Windows 10 – Microsoft’s Next OS

October 6th, 2014

Last week, Microsoft previewed Windows 10. It looks to be a popular OS for both Windows 8 fans and those who prefer the familiarity of Windows 7. A lot of the previewed features incorporate the two looks pretty well.

Read more from PC World here:


With the Cool Autumn Air Comes the Potential for Static Electricity

September 21st, 2014

Ahhh, autumn has come to Lake Norman! It’s my favorite season of the year but with the cooler, drier air comes the potential for static electricity – a serious hazard to the components within your computer. Electrostatic Discharge, also known as ESD, can cause the failure of solid-state electronics components such as integrated circuits. Computer components can suffer permanent damage when subjected to the intense, instantaneous voltages of static electricity and that is why manufacturers establish electrostatic protective areas that are free of static. If your computer is being opened for repair on your living room floor or your computer technician has taken it to her house to work on it on her kitchen table, your system is in danger. Sure, it may come back working but consider the potential damage has been done to the internal components, reducing the life of those components by years. At CET, our work laboratory is fitted with grounded, anti-static work stations. Come see for yourself. We’ll repair your PC while taking care of your computer’s internal components using professional equipment and professional standards.

Security in the Cloud

September 6th, 2014

With recent news stories about breaches in cloud-based storage, it is understandable to be concerned about your files and pictures stored “online”. CET clients from Mooresville to Cornelius, and throughout the Lake Norman area, have questioned Lance and myself about cloud security and, while you need to trust that your cloud service provider is up to the task of giving your data the protection that you need or want, it is essentially your responsibility to ensure the security of your data.

You should investigate the cloud provider that you’re considering using. Simply “googling” a provider on the internet is likely to offer you more information than you’d ever need, but take some time to see what the companies are writing about themselves and see what others are writing about them as well. Most cloud providers are willing to work with their customers to provide security measures and assurances that they will do their best to protect your files.

Another significant step that you can take is to encrypt your data. While most cloud services, even Dropbox, already encrypt your files, those same services have the decryption keys and can decrypt your files at any time, such as at the request of law enforcement agencies. You can also encrypt your data prior to loading it to the cloud service in the first place. This second level of security can be employed with programs like TrueCrypt or other purchased software.

Lastly, the most important measure that you can take to secure your files – whether on a cloud storage on on your own computer – is the use of a strong password. Strong passwords cannot be found in dictionaries; common words (or names) are easily hacked and provide little or no protection at all. Use passwords that contain lowercase and uppercase letters, numbers, and non-alphanumerical symbols like the dollar sign, the exclamation point, or the ampersand.

Security, whether on the cloud or at your own home or office, is essential in protecting your files, and ultimately your identity. Be smart when storing pictures and files and be cautious with them as well. Don’t make it easy for the bad guys! If you need help, contact us at CET and we’ll be glad to help you secure your data.