GJ Tech Repair Logo
755 North Avenue, Unit A
Grand Junction, CO 81501
  • Home
  • What We Do
  • Get in Touch
  • Our Story
  • Journal
  • Shout-Outs

2018 in Review

December 31, 2018 by Jeremy Marshall

Happy New Year
As 2018 draws to a close, we look back on the past year and can’t help but to be extremely grateful.

This last year we’ve repaired hundreds of computers – desktops and laptops – Windows and Mac – for our clients.

We’ve removed viruses, stopped malware, and blocked pop-ups from computers of all makes and models, all shapes and sizes.

We’ve successfully recovered data from dead computers, old computers, flash drives, and SD cards for many panicked and stresses-out customers.

Our Maintenance Plans have protected our client’s computers, saving them hundreds of dollars, and countless hours of downtime and frustration.

We’ve helped clients who were scammed by unscrupulous emails, pop-up ads, and telephones calls – securing their computers, and walking them through the steps of recovering what was stolen from them.

We’ve advised many clients on what equipment was needed to fill their particular IT needs, recommended software, and helped with setting everything up.

We were even awarded for being the top rated Computer Repair/IT Services company in Grand Junction, and the third highest in the state of Colorado.

We’ve earned almost a thousand new clients, and made hundreds of new friends this year.

As you can see, 2018 has given us a lot to be grateful for, and know that 2019 will be even more awesome!

Filed Under: News Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer Maintenance Plan Grand Junction, Computer Questions Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction, Data Recovery Grand Junction, Mac Repair Grand Junction, Malware Removal Grand Junction, Virus Removal Grand Junction

Share:

How Do You Know When You Need A New Computer?

October 29, 2018 by Jeremy Marshall

new computer old computer
As we all know, a computer can slow down over time. No matter how many tune ups you get, and how well your general maintenance is, no amount of regular upkeep will prevent the inevitable decay in performance. While all that caution certainly does help prolong the lives of our devices, at one point, you will want to replace your old computer with a newer model.

The real question is “when?” When should you stop bringing your computer to a repair shop and instead seek out something more “modern”? Well, there’s a lot to consider before making that decision.

Some experts suggest replacing your computer every few years or so – A desktop computer can be expected lo last anywhere from 5-7 years, and a laptop about 3-5. That might seem like a relatively short amount of time, but there’s a method to the madness – The technological climate is always rapidly evolving, and older computers simply aren’t built to adequately run newer software.

That isn’t to say you can’t use a computer that’s a decade old. One of the most important factors in deciding when it’s time to invest in a new computer is what you intend on using it for. Gaming for instance is a demanding hobby, as game developers are constantly improving on different aspects of the games they make – and by extension making games that are harder on our computers.

Alternatively, if you’re using your computer to complete everyday tasks, casually browsing the internet or working from home on applications that don’t have many system requirements, you might be fine to just keep that old computer going until you just can’t anymore.

Sometimes the cost of the parts needed to repair the computer simply exceeds the cost of the machine – in that case you’re better off just getting a new computer altogether. Often this happens with older models because there aren’t many companies manufacturing these parts anymore, and they’re not in high demand, so they can cost quite a bit.

Another thing to keep in mind s that when a computer has become so old that it begins rejecting updates completely, and when it doesn’t even meet the minimum system requirements needed to upgrade to the newest version of your operating system, it’s definitely time to start looking for something new.

If you’re unsure whether you old computer can last you just a little bit longer, or if you need to finally upgrade to something a little more “new and improved”, your friends at No Ware Computer Repair in Grand Junction can help you to determine which course of action would best fit your situation.

Filed Under: Educational Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction

Share:

What is a “GPU”?

September 10, 2018 by Jeremy Marshall

 

If you’re like most people, you spend upwards of six hours a day looking at some kind of screen. Be it a phone, television, or a computer screen – our monitors take up a very significant amount of our day to day lives. Especially if you happen to work at an office job, you turn one on regularly, nine to five even, but have you ever wondered how exactly the monitor displays all those pictures?

A Graphics Processing Unit, or more commonly a graphics card or chip is a piece of computer hardware that communicates with the rest of the computer and converts data into signals transmitted to your monitor. It is solely responsible for the images that you see on your screen when you turn your computer on and the better your graphics card is, the better the resolution (how smooth a picture looks) will be.

There are two types of GPUs.

An integrated graphics chip is the most commonplace and is built into the motherboard, it’s cost effective and if you’re using your computer for the casual web surfing then it should work perfectly. However, the integrated graphics chip is difficult to upgrade in comparison to the alternative.
graphics chipFor those looking to branch out into video editing or gaming, you might want to consider the discrete graphics card. It’s installed onto the motherboard as an extra component, particularly ideal for those looking for an upgrade to the graphics quality altogether. It’s crucial in preventing those unwanted jitters and lag during game-play.

GPUs

There are also two major graphics card manufacturers in the industry. Many pledge their allegiances to one manufacturer, but both brands do their jobs efficiently, with little to no difference in quality. These companies are Nvidia and AMD. As with most inner components of a computer, the design and style of your graphics card can be important. With both brands, you can browse slimmer or shorter graphics cards to meet your specifications.

Of course there’s far more to delve into where graphics are concerned, and if we have your interest piqued but you’re still not certain what you should be investing in, don’t be afraid to swing by No Ware Computer Repair in Grand Junction or give us a call at (970) 433-7454!

Filed Under: Educational Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Upgrade Grand Junction

Share:

What is a Chromebook and is it Right for You?

August 20, 2018 by Jeremy Marshall

ChroebookChances are, you’ve come across a Chromebook at some point in your life, or at the very least heard of it from someone you know. Simple and easy to navigate, the Chromebook is essentially a laptop that runs on Google’s Chrome operating system – and if you regularly use Google Chrome web browser as it stands, then using a Chromebook should be an absolute breeze.

Though even if you aren’t all that familiar with Google Chrome, the device is still incredibly user friendly, offering a stripped down, simplistic experience with a very small learning curve. Not to mention that buying one probably won’t burn a hole in your wallet as most of them range from one hundred fifty to two hundred dollars, a budget friendly alternative to the more mainstream devices.

All this taken into mind, you might still be wondering whether or not a Chromebook is the right choice for you, and it honestly depends on your situation, as with most choices when it comes to technology. If you’re looking for a powerful piece of hardware for instance, built for gaming and the like, a Chromebook probably isn’t for you.

Chromebooks are designed to run web apps, so they make the perfect business or schoolwork companion, as they’re quite portable and they can take a few hits. If you spend a lot of your time in your browser already, then a Chromebook might be exactly what you’re looking for. Newer models even have the added feature of being able to run Android applications too, which is a bonus if you’re a fan of mobile gaming.

It’s important to also take into consideration where you’ll be using your device. If you’re on the go and have ready access to the internet, then sure it’s a great choice, as the Chromebook relies heavily on your connection, so computing and file storage happens in the cloud. Which means while it automatically saves your documents and has them readily available across multiple platforms through Google Drive and other apps, it also requires constant internet connection.

The verdict ultimately comes down to your preference as a user. Fast, intuitive and easy to maintain, if everything you need can be found on the internet, we highly recommend looking into a Chromebook.

Filed Under: Educational Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction

Share:

Secure Passwords

July 16, 2018 by Jeremy Marshall

Secure laptop
There were simpler times when passwords were only preventative measures to keep the people around you in the real world from accessing your personal devices. That was before the internet blew up, before we had to start worrying about the whole “hacking” thing.

Unfortunately, nowadays things are far more complicated. Some places online require that you change your password regularly, and that’s even becoming more commonplace than you might think.

Passwords can’t be something silly like qwerty or 1234. The reason being those are the easiest to guess, but even if you did use something random and virtually impossible to determine, hackers now have access to different software that they can use to easily crack not so strong passwords. To cyber-criminals it’s just a guessing game, they have software that can run through every possible combination of letters and numbers in no time. That said, the longer and more complex your password is, the longer it would take to crack.

Basically, all of this stuff has gotten really complicated and somewhat convoluted, but if you’ve read this far you’re probably interested in how to further secure your accounts from the likes of hackers – and we have a few tips for that!

A fun practice to integrate into your password creation is telling a story. For instance, “I live at 4122 Elm Drive have five children, a girl, two boys, and three dogs and a loving wife,” could look something like @4122C5gbd&W. Or for instance your dog Rex is twelve years old and your cat Fluffy only has three legs, your password could look like Re12Fluff3.

One of our favorite methods is using an old address of yours. It’s something you’ll always remember and it’s not the easiest to guess either. Something like @123AnyStreet, or 987Broadway! would work perfectly.

Another method of creating a strong password is to use a verse from your favorite song. For instance, “The wheels on the bus go round and round,” that you loved when you were six could be, Wotbgr&r6yo. Or say that the eighties hit “Africa” by Toto really gets your foot tapping, you can use something like 80sIbtrdiA! .

These are just a few simple strategies that will help you to create a secure password. If you need any help creating a password or have questions about computer security give your friends at No Ware Computer Repair a call at (970) 433-7454.

password

Filed Under: Educational, Tips and Tricks Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Security Grand Junction, Computer Tips Grand Junction

Share:

A Brief History of iOS

May 14, 2018 by Jeremy Marshall

Fewer debates have divided a people as much as iPhone versus Android. Both fan bases can be especially competitive in their defense for their beloved mobile operating systems, but how did it all start? Here’s a brief history of Apple’s iOS.

Well, it all started way back in 2007 when the late Steve Jobs revealed the iPhone. The phone could hardly handle 3G, it lacked the copy and paste feature, and it couldn’t run third party apps. But it was a huge step in the right direction. Though today we might view it as nothing all that special – what with our smart TVs and fitbits – at the time it was massively popular, as there hadn’t been much of anything like it beforehand.

The second version of iOS, which came out the following year, introduced the App Store; this allowed people to download third party applications and new games. Along with those features, the new phone had expanded customization to make each one unique to the owner. Many of the beloved iOS capabilities we see today still hadn’t been implemented quite yet, but were definitely in development.

The next few years were marked by the release of a new iPhone with each year that passed. Simple capabilities like copying and pasting became commonplace with every iteration, TV shows and audio books became available through iTunes, purchasing within apps was all delivered by the fifth installment of iOS. With iOS 5 also came the rise of voice control, which could now interact with other apps.

Everything we know and love about the iOS today all happened within the span of a few short years. From Facetime to Siri, iOS boasted about its ability to “just work,” and to do so as efficiently as possible. With each release came updates that fine-tuned the features.

As of now, iOS remains the second most popular mobile operating system worldwide, behind Android. Which is probably the reason the two brands have such a nasty feud going on. While there haven’t been many new internal software developments for a long while, iOS released their new wireless headphones just recently, ridding the phone of the audio jack in order to make things more “convenient”.

Steve Jobs iPhone Reveal

Filed Under: Educational Tagged With: Computer Consulting Grand Junction, Computer repair Grand Junction

Share:

Everything you wanted to know about Hackers but were afraid to ask – Part 3

February 26, 2018 by Jeremy Marshall

Over the last few weeks we have been talking about how hackers influence our lives for better or for worse. (Check out those posts here and here).

Of the three types of hackers the most dangerous are the Black Hat. These guys do it for profit; it is how many of them actually make a living, and they don’t care at whose “expense”.

A Grey Hat might hack into a corporation’s bank account to transfer money to a poor family that needs the funds for rent or food; a Black Hat will do it to transfer money to his own account so he can buy a new car.

While not all hackers are dangerous, the White Hat hackers work to make the world a safer place, but finding vulnerabilities and patching them before the bad guys can exploit them.

Some of the more nefarious hackers sit in coffee houses, parks, and even stores scanning for a chance to snag your passwords, account information, and other credentials. They can also sometimes sit in offices programming malware and viruses that will pop-up on your screen while you surf the net and hold your computer hostage until you pay the ransom.

Hackers!

However, there is hope! You can protect yourself by maintaining a few good security habits.

1.Uninstall Any Software You Don’t Use

Chances are that most of the software that comes with that fresh Windows install are just trials to get you to pay for the full version later. Basically you try it for 30 days and then it will pop-up ads every time you turn on your computer to get you to buy it. These bloatware programs can make your computer vulnerable.

2. Automatically Install Security Updates

Scary screen

Your Anti-malware and antivirus software is a great defense against hackers. Keeping it up-to-date plugs holes that a hacker can get through. If you don’t have time, or updates confuse you, think about getting a Maintenance Plan – It is like having your own personal nerd in the basement keeping you and your family safe.

3. Avoid Plugging in Devices You’re Not Sure About

USB drive

If this amazing person you just met in the coffee shop hands you a USB with a file of a story they just wrote on it, use some skepticism. If you find a random drive lying on the ground, best to toss it in an Electronic Recycle bin. Remember what curiosity did to the cat.

4. Never open attachments or emails (unless you’re really sure)

You just got an email telling you, you won a trip to Ibiza! Yay for you! Maybe… If it isn’t a timeshare, then chances are that link or attachment on this amazing offer is  malware or a virus  waiting to infiltrate your computer and take over your life.

5.  Don’t share personal data when surfing on public WiFi

 

Many stores, coffee houses and even restaurants have public Wi-Fi these days to allow you to use their apps and electronic coupons right in the store.  This is a bad opportunity to transfer funds, pay bills, or message your Social Security Number to a friend.  On a public Wi-Fi connection, a hacker can intercept this information and make it their own.

The same goes for Internet Cafés. If you have to use a public computer to do these things always remember to take the proper security measures.

Hackers can be some rather nasty hombres, but luckily there are ways to keep yourself from becoming a victim. If you would like to learn more about staying safe from hackers, or are interested in a Maintenance Plan to keep you and your family safe, reach out to No Ware Computer Repair in Grand Junction at (970) 433-7454.

 

Filed Under: Educational Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction, Malware Removal Grand Junction, Virus Removal Grand Junction

Share:

Everything you wanted to know about Hackers but were afraid to ask – Part 1

February 12, 2018 by Jeremy Marshall

Hacker?
When you think of the word “hacker,” what’s the first image that comes to mind? Was it a hooded figure, sulking in the basement and desperately waiting for the opportune moment to obtain all of your information with the click of a button? Or perhaps it was a socially awkward teenager chugging down their fifth energy drink of the night while typing out strings of 0s and 1s like rapid fire. The media most often portrays them as one of the two.

The term “hacker” started out relatively harmless. They were seen as innovators in the 1950s, the kind of person that challenged the manual and found different solutions to a problem. Eventually the more negative connotation stuck when the nineties arrived and is presently the most popular definition, a “hacker” is someone who uses a computer to gain unauthorized access to systems or data.

Today we mainly recognize three different kinds of hackers, categorized by the motives behind their actions. They typically hack with the same skill sets as one another as most hackers use the same methods.

Black Hat

Black Hat Hackers, also known as “Hacktivists,” apply their skills maliciously and their objectives typically range from stealing the personal data and monetary funds of individuals like you or I, to major corporate breaches. They work outside of the law, and what they do is usually very illegal.

These guys can type at mach ten, dress like death -if he wore a hoody and ratty jeans. The sketchy guys that stand in the back alleys of the internet waiting to tempt you with empty promises and infect your computer with malware and other harmful viruses.

Grey Hat

Occupying a vast land of motivations neither good nor bad, Grey Hat don’t aim to directly cause harm to anyone.

Some of them may in fact have good intentions, breaking into different organizations online and informing them of vulnerabilities anonymously. To some of them it’s only a hobby, to others, selling those vulnerabilities to different agencies is also common occurrence and their livelihood.

White Hat

Often called the “ethical” hackers, a White Hat is someone who utilizes their skills for the good of other people or companies and are usually hired in order to do so in the first place.

They’re compensated to find breaches in security, vulnerabilities, test systems and a plethora of other small jobs here and there that require their level of devotion and technological understanding.

Unfortunately, lurking behind each type of hacker are those that are ruthless in their pursuit of getting political and public attention. The members of this group can come from white, gray and black, and each is trying to open the eyes of the world.

Join us next week when we take a closer more in depth look at the people known as “Hacktivists”.

Filed Under: Educational Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction, Mac Repair Grand Junction

Share:

Client Success Story: Virtual Wizardry 2

November 13, 2017 by Jeremy Marshall

Here at No Ware Computer Repair we get all kinds of clients with all kinds of issues walking through our door. Some of these more “interesting” issues can even be a learning experience for all parties involved!

Speaking of learning, we recently had a client come into our office who home-schooled his daughter, but was having a bit of a problem. He wanted to make sure that she had the best equipment for school, so he purchased a MacBook Pro for her to do her lessons on. The poor guy ran into a snag after getting everything home and all setup: The program used to supervise the home-schooling only worked with Windows and his daughter had an assignment due in 2 days.

After doing a little, research our client discovered Boot Camp, a program used for making a Mac dual-boot into different operating systems. The idea was to get a choice at the opening prompt asking to boot into Windows 10 or the Mac OS.  A brilliant idea in theory, but it was proving difficult in practice. This was why he came to us, for a little tutoring on how to make Boot Camp work.

After talking to the client, and assessing the situation, we suggested a different approach. Instead of a dual boot system, which could prove to be cumbersome by having to log out of the computer completely and reboot every time he needed to run this one program, we suggested that installing a virtual machine; using a program called Virtual Box, would be a better fit. Virtual Box allows you to be in your main Operating System, but run another Operating System almost like running a program. Applications can be launched from within that Operating System “program”.

With the computer left in our capable hands, we installed Virtual Box, set up a virtual instance of Windows 10, and installed the program that his daughter needed to use. We were able to have everything done the very same day that the client brought the computer in to us. When the client came to pick everything up, we gave him some directions and pointers on how to use everything. He was definitely pleased with this new, easy-to-use setup.

Sometimes the solution to a problem requires nothing more than a little creative thinking.

Got a computer problem? We’re always happy to help!

Virtual Box on MacOS

Filed Under: Client Success Story Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction, Mac Repair Grand Junction

Share:

Browser Wars – Part 1

July 24, 2017 by Jeremy Marshall

There is a war being fought on the internet right now, but most of us don’t even notice. The war isn’t about the internet itself, but how we access it.

Welcome to Browser Wars!

Browser Wars!

This week we’ll take a quick look at how the browser landscape came to be the vicious online battlefield that it is today.

By 1995 the World Wide Web was being to be noticed, and began to become part of popular culture. Many of us may remember the first browser we used back then was AOL, a few readers might even remember Prodigy.

AOL Login

Seeing the success of the Netscape browser used by these two ancient internet companies, Windows released Internet Explorer 1.0 as part of the Windows 95 Plus pack in August 1995. Both companies began releasing updates in rapid succession over the next couple of years. It seemed that every time we turned around either Netscape or Internet Explorer was releasing a new version and wanting us to update. They were competing for the most users; the title of the best browser. Of course, all this was at the expense of being fairly buggy, but they kept showing us more and more “amazing” features.

It wasn’t just users these companies were fighting for, it was money. A popular web browser could make a lot of money from the bids by search engines to be the default search engine, not to mention popular webpages wanting to be pre-installed in the browsers bookmarks.

A seemed a minor battle until Microsoft “wowed” us with the speedy and stable update to IE 4.0 in 1997. Using the “monopoly” they had with the Windows operating system, they began packaging Internet Explorer with every release of Windows.

Internet Explorer 4.0

Over the next few years Microsoft slowly cut off Netscape’s “air supply” with its numerous resources. It even created a licensing agreement with AOL to base AOL’s primary interface on IE rather than Netscape.  IE began adding features much like those of Netscape and few superior. The want to download and install Netscape.

Netscape Navigator

Thinking it had finally won the monopoly over the internet, it began to relax with Yahoo as it’s default search engine, and many news websites pre-installed as book marks. It turned its ventures to other things.

Little did it know it was being stalked by a big red “O” and a cute little “fox”.

Browser Battle

More on that battle next week.

Filed Under: Educational Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction

Share:

  • 1
  • 2
  • 3
  • Next Page »

VISIT US

GJ Tech Repair

9704337454
755 North Avenue, Unit A
Grand Junction, CO 81501

Copyright © 2023 · GJ Tech Repair · 755 North Avenue, Unit A, Grand Junction, CO 81501