any operation that's taking place in the computer system is not going to be visible. Regardless of whether you are amazingly cautious wit...

Author: Delilah Daut

28
Which Computers Are the Best?
PCs have more power than ever before. Their evolution has enabled them to pack high-end graphics cards and eight-core processors, with some offering real-time ray tracing. Remarkably, some of these things were not possible a few years back. With that...

Author: Delilah Daut

29
How To Reinstall Windows 10
If your computer's performance has taken a nosedive recently, reinstalling Windows 10 - also known as a PC reset - might be the perfect solution. This is a somewhat extreme way of spring cleaning your hard drive, but it's certainly effective. If you'...

Author: Trey Williams

30
What Is SATA 6GB/s
The abbreviation SATA stands for Serial ATA (Advanced Technology Attachment), a modern generation drive interface preceded by the traditional wide and inconvenient Parallel ATA or PATA, also known as IDE. These technologies, PATA and SATA, describe t...

Author: Collins Okoth

31
How To Understand Thermal Design Power (TDP)
TDP measurements for specific chips are one of the least understood acronyms on the computer professional’s vocabulary. While TDP has always been associated with power consumption, it is not an entirely accurate description. So, what is TDP? How does...

Author: Emman Jemuel

32
What Is Processor Virtualization Technology?
In computing, many things can be made virtual, and there are various types of virtualization: network, desktop, and application virtualization. There are some challenges involved in the virtualization of modern processors (i.e., those built on x86 ar...

Author: Trey Williams

33
Why Is My Printer Not Connecting To My Computer
As a rule, we tend to upgrade our printers much less often than upgrade the software on our computers. This is because Microsoft and Apple are always releasing security updates and new features to make their Operating Systems more efficient, faster, ...

Author: Trey Williams

34
How Do I Know If I Have a Virus on My Laptop or Desktop Computer
Making sure you have up-to-date anti-virus software installed is the easiest way of protecting your computer against viruses. This software is usually the first to notice that something is wrong. But with malware and hackers getting ever more sophist...

Author: Trey Williams

35
How to Update Graphics Drivers on Windows 10
In today’s world, computers have become an essential part of our lives. From work to leisure, the relevance of computers in our lives cannot be negated. This, therefore, necessitates the need to take excellent care of these devices. When it comes to ...

Author: Gloria Mutuku