technology blog

I don’t always use Internet Explorer but when I do, it’s usually to download a better browser


How to bring back your WordPress site after it crashed due to a plugin update

So the other day, I was updating a WordPress site that has been neglected for a while. Basically, every plugin needed to be updated in addition to WordPress itself. I started with a backup in case something went wrong. I believe the backup plugin that I used was Updraft which downloaded a backup of the site to the server. After doing the backup, I updated to the latest version of WordPress. The site still worked. The next step was taking 3 plugins at a time and updating them. The first round worked. After updating the next 3 plugins, I checked the site and got a white screen with an error pointing to a specific plugin. Can’t remember which one it was. Anyway, nothing worked. The site did not work and I could not get into the wp-admin console. This was not a good feeling! I called my friend up and he knew exactly what to do. I had to go into the server where the files reside and rename the plugin that was causing the error. The plugins folder is in the wp-content folder. After adding a – in front of the plugin that was giving the error, the site was accessible again. What a relief! Simple fix.


How to change your own broken laptop screen

Broken screens are common in today’s digital age. Accidents happen, especially when we are on the screen for so many hours a day. This video shows you the basic steps needed to remove and replace a cracked lcd screen. Every laptop is different but the basic principal is the same. I taught my middle school kids how to do it and now they are able to repair cracked laptop screens.


What’s your favorite device to browse the internet?

We’re spending hours on the internet every day and most people have multiple devices including a laptop, cell phone, and tablet. What’s your go to device for browsing the internet? Me personally, it’s my iPhone.  When I want to look something up really quickly, the cell phone is my go to.  It’s all about the speed. Voice to text is set up on the phone and it’s really easy to speak what I want to search for.  The iPhone is also really fast and if the computer is logged off, it may take a couple extra seconds to get to where I want to.  We’re talking about seconds! This is 2019, where seconds matter! LOL. It’s our reality. So what’s your go to device for browsing the internet?


iPhone 7 video stuck in a weird loop and keeps flashing a blurry image

So this has been happening to my iPhone 7 lately where the video mode is really blurry and keeps blinking as if it’s trying to turn on and doesn’t quite make it there. Thought it was maybe a hardware issue or possibly damage from peeking at the latest solar eclipse.  It’s neither of those things though.  After some google searching, people are powering down the phone, resetting the phone, switching to photo mode and then back to video.  What has worked for me was closing all open apps and today I figured out that the photos app when closed stops this loop from happening. So, if this ever happens to you, try this:

double tap the home button

find the photos app

swipe up

that’s it. Annoying, at least it’s not that hard to do.  Good luck!



Just upgraded from an Apple iPhone 5 to iPhone 7

It’s been a while since I posted anything on this blog so figured it would be a good time to write something because I just got the iPhone 7.  My old phone was a beat up iPhone 5 that i’ve been using for the last 3 1/2 years so it definitely got its use. Upgrading from a 5, I am blown away with what this 7 has to offer.  1st of all, my 5 didn’t have the finger print reader so I was punching in my 4 digit code every time I wanted to open the phone.  Now, all I have to do it touch the home button and instantly get access to the home screen.  I’ve seen the finger print take a few moments on a 5s and 6 but because this processor is such a beast, I am instantly authenticated.  It’s a beautiful thing.  The camera is way better than the 5.  The night pictures are pretty amazing for a phone.  Still no where near as good as a DSLR but I am not concerned about that at all. The lack of a headphone jack is a little bit of a pain but manageable.  It’s kind of how I felt when my laptop didn’t come with a dvd drive.  I was uneasy at first and then got used to it. Overall, I love this phone and will report again when I get more familiar with it. Thanks for reading!


Beware of Rogue Anti-Viruses, Scareware

Rogue Anti-virus programs (also called “Scareware”) are spreading like wildfire. These programs pretend to be legitimate anti-virus programs, and lock users out their software, making the computer inoperable. They then warn that the computer is infested with viruses, and that you need to activate the program by giving them your credit card.

DON’T GIVE THEM YOUR CARD! These are fake programs created by criminals and they are likely to charge more then what they ask for. Regular anti-virus programs won’t lock you out and ask for payment to remove infections. Since the “Scareware” program, blocks users from accessing their programs, they can be a little tricky to remove if you don’t know the proper methods.


There are many different Rogue Anti-virus programs, but the proper removal process is almost always the same. In order to gain control of your computer again, you must boot into “Safe Mode with Networking”.


1.Restart your computer. When it first turns on, repeatedly press the “f8” key, to bring up a menu. In the menu, use your keyboard to select “Safe Mode with Networking”.

2.Now that you are in safe mode, you will usually see an icon for the rogue anti virus program on the desktop. (typical names are “Spyware Protect 2009/2012, XP-Antivirus, and System Security 2012.) Don’t open it! RIGHT CLICK on the file once and goto properties. It will now show the actual location of the virus. Almost always the virus will be located in the windows “Application Data” folder.

3.Now that you know the name and location of the Rogue Virus, browse to the folder where it is located, and delete the file. Make sure to empty the recycle bin to ensure it is gone for good.

4.Next, remove the virus from the windows startup using Msconfig. For Win7 and Vista, click the start button, and in search box, type “msconfig” and press the “enter” key. For XP and older versions, click Start, then “run”, then type “msconfig” and press the “enter” key.

5.Navigate to the “Startup” tab, and deselect the scareware program from the list. If having trouble finding it, it is usually located in the “Application Data” folder, and you should be able to see it in the list.

6.Stay in msconfig, and check the “services” tab to make sure the program isn’t located in there as well.

7.Click Apply, and close msconfig. It will ask if you want to restart. Restart the computer, and the fake anti-virus program should be gone. After you reboot, update your current real anti-virus program and do a “full scan” to ensure there are not any other infections.


1.Boot into “Safe Mode with Networking” using the same instructions located above.

2.Now that you are in safe mode, download and install the free program “SuperAntiSpyware”, and run a quick scan or full scan.

3.SuperAntiSpyware should pick up the virus and remove it. After the scan, the program will usually require a restart to finish the removal process.

4.If SuperAntiSpyware doesn’t do the job, try another free program called “Malwarebytes”.

5.If both programs fail to help, use the manual removal instructions located above.

Article Provided by Eugene Computer Geeks, Computer Repair Eugene Oregon


Think your WIFI network is protected?

Most people assume if they have a password set on their wireless network that they are safe.  This is usually not the case.  There are three main types of security methods, and all can usually be cracked quite easily and quickly.

WEP’s are very easy to crack, and takes almost no time at all. Software can decrypt the password by observing patterns of packets collected in the air. WEP is an older password method, but is still commonly used, and it is even set as default for many new routers. Avoid WEP whenever possible.

WPA and WPA2 is the safest method to use, but can still be cracked if the password is too short or commonly used. The attacker will “sniff” the network and get the encrypted password. They will then feed the string into a program that goes through very large password lists or guesses every combination till it finds the decrypted key. These programs can guess thousands of passwords per second, and if the cracker uses multiple computers, they can guess many combinations VERY quickly.  Make sure to make the password very robust. A good rule of thumb is to create a password that nobody else on earth is ever likely to use.

Invisible Network
This usually can easily be circumvented by using software that waits for a user to connect to the network. This then gives away the SSID or network name away.

Mac Address filtering
Mac address filtering is another method that can easily be beaten.  The attacker can spoof their MAC address to be the same as a user on your network, and trick the router into thinking they are that user.

Rogue WIFI Networks
Another thing to look out for is Rogue WIFI networks.  Hackers can easily set up a network with the same name as yours, kick you off and force you to connect to their network without your knowledge. They then strip all the browser encryption from your session, making them able to view everything, including grabbing sensitive information like passwords, credit card numbers, and banking information.  For more information on protecting yourself from rogue networks and other attacks, please check out Eugene Computer Geeks Free Tech Support Chat.

Remember, everyone is a target. It’s possible to build very sophisticated antennas that can connect from long distances. The attacker could have many reasons to break in.  Once they penetrate your network, they can usually break into other systems on your network.  Attackers can also use your network to commit crimes and cover their identity. Once they have the password, they can decrypt packets they “sniff” from the air, and see your private data.

Use WPA or WPA2 and make sure to set a long and unique password.


Parting with Firefox 3.6

Firefox 3.6 is a good browser. It’s such a good browser that 20% of Mozilla clients were still using it last month, even though Mozilla recently released the 9th edition of Firefox. In fact, 82% of Firefox users were still surfing the web with Firefox 3.6 a year ago. Since that time, many users have slowly made the transition to newer versions of the browser. Some Firefox 3.6 loyalists (the 20%), however, have decided to stick with what works for them.

Users who have enjoyed Firefox 3.6 for years and are hesitant to upgrade will be disappointed that Mozilla plans to completely retire Firefox 3.6 in April of this year. This means that Mozilla will not provide any sort of support for Firefox 3.6 users, even businesses who have been loyal to the version of the browser since its 2008 release. Earlier this year, Mozilla had stated that they would continue to support the browser for business users indefinitely, but they have since changed their minds. Firefox 3.6 will soon become a browser of the past.

Many Mozilla users claim that Firefox 3.6 is the most reliable Firefox version. Versions 4, 5, 6, and 7 all had significant problems with bugs. These problems caused users to either switch back to 3.6 or switch to another browser like Chrome or Safari. Firefox 8 seemed to have fixed most of the bug issues, but some users were understandably wary about upgrading when version 8 was released. Now that Firefox 9 is available, Mozilla is working overtime to patch up bugs and make sure the reputation of its newest Firefox version stays intact.

If you are a proud Firefox 3.6 user, the time has come for you to make a decision. You can only use your favorite browser for a few more months, and then you will have to either upgrade to a new version of Firefox or try something else out. Maybe you’ll switch back to Internet Explorer or Safari. Or maybe you’ll try out Chrome. In the end, the choice is yours. Just don’t expect any browser to be able to do exactly what Firefox 3.6 did for you.

Author’s Bio: Ryan is a Blog Content Guild writer who is interested in the subjects of web browsing, CSS, and saving money.


Digital Nativity – A Digital Christmas Story

The Digital Story of the Nativity tells the story of the first Christmas through the eyes of social media.