Services:

  • Computer Repair
  • Virus and Malware Removal
  • Speed Up Your PC or Phone
  • Hardware and Software Installation / Upgrades
  • Custom and Gaming PC Builds
  • Data Recovery

Home Electronics:

  • TV Mounting and Setup
  • Kodi
  • Security Camera Installation and Repair
  • Home Theater Setup
  • Smart Home and Smart Devices

Mobile Devices:

  • Screen Repair (Phones, Tablets & Laptops)
  • iPhone
  • Android

Operating Systems:

  • Windows
  • macOS
  • Linux
  • iOS
  • Android

Network and Connectivity:

  • Wifi Setup
  • VPN Setup
  • Networking
  • IoT

Miscellaneous:

  • Cybersecurity
  • Printer Setup
  • Ring, Nest, Alexa Support
  • One-on-One Tutoring and Lessons
  • Anything Tech Related!

 

CrowdStrike Bug Microsoft Outages: How To Fix The Blue Screen Of Death On Windows PCs

If you found your Windows PC showing a Blue Screen of Death this Friday morning (07/19/2024), you're in good company. An issue with a recent update from antivirus provider CrowdStrike has incapacitated millions of Windows machines.

There is a solution, though it involves a few steps. CrowdStrike traced the issue to a problematic update sent to Windows systems, including servers. Thankfully, the fix is straightforward: deleting a specific file within the CrowdStrike software will resolve the problem. 

How To Fix It:

The main challenge is that affected Windows PCs are automatically booting into the error state, preventing any file changes. However, there is a workaround. According to a support document from CrowdStrike, affected users should boot their Windows PC into Safe Mode—a Microsoft feature designed for troubleshooting.

To enter Safe Mode from the Blue Screen of Death, click the "Advanced repair options" button if you are already in the Recovery Environment. Alternatively, restart your PC and hold the F8 key before the system reaches the Windows screen. If that doesn't work, restart the PC up to five times and Windows will eventually boot into the Recovery Environment - a blue screen that allows you to troubleshoot. From there, navigate to "Advanced options" and select the option to boot into Safe Mode.

CrowdStrike advises selecting the "Safe Mode with Networking" option. This will allow your PC to restart without triggering the Blue Screen of Death, as Windows will use only a limited set of files, preventing the faulty CrowdStrike bug from running.

Next, open File Explorer and navigate to the C:\Windows\System32\drivers\CrowdStrike directory. Locate and delete the file named C-00000291*.sys. Afterward, restart your computer, and the issue should be resolved for good.

10 Websites You'll Wish You Knew About in 2024

 

The internet is a vast and ever-expanding ocean of information and resources. But with so much out there, it can be tough to know where to start. That's why I've compiled a list of 10 incredibly useful websites that you'll definitely want to add to your bookmarks in 2024. These sites cover a wide range of categories, from productivity and learning to creativity and entertainment, so there's something for everyone.

1. Upstract: Think of Upstract as your ultimate news aggregator on steroids. It curates headlines and links from the most popular websites across various categories, including news, tech, science, and entertainment, and presents them on a single, scrollable page. This means you can stay up-to-date on all the latest happenings without having to jump from website to website. 

2. Prompt Hero: Unleash your inner artist with Prompt Hero, a treasure trove of AI art prompts. Explore their extensive library and discover thousands of stunning images created by AI models like DALL-E. Whether you're looking for inspiration for your next creative project or simply want to marvel at the possibilities of AI art, Prompt Hero is a must-visit. 

4. Craiyon: Ever wanted to turn your wildest dreams into images? Craiyon makes it possible! This free website uses AI to generate images based on your text prompts. Simply type in what you're envisioning, and Craiyon will do its best to bring it to life. Be prepared for some hilarious and unexpected results!

5. Talk to Books (by Google): Dive into the wisdom of thousands of books with Talk to Books. This fascinating website lets you ask any question to its collection of over 100,000 books and receive relevant quotes in response. It's like having a conversation with a giant library, and it's a great way to discover new insights and perspectives. 

6. WeTransfer: Sharing large files can be a real headache, but WeTransfer makes it easy. This free service lets you upload files up to 2GB and send them to anyone, even if they don't have an account. No more struggling with email attachments or complicated file-sharing services! 

7. WolframAlpha: Need to solve a complex equation, find scientific data, or just learn something new? WolframAlpha is your one-stop shop for all things knowledge. This computational knowledge engine can answer your questions in a comprehensive and informative way, making it a valuable resource for students, researchers, and anyone curious about the world.

8. Memrise: Learning a new language can be daunting, but Memrise makes it fun and engaging. This gamified language learning app uses flashcards, quizzes, and games to help you memorize vocabulary and grammar. With Memrise, you'll be surprised at how quickly you pick up a new language.

9. Oyster: Discover a world of audiobooks with Oyster. This subscription service gives you unlimited access to a vast library of audiobooks for one monthly fee. Whether you're commuting, working out, or relaxing at home, Oyster is a great way to immerse yourself in your favorite stories.

10. PCPartPicker: Building your own computer can be a challenging but rewarding experience. PCPartPicker takes the guesswork out of the process by helping you choose compatible components and build your dream PC. This website also has a vibrant community of builders who can offer advice and support. 

These are just a few of the many amazing websites out there waiting to be discovered. So go forth, explore, and find the hidden gems that make your life in 2024 a little bit easier, more productive, and more fun!

Transforming an Old Chromebook into a Headless Debian OpenVPN Server

Hello, tech enthusiasts! Today, I'm excited to share a fascinating tech journey: repurposing an old Chromebook with limited specs into a robust headless Debian OpenVPN server. But first, let's demystify some tech jargon.

Understanding Headless Servers

A headless server operates without a monitor, keyboard, or mouse. It functions remotely, managed entirely through a network connection. It's like the invisible magician behind the scenes, doing its job without a visible interface.

Delving into VPN and Networks

A Local Area Network (LAN) is your home's digital space, where devices like computers, printers, and smartphones connect within a confined area. On the other hand, a Wide Area Network (WAN) spans larger distances, linking multiple LANs and forming the vast internet we know.

The Benefits of Hosting Your Own VPN Server

Why bother turning an old Chromebook into a VPN server? Well, the advantages are numerous:

Enhanced Security: Protect your data from potential threats, especially when using public Wi-Fi networks. A VPN creates a secure, encrypted tunnel for your online activities.

Remote Access to Your LAN: Need to access files or devices on your home network while away? Your personal VPN provides a secure connection to do just that.

Bypassing Restrictions: Say goodbye to frustrating content restrictions based on your location. With your VPN, you can access content as if you were at home, regardless of your physical location.

Privacy and Control: When you manage your VPN server, you're in charge. No logging, no third-party interference—just your rules and control.

Why This Idea Is Brilliant

Repurposing an old Chromebook into a headless Debian OpenVPN server offers several advantages:

Cost-Effective Solution: Utilize existing hardware instead of investing in pricey equipment.

Environmentally Friendly: Rather than discarding old tech, repurpose it for a new use.

Opportunity for Learning: Explore and experiment with tech without breaking the bank. It's an educational adventure in itself!

* See my blog article How To Set Up Your Own VPN Service FOR FREE with OpenVPN and Docker for an easy, step-by-step guide. 

In conclusion, transforming an aging Chromebook into a powerful headless Debian OpenVPN server is a practical, budget-friendly, and educational endeavor. So, dust off that old device, and let's embark on this tech journey together! 

RHEL Drops Xorg in Favor of Wayland: A Step Towards a Modern and Secure Linux Desktop

 

Red Hat Enterprise Linux (RHEL) has made a significant shift in its display server technology, dropping the long-standing Xorg in favor of Wayland. This decision marks a pivotal moment in the Linux desktop landscape, signaling the adoption of a more modern, secure, and performant display server for the enterprise.

The Rationale Behind the Shift

The transition from Xorg to Wayland is driven by several key factors:

Modernity and Security: Wayland is a more modern display server with a cleaner architecture, addressing longstanding security concerns in Xorg.

Performance Enhancements: Wayland boasts improved performance, particularly for graphics-intensive applications, making it more responsive and efficient.

Touchscreen Support: Wayland's native touchscreen support is crucial for the growing prevalence of touchscreen devices, including laptops, tablets, and smartphones.

Benefits of Wayland over Xorg

The adoption of Wayland brings forth several advantages over Xorg:

Modular Architecture: Wayland's modular design allows for easier customization and extension, facilitating the development of new features and integrations.

Improved Performance: Wayland's optimized architecture and reduced overhead contribute to enhanced performance, especially for demanding workloads.

Touchscreen Compatibility: Wayland's built-in touchscreen support ensures smooth and responsive interactions with touchscreen devices.

Enhanced Security: Wayland's modern security model provides a more robust foundation against vulnerabilities and exploits.

Navigating the Transition

While the shift from Xorg to Wayland marks a significant change, Red Hat has taken steps to ensure a smooth transition for its users:

Xwayland Compatibility: Xwayland, an compatibility layer, enables X11 applications to run seamlessly within Wayland, minimizing disruptions for users.

Community Support: A growing community of developers and enthusiasts supports Wayland, providing resources and assistance for users and developers alike.

RHEL's Commitment: Red Hat is committed to Wayland's development and adoption, ensuring that RHEL users benefit from the latest advancements in display server technology.

Embracing the Future of Linux Display Servers

The transition from Xorg to Wayland represents a crucial step towards a more modern, secure, and performant Linux desktop environment. While the transition may require some adjustments, the long-term benefits of Wayland are undeniable. With Red Hat's commitment to Wayland and the growing community support, the future of Linux display servers looks bright and promising.

25 Most Useful Ubuntu Server Commands

 

Ubuntu Server is a popular Linux distribution that is used by businesses and individuals alike. It is a powerful and versatile operating system that can be used for a variety of tasks, from hosting websites to running databases.

One of the strengths of Ubuntu Server is its command-line interface (CLI). The CLI is a powerful tool that can be used to perform a wide range of tasks, from basic file management to complex system administration.

In this blog post, we will discuss the top 25 most useful Ubuntu Server commands. These commands will cover a variety of tasks, so you should be able to find what you need, regardless of your experience level.

The 25 Most Useful Ubuntu Server Commands

  1. ls: List the contents of a directory.

    • Example: ls
  2. cd: Change the current directory.

    • Example: cd /etc
  3. mkdir: Create a new directory.

    • Example: mkdir my_directory
  4. touch: Create an empty file.

    • Example: touch my_file
  5. cp: Copy a file or directory.

    • Example: cp my_file /tmp
  6. mv: Move or rename a file or directory.

    • Example: mv my_file /home/user
  7. rm: Remove a file or directory.

    • Example: rm my_file
  8. nano: Edit a text file.

    • Example: nano my_file
  9. cat: Read the contents of a file.

    • Example: cat my_file
  10. grep: Search for a text pattern in a file.

    • Example: grep "hello" my_file
  11. chmod: Change the permissions of a file or directory.

    • Example: chmod 400 my_file
  12. chown: Change the ownership of a file or directory.

    • Example: chown user my_file
  13. tar: Create or extract a tar archive file.

    • Example: tar -cf my_archive.tar my_directory
  14. zip: Create a zip file.

    • Example: zip my_archive.zip my_directory
  15. unzip: Extract a zip file.

    • Example: unzip my_archive.zip
  16. ssh: Connect to a remote server.

    • Example: ssh user@server
  17. sudo: Run a command with root privileges.

    • Example: sudo apt install my_package
  18. apt: Install or remove packages from the Ubuntu repositories.

    • Example: apt install my_package
  19. apt-cache: Search for packages in the Ubuntu repositories.

    • Example: apt-cache search my_package
  20. dpkg: Manage packages that are installed on the system.

    • Example: dpkg -l
  21. ps: List all running processes.

    • Example: ps
  22. top: Monitor the system resources.

    • Example: top
  23. kill: Kill a running process.

    • Example: kill 1234
  24. df: Display the disk space usage.

    • Example: df
  25. du: Display the file space usage.

    • Example: du -h /

YouTube's Experiment with Ad Blockers: Urging Viewers to Choose Ads or Premium

 
YouTube is implementing a significant change to video playback for users who utilize ad blockers. In a statement to The Verge, the company confirmed that it is conducting a global experiment that urges viewers with ad blockers enabled to either permit ads on YouTube or consider subscribing to YouTube Premium.

This development follows the emergence of a new prompt that warns users about potential disruptions in video playback if YouTube detects repeated usage of ad blocking tools. Android Authority previously reported on these tests, which restrict viewers from watching more than three videos when an ad blocker is active.

According to Oluwa Falodun, a Google spokesperson, ad blocker detection is not a new practice, as other publishers frequently request viewers to disable ad blockers. YouTube emphasizes that it will issue multiple notifications encouraging users to discontinue the use of such tools or, alternatively, subscribe to YouTube Premium, before any interruptions to their viewing experience occur.

“We take disabling playback very seriously and will only do so if viewers disregard repeated requests to allow ads on YouTube," Falodun stated in an email to The Verge. "If viewers believe they have been incorrectly identified as using an ad blocker, they can provide feedback by clicking on the link in the prompt."

These measures indicate that YouTube is adopting a stricter stance against ad blockers, citing the importance of ad revenue for compensating creators and maintaining a free platform. "YouTube’s ad-supported model supports a diverse ecosystem of creators and provides billions of people worldwide with access to free content through ads," the company's statement explained.

Over the years, YouTube has tested users' patience by experimenting with heavier ad loads. In one of its previous experiments, the company served up to ten unskippable clips within a single ad break. Additionally, in May, YouTube announced the introduction of 30-second ads on TV platforms.

YouTube Premium, priced at $11.99 per month or $119.99 annually, offers an ad-free experience along with other benefits like offline downloads and YouTube Music Premium. Last November, the company announced that it had surpassed 80 million combined subscribers across YouTube Premium and YouTube Music. Thus, while protecting creators' earnings serves as a commendable rationale, YouTube also has a vested interest in steering more users towards its recurring monthly subscription.

"We aim to inform viewers that ad blockers violate YouTube's Terms of Service and make it easier for them to enable ads on YouTube or try YouTube Premium for an ad-free experience," the company stated in its email to The Verge.

Intel Advances Quantum Computing with New Test Chip

 
Intel has announced a new quantum test chip that marks a significant milestone in the company's efforts to build a commercial quantum computer. The new chip, called Tunnel Falls, has 12 qubits, which are the basic units of quantum information. This is the most qubits ever integrated on a single chip by Intel, and it represents a major step forward in the company's efforts to scale up its quantum computing capabilities.

The Tunnel Falls chip is based on Intel's silicon spin qubit technology, which uses the spin of electrons to store quantum information. This technology is well-suited for large-scale quantum computers because it is relatively easy to manufacture and it can be integrated with existing semiconductor manufacturing processes.

In addition to the 12 qubits, the Tunnel Falls chip also includes a number of other features that are important for building a commercial quantum computer. These features include a cryogenic control chip that helps to keep the qubits at a very low temperature, and a readout circuit that allows the qubits to be measured.

Intel is making the Tunnel Falls chip available to the quantum research community, which will help to accelerate the development of quantum computing applications. The company is also working on developing a full-stack quantum computing system, which would include the quantum chip, a classical computer to control the chip, and software to run quantum algorithms.

Intel's progress in quantum computing is significant, and it is one of several companies that are working to develop a commercial quantum computer. If successful, quantum computers could revolutionize a wide range of industries, including finance, healthcare, and materials science.

Here are some of the potential applications of quantum computers:

  • Finance: Quantum computers could be used to develop new financial products and services, and to improve the efficiency of existing financial markets.
  • Healthcare: Quantum computers could be used to develop new drugs and treatments, and to improve the accuracy of medical diagnostics.
  • Materials science: Quantum computers could be used to design new materials with improved properties, such as strength, conductivity, and lightness.
The development of quantum computers is still in its early stages, but the potential benefits are enormous. Intel's latest test chip is a significant step forward, and it shows that the company is committed to making quantum computing a reality.

Enhancing Network Security: Dedicated Firewall vs. Built-in Computer Firewall

 


Network security is a critical aspect of protecting your data and ensuring the integrity of your network. While using the built-in firewall on your computer is a step in the right direction, it may not provide the level of protection and control needed for a comprehensive network security strategy. In this blog post, we will explore the advantages of using a dedicated firewall device, such as pfSense, over relying solely on the built-in firewall on your computer.

Network-wide Protection:
A dedicated firewall device operates at the network level, safeguarding all devices within the network. By implementing a dedicated firewall, such as pfSense, you gain centralized control and monitoring capabilities, enabling consistent security policies across your entire network. On the other hand, the built-in firewall on a computer protects only that specific device, leaving other devices vulnerable.

Advanced Features and Customization:
Dedicated firewall devices offer a wide range of advanced features and customization options beyond what a built-in firewall provides. For example, pfSense supports intrusion detection/prevention systems (IDS/IPS), VPN capabilities, content filtering, and more. These features allow for granular control over network traffic, empowering you to tailor security measures to meet your specific requirements.

Segmentation and Network Isolation:
One of the key advantages of a dedicated firewall device is the ability to create network segments or VLANs (Virtual Local Area Networks), which facilitate network isolation. By separating different parts of your network, you can enhance security by restricting access between segments and contain potential threats or compromises. Built-in firewalls lack this segmentation capability.

Performance and Scalability:
Dedicated firewall devices are designed to handle heavy network traffic efficiently. Unlike built-in firewalls, which may have performance limitations, devices like pfSense are equipped with robust hardware optimized for processing network traffic at higher data throughput. They also offer scalability options to accommodate growing networks and increased traffic demands.

Centralized Management and Logging:
Dedicated firewall devices provide centralized management interfaces and logging capabilities, simplifying administration and improving visibility into network traffic and security events. With pfSense, for instance, you can configure and monitor firewall settings across your entire network from a single interface, ensuring consistent security policies and easing management efforts.

Conclusion:
While utilizing the built-in firewall on your computer provides a basic level of protection, a dedicated firewall device like pfSense offers significant advantages for network security. With features such as network-wide protection, advanced customization options, network segmentation, improved performance, scalability, and centralized management and logging, dedicated firewalls ensure comprehensive network security and enhanced control over network traffic.

To truly fortify your network and protect your valuable data, investing in a dedicated firewall device like pfSense is a wise choice. By implementing such a solution, you can proactively safeguard your network against threats, enforce security policies consistently, and gain peace of mind knowing that your network is fortified against potential vulnerabilities.

Remember, network security is a complex topic, and it's always recommended to consult with professionals or network security experts to ensure you have the most appropriate and effective security measures in place.

Understanding RAID Configurations: Enhancing Data Storage and Performance

 
Efficient data storage and reliable access are essential for businesses and individuals alike. RAID (Redundant Array of Independent Disks) configurations provide a solution by combining multiple physical hard drives into a logical unit with various levels of data redundancy, performance, or both. In this post, we will explore the most commonly used RAID configurations, their benefits, and how they can improve your data storage infrastructure.

RAID 0 (Striping): RAID 0, known as striping, is a configuration that focuses on performance and storage capacity. It distributes data across multiple drives, allowing for parallel read and write operations. While RAID 0 enhances performance by leveraging multiple drives, it lacks redundancy. A single drive failure can result in data loss, making it crucial to maintain regular backups.

RAID 1 (Mirroring): RAID 1, or mirroring, prioritizes data redundancy and fault tolerance. It duplicates data across two or more drives, ensuring that if one drive fails, the mirrored drive(s) can seamlessly take over. RAID 1 provides enhanced data integrity and improved read performance, but at the cost of reduced storage capacity due to data duplication.

RAID 5 (Striping with Parity): RAID 5 combines striping and distributed parity to achieve a balance between performance, capacity, and fault tolerance. It stripes data and calculates parity information, distributing it across multiple drives. RAID 5 can tolerate the failure of a single drive without data loss, as the parity information enables reconstruction of the missing data.

RAID 6 (Striping with Double Parity): Similar to RAID 5, RAID 6 also utilizes striping and parity, but with double parity for higher fault tolerance. It can withstand the failure of two drives simultaneously without data loss. While RAID 6 offers superior data protection, it has reduced write performance due to the overhead of calculating double parity.

RAID 10 (RAID 1+0): RAID 10 combines mirroring (RAID 1) and striping (RAID 0) to provide both performance and fault tolerance. Data is striped across mirrored pairs of drives, offering improved read and write performance, along with the ability to tolerate multiple drive failures depending on the configuration.

RAID 50 (RAID 5+0): RAID 50 combines striping and distributed parity, similar to RAID 5, but across multiple RAID 5 arrays. By striping data across multiple RAID 5 sets, RAID 50 enhances performance and fault tolerance, making it suitable for applications that demand both high performance and data protection.

RAID 60 (RAID 6+0): RAID 60 combines striping with double parity, similar to RAID 6, but across multiple RAID 6 arrays. It offers increased performance and higher fault tolerance compared to RAID 50, making it an ideal choice for systems that require robust data protection and optimal performance.

Understanding RAID configurations is vital for optimizing data storage and ensuring reliable access to critical information. By leveraging RAID, organizations and individuals can achieve a balance between performance, storage capacity, and data redundancy. Whether you prioritize speed, fault tolerance, or a combination of both, there is a RAID configuration that suits your specific needs. As you design your data storage infrastructure, consider the advantages and trade-offs offered by each RAID configuration to maximize the reliability and efficiency of your system.