Welcome to the Computer Repair Technicians website.

Thank you for your visit to the Computer Repair Technicians website. Our goal is to help people from all over the world find qualified computer help, performed by real professionals.

And to help these professional Computer Repair Technicians expand the circle of people that they can help and to promote higher standards in the computer support field.

News Feed

Latest news Most recent news

  • Can the police search your phone?
    by Mike Elgan on August 18, 2018 at 11:20 am

    Can the police search your phone?The answer to that question is getting complicated.But it’s an important thing to know. The reason is that your phone, and the phones of every employee at your company, almost certainly contain company secrets — or provide access to those secrets.Phones can provide access to passwords, contact lists, emails, phone call metadata, photos, spreadsheets and other company documents, location histories, photos and much more.[ Related: The paranoid Android traveler’s data-protection checklist ]Proprietary data — including information that would enable systematic hacking of company servers for sabotage, industrial espionage and worse — is protected from legal exposure by a complex set of well-understood laws and norms in the United States. But that same data is accessible from company phones.To read this article in full, please click her […]

  • What’s new in the F# programming language
    by Paul Krill on August 17, 2018 at 7:30 pm

    In mid-August 2018, Microsoft released the production Version 4.5 of F#, which supports the Span value type from .Net Core to improve code.To read this article in full, please click here(Insider Story) […]

  • The best laptops: Premium laptops, cheap laptops, 2-in-1s, and more
    by Gordon Mah Ung, Melissa Riofrio, Alaina Yee on August 17, 2018 at 6:54 pm

    Today’s best laptops bask in the glow of Intel’s 8th-gen Core CPUs, which at last bring quad-core performance to mainstream machines. The only thing missing is Oprah shouting, “and you get an 8th-gen quad-core laptop!”There’s plenty of good news with this new generation. Our favorite convertible laptop, HP’s Spectre x360 13, sports a quad-core 8th-gen chip while maintaining its diminutive size. It’s really the total package. But let’s be honest: You probably don’t need a quad-core powerhouse, especially if the hottest application you run is Microsoft Excel. Check out our budget favorites, like the Acer Aspire E 15 and Asus ZenBook Flip, whose dual-core CPUs do just fine with mainstream fare. Or read about the Asus Chromebook Flip, a well-priced and versatile laptop for living on the web—or delving into the wide, wide world of Android apps. To read this article in full, please click her […]

  • IBM, Maersk launch blockchain-based shipping platform with 94 early adopters
    by Lucas Mearian on August 17, 2018 at 3:51 pm

    After launching a proof of concept earlier this year, IBM and Maersk have unveiled TradeLens, the production version of an electronic ledger for tracking global shipments; the companies say they have 94 participants piloting the system, including more than 20 port and terminal operators.The jointly developed electronic shipping ledger records details of cargo shipments as they leave their origin, arrive in ports, are shipped overseas and eventually received.To read this article in full, please click her […]

  • What is Nmap? Why you need this network mapper
    by Marc Ferranti on August 17, 2018 at 10:00 am

    Network administrators, IT managers and security professionals face a never-ending battle, constantly checking on what exactly is running on their networks and the vulnerabilities that lurk within. While there is a wealth of monitoring utilities available for network mapping and security auditing, nothing beats Nmap's combination of versatility and usability, making it the widely acknowledged de facto standard.What is Nmap? Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks.To read this article in full, please click her […]

Krebs on Security In-depth security news and investigation

  • Indian Bank Hit in $13.5M Cyberheist After FBI ATM Cashout Warning
    by BrianKrebs on August 17, 2018 at 7:27 pm

    On Sunday, Aug. 12, KrebsOnSecurity carried an exclusive: The FBI was warning banks about an imminent "ATM cashout" scheme about to unfold across the globe, thanks to a data breach at an unknown financial institution. On Aug. 14, a bank in India disclosed hackers had broken into its servers, stealing nearly $2 million in fraudulent bank transfers and $11.5 million unauthorized ATM withdrawals from more than two dozen cash machines across multiple countries. […]

  • Hanging Up on Mobile in the Name of Security
    by BrianKrebs on August 16, 2018 at 5:01 pm

    An entrepreneur and virtual currency investor is suing AT&T for $224 million, claiming the wireless provider was negligent when it failed to prevent thieves from hijacking his mobile account and stealing millions of dollars in cryptocurrencies. Increasingly frequent, high-profile attacks like these are prompting some experts to say the surest way to safeguard one's online accounts may be to disconnect them from the mobile providers entirely. […]

  • Patch Tuesday, August 2018 Edition
    by BrianKrebs on August 15, 2018 at 2:52 pm

    Adobe and Microsoft each released security updates for their software on Tuesday. Adobe plugged five security holes in its Flash Player browser plugin. Microsoft pushed 17 updates to fix at least 60 vulnerabilities in Windows and other software, including two "zero-day" flaws that attackers were already exploiting before Microsoft issued patches to fix them. […]

  • FBI Warns of ‘Unlimited’ ATM Cashout Blitz
    by BrianKrebs on August 13, 2018 at 12:28 am

    The Federal Bureau of Investigation (FBI) is warning banks that cybercriminals are preparing to carry out a highly choreographed, global fraud scheme known as an "ATM cash-out," in which crooks hack a bank or payment card processor and use cloned cards at cash machines around the world to fraudulently withdraw millions of dollars in just a few hours. […]

  • Florida Man Arrested in SIM Swap Conspiracy
    by BrianKrebs on August 7, 2018 at 7:27 pm

    Police in Florida have arrested a 25-year-old man accused of being part of a multi-state cyber fraud ring that hijacked mobile phone numbers in online attacks that siphoned hundreds of thousands of dollars worth of bitcoin and other cryptocurrencies from victims. On July 18, 2018, Pasco County authorities arrested Ricky Joseph Handschumacher, an employee of the city of Port Richey, Fla, charging him with grand theft and money laundering. Investigators allege Handschumacher was part of a group of at least nine individuals scattered across multiple states who for the past two years have drained bank accounts via an increasingly common scheme involving mobile phone "SIM swaps." […]

TechCrunch TechCrunch is a group-edited blog that profiles the companies, products and events defining and transforming the new web.

  • The tech angle in dogs, mac and cheese and working out
    by Henry Pickavet on August 19, 2018 at 12:08 am

    Welcome back to TechCrunch Mixtape, the podcast where Megan Rose Dickey and I, Henry Oliver Pickavet, talk about some of the stories of the week that we feel like talking about. This week it was dogs, working out and mac and cheese. BarkBox creators Bark and Co. decided that Nashville, Tenn., needed a place for […]

  • Distributed teams are rewriting the rules of office(less) politics
    by John Chen on August 18, 2018 at 5:47 pm

    When we think about designing our dream home, we don’t think of having a thousand roommates in the same room with no doors or walls. Yet in today’s workplace where we spend most of our day, the purveyors of corporate office design insist that tearing down walls and bringing more people closer together in the […]

  • Global unicorn exits hit multi-year high in 2018
    by Joanna Glasner on August 18, 2018 at 4:09 pm

    Unicorn exits are taking flight. With the IPO window wide open, an apparent record number of venture-backed companies privately valued over $1 billion have launched public offerings this year. […]

  • Gaming in Asia may be crypto’s killer decentralized app
    by Joyce Yang on August 18, 2018 at 3:29 pm

    As money and talent flows into the crypto and blockchain worlds, a persistent question keeps coming up: what is going to be the “killer app” that drives adoption for these nascent technologies? The answer may well be quite simple: gaming in Asia. That’s the theory for Cryptokitties, the notable purveyor of cute cats. The company has […]

  • Only 48 hours left: Apply to Startup Battlefield at Disrupt Berlin
    by Samantha Stein on August 18, 2018 at 8:02 am

    The action you take within the next 48 hours could change your life. That’s how much time you have left to apply to TechCrunch Startup Battlefield, our world-renowned pitch competition, which takes place at Disrupt Berlin 2018 on November 29-30. The application deadline expires on August 20th at 9 p.m. PST. Don’t waste another minute — apply […]