0800 FIX NOW 
(0800 349 669) 
160b Selwyn St, Christchurch

0800 FIX NOW 
(0800 349 669) 
160b Selwyn St, Christchurch

Apple Macs - Why I Don't Like Encryption

Apple Macs - Why I Don't Like Encryption

Mac Encryption

Is Mac FileVault Disk Encryption Good or Bad?

The other day I was working on a MacBook which was not turning on. It's motherboard had failed, and the client wanted the data retrieved from their Apple laptop. The problem was that they had FileVault disk encryption on...and they had lost the password.

File Vault Apple mac

Read more …

How’s Your RAM?

How’s Your RAM?

Your computer’s RAM determines how many things it can think about at the same time. If it's too little, the computer starts using a much slower method to fulfil its memory needs. You’ll notice if it has too little RAM if it gets rather slow when you have a few things open at the same time. So...how's your RAM?

computer ram upgrade

Read more …

$ 10,000 Macbook Repair

Apple's "geniuses" spent two weeks and an estimated $10,000 in warranty costs fixing a MacBook Pro screen fault that was resolved with three button presses.
According to photographer Greg Benz who told the whole sorry computer tale on his website.

MacBook Pro problem

Read more …

Nostalgia - Computer Help 2002

Nostalgia - Computer Help in 2002

Below is our very first newsletter. Boy how times have changed, technology has improved and we've grown.
Look out for mentions of Windows 98 and CD-ROMs! It even has our old number before we changed.
Not to mention the addition of Steve, who has been with the company for 19 years now!
I hope you enjoy the read.

first computer newsletter

Read more …

Overheating Laptops

Overheating Laptops

The Sizzling Reality of Causes, Consequences, and Solutions

Introduction

In our fast-paced digital age, laptops have become an indispensable tool for work, entertainment, and communication. However, as laptops continue to evolve in terms of power and performance, one persistent issue haunts users worldwide: overheating. As laptops get smaller and smaller, the laws of physics do not change and heat must be dissipated through smaller and smaller heat sinks. This silent menace not only threatens the longevity of your device but also poses potential health hazards and productivity setbacks. In this comprehensive blog, we will delve deep into the world of overheating laptops, exploring the causes, consequences, and effective solutions to keep your device running cool and efficient.

Read more below...

laptoptop chch overheating

Read more …

How to Handle Suspicious Emails

How to Handle Suspicious Emails

Recognizing and Defending Against Scams and Phishing

In today's digital age, email has become an integral part of our lives, facilitating communication, collaboration, and information sharing. However, this convenience comes with risks, as cybercriminals constantly devise new ways to exploit email for malicious purposes. One of the most common and concerning threats is email scams and phishing attacks.

In this fairly comprehensive guide, we will delve deep into the world of suspicious emails, offering you insights, tips, and strategies on how to recognize and defend against scams and phishing attempts on you and your computer. By the end of this article, you will be well-equipped to safeguard your personal information, finances, and online computer security.

email security computer

Read more …

Asus Laptops - Zenbook vs Expertbook

Asus Laptops

ASUS, a well-regarded manufacturer of computers, is renowned for its extensive and diverse selection of computing solutions. The range of ASUS laptops encompasses a variety of options, each with its own unique qualities. These options include the ProArt, Zephyrus, Vivobook series, and more, offering a wide array of features, styles, and purposes. Among these choices, the ASUS Zenbook and ExpertBook series emerge as strong contenders suitable for personal, home, office and professional use. Choosing between them can be a complex decision. Read on to explore the significant differences and determine which aligns best with your specific computing needs.

asus laptop computer

 

Read more …

Hackers Listen to Your Passwords!

Hackers Listen to Your Passwords!

A group of researchers hailing from British universities has undertaken a pioneering project in the realm of cybersecurity: a way hackers can LISTEN to your passwords. This involves the development of a sophisticated deep learning model with the capability to extract sound data from keyboard keystrokes recorded utilizing a microphone, achieving an astonishing accuracy rate of 95%. The significance of this achievement stems from its potential to compromise computer data security on an unprecedented scale.

hackers listen computer passwords

Read more …

Computer Phishing?

What is phishing?

Phishing is a cunning cybercrime tactic where malicious actors try to deceive individuals into divulging sensitive information under false pretences. Imagine the classic movie "Home Alone," where a crafty 'police officer' paid a visit to the McCallister family. Despite being a burglar, his convincing impersonation of a real law enforcement officer led the unsuspecting family to willingly share details about their whereabouts and travel plans. Similarly, cybercriminals, commonly referred to as 'phishers,' employ various online channels like email, messenger platforms, or phone calls to dupe unsuspecting victims into sharing their confidential data.

computer phishing security

Read more …