| About Geek Squad | Careers | Media/PR | Contact Us | Store Locator

The Archives

Archive for the ‘Computing’ Category

Connecting Your Laptop to Your TV with WiDi

Tuesday, April 15th, 2014

With the explosion of video content on the Web, many of us are using our computers, at least some of the time, to just watch TV. Video sharing services like YouTube, Web broadcasting sites like Hulu and Netflix, and pay-for-play services like Amazon Prime and iTunes have made our computers a key source of video entertainment in the modern home.

But anyone who has tried to watch a long video with someone else on a laptop knows, all that closeness is, well, close.

Fortunately, Intel and the television industry have solved this problem for you. Many newer TVs come with a WiDi (wireless display) connection that will allow you to connect your laptop to it wirelessly. I recently teamed with the Best Buy video production team to put together a short instructional video on how to link your Windows 8 laptop to a WiDi-enabled TV. Take a look at the video here:

Send What’s on Your Laptop to Your TV

If you are struggling to link the big screen in your house to your computer, chat with an Agent or visit a Precinct at your local Best Buy store.

Agent Gernbacher has been wrangling misbehaving and unruly Home Theater, PC, and Car Audio technology for the last 15 years. When he is not out saving the world as a Secret Weapon for the Geek Squad, he is preparing his little ones to take over the world, making people laugh with his ridiculous eyebrows and personality, pretending to moonlight as a chef or raging to whatever sounds he can find on the internet.

Support for Windows XP Ends Tuesday

Friday, April 4th, 2014

I know we’ve said this before, but it’s kind of a big deal if you are still using Windows XP – Microsoft will stop supporting the XP operating system next Tuesday (4/8/14). Agent Devin Collins gives some advice in our YouTube video.

If you think you are using Windows XP, we suggest you check on a few things:

  1. Confirm that you are using XP. Microsoft has a web site that will detect if you are running XP. To use the service, go to
  2. Can you keep running XP. If you are currently using XP and would like to continue with it, there will be a number of things you should take into account. The primary concern is the system itself will be less and less secure as time goes on without security updates from Microsoft. For a good summary of these and other issues brought about by the sunsetting of XP support, visit the Microsoft Stops Supporting Windows XP page on our main website. If you want to go ahead using the system anyway, be sure to visit the What to Do If You Want to Keep Windows XP After Support Ends page on our site.
  3. If you want to upgrade to a newer version of Windows but have an older machine, check to see if you can upgrade to Windows 8 by downloading the Windows Upgrade Assistant from this page. Microsoft is selling the Windows 8 system for users of XP or Vista, but does not sell the older versions of the sytem through their normal channels. Although you may be able to find a merchant willing to sell you a copy of the Windows Vista or Windows 7 operating system, be careful that the merchant selling you the software will back it up. Some legitimate resellers may still have valid copies of the system available, but do your due dilligence whenever you deal with software resellers.

As we said in our earlier posts about the subject, continuing to use XP after Microsoft stops supporting is can leave you open to a myriad of challenges, not the least of which exposing your data to cybercriminals. If would like help dealing with the process, we have Agents standing by.

Geek Squad will continue to support clients that stay on XP to the best of our ability and while we recommend moving to a modern operating support that is supported my the manufacturer, for those that are going to stay with XP should follow some instructions we collected to try to minimize the risk as much as possible.

It is hard to walk away from a system that has served us so well, but, to everything, turn, turn, turn….

Agent Tanya B. has been a woman of technology since 2009. When she steps away from her role maintaining the website, Tanya is either at the gym, walking her dog, or gaming with the other Agent B. Having moved to corporate from Florida last spring, she’s trying really hard to not complain about the cold too much.

More on the Retirement of Windows XP

Monday, March 31st, 2014

As we mentioned in a post last week, Microsoft will stop updating and supporting its Windows XP operating system beginning April 8, 2014.

Our web team collected some information about the sunsetting of XP, and what users should do to improve their network security if they choose to continue using XP. Stopping support of Windows XP means that Microsoft will stop fixing new bugs discovered in the system — providing new opportunities for hackers waiting to take advantages of XP’s new vulnerabilities. Basically, XP will become increasingly insecure as time goes on, and users’ data will be more in jeopardy as time passes without updates.

For more on what this means to people currently using XP and what they can do about it, visit our “Microsoft Stops Supporting Window XP page” on

We also dug around and developed a few recommendations for users who aren’t ready to let go of Windows XP. If you are planning on using XP on your computer after April 8, you should really check out our “What to Do If You Want to Keep Windows XP After Support Ends page” on

If you have questions on how you should handle this, we have Agents standing by.

Agent Tanya B. has been a woman of technology since 2009. When she steps away from her role maintaining the website, Tanya is either at the gym, walking her dog, or gaming with the other Agent B. Having moved to corporate from Florida last spring, she’s trying really hard to not complain about the cold too much.

So long, Windows XP (Microsoft Says Farewell to an Old OS Workhorse)

Wednesday, March 26th, 2014

It’s official — beginning April 8, 2014, Microsoft will no longer provide updates for that old, faithful workhorse of the masses - the Windows XP operating system.

First launched in October of 2001, XP was a huge leap forward for Microsoft — being a more secure, stable and effective system compared to earlier versions of Windows. While they replaced with Windows Vista six years later, and have released two more OS versions to date (Windows 7 in 2009 and Windows 8 in 2013), lots of people still use the old OS. Now, Microsoft seems ready to put their old XP horse out to pasture.

When Windows XP was originally released, I was initially reluctant to make the switch — mostly due to the amount of money I earned on my paper route, and the hefty price tag for XP at the time. (Plus, Windows 98 was doing everything I needed it to do: mainly play Doom and Age of Empires.) When I finally got my hands on a copy of XP, I realized all the changes made for a much more enjoyable Windows experience.

Windows XP helped me achieve a great deal: build my first web page, compose and record my first song, create my first logo, and (of course) fix dozens of interesting tech issues for my friends and neighbors. So while I moved on from Windows XP long ago, I’ll always have the fond memories of those early days.

So, for you XP lovers out there – never fear. XP isn’t going to “turn off” on April 8. It will keep working on your machine once support ends. What’s going to happen is this: Microsoft will stop sending out security updates and bug fixes for the OS. In turn, this makes the OS increasingly vulnerable to malware and hacker exploits. If you keep using XP, you run an ever-growing risk of exposing your private data to hackers, and the potential for identity theft grows right along with it. Don’t want to take that risk? Then Geek Squad strongly recommends you update your operating system to one that is supported (Windows Vista, 7, 8 or 8.1) that have the latest security updates needed to help keep your data safe and secure.

If you are using XP because your computer is old and cannot accommodate a newer version of Windows… well, that’s a bit of a problem. Your only solution may be to retire the old machine and buy somthing newer. (When it comes to your financial data, better safe than sorry.)

We are preparing some content for our web site about the XP shutdown. Keep an eye on this space, and we will link to it when we get it published.

Agent Williams joined the ranks of Geek Squad in 2007, earning the badge number #13337 and the alias “Agent Leeet Sauce”. Now Agent Williams protects the internetz from the Geek Squad Magic Castle. When he’s not policing unruly technology (or eating cookies) he can be found making music, chasing down his badge (it’s been on a trip to the stratosphere) or riding his imaginary pet unicorn.

Beware the Netflix Phishing Scam

Thursday, March 13th, 2014

Last week we published an blog post about how to avoid being a victim of a phishising scam. We hope you took a minute to read it. Although some think the identity theft that happens on the Internet is techie wizardry, nearly all of it can be thrwarted by just being a little more aware of what you’re doing when you’re out on the big bad Web. Skepticism is always the best first line of defense against cyber criminals.

I recently ran across a story on the Malwarebytes Unpacked blog, a site maintained by a computer security company dedicated to the belief that “everyone has a fundamental right to a malware-free existence.” The story brings to our attention a new flavor of the ‘computer support – you have malware -let me unlock your computer for you scam’ that was the subject of a post I did last summer. Although the scam itself is similar to the ones we have been talking about here lately, I wanted to bring it to your attention because of the hook this one uses.

In this instance, a potential victim goes to the Netflix home page to log in to their account and, after putting in their login information, are presented with a pop-up informing the user that Netflix had suspended their account because some suspicious activity had been detected. The pop-up displays a phone number and instructs the user to call that number to regain access to your account.

It’s a pretty typical fake tech support center scam when it comes down to it. But because so many of us are regular Netflix users, I wanted to get this out their to help you protect yourself.

Here’s what the pop-up looks like:

netflix scam popup

Here’s an article about the scam from the British version of
Watch out for this Netflix ‘tech support’ scam

Here’s the original Malware Unpacked blog post about it:
Netflix Phishing Scam leads to Fake Microsoft Tech Support

As always, be careful out there on the Interwebs.

Agent Derek has been removing techno-stress from the lives of his Geek Squad clients since 2005. When not providing remote help as an Online Support Agent, he likes to take to the road on a vintage motorcycle for adventures through Ohio country highways.

Google Does "Takeout":
Your Data is Now Easier to Download

Thursday, March 6th, 2014

Google – owners of the the most popular website in the world (according to Alexa) – has never been satisfied being just the primary search engine to the Web. Between mapping the Earth through Google Maps and attempting to make everyone a data input via Google Glass, Larry Page and Sergey Brin have converted Google into one of the main forces driving innovation in the world.


Nowadays, Google looks like a company moving beyond it’s original mission of managing the internet’s data. With the development of their free software services (Gmail, Google Calendar, Blogger, etc.), Google has revolutionized the way people interact online. Their light, mobile-friendly applications provide standard tools anyone can use to write documents, share pictures, schedule appointments and stay in touch. As computing becomes more mobile, the availability of small, standardized cloud-based applications will become even more important to the public – and Google seems well-positioned in this regard.

However… there is also the issue of portability. A serious criticism of free software programs is this: many of them are proprietary and files generated by these tools often can only be read and edited by that tool. Worse yet, many web-based apps don’t allow users direct access to their own data. (For some of us, that’s kinda hard to live with.) I don’t feel good unless I know where my data is and can manipulate it as I see fit.

This was originally true of many of the Google Data Tools. But then a group of Google developers banded together to form “The Data Liberation Front” and that all changed.

Beginning in June 2009, Google began making data generated by their applications available for download by account users. The “Google Takeout” project was started as a way to give Google users the control over their data they wanted. They started by making available data from Google Buzz, Google Contacts, Google Streams and Picasa Albums. The project shortly added Google Plus and Google Voice to the list of available data. Over the next two years, data from other Google applications was added based on user request.

But it wasn’t until December 2013 that the project was able to make available arguably their most popular and most sensitive data – messages from Gmail accounts. (Seriously, who doesn’t have a gmail account by now?) Now, your emails are no longer stuck on the Google servers.

At this time, the Takeout project supports 14 Google products, ranging from documents stored on Google Drive to events you are tracking on your Google Calendar. Takeout allows users to select the data they would like to have by application, converts it into a single ZIP file and makes it available for download through the user’s Google account.

To find out more, visit the Google Takeout page here.

Agent Ron G. has been battling the forces of unruly technology run amok since 2001, prior to Geek Squad’s acquisition of Best Buy. When not busy creating video & technical training content for Geek Squad Agents in the field, Agent Ron enjoys home brewing, international travel, sketch writing, and learning how to cook new cuisines.

Phished In! (How to Avoid Being Hooked By a Phishing Scam)

Friday, February 28th, 2014

Has this ever happened to you? You open an “official-looking” email that looks like it’s from your bank, credit card, etc. The message is dire — someone may be messing around with your account, and only clicking on a link to “correct” or “verify” your account information will save you. Hurry! Quick! Do it now! Without even thinking about it, fear of loss drives you to click on the link and supply the information requested (and breaking one of the cardinal rules of online security in the process).

SNAP! You’ve just been reeled in… by a phishing scam. (Don’t feel too bad… lots of smart people fall for the same thing all of the time.) Why?

Phishing scammers — people attempting to harvest your valuable, private information (like passwords or credit card information) by posing as trustworthy organizations or businesses – are all over the Internet. Everyone with an email account has probably seen a phishing email, which often looks uncannily like something from your bank, company, etc. Common to all of them is an inciting message — something requires your action NOW, or there will be problems.

The good news is that, although some phishing scams create pretty convincing email layouts, there are usually clues that you can find that all is not right with their request. We recently ran across a blog post on CNET that discusses ways to tell if an email is part of a phishing scam. It’s got some really good tips in it to help you avoid falling victim to these scams. Take a look at it here:

Spot a Phishing Email in 2014

One of the keys to keeping your identity safe online is to never give up your information easily. In the fast-paced rhythm of today’s world, is easy to rush from one task to the next without much thought. Fraudsters running phishing scams rely on that — distracted users are easy targets.

Phishing relies on people’s predilection toward following rules, and being helpful and cooperative. Online hustlers are skilled social engineers, manipulating people to turn their natural tendencies and good intentions into profit. So, when responding to a “your data has been stolen” or “click here for a prize” email, remember to slow down and ask yourself one question – why do they need it? Legitimate outfits won’t ask you for information they already have, so any such request is a dead giveaway that something isn’t right.

Be careful if an email offers an easy fix to your information being compromised. If a legitimate organization had their customer database compromised, they will be very careful about reestablishing contact with customers. They will also go out of their way to assure you that they are who they say they are, and will take care to protect your information — and definitely will not deploy a one-click solution to this problem.

For more on phishing and online scams, check out some of our recent blog posts:

Phone Scams and Computer Repair: Know Your Facts to Protect Your Computer

Online Shopping During the Holidays, Part 1: Let’s Be Safe Out There

Online Shopping During the Holidays, Part 2: Scamming in the Wireless World

Agent Patrick B. has been an Agent with the Geek Squad since 2005. When he isn’t overseeing the Geek Squad Web and Social Media presence, he can be found wandering the streets of Minneapolis in search of a fresh source of caffeine to fuel his all night gaming sessions.

Routers & Malware: No Longer Just Your Computer That's Vulnerable

Thursday, February 20th, 2014

Warning: it isn’t just your computer at risk from hackers. Some recently discovered issues with wireless routers from two different companies show that they too can be vulnerable to hacker exploits that can leave your data exposed to online evildoers. In one case, the affected routers allowed hackers to access data on the victim’s network, while in the other the router was used to distribute a self-replicating worm onto other users’ networks.

Users of Asus RT routers have reported that a router flaw allows hackers access to data on external USB hard drives attached to the router. Although some security experts believe that only users who have turned on the https service (part of the router’s AICloud feature) were affected, some users have reported their systems were compromised even though they never enabled that feature.

The best way to secure these potentially hackable routers is to update the router’s firmware, make sure all default passwords have been changed, and deactivate any remote access options. For more details on this, check out the excellent article about the situation on ARS Technica.

Dear Asus Router User: You’ve Been Pwned, Thanks to Easily Exploited Flaw (Ars Technica)

Security experts have also identified activity online indicating a persistent attack on networks using Linksys routers, particularly those of the Linksys E series. The attack involves the distribution of malware designed to seek out and hijack other networks connected to the Internet by vulnerable devices. Although experts have not been able to identify the purpose of the attack, it is consuming significant bandwidth in specific IP ranges. Some speculate the attackers may be testing their ability to assemble a botnet (a network of compromised computers) that could exploit the Linksys router vulnerability.

Observers say simply restarting the router appears to remove the malware. However, this does not prevent the router from being reinfected. It appears that routers using updated firmware do not become infected, so it is suspected that the vulnerablity must be part of earlier versions of the firmware. Users with Linksys routers in the E series should go to the Linksys website and look for the 2.1 version of the software.

For more on this router-based vulnerability, check out this detailed article on ARS Technica:

Bizarre Attack Infects Linksys Routers With Self-Replicating Malware (Ars Technica)

If you think your system may have been compromised, we offer a Virus and Spyware Removal Service online, on-site and at Precincts in Best Buy stores.

Agent Williams joined the ranks of Geek Squad in 2007, earning the badge number #13337 and the alias “Agent Leeet Sauce”. Now Agent Williams protects the internetz from the Geek Squad Magic Castle. When he’s not policing unruly technology (or eating cookies) he can be found making music, chasing down his badge (it’s been on a trip to the stratosphere) or riding his imaginary pet unicorn.

Digital Learning Day Expo 2014: Geek Squad Academy Shares Game Programming Curriculum

Monday, February 17th, 2014

On February 4th, the Libary of Congress in Washington DC hosted the Digital Learning Day Expo, a conference promoting digital learning and technology education in the classroom. Geek Squad was there, presenting on the Game Programming class taught at our Geek Squad Academy camps.

This curriculum is extremely popular with the kids, and is a good way of engaging kids and teaching the kind of decision-making and experimentation behind successful digital creation. Using Geek Squad-created content and the Stencyl game creation software,  the class helps students develop the programming and problem-solving skills needed to fix errors intentionally introduced in our “Gopher Roman” game. The students fully engage in in the computer programming process, manipulating characters, environments, backgrounds and behaviors as they learn to solve problems they find in the game.

Stencyl is a great vehicle for introducing programming to younger audiences. Because it is a drag-and-drop tool that reduces computer coding to actions, students intuitively grasp the concepts as they work with the software, and are able to edit parameters and rearrange activity blocks much the way computer programmers do without having to learn complex programming languages.

Geek Squad Agent Travis Sellers and Best Buy Blue Shirt Kelsi Facsina ran a demo of the Gopher Roman program in the Best Buy booth at the Expo, showing educators and other attendees how the tool can be used to draw students into the programming process.

The Geek Squad Academy project team would like to thank everyone involved in this event, particularly the Alliance for Excellent Education, our partner in this effort. If you are a teacher, the Digital Learning Day website features Lesson Plans you can use to help your students understand and use technology more effectively. (The site also has a link to Best Buy’s Teen Tech Toolkit, which includes the Game Programming lesson plan.)

For more on the importance of computer science education in elementary and secondary schools, check out this story National Public Radio did as part of their All Tech Considered series.

A Push to Boost Computer Science Learning, Even at an Early Age

Agent Tanya B. has been a woman of technology since 2009. When she steps away from her role maintaining the website, Tanya is either at the gym, walking her dog, or gaming with the other Agent B. Having moved to corporate from Florida last spring, she’s trying really hard to not complain about the cold too much.

Valentine’s Day and Long-Distance Relationships: Skype to the Rescue!

Thursday, February 13th, 2014

Long distance relationships (LDRs) are not for the faint of heart. The late-night phone calls, frantic searching for low-cost airfares, the random text messages in the middle of the day, the joyous reunions and sad separations can take a lot out of a person. No matter how strong the connection between you and your loved one is, the miles between you can take their toll. Sometimes all you want to do is see his or her face.

As Valentine’s Day approaches, most of us are more concerned with “did I get the right gift?” (Answer: Chocolate and flowers are usually a winning combo.) But for those of us who have been in an LDR before, we know that the greatest gift is being able to be with your significant other — and when that’s not physically possible, we turn (as always) to technology for a fix.

One of the greatest things about technology and the Internet is that — together – they can bridge the gap between people separated by vast distances. The ability of modern hardware and network infrastructures enable us to stream clean, non-jerky two-way video & audio in real time is a glorious thing: so, if you can’t be with the one you love on the special day, at least you can still connect with each other via services like Skype.

Speaking of Skype, a few years back Agent Alex starred in one of our “Two Minute Miracle” videos on how to set up Skype on your computer. Check out the video on our site here:

Skype Setup: 2 Minute Miracles

If you have trouble getting this to work, Agents are standing by to help. Chat with one here.

Agent Tanya B. has been a woman of technology since 2009. When she steps away from her role maintaining the website, Tanya is either at the gym, walking her dog, or gaming with the other Agent B. Having moved to corporate from Florida last spring, she’s trying really hard to not complain about the cold too much.

Note: Comments are moderated and will be handled as per our privacy policy. Please keep your comments on-topic and free of profanity. For more information, please view our Blogging Terms of Use.


Tag Cloud