As technicians, we often have a wide range of tasks, from estimates, invoices, and contracts, in addition to the actual tech work we perform. This involves customer relationship management solutions, billing solutions, software tool updates, and much more. If you haven’t given much attention to your workflow, you might be jumping from one unrelated task to another and wasting a lot of time and effort in the process. The well known adage ‘time is money’ applies quite well here, so let’s take a look at some ways you can maximize your workflow. In fact, an easy way to remember the tips is simply the acronym ‘IDEA’.Read full article...
There are a huge response over the weekend and the products are flying out the digital door. If you didnt pick up any of the products over the weekend, you missed out on the deepest discounts. However, the savings remaining are still huge. Again, get them before they are gone!
The Black Friday and Cyber Monday Deals have arrived. This year 5 of us got together to deliver some deep discounts of our products. We have 50% off the Technibble Computer Business Kit and Business CLients book, MhelpDesk Annual Plans, Instant Housecall Yearly plans, CallThatGirls Remote Support book and Hosted Exchange Training as well as the D7 Products. Be Quick and get them while you can!
Its that time of year again where retailers publish some sweet Black Friday and Cyber Monday deals. Of course, the computer business is no different. I would like to announce that this year, mHelpDesk, FoolishIT (creator of D7), InstantHousecall, CallThatGirl and us here at Technibble will be posting deep discounts on our products this year over the weekend. So put some money aside to take advantage of these great deals.Read full article...
If 2013 taught us anything about computer repair, it’s that our industry is changing, and changing fast. While traditional computer repair will not die for the forseeable future, as even the tablet craze hasn’t bumped users from their primary workhorse machines, technicians need to be forward looking so they don’t get caught with their pants down.
There has been a lot of hot air in the media about PC sales being destroyed by alternative devices, but recent reports are proving this to be not as drastic as originally reported. Windows 8.1 is helping lift PC sales, with a US year over year drop in sales only at 0.2% which is negligible at best if you ask me. The titanic isn’t sinking, no matter how much the media blowhards love to scare us in the repair industry.Read full article...
This guide was written by one of our forum members SilverLeaf and was originally written as a forum post. This guide is intended for people who are looking to do quality data recovery using free tools. This guide is fairly technical requiring you to deal with the Linux command line. Some paid software is more straight forward than the steps here, but this is a great way to get the job done for free. Use at you own risk. Technibble and SilverLeaf take no responsibility for the loss of any data, business, reputation etc..
It seems that a guide for using ddrescue might be of some benefit to many members who may be shy of the linux terminal. So, I’ve decided to document some real-world examples from in the shop. I plan on doing this in 3 parts to cover the most common scenarios.
Part 1: Creating an image from a failing disk
Part 2: Restoring an image to a new disk & cloning directly to a new disk
Part 3: Working with the image files
In will be using Parted Magic as a platform for this guide. I usually PXE boot (or boot from a live CD) the machine that I am working on to Parted Magic for this purpose. If you run linux on your test bench machine and prefer to attach the failing drives to it, this guide will give you the basics, but obviously the screenshots will be different.
Computer Technicians and System admins across the internet are hearing more and more about the Cryptolocker threat. If you havent heard about it, Cryptolocker is a nasty piece of ransomware that will seek out certain files on computers, attached drives and networks and encrypt them. Once it has finished encrypting the files, it will show a popup that tells the user that their files are encrypted and they have to pay a ransom to decrypt them before the 96 hour countdown completes. If the user doesnt pay the ransom during the countdown, the private key used to encrypt the files is destroyed and the users files become unrecoverable.
Nick from FoolishIT (creator of the popular tool “D7″) took the “How to prevent Cryptolocker steps” from BleepingComputers guide and turned them into a handy executable.
‘What happened to that stack of hard drives I just had? I could have sworn I had three video cards in stock, but they’re nowhere to be seen!’ If you’re having issues tracking your inventory, or failing to track it at all, it will seriously hamper your efficiency and can even cause your workflow to grind to a halt. There are some excellent inventory management systems available now, and they’re not that expensive. In fact, some won’t cost you a thing, and they may provide exactly what you need. If a simple spreadsheet just isn’t working for you anymore, it’s time to get something more advanced. I’d like to cover just a few options you should try out if you need a good inventory management system.Read full article...
Comodo Cleaning Essentials (CCE) is a fairly large, portable and freeware software that allows you to remove malware and unsafe processes from your client’s computer.
Although there is no perfect solution when removing malware from a client’s system, having one more program in your toolkit never hurts.
Just as RSS feeds are a great way to keep up on Tech news, Twitter is another way to keep up to date with Tech news, reviews, and stories in the technology industry. As a Tech, though, why bother with Twitter? There are several reasons.Read full article...
- 1000VA 600 Watt Uninterruptible Power Supply $49.99 AR
- Malwarebytes Anti-Malware Pro Lifetim 12.95
- OK Bertie…I await your response on this one!
- Client Support Consultant
- Outlook Anywhere asking for password
- Hello guys..!
- Very hard to find even one client
- New laptop time!
- "thats not what I said" – just installed a security cam at ft counter
- Is this a record?
As technicians, we often have a wide range of tasks, from estimates, invoices, and contracts, in addition to the actual tech work we perform. This involves customer relationship management solutions, billing solutions, software tool updates, and much more. If you haven’t given much attention to your workflow, you might be …read more...