(785) 408-4717
Geek Computer
A computer repair company that specializes in computers ...

SECURITY ARTICLES




How to Change your Wi-Fi Password

Here, you will learn how to access your router's web interface and change your Wi-Fi Password in a few, simple steps!
Author: Charz
Wednesday, October 14, 2020



Password Protecting Folders and Files

Depending on what device and operating system you’re using, there are various ways to password protect and/or encrypt the files you want to keep private. MS Office makes it really easy to add a password...
Author: Trey Williams
Saturday, November 30, 2019



How to Remove Malicious Software

Disconnect your computer from the internet. If you suspect that malware has infected your device, you need to boot your PC into Microsoft Safe Mode. However, before you enter safe mode, you need to access the Windows Recovery Environment (winRE). Th
Author: Delilah Daut
Monday, January 13, 2020



What Happens When a Site I Use Gets Hacked?

When the security of the website you use gets breached, it means that a malicious intruder has gained access to sensitive data. This leaves your information vulnerable to theft or misuse.
Author: Ian Musyoka
Wednesday, January 29, 2020



Do I Really Need To Care About My Privacy Online?

When the privacy of your Internet activity is in question, be very afraid. Your information, be it financial or personal, is of high value to cybercriminals. In this era, consumers are more than willing to share their private information just for...
Author: Ian Musyoka
Sunday, February 2, 2020



What Is End-to-End Encryption in Messenger?

End-to-end encryption, in simple terms, is encrypting or scrambling messages in such a way that they cannot be decrypted unless by the recipient. So the recipient receives the message in an encrypted form and decrypts it.
Author: Collins Okoth
Tuesday, June 22, 2021



What Does a Firewall Do?

When your private information is under threat, a firewall is your first line of defense. It is a tool used to filter network traffic between your home/company network and the internet.
Author: Ian Musyoka
Saturday, December 28, 2019



Computer Repair: How to Detect Crypto Mining Malware

On average, cryptojacking victims report abnormally high CPU usage, slow running computer, hot computer fan, server overload, and a shortened battery life. These crypto mining malware are hard to detect in a system as they are designed to run
Author: Ian Musyoka
Monday, July 19, 2021



What is HTTPs, and Why Should I Care about it?

pThere are two types of protocols between a web server and a web browser that is HTTP and HTTPs The HTTPs protocol is the secured version of the two while HTTP is unsecuredppA secured protocol means that the sessions between the web browser you are u
Author: Collins Okoth
Wednesday, October 20, 2021



Password Security: How to Create a Strong Password (and Remember It)

pThere are 7 essential tips to create a strong memorable password They includepulliDo not use sequential letters or numbersliliDont include your birthday detailsliliUse a combination of numbers symbols and at least 8 lettersliliUse unrelated wordslil
Author: Fay Kokri
Monday, November 15, 2021

×
SERVICES
Android Repair Backup Custom PC Build Data Restore DC Jack Diagnostic Email Migration Email Setup Game Console Repair In Home iPad Repair iPhone Repair iPod Repair Mac Repair Monitor Repair Networking New Computer Setup Printer Repair Remote Assistance Security Smart Home Stereo Repair Tablet Repair Theater Tune Up Tutorial TV Repair
ARTICLE CATEGORY
Android Apple Cloud Device Technology Ethics Hardware Troubleshooting Internet Network Personal Computer (PC) Product Review Security Software Asset Software Troubleshooting Technology Concepts Windows 10 Windows 11 Windows Software