Clearing Out the Clutter: How to Rescue Photos from That Old Garage Computer
That dusty old computer in the garage probably hasn’t been powered on in years, but it still holds something you care about your photos, memories, and personal files. You don’t want to throw it away, but you also don’t want it taking up space forever. The good news is that you don’t have to keep the whole machine just to keep the data.
This is exactly the kind of situation we help with every day.
Why Old Computers Become “Storage Units”
Many people hang onto aging desktops and laptops for one simple reason: there are files on them they don’t want to lose. Even if the computer no longer boots properly, runs painfully slow, or has broken parts, the internal drive often still contains everything you need.
But keeping a full size computer around just for a handful of photos or documents isn’t practical. They take up space, gather dust, and eventually become e‑waste.
How We Help You Recover Your Files
You can bring that old computer to us tower, laptop, or even just the hard drive and we’ll safely extract your files. Our process is straightforward:
We remove or access the internal drive from your old system.
We scan it for your photos, documents, and other personal files.
We copy everything onto a storage device of your choice, such as:
A USB thumb drive (as long as it’s large enough)
An external hard drive or SSD
A drive you already own, or one we can provide
Even if the computer itself won’t turn on, the data is often still recoverable. In many cases, we can retrieve everything without needing to repair the machine.
Free Up Space Without Losing Your Memories
Once your files are safely transferred, you’re free to recycle, donate, or dispose of the old computer without worry. You get your digital memories back, and you reclaim space in your garage or storage area.
It’s a simple way to declutter while preserving the things that matter.
The Easiest Fix for Misbehaving Windows: Using Alt + Space to Resize a Hidden or Tiny Window
Every Windows user eventually runs into that moment: you open an app, and instead of appearing where you left it, the window shows up microscopic, off‑screen, or shaped like a weird sliver you can’t grab. You try dragging. You try maximizing. You try swearing at it. Nothing works.
Fortunately, Windows has a built‑in, decades‑old keyboard shortcut that can rescue almost any mis-sized or misplaced window:
Alt + Space
It’s simple, reliable, and works even when the window looks broken.
Let’s walk through how it works and why it’s such a lifesaver.
How Alt + Space Fixes the Window
Pressing Alt + Space opens the classic Window Menu—a tiny control panel that predates modern Windows UI but still works flawlessly.
From this menu, you can:
Move the window
Resize it
Maximize it
Restore it
Even if the window is invisible or unusably small, the menu still appears and gives you control.
Step‑by‑Step: Resize a Misbehaving Window Using Alt + Space
Here’s the exact sequence that works almost every time:
1. Make sure the window is active
Click its taskbar icon once.
(Even if you can’t see the window, this still activates it.)
2. Press Alt + Space
This opens the hidden Window Menu.
3. Press S to activate “Size” mode
Your cursor will change to a directional resize icon.
4. Use the arrow keys to stretch the window
Try Left, Right, Up, or Down until the window reappears or becomes large enough to grab.
5. Press Enter to lock in the new size
6. Close the window normally
This forces Windows to save the corrected size so it opens properly next time.
Bonus: Move a Window That’s Off‑Screen
If the window is completely invisible:
Activate the window
Press Alt + Space
Press M for Move
Use the arrow keys to bring it back into view
Press Enter to lock it in place
This is especially useful after disconnecting a second monitor.
Why This Trick Is Worth Remembering
Alt + Space is one of those old‑school Windows shortcuts that quietly solves problems modern UI can’t. It works on:
Windows 10
Windows 11
Most legacy apps
Many third‑party programs
And because it doesn’t rely on the mouse, it’s perfect for rescuing windows that are too small to grab or completely off‑screen.
Final Thoughts
When an app window refuses to behave, you don’t need to reboot, reinstall, or dive into the registry. The humble Alt + Space shortcut gives you direct control over any window’s size and position, no matter how badly it’s misbehaving.
Where Did My Disk Space Go? A Practical Guide to Finding Hidden Storage Hogs
A shrinking hard drive with no obvious culprit usually means one thing: something on the system is consuming space behind the scenes, and it isn’t showing up in the usual places like Pictures, Videos, or Programs. When the math doesn’t add up, the fastest way to get clarity is to switch from guessing to visualizing.
Finding the real space hogs
Tools like SpaceSniffer give you a treemap view of your entire drive, showing every folder and file as proportional blocks. Instead of digging through File Explorer one folder at a time, you see the whole drive laid out visually, with the largest consumers immediately obvious.
SpaceSniffer is free, lightweight, and doesn’t require installation. When downloading it, always get it directly from the developer’s site — uderzo.it — to avoid tampered or repackaged versions that could contain malware.
Run it with full visibility
SpaceSniffer (and similar tools) should be run as an administrator. Without elevated permissions, system-level folders and hidden locations won’t appear, and you’ll miss the very areas most likely to contain the problem.
Once the scan completes, you’ll see large blocks representing folders like:
Program Files
Users
Windows
Temp locations
Installer caches
Virtual machine disks
Cloud sync folders
This is where the real detective work begins.
Look, don’t delete blindly
A visual tool helps you spot the issue, but it doesn’t mean everything is safe to remove. Some of the largest folders on a Windows system are critical. One of the biggest is usually:
C:\Windows\Installer
This folder stores installer packages for updates, patches, and application repairs. Deleting anything here can break software, prevent updates, or force a full reinstall. It’s not a place to experiment.
The same goes for most of the Windows directory, system caches, and anything you don’t fully recognize. A wrong deletion can cause more problems than the disk space you’re trying to reclaim.
When in doubt, get help
If the tool reveals something unusual, or you’re not completely sure what a folder does, it’s better to pause than to guess. Hidden system folders, corrupted update caches, runaway log files, and cloud sync conflicts can all cause massive disk usage and each requires a different fix.
If you’re unsure or want someone to walk through it with you, give us a call. A quick review can save hours of frustration and prevent accidental damage to your system.
What Businesses Really Spent on IT in 2025: A Look Back at MSP Costs, Labor, Equipment, and the Windows 10 Replacement Surge
Now that 2025 is behind us, many businesses are reviewing their IT budgets and asking whether their spending aligned with industry norms or whether their MSP costs were higher than they should have been. With major shifts in cybersecurity, cloud adoption, and one of the largest workstation replacement cycles in a decade, 2025 became an unusually expensive year for many organizations.
Using real world data from companies ranging from 4 to 130 employees, this retrospective breaks down what businesses actually spent on IT support in 2025, how much went toward labor vs. equipment, and how the Windows 10 end of support deadline dramatically influenced budgets.
Why IT Spending Rose in 2025
Several industry forces pushed IT costs higher than in previous years:
Increased MSP labor rates
Higher cybersecurity requirements
Expanded cloud service usage
Rising hardware prices
The end of support for Windows 10, which forced widespread workstation replacements
That final factor had the single largest impact on equipment spending.
The Windows 10 End‑of‑Support Effect: A Historic Hardware Refresh Cycle
Microsoft officially ended support for Windows 10 in October 2025, and this created one of the largest forced hardware refresh cycles since the retirement of Windows 7.
A significant percentage of older systems especially those purchased between 2015 and 2018 could not upgrade to Windows 11 due to missing TPM 2.0 support or incompatible processors. As a result:
Businesses replaced far more workstations than in a typical year
MSPs saw a surge in procurement and deployment labor
Equipment spending spiked across nearly every industry
Per employee IT costs rose in many organizations
For many companies, 2025 wasn’t just a normal refresh cycle it was a mandatory modernization event.
2025 IT Spending Benchmarks (Real Data)
15 Person Firm
Total: $22,598
Labor: $13,265
Parts: $9,33312 Person Firm
Total: $25,188
Labor: $16,037
Parts: $9,1516 Person Firm
Total: $10,855
Labor: $6,620
Parts: $4,2354 Person Firm
Total: $2,977
Labor: $2,525
Parts: $45211 Person Firm
Total: $16,862
Labor: $9,476
Parts: $7,38611 Person Firm
Total: $16,862
Labor: $9,476
Parts: $7,38661 Person Firm
Total: $68,639
Labor: $37,452
Parts: $31,187130 Person Firm
Total: $136,990
Labor: $83,065
Parts: $53,925
Average per‑employee IT cost across companies <20 employees : $1,538 per employee
Average per-employee IT costs for the larger firms :$1,410 per employee
This falls within the typical national range of $1,200–$2,200 per employee annually, though the upper end was more common in 2025 due to hardware replacement demands.
Key Insights From 2025 IT Spending
1. Labor Remained the Largest Cost Driver
Labor made up the biggest portion of overall IT spending, consistently outweighing equipment and other expenses across all organizations.
2. Equipment Costs Were Higher Than Normal
The Windows 10 retirement created a one time spike in workstation replacements, pushing equipment spending well above typical levels.
3. Smaller Companies Paid More Per Employee
Fixed costs spread across fewer employees naturally increased per employee averages.
4. Larger Organizations Benefited From Scale
Larger companies enjoyed noticeably lower per employee IT costs because their expenses were spread across a bigger workforce, making support more efficient and cost effective.
Was Your MSP Overcharging You in 2025?
Higher than normal spending in 2025 doesn’t automatically indicate MSP overbilling. You may have simply been caught in the Windows 10 replacement wave.
However, you may have been overpaying if:
Your per employee cost exceeded $2,000 without major hardware upgrades
You saw unexplained labor spikes
Your MSP pushed unnecessary equipment
You were billed premium rates for basic tasks
You paid for services you didn’t use
A healthy MSP relationship should be predictable, transparent, and proactive even in a year with unusual industry events.
Final Takeaway: 2025 Was an Abnormal Year for IT Budgets
Looking back, 2025 stands out as a year where IT spending surged not because MSPs universally raised prices, but because the industry underwent a forced modernization event.
Windows 10 reached end‑of‑support
Many older systems couldn’t run Windows 11
Businesses replaced more hardware than usual
Equipment and deployment labor costs rose accordingly
Most organizations should expect their IT spending to normalize in 2026 and beyond, returning closer to traditional refresh cycles and more predictable MSP costs.
How to Keep Your Email Address When Switching Internet Providers
For a lot of people, an ISP provided email address has been part of their digital life for years sometimes decades. But when it’s time to switch internet providers to save money, improve speed, or upgrade reliability, one big worry always pops up:
“What happens to my email?”
The good news is that you can switch ISPs without losing access to your long time email account. With a little planning, you can transition smoothly and avoid missing important messages.
Here’s a clean, practical workflow you can follow.
1. Check Whether Your ISP Offers Email Only Service
Many internet providers now allow customers to keep their email accounts even after canceling internet service. This is often called:
Email only service
Standalone email
Legacy email retention
Before doing anything else, call your ISP and ask:
“Can I cancel my internet service but keep my email address?”
“What is the monthly cost for email only service?”
If they say yes, you’re already halfway there.
2. Create Your New Long Term Email Address
Even if you keep your ISP email temporarily, you don’t want to rely on it forever. ISP emails are tied to a company you may not stay with long term.
Choose a permanent, provider independent email service such as:
Outlook.com
Gmail.com
If you prefer using the Outlook desktop or mobile app, Outlook.com integrates more smoothly than Gmail. It’s simply a better experience for Outlook users.
Create your new address now you’ll use it during the transition.
3. Set Up Email Forwarding From Your ISP Email
Log in to your ISP’s webmail portal and enable email forwarding to your new Outlook or Gmail address.
This ensures:
You don’t miss messages during the transition
Everything continues to arrive in one inbox
You can start replying from your new address immediately
Forwarding is the key to a painless migration.
4. Install Your New Internet Service
Go ahead and sign up with your new ISP and get everything installed. Your old ISP email will continue working during this time.
5. Cancel Your Old Internet Service (But Keep the Email)
Once your new internet service is up and running, call your old ISP and cancel the internet portion of your account but keep the email only plan.
This stops the billing for internet service while preserving your inbox.
6. Notify Everyone of Your New Email Address
This part takes time, but it’s important.
Start updating:
Banks and financial institutions
Online accounts and subscriptions
Friends, family, and coworkers
Business contacts
Any mailing lists you care about
Because forwarding is active, you won’t miss anything while you update your contacts.
7. After About Six Months, Cancel the Old ISP Email
Six months is usually enough time for:
Everyone to update your contact info
Mailing lists to switch over
Old senders to stop using your ISP address
Once you’re confident nothing important is still coming through, cancel the ISP email service entirely.
You’re now fully independent of your old provider and your email address will never be tied to an ISP again.
Need Help Making the Switch?
Email migrations can be confusing, especially if you’ve had the same address for years. If you want a smooth, stress‑free transition, R‑Tech can handle the entire process for you.
Give us a call we’re happy to help.
QuickBooks Stopped Sending Email Through Outlook? Here’s What Happened — And How to Fix It
Over the past few weeks, many QuickBooks Desktop users suddenly found themselves unable to send invoices, estimates, or statements through Outlook. Everything had been working fine… until it wasn’t.
If this happened to you, the timing wasn’t a coincidence.
What Caused the Problem
In late December 2025 and early January 2026, a QuickBooks Desktop update rolled out that unintentionally broke the connection QuickBooks uses to send email through Outlook. After that update installed, QuickBooks could no longer communicate with Outlook’s mail interface.
The symptoms were consistent everywhere:
QuickBooks worked normally
A QuickBooks update installed
Email sending stopped immediately afterward
Reinstalling QuickBooks temporarily fixed it
As soon as QuickBooks updated again, the problem returned
This made it clear the issue wasn’t user error — it was the update.
The Fix Arrived on January 13th
On January 13th, Microsoft released a new Office/Outlook update that restored compatibility. Once that update installed, QuickBooks and Outlook began talking to each other again.
If you updated Office recently and everything suddenly started working, that’s why.
To manually update Office:
Open Outlook
Go to File → Office Account
Select Update Options → Update Now
Restart Outlook and QuickBooks
For most users, this resolves the issue immediately.
If QuickBooks Still Won’t Send Email
If updating Office doesn’t fix it, try refreshing QuickBooks’ email settings:
Close both QuickBooks and Outlook
Reopen QuickBooks as Administrator
Go to Edit → Preferences → Send Forms
Re‑select Outlook as your email option
Save and test again
This forces QuickBooks to rebuild its connection to Outlook.
Still Having Problems?
If QuickBooks and Outlook still refuse to cooperate, there may be deeper issues with the update, the MAPI interface, or the QuickBooks installation.
Still having problems? Give us a call — we can help.
Got a Hand‑Me‑Down Computer… But It’s Locked? Here’s What to Do
So your uncle passed down his old computer—great! But there’s one small problem: he can’t remember the password. The system is locked, you can’t get in, and he’s not worried about keeping any of his old data. You just want a clean, fresh machine you can call your own.
Good news: you can reset the computer and start from scratch. Even better news: you don’t have to do it alone.
Let’s walk through your options.
Option 1: DIY — Wipe and Reinstall Windows
If you’re comfortable doing a little hands‑on tech work, you can reset the system yourself. Here’s the basic process:
1. Create a Bootable Windows USB
You’ll need access to another working computer. From there, download the Windows installation media and create a bootable USB stick.
2. Boot From the USB
Plug the USB into the locked computer, restart it, and boot from the USB drive. Most systems let you do this by tapping a key like F12, F2, or ESC during startup.
3. Wipe the Hard Drive
Once the Windows installer loads, choose the option to delete the existing partitions. This clears out all old data—including that forgotten password.
4. Reinstall Windows
Follow the prompts to install a fresh copy of Windows.
5. Install Drivers & Updates
Once Windows is up and running, install any necessary drivers and run all Windows Updates to make sure the system is secure and fully functional.
It’s a straightforward process, but it does take time, patience, and a bit of technical comfort.
Option 2: Let Us Handle Everything
If all of that sounds like more work than you want to deal with, we’ve got you covered.
Bring the computer to R‑Tech Computers, Inc., and for the cost of one hour of billable time, we’ll:
Wipe the system
Reinstall Windows
Install all necessary drivers
Run all Windows updates
Ensure everything is running smoothly
Our typical turnaround time is 1–2 business days, depending on our current workload.
You can check our current pricing anytime here:
http://www.r-tech.com/pricing
Final Thoughts
A forgotten password doesn’t have to mean a dead computer. Whether you want to tackle the reinstall yourself or prefer to hand it off to professionals, you’ve got solid options. And once the system is refreshed, you’ll have a clean, fast machine ready to make your own.
Broken Laptop Hinges: Repair or Replace?
The Problem:
Your laptop screen hinges have finally given out. After four years of daily use, the wear and tear has caught up, and now you’re faced with a decision: fix it or move on to a new machine?
The Cost of Repair
Labor: Around $120
Parts: Between $50–$150, depending on whether it’s just the hinges or the plastic frame they’re screwed into.
Total Estimate: $200–$300
Since hinge parts are often special order, expect 3–10 days before your laptop is back in action. That’s a week or more without your device—can you manage without it?
Is It Worth Fixing?
Here’s the tough truth:
A laptop that’s 4+ years old has likely given you solid value already.
Even if repaired, other components (battery, storage, performance) may soon show their age.
Spending $200–$300 on repairs might not be the best investment if your budget allows for a replacement.
When to Repair
Consider repairing if:
You’re on a tight budget and can’t afford a new laptop right now.
The laptop still meets your performance needs (no lag, decent battery life).
You’re okay waiting up to 10 days for parts and repair.
When to Replace
Consider replacing if:
You can afford a new laptop.
You rely on your laptop daily and downtime isn’t an option.
You want modern features (faster processors, better battery, lighter design).
Final Thoughts
Broken hinges are frustrating, but they’re also a sign your laptop has served you well. If your budget supports it, upgrading to a new device is often the smarter move. If not, repairing can buy you more time—but remember, it’s a short-term fix for a long-term problem.
The Ultimate Lightroom Editing PC: What You Really Need
If you’re serious about photo editing in Adobe Lightroom, your computer setup can make or break your workflow. Nothing slows down creativity faster than laggy previews, sluggish exports, or running out of storage mid-project. So, what kind of machine should you invest in? Let’s break down the essentials.
Processor: The Heart of Your Editing Rig
Lightroom thrives on strong single-core performance, but modern multi-core processors help with batch exports and multitasking.
Recommendation: A 14th Gen Intel i7 processor or faster. This gives you the speed you need without overspending on diminishing returns. If you’re juggling massive catalogs or dabbling in video editing, stepping up to an i9 is worth considering.
RAM: Smooth Multitasking
RAM is where Lightroom stores active data while you edit. Too little, and you’ll feel the drag. Too much, and you’re just wasting money.
Recommendation: 32GB–64GB of RAM. Lightroom rarely benefits from more, so don’t bother with 128GB unless you’re running multiple heavy apps side by side.
Storage: Fast, Spacious, and Reliable
Photo libraries grow quickly, and Lightroom loves fast drives for previews and catalogs.
Primary Drive: A 4TB NVMe SSD for lightning-fast access. If you’re a heavy shooter or work with large RAW files, consider 8TB.
Backup Drive: A 20TB external USB hard drive ensures your work is safe. Pair this with reliable backup software to protect against data loss.
Backup Strategy: Don’t Skip This
Even the best hardware can fail. That’s why a solid backup plan is non-negotiable.
Recommendation: Veeam Endpoint Backup software. It’s robust, easy to configure, and keeps your photo library secure.
Graphics Card: Do You Really Need One?
Lightroom isn’t as GPU-dependent as video editing software, but a good graphics card speeds up rendering, zooming, and AI-powered features.
Recommendation: Depending on your workload, an NVIDIA RTX 5070 with 12GB of VRAM is a strong choice. If you mostly edit smaller catalogs, you can scale down—but if you’re handling thousands of RAWs or using AI tools, the extra GPU power pays off.
Final Thoughts
Building the right Lightroom PC is about balance. You don’t need to chase the most expensive parts—just the right ones:
CPU: 14th Gen i7 or better
RAM: 32–64GB
Storage: 4TB NVMe (8TB for heavy users) + 20TB external backup
GPU: RTX 5070 w/12GB VRAM (optional, but recommended for large workloads)
Backup Software: Veeam Endpoint Backup
With this setup, you’ll have a machine that keeps up with your creativity, handles massive photo libraries, and protects your work for the long haul. Give us a call and we can build the right machine for you.
Why Your Sound Works in One App but Not Another: The Mystery of Default Audio Settings
Have you ever had this happen: you’re watching YouTube in your browser, sound is working perfectly, but the moment you join a Zoom meeting—silence. Or maybe the opposite: Zoom works fine, but YouTube videos play without a peep. It feels like your computer is playing tricks on you, but the truth is much simpler: each program needs to know which audio device to use, and sometimes those settings get out of sync.
System Sound vs. Application Sound
Your operating system (Windows, macOS, etc.) has a default audio output device—usually your speakers or headphones. When you play a test sound in the system settings, it uses that default device.
But here’s the catch:
Browsers like Chrome or Edge may remember a different device than your system default.
Zoom (and other conferencing apps) often let you pick a microphone and speaker separately, and they don’t always update automatically if your system default changes.
That’s why you can have sound in one program but not another: each app is “listening” to its own instructions.
Why Defaults Get Messed Up
Several things can cause mismatched audio settings:
Plugging in or removing headphones/USB devices
Switching between Bluetooth and wired connections
Updating drivers or the operating system
Apps “remembering” an old device that’s no longer connected
When this happens, the app may keep trying to send sound to a device that doesn’t exist—or isn’t the one you’re actually using.
How to Fix It
Here’s a step-by-step approach:
Check System Default
On Windows: Right-click the speaker icon → Sound settings → make sure the correct device is set as Default Output.
On macOS: Go to System Settings → Sound and confirm the right output device.
Check the App’s Settings
In YouTube (via your browser), right-click the tab → Select Audio Device (in some browsers) or check system mixer settings.
In Zoom, go to Settings → Audio and make sure the correct speaker and microphone are selected.
Test and Adjust
Play a test sound in the app.
If it still doesn’t work, close and reopen the app after changing the settings.
The Takeaway
If sound works in one place but not another, it doesn’t mean your speakers are broken. It usually means the app is pointing to the wrong output device. By double-checking both your system default and the app’s own audio settings, you can get everything back in harmony.
Unexpected Outlook Invitations: What’s happening and why you should care
You open your Outlook calendar and find an appointment you never created. That unsettling moment — someone else added an event to your schedule without your consent — is exactly what many people are finding lately. Scammers are exploiting a loophole in Outlook’s meeting-handling behavior to push unwanted invitations into calendars, clutter schedules, and even try to trick recipients into clicking links or joining fake meetings.
How the loophole works
Scammers send meeting invitations that appear legitimate enough to be accepted automatically or to show on your calendar.
Because Outlook can add online-meeting metadata to every appointment and has automatic accept/decline behaviors, those invitations can appear without you taking any action.
Once the invite appears, a malicious link or meeting join button can be used to phish credentials, install malware, or socially engineer you.
Quick fix — stop Outlook from auto-adding online meetings
Follow these steps in Outlook to prevent automatic insertion of online meeting details into every new meeting:
Open Outlook.
Click File, then select Options.
Choose Calendar from the left-hand menu.
Uncheck Add online meeting to all meetings.
Scroll to the bottom of the Calendar options and click Auto Accept/Decline.
In the Auto Accept/Decline dialog, make sure nothing is checked (no automatic processing of meeting requests).
These two changes stop Outlook from automatically stamping meetings with online-join info and from processing invitations without your explicit action.
Best practices to reduce risk
Never click links or join meetings from calendar items you did not expect.
Verify unexpected invites by contacting the organizer through a trusted channel (email address you know, phone, or your organization’s directory) rather than using the meeting’s reply/join controls.
Train staff and family to recognize unsolicited calendar invites and to follow the same verification steps.
Keep Outlook and your OS patched; many threats rely on known vulnerabilities already fixed by updates.
When to get help
If you still see strange invites after changing these settings, or if you think you or your organization may have been targeted, get assistance. We can walk through the settings with you, check account rules and delegates, and verify if your account has been abused.
Give us a call and we’ll help secure your calendar and make sure nothing slips through the cracks.
Accidentally deleted files and nothing in the Recycle Bin with no backup
Losing important files with no backup is stressful. The single most important thing to do right now is stop using the computer. Every keystroke, application launch, or background task can reduce your chances of recovery.
Shut down the computer now and don’t use it
Power off immediately. Shut down the system instead of logging off or restarting.
Do not boot into Windows or open apps. Any normal use writes data to the drive and can overwrite the exact sectors holding your deleted files.
Avoid accessing the drive for any reason — even opening File Explorer or installing recovery tools on the same machine risks permanent overwrites.
Why you must avoid using the PC
When you delete a file in Windows, the operating system typically removes the file’s reference (the pointer) from the file system table; it does not immediately erase the file’s contents on the disk. The data remains on the drive until Windows writes new data to those same disk sectors. Temporary files, Windows updates, pagefile activity, application caches, and even antivirus scans can quickly write to the disk and overwrite deleted-file data, making recovery impossible.
Best recovery approach — remove the drive and recover from another system
Remove the drive from the PC
Power down and disconnect the computer. Physically remove the hard drive or SSD. This prevents any further writes from the original system.
Attach the drive to a different computer as a secondary drive
Use a SATA-to-USB adapter, external enclosure, or install it into a second desktop. Do not make it the boot drive on the recovery machine.
Use specialized recovery software from the other computer
Run reputable file-recovery software on the host machine, targeting the removed drive as the source. Let the software scan for deleted files and recover to a different physical drive (never recover onto the same drive you’re scanning).
Save recovered files to another external drive or the host system’s internal drive.
If you’re not comfortable doing this
Call us. Continuing to try random fixes can reduce recovery chances.
Practical tips and precautions
Do not install recovery software on the affected drive. Always install and run tools from another system or USB drive.
Recover to a separate drive. Writing recovered files to the same drive can overwrite other deleted content you still need.
Consider read-only imaging. Advanced users or professionals often create a full disk image and perform recovery from that image to avoid touching the original sectors.
Act quickly. The sooner you stop using the drive, the better the chance of complete recovery.
If the data is mission-critical (legal, financial, irreplaceable), consider contacting a professional data-recovery service right away. They have tools and clean-room procedures that raise the odds of success.
Need Help
Need Help, give us a call. We can walk you through safe next steps or handle the drive removal and recovery for you.
Dispose of Windows PC Securely Using System Reset
So you want to dispose of an old Windows PC and make sure nobody can recover your data. Use the built‑in System Reset, but do it the right way. This guide gives a clear, step‑by‑step plan: prepare, perform a secure reset, verify, and know when to escalate to full drive sanitization or physical destruction.
Why a simple delete is not enough
Deleting files or emptying the Recycle Bin only removes directory entries; the underlying data remains on the drive and can be recovered with widely available tools. A properly executed Reset that includes data cleaning or a full drive wipe reduces or removes the chance of recovery and is the practical choice for most users.
Preparation steps (do these first)
Backup important data. Copy documents, photos, and any settings you want to keep to an external drive or cloud storage.
Export account data and credentials. Export browser bookmarks, passwords, and application settings if needed.
Deauthorize services. Sign out or remove the device from accounts that use device limits (iTunes/Apple ID, Office, Adobe, Steam, Dropbox, etc.).
Remove removable media. Take out SD cards, USB keys, and any secondary drives you plan to keep.
Decide what to keep physically. If you plan to reuse the internal drive, remove it now; if not, proceed with secure wipe options below.
Use Windows Reset correctly
Open Settings. Go to Settings > System > Recovery in Windows 11 or Settings > Update & Security > Recovery in Windows 10.
Start Reset. Click Reset this PC then Reset PC.
Choose Remove everything. Select Remove everything rather than Keep my files.
Choose data cleaning. When offered, select Remove files and clean the drive (or Fully clean the drive) instead of just removing files. This option makes recovery much harder by overwriting sectors and is recommended when giving away, selling, or recycling the PC.
Finish and wait. Confirm and let the process complete. Expect it to take significantly longer when you choose the full clean option.
Verify the result
Boot to the Windows setup screen. After a successful reset the machine should boot to OOBE (Out Of Box Experience) or show no user accounts.
Check disk state. If you can boot from a rescue USB, verify partitions and that no personal folders exist. If the drive shows only system partitions or unallocated space and setup prompts for account creation, the reset likely succeeded.
Optional recovery test. If you have the skill and tools, run a quick file-recovery scan to confirm there are no recoverable personal files; if you find recoverable data, proceed to full drive overwrite or physical destruction.
When to escalate: full wipe or physical destruction
Highly sensitive data. If the device contained sensitive business, legal, medical, or financial data, do not rely solely on the Reset. Use a certified disk-wiping tool to perform multiple overwrites, or remove the drive for secure destruction.
Use a secure wipe tool if removing drive. Boot a trusted wipe utility from USB and perform a full-disk overwrite (single-pass is usually sufficient for modern drives; multi-pass optional for specific policies).
Physical destruction. For drives that must never be recovered, physically destroy the platters (HDD) or shred/disintegrate the SSD. Follow organizational policies or certified destruction services for compliance.
Practical checklist before disposal
Backup data.
Deauthorize accounts.
Remove external media.
Run Reset > Remove everything > Fully clean the drive.
Verify OOBE or absence of user accounts.
Escalate to disk wipe or destruction if data sensitivity requires it.
Bold, deliberate steps protect your privacy without unnecessary complexity. Use the Reset with the full clean option for most situations and choose a full wipe or destruction for high‑risk data.
Streamline Your Team Communications with Exchange Distribution Lists
Setting up a distribution list in Exchange lets you route incoming messages—like queries sent to info@yourcompany.com—to multiple team members automatically. This approach ensures everyone stays in the loop without relying on manual forwarding or risking a single point of failure. It’s perfect for shared mailboxes handling support, sales, or general inquiries.
What Is a Distribution List?
A distribution list (also called a distribution group) is a mail-enabled object in Exchange that contains multiple recipients. When an email is sent to the group’s address, Exchange automatically delivers it to every member. This saves time, reduces administrative overhead, and ensures consistency in client responses.
When to Use an Alias Instead
If you only need all messages to go to one person, an alias is a simpler option. An alias is an additional email address attached to a single mailbox. Incoming mail to that alias lands directly in the user’s primary inbox without the need for a separate distribution object.
Best Practices
Naming Conventions
Use clear prefixes (e.g., info@, support@, sales@)
Access Control
Limit who can send to critical lists to prevent spam
Membership Reviews
Quarterly audits to remove inactive or departed employees
Documentation
Maintain a record of group owners, members, and settings for compliance
Need help managing your Office 365 accounts on a day-to-day basis? We can help. Give us a call.
When Your Emails Disappear Into RSS or Deleted Items
If you suddenly find every incoming message bypassing your inbox and landing in your RSS Feeds folder or the Deleted Items folder, your account has very likely been compromised. Attackers have hijacked your mailbox to send mass spam or phishing emails and created hidden rules to keep you from noticing the activity.
Signs Your Account Is Compromised
No new messages in your main inbox despite people confirming they’ve emailed you
Unfamiliar rules in Outlook moving or deleting mail automatically
Sent items full of messages you didn’t send
Notifications from contacts about strange emails coming “from you”
Step-by-Step Recovery Guide
Change your email password immediately
Identify any other service where you reused that password and update it there as well
Enable two-factor authentication on your email account if it isn’t already active
Review your Outlook rules and delete any that move incoming mail into the RSS Feeds or Deleted Items folders
Check for automatic forwarding settings and disable any you don’t recognize
Advanced Cleanup Tasks
Verify there are no app-specific passwords you didn’t create
Sign out of all devices and web sessions connected to your account
Revoke access for any third-party apps or services you don’t recognize
Audit your account’s login activity or security logs for unfamiliar IP addresses
Beyond the Basics: Strengthen Your Email Security
Use a reputable password manager to generate and store unique passwords
Schedule regular password rotations and security audits
Train your team or family on phishing awareness and suspicious-email reporting
Consider advanced email filtering or a dedicated security gateway
If you need hands-on assistance restoring your mailbox or reinforcing your security posture, give us a call. We’ll help you reclaim control of your email and lock down your account for good.
Preparing for Windows 10 End of Life: Upgrade, Extend, or Adapt
Windows 10 reaches end of support on October 15, 2025. After that date, Microsoft will no longer release security patches or quality updates for consumer editions. You’ll still be able to use your PC, but it will become increasingly vulnerable to emerging threats and software incompatibilities.
Is It Time to Replace Your PC?
If your machine is more than five years old, it’s likely approaching hardware obsolescence. Components such as batteries, spinning hard drives, and aging thermal paste degrade over time, leading to sluggish performance, unexpected shutdowns, or even data loss.
Look for signs of hardware fatigue: noisy fans, slow boot times, and frequent hangs.
Consider your workload: modern productivity suites, web apps, and virtualization demand more RAM and CPU cycles than older systems can reliably deliver.
Factor in warranty and repair costs: a new entry-level laptop or desktop often costs less than a single major repair on a legacy machine.
Extending Windows 10 Support on a Budget
If replacing your PC isn’t feasible right now, you can still receive critical security updates through Microsoft’s Extended Security Updates (ESU) program for Windows 10. This program offers up to three additional years of paid patches after end of support.
Click the Start button and type Windows Update.
Select Check for updates in the Settings window.
Look for an Enroll now link or button under the “Quality Updates” section.
Sign in with your Microsoft Account—or create one—when prompted.
Once enrolled, your device will download and install ESU patches just like any regular security update.
Why Wired Beats Wireless (Whenever You Can)
In today’s always-on world, reliable network performance isn’t a luxury—it’s a necessity. Whenever possible, running a wired connection delivers unmatched speed, stability, and security. If you must go wireless, investing in enterprise-grade gear gives you visibility into your access points and makes troubleshooting far easier.
The Case for Wired Connections
Wired networks deliver consistent throughput without the interference or congestion that often plagues Wi-Fi.
Devices on Ethernet experience near-instantaneous data transfers, reducing latency for time-sensitive apps like video conferencing or VoIP.
Physical cables also isolate traffic, making it harder for attackers to eavesdrop or launch man-in-the-middle exploits.
A wired backbone simplifies quality-of-service (QoS) policies, ensuring critical applications always get priority over spare bandwidth.
When Wiring Isn’t an Option
Sometimes walls, desks, or shared spaces prevent you from running Ethernet everywhere.
Mobile devices like tablets and smartphones simply can’t plug in.
Legacy buildings or historic sites often prohibit new cabling for aesthetic or regulatory reasons.
These scenarios force you into the wireless realm—so you’ll want tools that tell you exactly what’s happening on your network.
Investing in Smart Wireless Solutions
Enterprise-level access points and controllers provide real-time dashboards, alerting you to congestion, rogue clients, and spectrum noise.
Look for systems that include built-in heatmaps or spectrum analyzers so you can pinpoint dead zones and interference sources without guesswork.
High-end gear often integrates with cloud-based management, letting you push firmware updates and configuration changes remotely across multiple sites.
APs with multi-band radios and beamforming adapt automatically to shifting environments, preserving performance as your floor plan or user density changes.
Key Wireless Deployment Tips
Segment guest traffic on a separate SSID and VLAN to protect your core network.
Enable band steering so clients automatically choose the optimal frequency (2.4 GHz vs. 5 GHz).
Schedule regular firmware and driver updates to patch vulnerabilities and performance bugs.
Monitor client counts per AP and redistribute load when thresholds are exceeded.
Wired vs. Wireless at a Glance
When push comes to shove, wired connections remain the gold standard for mission-critical networks. But if cabling isn’t feasible, the right wireless infrastructure and monitoring give you near-wired confidence.
Call us if you need help designing, deploying, or troubleshooting your wired and wireless networks. We’ll guide you to the fastest, most reliable solution every time.
When Your Acct Folder Vanishes from Documents
You open File Explorer, navigate to Documents, and your entire Acct folder is gone. Heart sinks. Before you call IT or start crying into your backup drive, run a quick investigation: often the “missing” folder isn’t deleted at all — it’s been moved. This guide walks you through a calm, methodical recovery plan: find it, return it, or restore it from backup.
Quick triage — what to do first
Open File Explorer and stay calm.
Don’t create, rename, or move other files in Documents — that can make recovery harder.
Limit your actions to searching and checking obvious places.
Step 1 — Search for the Acct folder
Click into the Documents folder, then use the search box in the top-right.
Type: Acct
Expand the search scope to This PC if nothing appears under Documents.
Why this works: folders are frequently dragged into nearby folders during routine file work. A simple search often finds the folder intact but misplaced.
Step 2 — If you find the folder in a different location
Note the current path shown in File Explorer’s address bar.
Drag the Acct folder back to Documents, or right-click → Cut, navigate to Documents → Paste.
Verify contents: open a few files to confirm they’re intact.
Checklist after moving back:
Folder appears under Documents.
File timestamps and sizes look correct.
Recent files open without error.
Step 3 — If the folder is truly missing
If the search returns nothing, assume the folder was deleted or corrupted and proceed to recovery.
Options, in order:
Check Recycle Bin
If present, right-click the Acct folder → Restore.
Restore from File History (Windows)
Documents folder → right-click → Restore previous versions → choose a date → Restore.
If you use File History, pick the most recent snapshot that contains Acct.
Restore from cloud sync (OneDrive, Google Drive, Dropbox)
Open the cloud client or web interface → look for deleted items or version history → restore.
Restore from offline backup
Use your backup software (Acronis, Veeam, Windows Backup, etc.) and restore the Acct folder to Documents.
If you have image-based backups, mount the image and extract the folder.
Use recovery tools as last resort
If no backups exist and the Recycle Bin is empty, consider professional file-recovery software or services.
Stop using the drive to prevent data overwrite; recovery success falls with continued writes.
Prevent this from happening again
Enable versioned backups
Turn on File History, set up periodic backups, or use cloud backup with versioning.
Use cloud-synced Documents
Keep Documents under OneDrive or similar to get automatic version history and recovery.
Turn on Confirm before moving
Get into the habit of using cut/paste and double-checking paths before drop operations.
Adopt folder permissions and structure
Keep sensitive folders in an obvious top-level structure and avoid deep nesting where accidental drags hide items.
Routine verification
Monthly quick check: search for critical folders and ensure backups are healthy.
Quick decision flow (two-minute rule)
Search for Acct across Documents and This PC.
If found: move back and verify files.
If not found: check Recycle Bin, cloud trash, then File History/backups.
No backups: minimize disk use and run recovery tools or contact a recovery specialist.
Conclusion
A missing Acct folder is usually a misplaced folder. Search first, move it back if you find it, and only then escalate to recovery from backups or tools. Build a simple backup habit (File History or cloud sync) so the next time something vanishes, restoration takes minutes instead of hours or days.
Protecting Your Free Software Downloads: A Cautionary Tale with Sage Thumbs
Free tools can be productivity gold mines until they’re Trojan horses. Recently, one of our clients decided to install Sage Thumbs, a handy utility that lets you preview PSD file thumbnails directly in File Explorer. What seemed like a routine install quickly turned into a lesson in vigilance and defense in depth.
The Sage Thumbs Incident
Our client clicked what appeared to be a legitimate download link for Sage Thumbs. After repeated failures, they reached out for help. We discovered the site they were using wasn’t the official provider; it was a cleverly disguised imposter hosting a potentially dangerous installer.
Rogue Download Sites: A Growing Threat
Attackers set up fake download portals for popular free software to:
Distribute malware, adware, or cryptojacking scripts
Harvest user data through stealth installers
Trick organizations into bypassing internal protections
These sites often mimic official branding including logos, fonts, and URLs to lower your guard. Without a solid verification process, anyone even savvy users can fall prey.
How SonicWall Stopped the Attack
Luckily, our client’s SonicWall firewall had Application Control enabled to block unauthorized free software installations. As soon as the malicious installer tried to execute, SonicWall flagged and quarantined the file, preventing any compromise.
Key features that saved the day:
Application Control signatures for known freeware hosts
Real time intrusion prevention blocking suspicious payloads
Web filtering rules enforcing approved download categories
Best Practices for Safe Software Downloads
Verify the Source
Always navigate to the official vendor site rather than relying on search engine results or third party reposts.Leverage Web Filtering
Block or warn against known malicious or untrusted download sites with URL category policies.Enforce Application Control
Prevent unauthorized installers from executing based on hash or signature analysis.Maintain a Whitelist of Trusted Vendors
Approve only the domains and software publishers your organization has vetted.Educate Your Team
Train users to recognize fake URLs, phishing pages, and installer baits.
Secure Your Organization’s Downloads Today
Free utilities shouldn’t come with a hidden cost. If you don’t yet have protections like SonicWall’s web filtering and application control reach out to us. We’ll assess your environment, recommend the right security, and help you keep every download safe and legitimate.
How Good Is Your Backup? A Simple Test to Ensure Your Data Is Safe
Your backup solution might be humming along in the background, but how can you be certain it’s actually protecting your files? If you’ve never verified that your backups succeed and your data can be restored, you simply don’t have a reliable backup. This article walks you through a straightforward test to confirm your backup is working—and shows you how to set up email notifications so you’ll always know its status.
The Myth of “Set and Forget”
Many people assume that once a backup schedule is configured, it will forever safeguard their data. In reality, hardware failures, software bugs, misconfigurations, or full storage targets can all silently derail your backup jobs. Without verification, you risk discovering corrupt or incomplete backups only when disaster strikes—far too late to recover critical documents.
A Foolproof Backup Test
Verifying your backup doesn’t require specialist tools or complex scripts. Follow these simple steps to confirm end to end functionality:
Create a small test document on your computer (for example, “backup_test.txt”).
Run or wait for your next scheduled backup to include this file.
Delete the test document from your local drive.
Initiate a restore operation and recover “backup_test.txt” to its original location.
Open the restored file to ensure it’s intact.
If this process completes without errors, your backup pipeline is working as intended. If not, you’ve uncovered a critical weakness that needs immediate attention.
Setting Up Email Notifications
Waiting for a backup to fail is like waiting for a storm without a weather alert. Most backup solutions offer built in reporting or notification features—enable them to receive automatic email alerts:
Notify on success or failure for every backup job.
Customize thresholds (e.g., alert if a job runs longer than expected or if free space drops below a safe level).
Include detailed logs or summaries in the notification to speed troubleshooting.
With notifications in place, you’ll know within minutes whenever backups succeed or stumble, giving you time to fix issues before data is lost.
Turning Tests Into Routine
Verification shouldn’t be a one off exercise. Embed backup tests into your maintenance calendar:
Perform a test restore quarterly or after significant system changes.
Rotate test documents or use unique filenames each time to avoid confusion.
Document results in a simple log date, result, and any follow up actions.
By treating backup verification as a regular task, you transform uncertainty into confidence. You’ll always know your data is secure, and you’ll sleep better knowing you’ve done the due diligence.
Your Data’s Lifeline
Backups only protect what you can successfully recover. If you don’t know whether your backups work, they’re as good as non existent. Run the simple test outlined above, enable email alerts, and make verification a routine. Your future self and your organization will thank you for the peace of mind when the unexpected happens.