Author Archives: Kristin Willis

Windows 20H2 Needs to Update

Microsoft shared a reminder for users still utilizing Windows 10 version 20H2:

Windows 10, version 20H2 will reach the end of servicing on May 10, 2022. This applies to the following editions* of Windows 10 released in October of 2020:

  • Windows 10 Home, version 20H2
  • Windows 10 Pro, version 20H2
  • Windows 10 Pro Education, version 20H2
  • Windows 10 Pro for Workstations, version 20H2

These editions will no longer receive security updates after May 10, 2022. Customers who contact Microsoft Support after this date will be directed to update their device to the latest version of Windows 10 to remain supported.”

It appears that there must be a clear reason why customers should upgrade to Windows 10. However, it is pretty complicated.

People believe it is simply to obtain the top features and to upgrade the digital sector. And, although it is true, there is a lot more to it. Security is one of the biggest features of an operating system.

Outdated OS systems means that security flaws are more prevalent than ever. Because Microsoft releases security upgrades on a regular basis, the risks associated with upgrading to Windows 10 are minimal.


If you are experiencing computer issues, please give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities.  This blog post is brought to you by our staff at the Riverview Computer Repair Service. If you need computer repair in Riverview, FL, please call the local office at (813) 400-2865.

High Alert for PC Users

Because to the reappearance of the terrible QBot bug, Windows 10 users should be on high alert. This virus initially appeared in 2007, but it has returned and has evolved.

According to Digital Forensics and Incident Response (DFIR), this recent attack can provide hackers with complete access to data such as emails, passwords, and online internet activity within half an hour of an attack.

The issue appears to be able to travel between PCs linked to a network, allowing it to spread wider and quicker. The DFIR had also said the QBot’s reappearance was initially detected in October.

The virus appears to be spreading through phishing emails.

Phishing scams are internet frauds in which hackers attempt to dupe victims into providing personal information. Typically, this is accomplished through the use of e-mail.

These phishing schemes appear legitimate since the e-mails contain identical information to the firm they’re imitating. The recipient may already have an account with the company, such as AOL or Google.

The malware e-mails use subject lines, which include ‘Covid notifications’ to deceive people into installing the bug.

Protect yourself from phishing scams by doing the following:

-Try out Carbonite online backup solutions, which will protect your data regardless of any type of attack or problem. This can ensure your important files and data are backed up to a secure cloud storage. 

-Use 2-factor authentication, which gives an extra set of security.

-Do not click on any e-mail links that look suspicious. If you’re unsure as to who sent you the e-mail, double check their address to verify its authenticity.


If you are needing assistance with any Microsoft issues, please give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities.  This blog post is brought to you by our staff at the Tampa Computer Repair Service. If you need computer repair in Tampa, FL please call the local office at (813) 400-2865.

Routine Maintenance

Routine maintenance is crucial to a healthy PC.

Keep your computer up to date, whether you use Windows, Apple, or any other operating system. There are a few advantages that ensure the safety of any and all portions of it. This includes security and better performance.

It’s vital to understand that cleaning up your computer’s disk drives on a regular basis may help you free up a lot of disk space. There are a variety of approaches you can take.

The first step is to run an automated operation that cleans up your hard drive, which is fairly easy to perform. Simply choose the drive you wish to clean, right-click it, and choose properties from the menu. You’ll find “Disk Cleanup” as an option. Click on it to begin the process.

Remember, the more apps you have installed and the more documents, photos, photographs, music, videos, and toolbars you have saved on your computer, the slower it will get over time.

Back Up Hard Drive

Backing up your hard drive should be done often. If you’re working on a large project, you may do this every day to ensure the security of your data. Backing up your data preserves crucial files in the event of a hard disk failure or a system disaster.

A failing hard drive is one of the worst things that may happen to your computer because of all of the important documents, photographs, and other items saved on it. Backing up your computer is highly recommended by both Mac and Microsoft technical support, and it will significantly reduce your stress. It’s also really simple to accomplish! We share how to do that here.


If you are needing help with computer issues, please give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities.  This blog post is brought to you from our staff at the Tucson Computer Repair Service. If you need computer repair in Tucson, AZ, please call the local office at (520) 526-9940.

What is Access Time?

Access time is one of the most regularly reported performance characteristics for CD-ROM drives. It is overused at least as frequently as it is utilized correctly, as is the case with most popularly used performance metrics. Surprisingly, access time is frequently specified in CD-ROM drive specifications but is almost never mentioned in hard disk specifications. Quotes of the other variables that are used to make up access time are far more prevalent with hard disks. (Despite the fact that the devices access data in a comparable manner…)

The term “access time” refers to the length of time it takes from the start of a random read operation until data begins to be read from the disk. It is a composite statistic, made up of the following various metrics:

  • Speed Change Time: For CLV drives, the time for the spindle motor to change to the correct speed.
  • Seek Time: The time for the drive to move the heads to the right location on the disk.
  • Latency: The amount of time for the disk to turn so that the right information spins under the read head.

While access time is made up of the time spent on these individual processes, this does not imply that you can just put these other metrics together to get access time. The link is more complicated than this since some of these events might occur concurrently. There’s no reason why the spindle motor’s speed couldn’t be altered at the same time the heads are moved (and in fact this is done).

In general, the access time of a CD-ROM drive is determined by the drive’s rated “X” speed, which may and does vary greatly amongst drives. The earliest 1X drives had absolutely terrible access times, frequently reaching 300 ms; as drives became faster and quicker, access times reduced, and top-end drives currently have access times of less than 100 ms.

Part two coming up soon!

(Disclaimer: This post is a rewrite of a past KT blog post dated back in 2018.)


If you ever have an issue with any Windows 10 updates, give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you by our staff at the Garland Computer Repair Service. If you need computer repair in Garland, TX please call or text the local office at (469) 299-9005.

Reduce RAM to Improve Performance

First, let’s discuss what RAM is.

RAM, or Random Access Memory, is an essential and speedy type of short-term storage that your computer uses to store data that is presently in use.

With this, temporary storage is utilized by whatever apps are running on your computer, such as browsing or word editing. RAM gets purged when you shut down your computer. RAM varies from a hard disk drive or a solid state drive in that it continuously stores files and programs.

According to WindowsLatest, in the current edition of Windows, Microsoft Teams plays a larger role than predicted. The Teams application has been incorporated into the taskbar. This allowed users with personal accounts to initiate conversations or video conferencing calls, as well as add other users to the program.

Certain features and settings are enabled on Windows 11 by default that you might want to disable to improve the speed of the OS. If you have an unsupported device or old hardware with a low amount of RAM, you should immediately limit or disable the Microsoft Teams icon which is pinned to the taskbar of the new operating system.

Source: WindowsLatest

While you can find out the RAM usage on Windows Task Manager, there’s another simple way. Here’s how to find out how much RAM your computer is utilizing, follow the steps below:

  1. Click Start
  2. Search for “About Your PC”
  3. Find the section “Device Specifications”

From there, you’ll see “Installed Ram” information. You can then determine if your computer needs an upgrade.


If you have any Windows 10 issues, please give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities.  This blog post is brought to you from our staff at the Plano Computer Repair Service, if you need computer repair in Plano, TX please call the local office at (469) 299-9005.

Romance Scams are a Thing

With Valentine’s Day around the corner, it’s best to be reminded to stay vigilant with e-mail scams. Because romance scams are a massive moneymaker for hackers.

According to the Federal Bureau of Investigations, or FBI, “In 2020, complaints filed with the FBI’s Internet Crime Complaint Center (IC3), showed that victims lost more than $281 million to romance scams. South Carolinians reported losses of more than $4.4 million that year. These schemes affect victims from all demographics, but elderly women are often targeted most.”

Outside of a dating website, rapid efforts to contact via email or messaging services is one of the warning signs of a hacker. These attacks often request money, or personal information in exchange for forms of affection or sympathy.

It’s suggested to report a romance scam to the IC3. if you suspect you have been a victim. You should notify the website or application from which the contact originated. If you come across any fraudulent or questionable transactions, you should also inform your banking institution.


For help with any computer issues, call us at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you by our staff at the Pasadena Computer Repair Service. If you need computer repair in Pasadena, TX please call or text the local office at (281) 860-2550.

Let’s Talk Bloatware

When it comes to computer terminology, seeing any word ending in ‘ware’ is worrisome. Malware, Ransomware, and spyware are just a few that raise red flags as they are created to sneak into unsecured software. This in turn gives hackers the ability to steal personal information such as social security numbers or bank credentials.

No one wants that. We want to feel safe and secure during our time on the web. I’m sure we can all be in agreement that our computer time, in general, should be a pleasant experience.

So let’s talk about another kind of ‘ware’, named Bloatware. What is it exactly?

So a short answer is, Bloatware is simply unnecessary, preinstalled software.

These preinstalled apps can cause issues within the operating system. You may find a reduction in battery life or a lower quality in performance. Just recently, WindowsLatest shared an announcement made by Microsoft. This statement explains how Microsoft understands some of the preinstalled apps available on Windows 10 are often useless to users.

“When you buy a new device, you expect it to be clean with fewer apps. Unfortunately, most new Windows 10 PCs are clogged with unnecessary preloaded software from Microsoft and OEMs, and even the clean install of the OS includes unwanted apps, such as 3D Viewer and Paint 3D.”

Source: WindowsLatest

Thankfully, Microsoft has shared that their upcoming updates will include an ‘optional’ button for those apps you may not use. This change will most likely be seen in the upcoming Sun Valley update in October or November.


If you have any questions regarding Apple OS, call us at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the Phoenix Computer Repair Service. If you need computer repair in Phoenix, AZ please call our local office at (602) 445-9862

FBI Cautions About LockBit 2.0

Since its inception as a ransomware-as-a-service in September 2019, the LockBit ransomware organization has been particularly active (RaaS). After malware perpetrators were prohibited from participating on cybercrime sites, LockBit revealed the LockBit 2.0 RaaS on their data leak site two years later, in June 2021.

In a notice published on Friday, the Federal Bureau of Investigation (FBI) disclosed technical data and signs of breach linked with LockBit ransomware assaults. They stated that upon infiltrating a targeted system, LockBit 2.0 attackers increase access using publicly available tools like Mimikatz.

How To Remedy

On the FBI website, they state to lessen the danger of LockBit 2.0 ransomware penetration, the FBI advises users to utilize these preventive measures:

  • Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to have strong, unique passwords. Passwords should not be reused across multiple accounts or stored on the system where an adversary may have access. Note: Devices with local administrative accounts should implement a password policy that requires strong, unique passwords for each individual administrative account.
  •  Require multi-factor authentication for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.
  •  Keep all operating systems and software up to date. Prioritize patching knownexploited vulnerabilities. Timely patching is one of the most efficient and cost-effectivesteps an organization can take to minimize its exposure to cybersecurity threats.
  •  Remove unnecessary access to administrative shares, especially ADMIN$ and C$. IfADMIN$ and C$ are deemed operationally necessary, restrict privileges to only the necessary service or user accounts and perform continuous monitoring for anomalous activity.
  •  Use a host-based firewall to only allow connections to administrative shares via server message block (SMB) from a limited set of administrator machines.
  •  Enable protected files in the Windows Operating System to prevent unauthorized changes to critical files.Adversaries use system and network discovery techniques for network and system visibility and mapping. To limit an adversary from learning the organization’s enterprise environment, limit common system and network discovery techniques by taking the following actions:
  •  Segment networks to prevent the spread of ransomware. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
  •  Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool. To aid in detecting the ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network. Endpoint detection and response (EDR) tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.
  •  Implement time-based access for accounts set at the admin level and higher. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the AD level when the account is not in direct need. When the account is needed, individual users submit their requests through an automated process that enables access to a system, but only for a set timeframe to support task completion.
  •  Disable command-line and scripting activities and permissions. Privilege escalation and lateral movement often depend on software utilities that run from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.
  •  Maintain offline backups of data, and regularly maintain backup and restoration. This practice will ensure the organization will not be severely interrupted, have irretrievable data.
  •  Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted) and covers the entire organization’s data infrastructure.

If you’re needing help with computer problems, call us at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you by our staff at the Boulder Computer Repair Service. If you need computer repair in Boulder, CO please call or text the local office at (720) 441-6460.

Using iPad as Second Monitor

Apple’s operating system incorporates a number of handy attributes throughout all of their devices. One in particular allows iPads to be used as a second monitor.

Named Sidecar, this feature has the ability to either act as a second monitor or a mirror. Be certain both your iPad and your Mac are on the same WIFI.

“If you’re using macOS Catalina, click the AirPlay icon  in the menu bar, then choose your iPad from the menu. (If you don’t see the AirPlay icon, choose Apple menu  > System Preferences, click Displays, and select “Show mirroring options in the menu bar when available”.)”

Source: Apple Support

For inquiries or help with any Apple brand products, call us at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the Denver Computer Repair Service, if you need computer repair in Denver, CO please call or text the local office at (720) 441-6460.

New Task Manager Design

The Task Manager in Windows 11 is undergoing significant changes, including the addition of dark mode support. According to experts, the new design is built on top of the previous interface. In the final version, you might be able to restore the traditional appearance. The previous Task Manager’s tabs have been replaced with a sidebar, which allows you to navigate between the app’s many parts.

The new Task Manager follows the same approach as the existing app. For example, there are no changes to the process, performance and other tabs.

The tabbed approach that Task Manager currently uses seems just about right, but it appears that Microsoft is switching to a new design layout where process and other tabs will appear in the hamburger menu on the left side of the app.

This new menu will house options like Process, Performance, Services, and Settings.

Source: WindowsLatest

The Task Manager is an important core feature of Windows that appeared with Windows NT 4.0. After being revamped in Windows 8, the application hasn’t seen any substantial modifications in almost a decade.


If you have any computer-related questions, please give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities.  This blog post is brought to you by our staff at the Henderson Computer Repair Service. If you need computer repair in Henderson, NV please call the local office at (702) 800-7850.