GJ Tech Repair Logo
755 North Avenue, Unit A
Grand Junction, CO 81501
  • Home
  • Solutions
  • Get in Touch
  • Our Story
  • Journal
  • Shout-Outs

2019 in review

December 5, 2019 by Jeremy Marshall

Calendar
I can’t believe that another year is almost over. That means it’s time for another year in review. 😉

As I look back on 2019, I can’t help but to be extremely grateful for everything that it’s brought – the ups and downs, the new skills learned, and the exciting plans for the future.

In this last year alone, we’ve repaired hundreds of computers – both desktops and laptops, running Windows and Mac – for some amazing people.

We’ve removed viruses, stopped malware, and blocked pop-ups from computers of all makes and models, and all shapes and sizes.

We’ve successfully recovered data from dead computers, old computers, flash drives, floppy disks, and SD cards for many panicked and stressed-out customers.

Our Maintenance Plan has protected our client’s computers – saving them hundreds of dollars, and countless hours of downtime and frustration.

We’ve helped clients who were scammed by unscrupulous emails, pop-up ads, and telephones calls – securing their computers, and walking them through the steps of recovering what was stolen from them.

We’ve advised many clients on what equipment was needed to fill their particular IT needs, recommended software, and helped with setting everything up.

We were even awarded for being the top rated Computer Repair/IT Services company in Grand Junction for the second year in a row, and the scored second highest in the whole state of Colorado.

We’ve met thousands of new faces, earned almost a thousand new clients, and made hundreds of new friends this year

2019 has given us a lot to be grateful for, and I know that 2020 will prove to be even more awesome!

Filed Under: News Tagged With: Client Success Story, Computer Help Grand Junction, Computer repair Grand Junction, Data Recovery Grand Junction, Mac Repair Grand Junction

Share:

5 Common Computer Myths Debunked

August 1, 2019 by Jeremy Marshall

Common urban myths would have us believe alligators live in sewers or people put razor blades in kids’s candy. Common misconceptions about computers are just as persistent. Here are several IT myths debunked for your benefit.

Computer Myths


#1 A slow-running computer has a virus

A virus can be to blame. Spyware or other malware can also cause a computer to slow down. However, there are also many other reasons your computer might run slower:

  • You may have a lot of programs that start up when you boot up the computer. You could remove or disable programs that start every time.
  • The computer has gone into power save mode every night, but you haven’t rebooted the computer in a long time.
  • There are many programs running in the background. On a Windows PC, you can go into task manager and see what is running and the computer resources in use.
  • A security utility is running. If it’s an antivirus scanner, let the scan finish first, then see if your computer speed improves.
  • Temporary files or other junk are taking up too much hard drive space. Your computer needs at least 200–500MB of free space on the hard drive to be able to move and manage files.
  • Your computer doesn’t have enough RAM to run programs within memory. If your computer has to swap information on the hard drive to get enough memory to run programs, it’s going to work slower.
  • The computer is old. You may need to upgrade to a computer that can handle current software needs without slowing to a snail’s pace.

#2 Macs don’t get viruses

Many Apple owners believe their Macintosh computers are immune to viruses. If only. Macs do get viruses; they are simply targeted less than PCs. Why? There are many more computers running Windows, which means a bigger, easier target for cybercriminals.

As Apple’s market share rises, the threat to Macs is growing. Apple works to protect its users from malware, but you still need to use caution with downloads and when clicking on links from unknown sources.

#3 My Windows registry needs cleaning up

Registry cleaning companies will say that scanning your Windows registry can speed up the computer and avoid error messages. The cleaner finds unused registry keys and any malware remnants for removal.

But let’s consider the fact that Microsoft has not released its own registry cleaner. Why not? Because it’s really not necessary. Worse still, going in to clean your registry (when you don’t know what you’re doing) can actually do serious damage.

#4 My laptop battery needs to be dead before I recharge if I want it to last longer

This was once true. Nickel-cadmium batteries suffered from what was called a “memory effect.” If discharged and recharged to the same point several times, they would remember that point in the future and not go further.

Now, however, laptops typically come with lithium-ion (or Li-ion) batteries. They don’t suffer from this memory effect. In fact, they function better with partial discharge instead of letting the battery run down to zero.

#5 I don’t have anything hackers would want

Cybersecurity should be a priority for everyone, not only sprawling enterprises. Let’s put it this way:

  • Do you have any money?
  • Do you have an identity cybercriminals could use to access money or sell for money?
  • Do you work anywhere?

Hackers have all kinds of ways to profit from your data or from hijacking your computer’s processing power. They can turn your computer into part of a bot network or use your information as a bridge into a business target’s system.

Keep all your computers at top speed with the best security measures in place with the help of our experts. Contact us today at (970) 433-7454!

Filed Under: Educational Tagged With: Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction, Mac Repair Grand Junction, Virus Removal Grand Junction

Share:

2018 in Review

December 31, 2018 by Jeremy Marshall

Happy New Year
As 2018 draws to a close, we look back on the past year and can’t help but to be extremely grateful.

This last year we’ve repaired hundreds of computers – desktops and laptops – Windows and Mac – for our clients.

We’ve removed viruses, stopped malware, and blocked pop-ups from computers of all makes and models, all shapes and sizes.

We’ve successfully recovered data from dead computers, old computers, flash drives, and SD cards for many panicked and stresses-out customers.

Our Maintenance Plans have protected our client’s computers, saving them hundreds of dollars, and countless hours of downtime and frustration.

We’ve helped clients who were scammed by unscrupulous emails, pop-up ads, and telephones calls – securing their computers, and walking them through the steps of recovering what was stolen from them.

We’ve advised many clients on what equipment was needed to fill their particular IT needs, recommended software, and helped with setting everything up.

We were even awarded for being the top rated Computer Repair/IT Services company in Grand Junction, and the third highest in the state of Colorado.

We’ve earned almost a thousand new clients, and made hundreds of new friends this year.

As you can see, 2018 has given us a lot to be grateful for, and know that 2019 will be even more awesome!

Filed Under: News Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer Maintenance Plan Grand Junction, Computer Questions Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction, Data Recovery Grand Junction, Mac Repair Grand Junction, Malware Removal Grand Junction, Virus Removal Grand Junction

Share:

The Four Main Types of Spills That Can Kill Your Computer

June 18, 2018 by Jeremy Marshall

coffee spill on laptop
Contributing to at least sixty percent of all computer repair problems, liquid damage is one of the biggest nuisances for the
computer-age office worker. Even if it is easily preventable, there can always be accidents. Here are the four most common types of liquid spills that we see damaging our client’s computers.

Coffee

The biggest culprit of liquid damage by far has got to be coffee, likely because those of us that work at our computers all day, and likely all night, need a bit of a pick-me-up. The complex cocktail of chemicals and additives in coffee can absolutely destroy a computer’s inner-workings. They can even caramelize the insides of the device – as well as leave a rather nasty odor, due to the dairy products and sugar Many of us add to your coffee.

Water

Water would be just beneath coffee, contributing to about twenty percent of all cases of liquid damage. Oddly enough it really isn’t even the water that does the damage, it’s what’s within the water. A myriad of minerals in distilled or tap water can cause a short circuit, but completely pure, distilled water itself isn’t even a conductor of electricity.

Soda

Due to the sugar and acidity in soda and other soft drinks, they’re extra-corrosive on computer hardware, causing a lot of the same damage as a coffee spill. It’s probably best to keep any liquid fit for cleaning auto parts as far away from your electronic devices as humanly possible.

Beer and Wine

Surprisingly enough, the alcohol in beer and wine isn’t what damages your computer, in fact it’s pure isopropyl alcohol that a lot of technicians use to clean up the components of a computer. It’s actually the additives to alcoholic beverages that typically do all of the dirty work. Sugars, juices, and food coloring can all do severe damage to the circuitry of your computers or other electronic devices.

What should you do when the inevitable accidents do happen? It’s important to know the precautionary steps to take to prevent anymore damage from occurring. First of all, turn off, unplug the device and take out the battery, as electricity still conducts through it even when it’s powered down. You should also seek the advice of a reputable computer technician, like the ones at No Ware Computer Repair in Grand Junction.

Filed Under: Educational Tagged With: Computer Help Grand Junction, Computer repair Grand Junction, Computer Repair Service Grand Junction, Laptop Repair Grand Junction, Mac Repair Grand Junction

Share:

Everything you wanted to know about Hackers but were afraid to ask – Part 1

February 12, 2018 by Jeremy Marshall

Hacker?
When you think of the word “hacker,” what’s the first image that comes to mind? Was it a hooded figure, sulking in the basement and desperately waiting for the opportune moment to obtain all of your information with the click of a button? Or perhaps it was a socially awkward teenager chugging down their fifth energy drink of the night while typing out strings of 0s and 1s like rapid fire. The media most often portrays them as one of the two.

The term “hacker” started out relatively harmless. They were seen as innovators in the 1950s, the kind of person that challenged the manual and found different solutions to a problem. Eventually the more negative connotation stuck when the nineties arrived and is presently the most popular definition, a “hacker” is someone who uses a computer to gain unauthorized access to systems or data.

Today we mainly recognize three different kinds of hackers, categorized by the motives behind their actions. They typically hack with the same skill sets as one another as most hackers use the same methods.

Black Hat

Black Hat Hackers, also known as “Hacktivists,” apply their skills maliciously and their objectives typically range from stealing the personal data and monetary funds of individuals like you or I, to major corporate breaches. They work outside of the law, and what they do is usually very illegal.

These guys can type at mach ten, dress like death -if he wore a hoody and ratty jeans. The sketchy guys that stand in the back alleys of the internet waiting to tempt you with empty promises and infect your computer with malware and other harmful viruses.

Grey Hat

Occupying a vast land of motivations neither good nor bad, Grey Hat don’t aim to directly cause harm to anyone.

Some of them may in fact have good intentions, breaking into different organizations online and informing them of vulnerabilities anonymously. To some of them it’s only a hobby, to others, selling those vulnerabilities to different agencies is also common occurrence and their livelihood.

White Hat

Often called the “ethical” hackers, a White Hat is someone who utilizes their skills for the good of other people or companies and are usually hired in order to do so in the first place.

They’re compensated to find breaches in security, vulnerabilities, test systems and a plethora of other small jobs here and there that require their level of devotion and technological understanding.

Unfortunately, lurking behind each type of hacker are those that are ruthless in their pursuit of getting political and public attention. The members of this group can come from white, gray and black, and each is trying to open the eyes of the world.

Join us next week when we take a closer more in depth look at the people known as “Hacktivists”.

Filed Under: Educational Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction, Mac Repair Grand Junction

Share:

Browser Extensions, Plugins, and Add-ons

December 4, 2017 by Jeremy Marshall

browser-extensions
We all love to customize things. We like to make them our own and give them a little touch of our personalities. With our cell phones, we buy colorful cases, download apps, and install custom ringtones. On our computers, we change the wallpaper and screen saver, install or uninstall programs and apps, and even install “extensions” in our web browsers.

Browser extensions, plugins, or add-ons, are small programs that increase or enhance the functionality of your web browser. these little programs can power-up your browser to handle a variety of tasks which most browsers wouldn’t be able to perform. Their ultimate goal, of course, is to make your online life easier and give you a better browsing experience.

How can browser extensions customize my internet experience?

Extensions can modify websites as they appear on your computer through adding, removing, or modifying content. In December 2015 there was a scare about seeing spoilers of the new Star Wars movie. Someone made a web extension that would block these spoilers from being seen until the fan got to see the movie for themselves.

Extensions can also give your online security a boost. Ad blockers like AbBlock Plus or uBlock Origin can blocks malicious pop-up, and keep annoying and potentially fraudulent ads from being displayed. Helping to keep you from falling for some of the more common computer scams.

Extensions can add additional features to your browser. An Extension called Web of Trust adds a safety feature to your web searching This extension shows you if a website is safe on the results page by adding a red, yellow or green dot next to the webpage.

Extensions can even combine with other services or apps. For example, you use Evernote, there is an extension called “Web Clipper” that allows you to highlight and automatically clips notes into your Evernote for use across all your technological devices.

One important thing to keep in mind about using browser extensions is that malicious extensions do exist. The best way to ensure that you don’t accidentally do more harm than good by loading one of these rogue extensions is to make sure that you only download and install extensions from your browser’s own web store.

Another thing to keep in mind is the more extensions you have running at once, the more RAM it takes for your browser to run, so try not to overdo it.

Of course, if you have any questions about browser extensions, or any other computer related question, feel free to reach out to No Ware Computer Repair in Grand Junction, CO. We’re always happy to help!

Filed Under: Educational Tagged With: Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction, Mac Repair Grand Junction

Share:

Client Success Story: Virtual Wizardry 2

November 13, 2017 by Jeremy Marshall

Here at No Ware Computer Repair we get all kinds of clients with all kinds of issues walking through our door. Some of these more “interesting” issues can even be a learning experience for all parties involved!

Speaking of learning, we recently had a client come into our office who home-schooled his daughter, but was having a bit of a problem. He wanted to make sure that she had the best equipment for school, so he purchased a MacBook Pro for her to do her lessons on. The poor guy ran into a snag after getting everything home and all setup: The program used to supervise the home-schooling only worked with Windows and his daughter had an assignment due in 2 days.

After doing a little, research our client discovered Boot Camp, a program used for making a Mac dual-boot into different operating systems. The idea was to get a choice at the opening prompt asking to boot into Windows 10 or the Mac OS.  A brilliant idea in theory, but it was proving difficult in practice. This was why he came to us, for a little tutoring on how to make Boot Camp work.

After talking to the client, and assessing the situation, we suggested a different approach. Instead of a dual boot system, which could prove to be cumbersome by having to log out of the computer completely and reboot every time he needed to run this one program, we suggested that installing a virtual machine; using a program called Virtual Box, would be a better fit. Virtual Box allows you to be in your main Operating System, but run another Operating System almost like running a program. Applications can be launched from within that Operating System “program”.

With the computer left in our capable hands, we installed Virtual Box, set up a virtual instance of Windows 10, and installed the program that his daughter needed to use. We were able to have everything done the very same day that the client brought the computer in to us. When the client came to pick everything up, we gave him some directions and pointers on how to use everything. He was definitely pleased with this new, easy-to-use setup.

Sometimes the solution to a problem requires nothing more than a little creative thinking.

Got a computer problem? We’re always happy to help!

Virtual Box on MacOS

Filed Under: Client Success Story Tagged With: Computer Consulting Grand Junction, Computer Help Grand Junction, Computer repair Grand Junction, Computer Tips Grand Junction, Mac Repair Grand Junction

Share:

Client Success Story – Crime Doesn’t Pay

July 31, 2017 by Jeremy Marshall

Sometimes when we’re in a hurry, it becomes easy to forget to look after our important belongings.

Recently we had a client who almost lost everything in just a few forgetful moments. [Read more…]

Filed Under: Client Success Story Tagged With: Computer Help Grand Junction, Computer repair Grand Junction, Data Recovery Grand Junction, Mac Repair Grand Junction

Share:

Mac Repair Service and Support Grand Junction, Clifton, Fruita, Whitewater, Palisade, Colorado

June 13, 2017 by Jeremy Marshall

No Ware Computer Repair specializes in Mac repair and service. Our experts in all things Mac can assist you with all your repair needs. We support the Grand Junction, Clifton, Fruita, Whitewater, and Palisade Colorado area.
Mac Repair

How can you get the absolute best help with your Mac?

Call No Ware Computer Repair at (970) 433-7454!

[Read more…]

Filed Under: Search Tagged With: Computer Help Grand Junction, Computer repair Grand Junction, Mac Repair Grand Junction, Mac Repair Service Grand Junction

Share:

Client Success Story: Finals Week Mac Smackdown

March 27, 2017 by Jeremy Marshall

If you live in a University town like Grand Junction then you know all about a crazy time of year called Finals Week. It’s common to see college kids shuffling around town with messed up hair, dark bags under their eyes, and an almost visible dark cloud following them.

It was finals week last year when “Nicole” stumbled into our office in a full-fledged state of panic. [Read more…]

Filed Under: Client Success Story Tagged With: Data Recovery Grand Junction, Mac Repair Grand Junction, Mac Repair Service Grand Junction

Share:

  • 1
  • 2
  • Next Page »

VISIT US

GJ Tech Repair

9704337454
755 North Avenue, Unit A
Grand Junction, CO 81501

Copyright © 2023 · GJ Tech Repair · 755 North Avenue, Unit A, Grand Junction, CO 81501