Crowned Computer Services Logo
FOLLOW US
CALL US
(469) 454-8628
  • Home
  • About
  • Services
  • Blog
  • Contact

What is Malware?

July 1, 2024 by S. Singleton

Malware is malicious software that is designed to intentionally attack and harm a computer system. There are several types of malware that each have different goals. Here are some that you may be familiar with.

  • Potentially Unwanted Programs (PuP)

A PuP is sneaky. It actually obtains your permission to download but it is loaded with stuff you may not have even agreed to. Have you ever thought you were downloading software but had 20 toolbars in your browser by the time everything was done installing? That’s a PuP. It can be loaded with adware, spyware and other things you just did not want.

  • Trojan horse

You may have thought you were downloading a free version of the popular video editing software, but it was really a trojan horse. Once you install the program and run it, malware is being installed in the background and getting ready to wreak havoc. Its goal could be to collect personal information, usernames and passwords, etc.

  • Ransomware

With ransomware, your computer’s boot drive is encrypted thus locking you out of your system until you pay the attacker’s ransom. It is very important to never click links in emails without verifying they are legitimate nor download software from unknown sources.

Keep your antimalware/antivirus programs updated and scan regularly to remove existing threats from your machine.

Filed Under: Uncategorized

Share:

Tech Support Scam

June 1, 2024 by S. Singleton

The last person you would ever expect to be a scammer is tech support right? Yes, and that’s exactly what a scammer is counting on. Be on the lookout for a tech support scam. A tech support scam can start with a pop-up message on your computer when you visit certain websites.

This pop up appears on your screen with a message stating:

“Your computer has been infected! Call tech support at 555-555-5555 to have this issue resolved.”

Once you call the number and reach a “tech support agent”, they will ask for remote access to your computer. If you give the scammer access to your computer malware can be installed and your information could be stolen.

Scammers may also be placing calls to unsuspecting people and pretending to be from trusted tech support companies. Their objective could be to get money from you to “fix the issue”. They may also use a sense of urgency to make you act quickly and without thinking.

Be sure to scan your computer frequently for malware and use a trusted browser guard if possible. Stay vigilant.

Filed Under: Uncategorized

Share:

Subscription based software vs. one-time fee

May 1, 2024 by S. Singleton

Subscription based software is becoming increasingly popular among many big-name vendors. However, many customers are not onboard with the new pricing model. We often get calls from clients wondering why they are unable to purchase certain programs via a one-time fee like they used to. The idea of paying monthly or yearly just doesn’t sit well with them.

I can admit, I was slightly extremely annoyed with my most used program going to a subscription model. If you’re like me, here are a couple of positives that may help get on board.

  • No more obsolete software
    • If you’re using the 2024 version and the company releases a brand new version in the next month, you’ll have access right away.
  • A la carte
    • Oftentimes you’ll be able to purchase the components you need and possibly pay less.
  • Extras
    • Vendors could throw in extra features or incentives that are only available when you purchase a subscription. For example, Microsoft offers 1TB of storage space with their subscription plans.

I was sold at the no more obsolete software, but we know it could take a little longer to get onboard. Hopefully you can find a happy medium.

Filed Under: Uncategorized

Share:

Password Security

April 1, 2024 by S. Singleton

A password is the first defense in securing devices such as phones, tablets, and computers as well as your online accounts. While we want the password to be easy for us to remember, we don’t make it too easy for everyone else to guess.

Commonly used insecure passwords are:

  • 123456
  • password
  • 1234567
  • 123456789
  • pa$$w0rd
  • dragon
  • football
  • basketball
  • qwerty

It is recommended that a password be 12 characters or more and include a mix of lower and uppercase letters, numbers, and symbols. The longer and more complex the password, the harder it is to crack.

Use a different password for every online account. This ensures that if one password is compromised, the hacker won’t be able to gain access to your other online accounts. Use a reputable password keeper to keep track of them all.

Lastly, change your passwords regularly. Most sites force password changes after 30 to 60 days. If not, play it safe and change it yourself.

Filed Under: Uncategorized

Share:

Artificial intelligence (AI)

March 3, 2024 by S. Singleton

Artificial intelligence focuses on using computer systems for problem solving and decision making that would usually be done by humans. These machines mimic human-like capabilities such as reasoning, learning, perception, and interaction.

AI is everywhere. Have you ever asked Siri or Alexa for help? These virtual assistants are a form of AI. What else uses AI?

  • Autonomous cars (those that can sense its environment and operate without human interaction)
  • Search engines
  • Online shopping and advertising
  • Internet of things (Check our blog about iOT devices)
  • Maps
  • Auto complete
  • Spell check
  • Filtering of spam in your email

We have been using AI daily in some form or another and can definitely expect growth as the years go by. What’s your favorite use of AI?

Filed Under: Uncategorized

Share:

Post holiday security check

February 1, 2024 by S. Singleton

The holidays are over. The tree and all the gifts are put away. There will be no more shopping for a while, we hope. Now is the perfect time for a post-holiday security check.

Check all accounts and statements for any unknown purchases. With the amount of shopping that has been done over the last few months it would be easy for an unauthorized purchase to go unnoticed. If you find any unknown charges dispute them with your bank immediately.

Update your accounts with strong passwords and enable two factor authentication. Two factor authentication will require a username & password along with a one-time passcode. These will help keep your accounts safe.

Remember to keep an eye out for unusual activities. Stay safe friends!

Filed Under: Uncategorized

Share:

It’s 2024!

January 1, 2024 by S. Singleton

Happy New Year! We are so very excited about 2024 and everything it has to offer. Please be sure to follow us on Facebook and Instagram to keep up with everything Crowned Computer Services.

There are always helpful tips, industry news and laughs. Through our social media pages, you can also book a service or send us a message. Connect and stay engaged.

As always, call us if you need us. We look forward to working with you this year!

Filed Under: Uncategorized

Share:

Goodbye 2023!

December 1, 2023 by S. Singleton

It’s time to say goodbye to another year. I sincerely hope that you were able to crush every goal you set. If not, roll it on over to next year and keep pushing!

Here at Crowned Computer Services, we once again extend our utmost thanks for your support. We look forward to partnering with you in 2024!

As a gift to us, please take all the knowledge and tips you’ve received in these blogs and pass it on.

We wish you a very Merry Christmas and Happy New Year!

Filed Under: Uncategorized

Share:

Thankful!

November 1, 2023 by S. Singleton

It’s November and National Gratitude Month! We are truly grateful for your support and so glad that you trust us to help keep your computer running smoothly.

We are also thankful for advances made in technology. A certain little someone added a cell phone to the Christmas wish list, then turned to me and asked, “When did you get your first cell phone?”. I laughed and said I didn’t even get my first cell phone until I started college around 18 years old. Of course, I had to mention how we didn’t keep our phones in our hands every minute of the day because they didn’t do anything special. We made phone calls. Texting didn’t even become popular until much later. That little face looked so shocked, HA! So yes, definitely thankful!

As you reflect and express your gratitude this month, do something kind for others. Volunteer your time to serve a nice hot meal or teach someone something new on their phone or computer. Enjoy time with family, friends, and co-workers.

Happy National Gratitude Month! Happy Thanksgiving!

Filed Under: Uncategorized

Share:

Shop safe!

October 1, 2023 by S. Singleton

The holidays are around the corner. Have you started shopping yet? Whether you have or haven’t yet decided to dive in, this post is for you.

Have you ever received the Christmas wish list from the kids and significant other and wondered, “Now where in the world am I supposed to find this?” I have, and I went right to my favorite search engine to look it up. A list of all the places that sold items x, y, and z were laid out right in front of me. I just need to pick one and shop away, right? Absolutely not!

Exercise extreme caution when shopping on any website. Here are a few things to look for:

  • Is it secure? There should be a padlock to the left of the website address, or the address should start with https://. Do not enter credit card information on a site missing these features.
  • Is the website legit? Check the site name. https://crownedcomputerservices.tech is a legitimate site. https://crownedcomputerservices.newsite2.tech should be questioned before entering any information.
  • Anyone can create a website for a company. Use your favorite search engine to look for reviews that would verify authenticity. If you decide to purchase and receive your product, leave a review to help others.

Happy shopping!

Filed Under: Uncategorized

Share:

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • …
  • 7
  • Next Page »

Copyright © 2025 · Crowned Computer Services · Powered by Tech Site Builder