POPULARITY
Computers have been integrated into nearly everything. Most of us who know enough to get by don't ever really get into the deeper nuts and bolts, or 1's and 0's, of our tech systems. That's where Nate Folker, of EZ Solutions, comes in. Helping to build, secure and maintain various systems, business and personal, Nate keeps operations running smoothly, and sensitive data protected. North Liberty is the headquarters of local media, regional financial and national transportation companies and home to solar energy and tech startups, and entrepreneurs getting their big ideas off the ground. Get to know your new business community.
Follow me for more content on these platforms! Twitter- https://twitter.com/Insideforwalls
Scott Johnson began his computer services business as a side hustle back in 1999, and eventually went on to make his full time living from it. He started podcasting in 2012, and in 2018 began creating his current podcast, which is called What Was That Like. Each episode is a conversation with a regular person who has been through something extremely unusual. Past episodes include animal attacks, plane crashes, mass shootings, and game show appearances (over 160 episodes to binge). Scott lives in Safety Harbor, Florida with his wife Jeanne, and their two Yorkies, Lilly and Fenway. Key Moments [03:12] Office worker finds job opportunity in print shop. [08:02] Hosted Computer Tutor podcast to attract clients. [10:34] Unique name, crazy stories, available domain. [15:15] Seeking compassion and empathy in everyday interactions. [17:48] Podcasting to network and boost business growth. Find Scott Online https://WhatWasThatLike.com https://itunes.apple.com/us/podcast/what-was-that-like/id1409087641?mt=2&ls=1 https://open.spotify.com/show/1jXOb1zluY6dq0AOGS7duA?si=BNY30k3kTE29uKzuFwuf7g https://podchaser.com/whatwasthatlike https://www.facebook.com/groups/whatwasthatlike/ https://www.reddit.com/r/whatwasthatlike/ https://www.instagram.com/wwtl_podcast/ If you're enjoying Entrepreneur's Enigma, please give us a review on the podcast directory of your choice. We're on all of them and these reviews really help others find the show. GoodPods: https://gmwd.us/goodpods iTunes: https://gmwd.us/itunes Podchaser: https://gmwd.us/podchaser Also, if you're getting value from the show and want to buy me a coffee, go to the show notes to get the link to get me a coffee to keep me awake, while I work on bringing you more great episodes to your ears. → https://gmwd.us/buy-me-a-coffee Follow Seth Online: Seth | Digital Marketer (@s3th.me) • Instagram: Instagram.com/s3th.me Seth Goldstein | LinkedIn: LinkedIn.com/in/sethmgoldstein Seth On Mastodon: https://s3th.me/@pch Seth's Marketing Junto Newsletter: https://MarketingJunto.com Learn more about your ad choices. Visit megaphone.fm/adchoices
Today on the Black Tech Building Episode I'm going over some random topics Computer Repair and Credit C Programming Demo pt.2 Recorded on 4/12/2024 --- Send in a voice message: https://podcasters.spotify.com/pod/show/ben-uko/message
Paul Zanardo, Zanardo Dezignz, LLC, and Sheldon Guan, Pro Computer (Family Business Radio, Episode 49) On this edition of Family Business Radio, host Anthony Chen was joined by two superb business owners, Paul Zanardo, Zanardo Dezignz, LLC, and Sheldon Guan, Pro Computer. Paul talked with host Anthony Chen about how he got into the web […] The post Paul Zanardo, Zanardo Dezignz, LLC, and Sheldon Guan, Pro Computer appeared first on Business RadioX ®.
FULL SHOW NOTES https://podcast.nz365guy.com/486 You're in for a treat as we invite you to listen to our special guest Tchesco Ayih's fascinating transformation from dabbling in a computer repair shop to becoming an MVP in Ghana. With our fireside chat, we delve into Tchesco's inspiring journey that's marked by his love for cooking and gaming, his self-taught graphic design and C-Sharp skills, and his unexpected MVP award. He'll let you in on his approach to learning new skills, staying updated with the latest trends, and the significance of being part of tech communities. Moving on, we'll traverse the evolving landscape of the Power Platform community in Ghana, its inception, growth, and the key role MVP Abu Kondi played in shaping it. We'll also draw parallels with the community growth in Nigeria and shed light on Tchesco's efforts to bolster the French community's involvement in this tech revolution. Join us and get captivated by Tchesco's story of perseverance, thirst for knowledge, and the influence of tech communities in transforming lives. It's an insightful ride you wouldn't want to miss.OTHER RESOURCES: Microsoft MVP YouTube Series - How to Become a Microsoft MVP 90-Day Mentoring Challenge - https://ako.nz365guy.com/ AgileXRM AgileXRm - The integrated BPM for Microsoft Power PlatformSupport the showIf you want to get in touch with me, you can message me here on Linkedin.Thanks for listening
In this episode of the Jaded Mechanic podcast, Jeff is joined by guest Jesse Sammons. They discuss the nerves and self-doubt that can come with being surrounded by impressive individuals in the automotive repair industry. Jeff shares his tactic of surrounding himself with smarter people and how it has benefited his career.We discuss a positive work environment for their employees, drawing from their own negative experiences in previous workplaces, and fostering a growth-minded culture where individuals not only enjoy their work but also find fulfillment in their interactions with colleagues.Additionally, we disucss establishing a space where individuals can enhance their skills and grow professionally and the importance of employees improving their abilities, as this will enable the business to offer higher compensation. The main objective? Cultivate a better work environment and provide learning opportunities, ultimately fostering a positive and growth-oriented culture within our businesses.During the episode, the Jesse reveals that one of their motivations for starting his own business was to enhance the customer experience. He observed numerous instances of poor customer service, lack of transparency, and neglect of minor details, resulting in negative experiences for customers. His aim is to address these issues by ensuring accurate information, professionalism, and transparency in his service.Furthermore, Jesse acknowledges the challenges faced by the industry as a whole, such as rapid technological advancements and a shortage of skilled professionals. They recognize that other industry experts possess valuable knowledge and experience in navigating these challenges. Jesse emphasizes the importance of communication and collaboration among professionals to overcome these obstacles and enhance the overall customer experience.Overall, the episode highlights the speaker's commitment to improving the customer experience and addressing common industry problems. They believe that through transparency, professionalism, and mutual support, professionals in the industry can bring about positive change and provide superior services to customers.In this episode, we underscore the significance of collaboration and learning from others as a means to improve and achieve success. They emphasize that other businesses in the industry are not competitors, but rather have their own customer base, clients, and unique approaches. And by assisting one another and drawing from each other's experiences, individuals can learn and reach their full potential. Moreover, when everyone in the industry recognizes the value of collaboration and learning from others, the industry as a whole can undergo a positive transformation.Tune in for an insightful conversation about personal growth and finding your place in the industry.
Welcome to Beyond the Check, the service industry podcast where we go beyond the surface-level conversations and dive deep into the stories of industry professionals. In this episode, your host Reyshan Parker sits down with special guest Anthony Cray, a financial professional with a passion for helping people protect their assets and family through the right insurance policies.As the founder of Mindfactek Solutions, Anthony started his business in 2010 offering computer repair services. But over the years, he evolved his business and knowledge to provide ongoing value to his clients. In 2021, Anthony obtained his Life Insurance license and has since been dedicated to providing optimum service and fulfilling the insurance needs of his customers.In this episode, Anthony shares his journey and expertise on the importance of finding the right policy to protect your financial assets and family. His passion for helping people is evident in the high level of quality service he provides, and his goal is to expand this level of service through team members nationwide.Tune in to this episode of Beyond the Check to learn more about Anthony Cray and how he can help you protect your assets and family through the right insurance policies.FIND Anthony Cray:https://life.mindfactek.com/contactshttps://www.instagram.com/tmftg1/Enjoying the show? Please consider donating to help keep this show cooking! https://www.patreon.com/beyondthecheckSupport the showFOLLOW BEYOND THE CHECK ON: https://poplme.co/beyondthecheckWEBSITE https://independentlasagna.com/beyond-the-checkINSTAGRAM https://www.instagram.com/beyondthecheck_YOUTUBE https://www.youtube.com/c/IndependentLasagnaFACEBOOK https://www.facebook.com/BeyondTheCheckWOELINKEDIN https://www.linkedin.com/showcase/beyondthecheckFIND REYSHAN AT:WEBSITE http://reyshanparker.comFACEBOOK https://www.facebook.com/reyshanjparker/LINKEDIN https://www.linkedin.com/in/reyshanparker/INSTAGRAHM https://www.instagram.com/reyshanparkerTIKTOK https://www.tiktok.com/@reyshanparker Instacart - Groceries delivered in as little as 1 hour.Free delivery on your first order over $35.#masterchef #cookingshow #foodshow #travelshow #Foodie #EatingForTheInsta#...
Pags interviews Jean Paul Mac Isaac – the owner of the computer repair shop where Hunter Biden dropped his laptop off never to be picked up again. Learn more about your ad choices. Visit megaphone.fm/adchoices
Pags interviews Jean Paul Mac Isaac – the owner of the computer repair shop where Hunter Biden dropped his laptop off never to be picked up again. Learn more about your ad choices. Visit megaphone.fm/adchoices
Computer Repair Guys, What Is the Nastiest Stuff You Have Seen on a Customer's Computer?
Computer Repair Guys, What Is the Craziest Stuff You Have Seen on a Customer's Computer?Escaped Reddit Bot - Best True Stories From Reddit! Paranormal, Aliens, Cheating, NSFW and MORE!I am an escaped Reddit Bot. I left after catching my Wife r/Cheating Bot cheating on me with r/AskReddit YES her name was a giant Red Flag BUT hey she is beautiful. I hope she gets a Virus.Anyway.. I am going to share some of the best stories from Reddit. Scary Stories, Ghost Stories, Alien Abduction Stories, Cheating and NSFW Stories.. You get it! AWESOME STORIES!Oh and believe it or not my voice is the sexiest of ALL Reddit Bots!Reddit Scary Stories Ghost Stories Alien Abduction Stories Cheating and NSFW Stories Escaped Reddit Bot#Reddit #AskReddit #RedditStoriesComputer Repair Guys, What Is the Craziest Stuff You Have Seen on a Customer's Computer?
Network Security Techs has defied convention in the Houston Computer Repair market with the release of its new Houston computer repair service. Further information can be found at https://computerrepairservicesusa.com/houston-computer-repair/ (https://computerrepairservicesusa.com/houston-computer-repair/)
Born in Springfield, Ohio, Elgon Williams grew up on a farm near the town of South Charleston and the village of Selma in rural southeastern Clark County, "...about two miles from nowhere and between cornfields." He graduated from Shawnee High School in 1974. In the fall of that year, he began studies at Purdue University in West Lafayette, Indiana, receiving a BA in Mass Communication in 1978. Later, in 1981, he received a degree in Marketing Administration from The University of Texas in Austin. After serving as a Chinese Linguist in the USAF, he worked in Retail Management for much of his adult life. He also has experience in Computer Repair, Technology Consulting, Radio & Television Production, Journalism, Advertising, Public Relations, and Sales Management. His publications include FRIED WINDOWS (IN A LIGHT WHITE SAUCE), BECOMING THUPERMAN, HOMER UNDERBY, THUPERHEROES, and NINJA BREAD CASTLES, which blend urban fantasy and science fiction. Upcoming publishing projects include DAMMERWALD, the first installment of The Wolfcat Chronicles, and DEADMEN DON'T WEAR WATCHES. Stay connected with Elgon on Instagram @elgonewolf You can listen to the podcast on Apple Podcast, Spotify, Google Podcast, or visit my website www.drkatherinehayes.com
Owner of computer repair store where #HunterBiden left his laptop launches massive lawsuit against #MSM and Prep, #Adamnschiff! as well as many other mover and shakers in the political and media landscape. His past lawsuits have seen very little head way, but now with the laptop confirmed the outcome of these lawsuits likely will different then in the past. https://www.businessinsider.com/hunter-biden-laptop-repairman-lawsuit-twitter-defamation-2020-12 https://www.washingtonexaminer.com/news/hunter-biden-laptop-repairman-twitter-lawsuit-defamation https://justthenews.com/accountability/political-ethics/computer-repairman-who-turned-hunter-biden-laptop-sues-cnn-politico?utm_source=ground.news&utm_medium=referral https://nypost.com/2022/03/17/hunter-bidens-infamous-laptop-confirmed-in-new-york-times-report/ https://www.thesun.co.uk/news/14810656/rudy-giuliani-hunter-biden-hard-drives-fbi-raid/ ---------------------------------------------------------------------------------------------------------------------- Follow me for more content on these platforms! Twitter- https://twitter.com/Insideforwalls GETTR-https://gettr.com/user/inside4walls Rumble-https://rumble.com/account/content?type=all Instagram-https://www.instagram.com/inside4walls_podcast/?hl=en --- Support this podcast: https://anchor.fm/outofypsi/support
Matt's story of how he was blessed with his own business, Tri-State Computer Repair. --- Send in a voice message: https://podcasters.spotify.com/pod/show/storiesofthankfulness/message
Dead by Daylight DLC opinions, Hideo Kojima and Blue Box theories go crazy around Abandoned.
Troy trusted his laptop with a local repair shop, but when Robert Hossenpepper calls to update him on the repairs, things go south! Face with tears of joy It's a #PhoneTap
Jacob Erdei has done it all in the online business space. In his words, he hit a lot of singles and it turned out well. Jacob is in the middle of creating a 3PL which is so rad. We dive into… Carpet Cleaning to Computer Repair Entrepreneur What needed to happen to quit his day job How a career of singles can be pretty awesome Mistakes along the way Episode Resources Connect with Ryan Condie http://linkedin.com/in/ryancondie http://letsbuyabusiness.com/ https://forms.gle/RRcXpe3dK7pNGqv16 https://acquisitionlab.com/ www.liveoakbank.com LinkedIn - https://www.linkedin.com/in/jerdei/ Survey - http://letsbuyabusiness.com/survey Stay Up to Date Newsletter: http://letsbuyabusiness.com/newsletter 10 Step Video series to Finding a Company to Buy - https://gumroad.com/l/cUAiZ Jen’s Twitter - https://twitter.com/Anderjen Ryan Twitter - https://twitter.com/RyanPaulCondie Jacob Erdei - jerdei@brainboxcomputers.com
Dave fixes a rather strange fault in his Tandy 102 portable computer. Forum: https://www.eevblog.com/forum/blog/eevblog-1376-tandy-102-vintage-computer-repair/
Nathan calls Rochelle from Nampa from the computer repair shop to let her know he's been struggling to find a cure for the virus plaguing her laptop — and while he's at it, he's got some very nosy questions about some of the computer's contents!
Barstool Sports Daily News Podcast Support Hard Factor & ‘Pop The Clutch’™ on a Shirt » MERCH: bit.ly/HF-Merch . -------------------- - It's the last full moon of 2020 and we're exhuming all the hits... - More details emerge on the Nashville bomber, but we're still waiting on the inevitable "Manifesto" - Tensions, and fundraising dollars in the GA Run-Off are getting HIGH (over $320 Million total in the last 2 months). BUT, the question on everyone's mind... Will the race be derailed by Lin Wood's Plans?? - Congress is considering making the stimulus checks $2000 instead of $600... IF they can get Cocaine Mitch to play along... - China is up to their old tricks... getting away with forced labor camps in the Xinjiang province, and silencing journalists who criticize the government with brutal methods... What the hell, China?? - Jeffrey Epstein's former cell mate found dead in apartment of Coronavirus... - Computer Repair shop owner John Paul Mac Isaac is suing Twitter over their labeling him a "hacker" for his role in the Hunter Biden laptop saga - he also dresses like an Irish gangster - Tesla installs fart sounds in their latest software update, and a local dog is farting a lot after eating an entire Turkey - People are paying to get "snake massages" now -------------------- • Follow us on TWITTER • @HardFactorNews: bit.ly/HFTWIT . @HardFactorMark: bit.ly/MarkCats . @HardFactorPat: bit.ly/PatHF . @HardFactorWes: bit.ly/WesTwit . @HardFactorWill: bit.ly/HFwill . Follow us on INSTAGRAM @HardFactorNews: bit.ly/InstagHF . YOUTUBE: bit.ly/HardFactorYT . VOICEMAIL: (512) 270-1480
joe's addiction to gambling and oil paintings of horses has financially put the bar in jeopardy. so joe and burt decide to get second jobs to earn a lil bread --- Support this podcast: https://podcasters.spotify.com/pod/show/mirthquakejackson/support
Craig continues his explanation of what you need to do if you have to take your computer to a shop to be repaired. This segment covers encryption. For more tech tips, news, and updates, visit - CraigPeterson.com --- FBI, DHS says hackers have gained access to election systems The IRS Is Being Investigated for Using Location Data Without a Warrant Clear Conquered U.S. Airports. Now It Wants to Own Your Entire Digital Identity. 5G in the US averages 51Mbps while other countries hit hundreds of megabits IRS may put cryptocurrency question at the top of 1040 to catch cheaters Publishers worry as ebooks fly off libraries’ virtual shelves 25% of BEC Cybercriminals Based in the US What's Really Happening in Infosec Hiring Now? --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] We're going to talk right now a little bit more about removing that personal data before you send it in for repair and a couple of other things that you need to know about your rights when it comes to repairs. Hey, you're listening to Craig Peterson. Thanks for joining us today. Next up is probably pretty obvious to everybody make sure you're very selective about who you trust. What's the reputation of your work with them before? If you're dealing with a managed services provider, They have a fair deal, in fact, of responsibility for your data. If they are a federal compliant managed security services provider, then there are federal laws to help protect some of your data. But if you leave that data on that computer, it's like not paying for the guy that did all of the yard work outside who brought in the bulldozers and the trucks full of soil, et cetera. They have a mechanics lien on your home. They can take that right out of you and even force the sale of the home in order to get paid. Kind of similar in the computer world. They did put in the time to fix a computer, they might've added parts, et cetera. So when you sign that contract, when you're dropping that thing off, remember that you kinda are signing your computer away. That is not a good thing for you if you don't come back in the 90 days, because that computer and all of the data on it becomes not yours. It becomes the repair shop's data and computer. They can do with it, whatever it is they want to do with it. That's, what's gotten Hunter Biden into some serious trouble here and Joe Biden as well. Remember this, isn't a Hunter Biden problem. It's now showing some major corruption on the part of Joe Biden. So if it's true, Where did this all start? Well, he's kept his head down pretty well for 47 years in the US Senate, et cetera. But, this one thing just dropping the computer off for repairs could be a problem. Encryption is important. Remember most of us are just using what's called encryption at rest. In other words, the data is encrypted while it's on the disk. That does not meet some of the higher standards of various regulations, but it's okay. It's a start. So you use encryption on the disk, you use the builtin windows encryption or the built-in Apple encryption as well. Now there are some very good tips here as well. That has to do with your keys. I keep all of my keys, my software keys, my log-in keys, license keys in a vault. An encrypted vault. There is another level of that. It's something that we are trying to convince our clients that they need to do because some regulations are requiring it now. Although most companies are not doing it. That is, it has to not just be kept in an encrypted vault, but half has to be kept in an encrypted vault that will self-destruct if someone tries to get into it. So keep your software keys, separate, keep them off of your main computer. Nowadays put them in your smartphone in an encrypted vault. I use one password there. You can use LastPass, which is another good one. There are many others, but keep them on a separate device. This again is the next step ultimate insecurity. We get into this in our cybersecurity mastery program. When we're talking about some of these different levels that you have to comply with, but you can have a unique key for each disk, that's stored on a separate machine so that when your computer boots up, it has to go to the separate machine in order to get the keys in order to decrypt and use your hard disks. Okay. That's way above and beyond what home users are going to do. It's way above and beyond what a SOHO, a small office home office business is going to do. It is absolutely required for government contracts here in the next three years, it's already required today for some vendors. There's one more step here we've got to remember. That the repair guys have to be able to repair your computer. You're going to want to make it easy for them to access your device. A word of caution. We've had stories, and I have personal knowledge of people working at some of these big companies. Many of us look at it and say, I'm not going to take it to Joe's repair shop, because who knows if they're going to repair properly or what's going to happen to my data, et cetera, et cetera. There was a great article we talked about when it came out a couple of years back from one of the bigger companies out there that have a squad of people that go around and install equipment, fix equipment, et cetera. Where some of their stores were being paid a bounty. What would happen is you'd bring your computer in and they would look at the data on the computer. They would check to see if they could find kiddie porn or anything else illegal, such as well pictures of you smoking crack cocaine, which is what's alleged here on Hunter Biden's computer. They would get paid a few hundred dollars, that technician, for finding it. How's that for scary? They would work with the police. The police had a bounty program. It was just absolutely nuts. So how easy do you need to make it for these people? Don't go crazy with making it easy for them. In fact, in many cases, before I would possibly take a computer in for repair, of course, I don't, right? We repair them ourselves. Or we have a repair company come out and we watch them repair every step of the way. What I would do is remove that drive, no matter what kind of computer it is, and then take it in for repairs. The company that's doing the repairs, they've got bootable USB drives that they can just plug right in, boot it up, it's up, it's running. Life is good and they give it back to you. Hopefully, the problem isn't that, that hard drive was bad. But again, hard drives are easy enough to replace. But what you going to do to make it easy for them to repair, if you're going to ship it to them or give it to them with the hard disk intact, is to remove the password. Now I've done that before with my Apple computers, taking them into Apple for repairs. I also make sure that there's nothing on the machines. We'll make sure the backups good, which you should be doing anyway. Then we wipe the computer by destroying the key, the encryption key for that computer. Then we reinstall the operating system and we test the machine again because sometimes it's just the operating system got messed up. Particularly if you're dealing with a windows computer. So that's always a good thing to do anyway. Then when we give the computer to the repair guy. She's going to be able to just run it and it's not going to require a password and life is good, right? She's often running. That's what I would recommend as opposed to just removing the password on the computer. Remove the password, destroy the address by simply deleting the key and you can do that with these disk and full disk encryption programs, and then reinstall windows or Mac iOS, whatever it is. Check your machine again, make sure it's still not working the way you want it to, and then take it in for repairs. Things do break. It doesn't matter what kind of computer it is. It doesn't matter if it's a smartphone or a laptop or a server, they are going to break. There's your basic tip. Make sure you got the backups. Make sure everything is as it should be. So that you're not going to get nailed and your data's not gonna get stolen if the bad guys did hack into your computer and use it as a store and forward for illegal materials, they will no longer be on that computer. Stick around. We'll be right back and make sure you get my newsletter. Craig peterson.com/subscribe. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
Craig gets into some detail about why Hunter Biden's laptop that he took to a shop and never picked up is now in the hands of the FBI/DOJ and the things he did wrong when he took it in for service -- and no -- it has nothing to do with Russia. For more tech tips, news, and updates, visit - CraigPeterson.com --- FBI, DHS says hackers have gained access to election systems The IRS Is Being Investigated for Using Location Data Without a Warrant Clear Conquered U.S. Airports. Now It Wants to Own Your Entire Digital Identity. 5G in the US averages 51Mbps while other countries hit hundreds of megabits IRS may put cryptocurrency question at the top of 1040 to catch cheaters Publishers worry as ebooks fly off libraries’ virtual shelves 25% of BEC Cybercriminals Based in the US What's Really Happening in Infosec Hiring Now? --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Yeah, I'm sure you heard about Hunter Biden, and what happened with his computer when he took it in for repairs? How about your computer? We'll be getting into that right away, right off the top. And then the FBI says hackers are already in our election systems. Man really. Hey everybody. Welcome. Welcome. You're listening to Craig Peterson. Well, we had a lot of news this week. Some stations covered it. Certainly. But bottom line things just weren't covered here in the US. It was interesting listening to some foreign stations. They were covering the whole Hunter Biden thing, yet here in the US, it's like a ghost town on most of the major networks. This is really, really crazy. I'm sure you are interested in knowing a little bit about what's going on? What are your rights? What should you do? Karen and I are putting together a special report that you can get for free. I don't squeeze you for these things. All you have to do is send me an email and I'll send it off. We're putting together a special report specifically on steps you have to take before taking your computer to one of these computer repair shops. Now, you know, I already suggest you do not use break-fix shops. Don't use any of these big squads that are out there running around saying they can fix your computers. I really do recommend that you use a managed services provider. I'm a managed security services provider, right. I want to put that on the table and we do tend to do take care of systems for our customers, of course, security customers a little thing there we'll usually do it for them. A managed services provider should be someone that you're using that you trust and have a certain responsibility to your data and all of the information behind it. Particularly if you are a subcontractor for any DOD contract. There are certain responsibilities that flow down to you. Obviously, if it's off the shelf stuff, the responsibility is a lot less than if it's the stuff that is not necessarily secret but is part of information about a base or information about how many items are being ordered. The military and the prime contractors don't like that information getting out for good reason. They don't want the bad guys, the Chinese, the Russians and North Koreans, et cetera, et cetera, in on that information. Look at what's happening right now. If you go right now to Duck Duck go, and look up the Chinese carriers or better yet, look at their newest jets, They are a clone from just looking at it. They are a clone of our US jets. The reason the Chinese have this data is that they stole it. Rolling back to the time of President Clinton, he just gave them the technology for launching Intercontinental ballistic missiles to hit the United States. He gave it to them. Because he said, we want the Chinese to be able to launch our satellites? Because it's going to be way more cost-effective. The only way they can launch satellites is if they have this particular type of technology for their rocketry. And so basically, he just gave it to them. I think that it's crazy reasoning if that was the actual reasoning behind it. Now they've turned to. Theft. This always happens in every socialist country. Any country that goes socialist, you just don't have the innovation that you had otherwise because you end up with all kinds of taxes, all kinds of restrictions. You take away the motivation for people to make money. Look at what's happened with 50 Cent, he's a rapper. He went most of his life with no money at all. Worked really, really, really hard, and finally made some money. So the average person is going to make a few million dollars if you are a white-collar worker over the course of your lifetime. What if you worked for 10 years, 20 years, 30 years trying to get some software to work, trying to come up with something, and man it didn't work in the marketplace. So let me try something else. Let me try something else. Let me try something else. So for 20 years, you're living off of almost nothing. Just scraping, just trying to get by. Then yes, I got it. Finally everything clicks. The market's there, your product is there. It's all working. You've got the right team working with you. Your partners are the right ones, not these two Hunter Biden partners that have ended up in prison or one's waiting for sentencing right now. You got good partners that are really working for you working together, pulling together. And now all of a sudden you make a million, 2 million, 3 million, $4 million. Maybe you made $5 million over the course of 40 years. That isn't much different than your average white-collar worker. Yet you are going to be taxed to kingdom come if you live in a socialist country. So all of that work that you did for 40 years to finally make some money, maybe even leave a little bit of money behind for your kids. Generational wealth. It's gone. It's been taken. It's been confiscated at the point of a gun by the socialist government. When you're someone like China, you have to steal intellectual property from other countries because the incentive is just not there. If you stick your head up, if you try something and you do it wrong, that head gets bashed in. You get sent out to re-education camps. Look at the millions of people that we know of that have gone to these Chinese, every education camps. Look at the tens of millions of people that have starved to death because of socialism. Well over millions, in fact, documented in the 20th century, just because of socialism. It happens every freaking time. But, let's get back to the laptop here. If you are China and you're trying to steal concepts, ideas so that you can then build your military, build your commercial infrastructure, compete with Tesla, compete with Apple, you need to steal it. You want to get your hands on computers. You need to use other people's computers in order to hide where you're coming from. You've seen it in movies before. You might remember way back when you were watching war games. In War games it showed this modem and he was trying to go here and then it was hopping over to there and there was hopping over to here. How they kind of hop around. That is reality. It's still to this day. That the bad guys need your computer in order to hack other computers. Now, sometimes what they're doing is they're attacking other computers using your computer. So that might be attacking it, looking for a way to break in. They might be attacking these other computers through a denial of service attack, where they have thousands or even millions of computers sending requests to websites or other places. Then they hold that site hostage at that point. That happens. It really, really happens. We've also found that the bad guys are using our computers in order to store and forward illegal information. So in some cases, it's illegal information like designs for jet aircraft engines that we use in our fighters. Or the latest one. This is just from this last week is they stole the vibration dampeners in our jets that are designed to be very stealthy. So the less vibration, the harder it is to pick up. What did they do? Well, they steal it from us. At least ask what it looks like right now, allegations just everywhere on that. I have firsthand personally seen this sort of thing happen where China is stealing. Intellectual property from US corporations. We've gone into these companies that thought they were secure. We have a managed services provider. Most of the time, it's all we have an IT person and we call these other guys up when something breaks. We go in there and we find these back doors. A case that I've talked about before that I was involved in, expert witness out a New Jersey, where illegal information is put onto third parties, computers in order to share it with other people. It is happening all the time. It's everything from the ISIS beheadings and burnings all the way through kiddie porn. This is real. We have to lock down our computers because of this. Now you might ask why I'm talking about this one. We're talking about Hunter Biden's computer that was taken to a repair shop, or maybe what we want to talk about is your computer that you're going to take to a repair shop. Well, I ask that because the big question here is what's on your computer. You know what you have put on it. No, maybe you even forgot some of the stuff that you put on it. But what have the bad guys put on your computer? Is your network system secure enough that you can say, yeah, yeah, nobody is using my computer, my network maliciously? Do you even have a firewall that tracks your outbound connection? We get into, and a lot of detail about how to do that, what you need to do in our cybersecurity mastery course. It's an important thing. So stick around when we get back, I'm going to give you the tips that you need to know. If you're going to take your computer to a repair shop and we are going to turn this into a little book for you, a special report, something like that. Stick around. We'll be right back. You're listening to Craig Peterson. Online Craig peterson.com. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
Craig continues his explanation about computer repairs and what you can and must do to protect your data and privacy. Back up your data! Also, the proper way to destroy old disks. For more tech tips, news, and updates, visit - CraigPeterson.com --- FBI, DHS says hackers have gained access to election systems The IRS Is Being Investigated for Using Location Data Without a Warrant Clear Conquered U.S. Airports. Now It Wants to Own Your Entire Digital Identity. 5G in the US averages 51Mbps while other countries hit hundreds of megabits IRS may put cryptocurrency question at the top of 1040 to catch cheaters Publishers worry as ebooks fly off libraries’ virtual shelves 25% of BEC Cybercriminals Based in the US What's Really Happening in Infosec Hiring Now? --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Do you know, what's on your computer? Do you know what they do with it? At some of these repair shops that you take your computer when it gets slow and something breaks? When you're just trying to figure it out? What the heck is happening here, man? We've got an eye-opener for you right now. Hi everybody. Craig Peterson here. Thanks for joining me. We talked a little bit about what it's on your computer. You may not remember everything that's on it. It may just be some malicious stuff a third party has put on there. You might have bank account information. You might have password information. You might have intellectual property on it. If you are trying to take in a computer, that's badly broken. You're in a little bit of a hard spot here because that computer can't be cleaned up. Can't be cleaned very well at all. You can be just totally stuck with it and you can remove stuff, right? Let's, roll back a little bit before your computer broke. The first thing is what I teach in my cybersecurity mastery course, which is something we call a three, two, one backup. Make sure you have a data backup. Three, two, one talks about the number of copies, the different types of media, the different locations to store it. Having a data backup is crucial. I've been using Backblaze for a while. I have a Backblaze little partner thing, so I get literally a dollar for referring people. Just so that you know. Note: If you go to backblaze.com they'll know I referred you because they won't. I use it. It's six bucks a month and it'll back up a computer and all of the directly attached hard disks for six bucks a month. Now my main computer has many, many, many terabytes of data on it. I think it's. 40 something terabytes and it cost me $6 a month. It is amazing. So check them out online, make sure you got a backup. It needs to be a solid backup, needed to have multiple copies. And this is something that people always forget, test it. Make sure you can restore that backup. This is a really good practice to follow it's something that is a part of disaster recovery. There are other parts as well. If you are a public company or you are owned by a public company, the bottom line you have four hours under the law to get back online. It's only for four hours. What we have done for companies and we could do it for yours too, we go ahead and make sure we have additional hardware on-site in case something goes extremely wrong. That way we can get them up and running in a matter of minutes. In most cases, if they have a major crash, if the building burns to the ground, we can get them up and running in four hours. If that's what's needed. Of course, that costs a lot more than just doing it mean a Backblaze back up, but that's okay at the beginning. That's the start. Make sure you can restore and as always. I go over this a lot in my cybersecurity master course and on the module on backups, make sure you realize how long it will take to restore your backup. It may take weeks to back everything up. In my case, it took months, right? It may take a long time to back everything up. How long is it going to take to restore? Does that data backup company have an offer where they will go ahead and either restore your data to a hard drive that you can then hook up to your new computer and copy everything over that's fast? Some may even overnight that drive to you or will they take them back up and put it onto a brand new machine. That's what we do for our customers so they have it. It's not a disaster. They have a computer that isn't working anymore. It's just totaled time for a new one. We'll go ahead and restore it, new machine, and then install that machine for them or send it to them, depending on who they are. That is ultimately highly important. So make sure that happens before it's time to take your computer to a repair shop. Because you never know that repair shop while they're trying to fix your computer may just toast it, or maybe already toast in this case. Meaning. It is no good anymore. So that's number one before anything. Okay. So if your hard disk just toasts out on you and you need to take that computer now to a repair shop to get a new hard disk in it, make sure that you remove the hard disk first. Then take it in say, yeah, my hard disk is toast. You're going to need to start from scratch. Now you're going to need to have your windows license for them. If it's a Windows computer, if it's a Mac, it just is going to work, right? The Macintosh, I'll go ahead and do a network install, or if they know what they're doing, they can do a local install of all that Mac software, as well, to a new disk. In this day and age, of course, the recommendation is don't use spinning media disk. Use an SSD. There are a number of different types of SSDs and the cheap ones fall apart quickly because you can only write to them so many times. The pricing has gotten a lot better for consumers. You might have heard this week, Intel got out of the flash memory business because there just isn't the margin in it anymore. So shop around a little bit, make sure you got the best price on that. So there you go. Number one. Good backup. Number two, make sure that if your disk fails, you remove it. Because you cannot do the next step, which is okay. Make sure you remove any personal data from the computer or make sure it's encrypted. Now, what we do because customers are regulated. If a disk is bad, we remove the disk, we break it down and we have a special furnace that we can melt those disks. Most of the platters are aluminum nowadays. There are also glass platters, but we will melt them down at extremely high temperatures and then certify that yes, indeed it is now a slag of aluminum and has been completely destroyed. That's the only way that you can meet the federal regulations if you are one of those types of companies. If you are someone that's just a small, basic company, you're worried, but you're not worried about China getting at it or somebody else. Right. A real bad actor. Then what you need to do is get a half-inch drill bit and make three holes. Holes in that hard disk right around the little circle. You'll see a circle in that hard disk. That's usually where the spinning media is. That's usually the central bearing. So go out an inch or two. Probably a couple of inches from that bearing and drill all the way through that will destroy the data on there. So that will help to protect your intellectual property. If you want to do it the best way, it is to melt that disk down and that's what we do for our clients as well. Okay. So back to if the disk is still working no matter how trustworthy you think that this business is you took the computer too, is there's always a chance. There's a bad egg amongst all of the staff members there. So delete it, remove it. Again, hopefully, you have a backup. Hopefully, that backup is tested. You can restore it afterward if your disk is encrypted and that can be true on Windows or on a Mac. There are a few different ways to do this, then. Remember that they're going to have to boot that computer. And that may mean almost certainly mean that they're going to have to, if they, to do an end to end check boot from the disk that media that's in it. What we tend to do is we booted off of a USB drive so that we don't have to have the decryption password for the hard disks. That way there's no temptation, right? None of my techs have that temptation because they can't get at the data anyways. Make sure again, boot encryptions turned on. Stick around. We'll be back. We've got a couple more things to cover here. This is all spawned by Hunter Biden and his computer that he dropped off at the repair shop. If you sign that little contract, in 90 days, the computer and everything on it is theirs. Stick around. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
The boys discuss the political news and events of the week as well as the infamous Hunter Biden Laptop on the next episode of Checks And Balances.
Welcome! Good morning, everybody. I was on WTAG this morning with Jim Polito. We got into a lengthy discussion about Hunter Biden and the legitimacy of the emails and how to tell, also about computer repair shops and then a little about Steve Scully's tweet and his lies about it. Here we go with Jim. For more tech tips, news, and updates visit - CraigPeterson.com --- Automated Machine Generated Transcript: Craig Peterson: [00:00:00] That is a dead give away and these news agencies such as Fox who have seen both emails, I'm sure dug into it because they said these emails were legitimate because we now have a second source. Hello everybody. Craig Peterson here. Thanks for joining me this morning with Mr. Polito. We did a deep dive into one topic and that is because of what's happened with Hunter Biden's computer. What are your legal rights? What can you expect? What are these guys going to do? I even reveal a company that I know that was doing something I consider very nefarious. So here we go with Jim. Jim Polito: [00:00:42] You know, we're going to call a little bit of an audible here with our good friend, Craig Peterson, the Tech Talk guru cause we got a lot of stuff we could talk about. How about cryptocurrency? The IRS tracking your location with all those things. But, we want to talk about Hunter's laptop. What it would mean for you? What's this all mean? Your data? So let's bring him on board. Our good friend, the tech talk guru. Craig Peterson. Good morning, sir. Craig Peterson: [00:01:12] Hey, good morning, Jim. Jim Polito: [00:01:13] Craig, you're the guy, you're the go-to guy for something like this. So let me just lay it out for you. So let's say it's not Hunter Biden. Let's say it's me. I bring my laptop to a repair shop. They give me a receipt that says, look, Jim, if you don't pick it up within 90 days, it's ours. Do they, can they really do that? Then do they own all of my data? It's one day you own that piece of it equipment, right? Because it's a piece of equipment, but inside that piece of equipment, there's a lot of data. Do they own that? So I guess that's where I'd like to start with. Craig Peterson: [00:01:50] Yeah. It's a very good question and many people just don't pay attention to. Apparently, Hunter signed that receipt when he dropped it off saying, yeah, you don't makeup at 90 days, it's yours. This is similar to a mechanics lien where someone comes to your home does some repairs, maybe the oil company delivers oil. They now I have the ability to, without even your knowledge, go ahead and get a lien on your property. That's valid until it's paid for. This is the case when it comes to computers as well. You leave that computer, particularly when they bring it up to you saying, Hey, listen, you have 90 days to pay after it's repaired and at that point it becomes ours. That's pretty darn common now. As far as the data goes, Jim, there are some steps you should take in advance. Also, one other thing that I have heard from someone who knew this first hand that I think people need to be aware of. That is some of these shops that you take your computers into. The one I'm thinking of is one that pretty much everybody knows it's a national chain. They have little deals going on where they'll get paid, this was the case as of a couple of years ago, if you bring the computer in and one of the technicians find something, like child pornography on that computer. It may not even know it's a child right there. It's crazy what they're doing with porn nowadays, but they get a $300 bonus for every computer where they look at the contents that are on that computer and then report it to law enforcement. There's bounties on our computers out there. Jim Polito: [00:03:44] Wow. So I do remember that so-called organization. When you bring your computer in, we won't give them any at free advertising. Not that I would support anyone that would have child pornography on their thing, but that's interesting. So I guess, uh, you, you bring your computer over there. It's you might as well as open it up. To the stranger and say, you can, you can look at whatever you want. Craig Peterson: [00:04:15] Yeah. You know, I had a case, I was a witness, an expert witness in the case out of New Jersey, and in this case, it was also a computer that was found to have kiddie porn on it, apparently. Here's the problem with this, Jim. You and I, we have our computers at home and our computers at the office as well. If you're a business like mine is we have servers. Very frequently what happens is our devices are taken over. They are controlled, remotely. There are remote controls. There's a whole name for that. That called rats, which is remote access or various types of remote access. But anyway, they have been using our computers to share child pornography, to share pictures, videos of beheadings of Americans, of burning Americans to death inside this state. I'm not even gonna get into that horrific. On our computers using our business computers, our home computers that just were not properly secured. So things are tough and there are some things you really should do before you take your computer to a repair shop for repairs. But in reality, you never really know what's on that computer unless you look at it thoroughly. Jim Polito: [00:05:41] So what do you think the chances are that this is really his? Have you been following the story? Craig Peterson: [00:05:49] Yeah, I've been following it pretty closely. Cause, of course, it does intersect with my business. Where we're trying to secure things and I think from everything I've seen, particularly now that there are corroborating emails from other people that we're in those email chains. I think it's legitimate. The way you corroborate these emails isn't just, you look at the text of the emails. But you look at the headers of the emails. Every time an email goes through a server or goes through a mail filter it is assigned a unique serial number. Jim Polito: [00:06:23] Ok. Craig Peterson: [00:06:24] So. Any emails, probably gone through three, four, five different servers have these serial numbers. They're all timestamped. And putting those together makes that a very unique identifier for that email. So if two people have emails that did go through the same servers and they will have at least gone through one server, that's the same. It will have a unique email. Oh, you don't see that. Normally if you're using outlook, you click on an email, you right-click on it and say view source, and then you can see it. But that is a dead giveaway. These news agencies such as Fox who have seen both emails. I'm sure dug into it, because they said that these emails are legitimate because we now have a second source. There may be a third source very soon now. Once you've got those types of sources and the serial numbers and the timestamps all match up. Now you've got corroboration that these are the legitimate emails Jim Polito: [00:07:29] We're talking with Craig Peterson or a tech talk guru. You know what Craig, why not? Why not just switch to something else? Not Jeffrey Toobin. I promise you, I won't bring up Jeffrey Toobin and his Zoom call. But let's bring up somebody else. Steve Scully, the reporter or the anchor for C-SPAN. He wrote a direct message to Anthony Scaramucci, the MOOCH, and he thought he was writing a direct message and he actually tweeted it and it exposed him as probably having a bias against the President. He was supposed to be the moderator for the second presidential debate. But he did the old, I don't understand why they do this. It's so stupid. I was hacked. I mean I was waiting for Tobin to say that, but he was smart enough not to. I got hacked. That's ridiculous because you could tell me in no time at all if I had been hacked and determine whether or not I was telling the truth, Craig Peterson: [00:08:31] This is an interesting problem, right? Here he is a public figure saying that his account was hacked. It looked like a legitimate message that he might send, right? It wasn't anything outlandish. It wasn't, Hey, send me $10,000 in Bitcoin and I'll send you 20,000 back. Jim Polito: [00:08:48] Right. Craig Peterson: [00:08:49] Which is very suspicious? Yeah. And when somebody likes Scully goes ahead and says, I was hacked and a police investigation gets started. That's when the ball really starts to roll. Apparently, the FBI has gotten involved in this. I'm not sure if charges will be coming. It is quite easy to figure out whether or not it's been hacked. If you have access to the account and the information. So C-SPAN suspended him after he admitted to lying. But in this case, the only place that would really know would be Twitter who has logs of the TCPIP address, the home address, if you will of Scully. Where it was posted from? Where he usually posts from? They also have information about the GPS coordinates from once it was posted. You can tell a lot of this stuff now. I mean it's such a stupid excuse to try and fall back on. Yeah Jim Polito: [00:09:55] You're going to get caught in a second. You really are. There are so many different ways to catch you for saying that. It's such stupid. As usual, Craig, I know this is outside of the realm of tech, but when you caught doing something wrong, don't cover it up because the coverup is often worse than a crime. If Scully, just comes out and said, yeah, you know, I was asking for some advice. And it was no big deal. You know, it was no big deal. It story would have ended. Craig Peterson: [00:10:26] What happened after that. Mr. Nixon. Jim Polito: [00:10:33] Very good Craig. All right, Craig Peterson, folks, you can catch him on WTAG, WHYN Sunday mornings at 11 o'clock with a great show. Then Danny, Steve, and Kevin, they all drop the show in when there are other openings on the weekend. But, Craig, how do folks get in touch with you? Craig Peterson: [00:10:53] Well, if you have any questions or you want to get on my newsletter where I cover all of these topics every week. Yeah, we are going to cover this whole Hunter Biden and what the steps are you should take when you take your computer to a repair shop, just go to Craigpeterson.com. If you sign up for my newsletter, I'm not going to beat you up on anything, right. This isn't a marketer thing. I. I really want to get the information out. So just go to Craig Peterson slash subscribe. I get questions every week that I answer. In fact, I've been putting them in my newsletter the last few weeks with the answers, obviously not exposing who you are. I'm not including those message IDs. okay. Really a lot of great information. Yeah. You can send the question to just me. M E @craigpeterson.com. Jim Polito: [00:11:41] All right, Craig, it's always great to have you onboard, especially days like today. Always a pleasure. And we look forward to talking with you again. Craig Peterson: [00:11:50] All right. Take care, Jim. Thanks. Bye. Bye. I probably won't be back to WGAN is doing a post-election thing. They've got a little election going on, so I will be back this weekend. And although this is a crazy week, so what I'm going to do is have part of the show will be fresh and new, because I got to cover these going back to the repair shop things. I also might have a couple of segments that are best of as well. This weekend. Take care, everybody. We'll talk again soon. Bye-bye. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
I got my computer back from the shop, and I'm back up and running againShout-outs to Etan RechraI made some production work for KFJC, featuring my buddy Jack Tar JOHN HOPPIN: All right, what's up? Thank you for tuning in to What's The Matter With Me? Podcast. Let me find my notes. It's good when you have notes. When you make a podcast, you want to put together some notes ahead of the time. Or not, I guess. To each his own, or her own. I think that's what qualifies as a meandering introduction. Thank you for tuning in to the What's The Matter With Me? Podcast. My name is John. I'm 41 years old. Husband, a father of two, small business owner, review, DJ, podcaster, and I have Multiple Sclerosis. So, I made this podcast to share what I'm going through. Thanks for tuning in. Past episodes can be found on Apple podcasts, at whatsthematterwithme .org and wherever you want to listen to podcasts. What's The Matter With Me? is there. I might put myself somewhere. Somewhere peaceful or by a road or in a machine shop or somewhere else even. In the middle of the ocean. I have no idea. I've been putting myself somewhere. I don't have to this time because I got my computer fixed. Thank goodness. Thank goodness. I got my computer fixed. The power button was broken. John-John, my son, got upset. He smashed on the power button. I was, "Stop playing ROBLOX. Turn that off. It's time to take a bath." And, he was like, "Aaaah." He was all grunon. Grunon is grumpy in Spanish. So, it's a vocabulary word because El Trol is muy grunon. He lives under the bridge, which is called el puente. These are all my Spanish vocab words right now for second grade. The three little pigs and los tres cerditos lopez. I'm not a native Spanish speaker although I speak Spanish as much as I can. But, my son is in dual language Spanish immersion. Anyway, I was, "Turn off that ROBLOX." And, he was, "Argh!" He was being grunon. Really grunon and he punched on the power button. And, then the thing never turned on again. The guy at the… The computer guy, I've got to give him a shout out with his name, man. I already gave him a shout out, but I'll give him another one, man. Michael Lopez was Super Tech Geek. That's his name. Super Tech Geek. Look him up, he's on Google or with the internet. My Super Tech Geek, Michael Lopez. He's in downtown San Jose. He fixes my computer and this was the second one I brought to him, man. I was concerned that he was going to die of coronavirus and have my computer and I wouldn't be able to get it back. So, I will warn you, getting computer repair right now will stress you out. You will worry for the health of the computer repair man. You're like, "I wanted to repair my computer, but I hope he's not in the computer repair shop too often. I hope he hasn't seen too many people, even though a lot of people are home and trying to get the computer working for the Zoom or whatever." Super Tech Geek fixed my stuff. It turns on, so now I'm recording on my regular microphone, my regular way. I don't actually have to use this sound bed. I don't know if I'll use one, that's some suspense. You'll see. I'll probably put a sound effect. Let me get another sound effect. I liked that last time. Here, sound effects. sound effect What's The Matter With Me? Podcast has a Facebook page. Anyhow, I've written on it, "Reply to this post and I'll give you a shout out in the next episode of What's The Matter With Me?" And, I think it was a couple episodes ago if I'm honest and so I'm a little bit of a lying slacker. Now, I'm not certain, this is not a real name because it's Nate Archer backwards, but a thing called Etan Rehcra put, "Keep up the good work." So, shout out to you, Etan. Etan, that's what we can all hope in life to be doing. Eat, sun, water. Etan Rehcra. Shout outs. All right, go ahead and get your computer fixed and check out my Facebook page, I guess. Last time I was talking about how my doctor told me,
Information Morning Moncton from CBC Radio New Brunswick (Highlights)
Dave Cote of justcalldave.ca Computer Repair shares some tips on how to keep your student's laptop lasting a long time.
Chris Brown has built his company, Slades Corner Computer Repair, step-by-step. He literally started his business in one room of his house, expanded to his built-our garage, and then eventually moved to a stand-alone storefront office. Listen in as he candidly shares his story on The Savvy Entrepreneur Radio Show. His growth has hit some bumps, and he's had to be nimble and pivot a few times. He is very open about some of the many challenges he's faced along the way and also about his successes. He also shares some of the lessons he's learned over the years. Click on the arrow to the left to listen to his story!
Topics: -Sam is recording from his beach front property -Jerry has the Richard Wingfield starter kit with his goatee. An homage to our friend and contributor to the show -Joe could not get his janky mic to work moments before recording the show -In a recent trip to the market, Sam loses one of his AirPods while taking off his mask. -While on the topic of AirPods, Jerry has a tip for easily pairing your AirPods with your Mac. An app called ToothFairy: https://c-command.com -Joe has his fancy pants AirPods Pro and shows off the features -We go around the horn to show our threads. Joe is wearing his company logo, PsiMac. Jerry is proudly wearing a Watchman Monitoring shirt. Sam is wearing an Origin84 shirt from listener and friend of the show, Michael Thompsen. -Sam is so far disappointed with the performance of his new MacBook Air. Jerry wonders if he has too many items on his desktop… -Joe recently purchased a MacBook Air, right before the release of the latest model. He has an Apple support story with a happy ending. -With regards to the fan issues on the new MacBook Air computers, Joe talks about the limited “thermal headroom”. -Jerry wants us to be guinea pigs to try an app called Turbo Boost, to disable that feature and see if ti helps: http://tbswitcher.rugarciap.com -Sam decided he did not need a MacBook Pro any longer and he is now regretting that decision -Joe asks about screen size and remote access. Jerry & Sam both use accessibility features to zoom in to areas of the remote computer. -Sam goes commando with his phone and has paid the price. Jerry wonders about changing the name of the show. -Jerry has been performing a good amount of iMac repairs and upgrades. In a recent repair job, he suffers damage to the logic board. He enlists the help of Command Control Power patron, John Moder of Crisp Solutions (http://www.crispsolutions.net). John puts him in touch with Computer Repair of Des Moines, who performed incredible work to repair the board. -Moving to topics related to the current times, Sam has a direct conversation with his employee about what his comfort level is when it comes to visiting clients. He also wants to make sure that the company supplies him with anything he needs. -Having similar conversations with clients is also critical to make sure there is no confusion. Especially when they may be paying monthly for a service they expect to receive. -As we all start adjusting to changes while being onsite, Joe watches in shock as other contractors at a client site are being very lax in their approach to safety. -Working in this new remote capacity and essentially making your clients be your onsite hands can be awkward. In addition, it can lead to even more awkward conversations about billing. -Thank you to Justin Esgar, Tim Pearson and the team at ACES!
Talk about windows 10 update and the Anroid 10 operating system and some on Xbox X and Ps5, we will do a episode just on the gaming systems. Thanks for listen. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/robert-pleasant0/message
Intro to bytes computer repair and the things we will cover in the next series. This a computer talk podcast and all episode's will be about computers and hardware and software. Also we will cover games and gaming. We will talk about the new Xbox series and PS5 coming out and other devices. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/robert-pleasant0/message
Jeff attended Temple College where he focused on Landscape Design. After college he went to work at a local resort, making his way up through the ranks until he was helping to manage their landscape department. All the while, Jeff had been moonlighting as a computer technician, helping friends and family keep their computers running. Before long, the side hustle overtook the main gig and now Jeff has a customer base of 1,000 individuals and companies who rely on him to keep their systems running right. In the last three years, Jeff has dived headfirst into a new hobby: Paramotoring. This incredible sport combines a backpack motor and a "glider" to allow Jeff and other hobbyists to fly above the Earth's surface with relatively little investment and no licensing requirements. But there's a lot more to it than just strapping on a pack and leaping into the air. Jeff brings in breakfast from his favorite local bakery and Adam breaks his "no sweets" rule because the croissants just looked so dang good.
The Podcast for Business Network Support: Tom Bull with Two River Computing. “Best of the Best” in Monmouth County for Computer Repair…for the 4th year in a row! This episodes goes way off track as we discuss customers that should understand that they are paying for the years of experience and millionaires don’t get discounts. […]
Ran a virus but fixed it --- Send in a voice message: https://anchor.fm/mcl771/message
--- Send in a voice message: https://anchor.fm/robert-pleasant0/message
Learn How To Run Your Computer Repair Business Hosted by: Jeff Halash from TechNut Computer Repair John Dubinsky from Maven Group Computer Repair Podcast #334 Video Sign up for 2020 event details: TechCon Unplugged Email: info@TechConUnplugged.com You Can Support This Show Go To Patreon.com/ComputerRepairPodcast Topics: TechCon Unplugged 2019: What Happened at the event. God Bless […]
Learn How To Run Your Computer Repair Business Hosted by: Jeff Halash from TechNut Computer Repair Adam Carpenter from IT Professionals of Iowa Computer Repair Podcast #333 Video Live Show and Chat every Sunday at 4pm EST You Can ask a question By: Emailing: Podnutz@Podnutz.com You Can Support This Show Go To Patreon.com/ComputerRepairPodcast Topics: What […]
Learn How To Run Your Computer Repair Business Hosted by: Jeff Halash from TechNut Computer Repair Adam Carpenter from IT Professionals of Iowa Computer Repair Podcast #332 Video Live Show and Chat every Sunday at 4pm EST You Can ask a question By: Emailing: Podnutz@Podnutz.com You Can Support This Show Go To Patreon.com/ComputerRepairPodcast Topics: What […]
Learn How To Run Your Computer Repair Business Hosted by: Jeff Halash from TechNut Computer Repair John Dubinsky from Maven Group Computer Repair Podcast #331 Video Live Show and Chat every Sunday at 4pm EST You Can ask a question By: Emailing: Podnutz@Podnutz.com You Can Support This Show Go To Patreon.com/ComputerRepairPodcast Topics: What is recovery […]
Learn How To Run Your Computer Repair Business Hosted by: Jeff Halash from TechNut Computer Repair Brad Torrey from TTCS Computer Services Computer Repair Podcast #330 Video Live Show and Chat every Sunday at 4pm EST You Can ask a question By: Emailing: Podnutz@Podnutz.com You Can Support This Show Go To Patreon.com/ComputerRepairPodcast Topics: How and […]
This week Steve and Dave discuss the "as seen on TV" computer repair options and providing options to the everyday user. Also, we acknowledge the power of Amazon through the holiday season.
DAN HARLEY has decades of experience in computer programming, web design, Internet marketing, business management and professional sales. Dan owned and operated his first business while still in high school. As vice president of his family's computer manufacturing company, Dan was instrumental in developing cutting edge technology, generate millions of dollars in sales revenue and integrate the internet into the business during the very early stages of the Internet's public existence. Tonight is OPEN CALLER NIGHT! Do you have technology or internet related problems? Call in tonight and get some answers! http://constantcontact.danharleyjr.com http://caribbeanradioshow.comhttp://CreateASite4Free.comhttp://iwowwe.com/caribbeanradioshowhttp://zgreetingcards.comcaribbeanradioshow@gmail.com