Roger Ahuja Roger Ahuja

Clearing Out the Clutter: How to Rescue Photos from That Old Garage Computer

That dusty old computer in the garage probably hasn’t been powered on in years, but it still holds something you care about your photos, memories, and personal files. You don’t want to throw it away, but you also don’t want it taking up space forever. The good news is that you don’t have to keep the whole machine just to keep the data.

This is exactly the kind of situation we help with every day.

Why Old Computers Become “Storage Units”

Many people hang onto aging desktops and laptops for one simple reason: there are files on them they don’t want to lose. Even if the computer no longer boots properly, runs painfully slow, or has broken parts, the internal drive often still contains everything you need.

But keeping a full size computer around just for a handful of photos or documents isn’t practical. They take up space, gather dust, and eventually become e‑waste.

How We Help You Recover Your Files

You can bring that old computer to us tower, laptop, or even just the hard drive and we’ll safely extract your files. Our process is straightforward:

  • We remove or access the internal drive from your old system.

  • We scan it for your photos, documents, and other personal files.

  • We copy everything onto a storage device of your choice, such as:

    • A USB thumb drive (as long as it’s large enough)

    • An external hard drive or SSD

    • A drive you already own, or one we can provide

Even if the computer itself won’t turn on, the data is often still recoverable. In many cases, we can retrieve everything without needing to repair the machine.

Free Up Space Without Losing Your Memories

Once your files are safely transferred, you’re free to recycle, donate, or dispose of the old computer without worry. You get your digital memories back, and you reclaim space in your garage or storage area.

It’s a simple way to declutter while preserving the things that matter.

Read More
Roger Ahuja Roger Ahuja

The Easiest Fix for Misbehaving Windows: Using Alt + Space to Resize a Hidden or Tiny Window

Every Windows user eventually runs into that moment: you open an app, and instead of appearing where you left it, the window shows up microscopic, off‑screen, or shaped like a weird sliver you can’t grab. You try dragging. You try maximizing. You try swearing at it. Nothing works.

Fortunately, Windows has a built‑in, decades‑old keyboard shortcut that can rescue almost any mis-sized or misplaced window:

Alt + Space

It’s simple, reliable, and works even when the window looks broken.

Let’s walk through how it works and why it’s such a lifesaver.

How Alt + Space Fixes the Window

Pressing Alt + Space opens the classic Window Menu—a tiny control panel that predates modern Windows UI but still works flawlessly.

From this menu, you can:

  • Move the window

  • Resize it

  • Maximize it

  • Restore it

Even if the window is invisible or unusably small, the menu still appears and gives you control.

Step‑by‑Step: Resize a Misbehaving Window Using Alt + Space

Here’s the exact sequence that works almost every time:

1. Make sure the window is active

Click its taskbar icon once.
(Even if you can’t see the window, this still activates it.)

2. Press Alt + Space

This opens the hidden Window Menu.

3. Press S to activate “Size” mode

Your cursor will change to a directional resize icon.

4. Use the arrow keys to stretch the window

Try Left, Right, Up, or Down until the window reappears or becomes large enough to grab.

5. Press Enter to lock in the new size

6. Close the window normally

This forces Windows to save the corrected size so it opens properly next time.

Bonus: Move a Window That’s Off‑Screen

If the window is completely invisible:

  1. Activate the window

  2. Press Alt + Space

  3. Press M for Move

  4. Use the arrow keys to bring it back into view

  5. Press Enter to lock it in place

This is especially useful after disconnecting a second monitor.

Why This Trick Is Worth Remembering

Alt + Space is one of those old‑school Windows shortcuts that quietly solves problems modern UI can’t. It works on:

  • Windows 10

  • Windows 11

  • Most legacy apps

  • Many third‑party programs

And because it doesn’t rely on the mouse, it’s perfect for rescuing windows that are too small to grab or completely off‑screen.

Final Thoughts

When an app window refuses to behave, you don’t need to reboot, reinstall, or dive into the registry. The humble Alt + Space shortcut gives you direct control over any window’s size and position, no matter how badly it’s misbehaving.

Read More
Roger Ahuja Roger Ahuja

Where Did My Disk Space Go? A Practical Guide to Finding Hidden Storage Hogs

A shrinking hard drive with no obvious culprit usually means one thing: something on the system is consuming space behind the scenes, and it isn’t showing up in the usual places like Pictures, Videos, or Programs. When the math doesn’t add up, the fastest way to get clarity is to switch from guessing to visualizing.

Finding the real space hogs

Tools like SpaceSniffer give you a treemap view of your entire drive, showing every folder and file as proportional blocks. Instead of digging through File Explorer one folder at a time, you see the whole drive laid out visually, with the largest consumers immediately obvious.

SpaceSniffer is free, lightweight, and doesn’t require installation. When downloading it, always get it directly from the developer’s site — uderzo.it — to avoid tampered or repackaged versions that could contain malware.

Run it with full visibility

SpaceSniffer (and similar tools) should be run as an administrator. Without elevated permissions, system-level folders and hidden locations won’t appear, and you’ll miss the very areas most likely to contain the problem.

Once the scan completes, you’ll see large blocks representing folders like:

  • Program Files

  • Users

  • Windows

  • Temp locations

  • Installer caches

  • Virtual machine disks

  • Cloud sync folders

This is where the real detective work begins.

Look, don’t delete blindly

A visual tool helps you spot the issue, but it doesn’t mean everything is safe to remove. Some of the largest folders on a Windows system are critical. One of the biggest is usually:

  • C:\Windows\Installer

This folder stores installer packages for updates, patches, and application repairs. Deleting anything here can break software, prevent updates, or force a full reinstall. It’s not a place to experiment.

The same goes for most of the Windows directory, system caches, and anything you don’t fully recognize. A wrong deletion can cause more problems than the disk space you’re trying to reclaim.

When in doubt, get help

If the tool reveals something unusual, or you’re not completely sure what a folder does, it’s better to pause than to guess. Hidden system folders, corrupted update caches, runaway log files, and cloud sync conflicts can all cause massive disk usage and each requires a different fix.

If you’re unsure or want someone to walk through it with you, give us a call. A quick review can save hours of frustration and prevent accidental damage to your system.

Read More
Roger Ahuja Roger Ahuja

What Businesses Really Spent on IT in 2025: A Look Back at MSP Costs, Labor, Equipment, and the Windows 10 Replacement Surge

Now that 2025 is behind us, many businesses are reviewing their IT budgets and asking whether their spending aligned with industry norms or whether their MSP costs were higher than they should have been. With major shifts in cybersecurity, cloud adoption, and one of the largest workstation replacement cycles in a decade, 2025 became an unusually expensive year for many organizations.

Using real world data from companies ranging from 4 to 130 employees, this retrospective breaks down what businesses actually spent on IT support in 2025, how much went toward labor vs. equipment, and how the Windows 10 end of support deadline dramatically influenced budgets.

Why IT Spending Rose in 2025

Several industry forces pushed IT costs higher than in previous years:

  • Increased MSP labor rates

  • Higher cybersecurity requirements

  • Expanded cloud service usage

  • Rising hardware prices

  • The end of support for Windows 10, which forced widespread workstation replacements

That final factor had the single largest impact on equipment spending.

The Windows 10 End‑of‑Support Effect: A Historic Hardware Refresh Cycle

Microsoft officially ended support for Windows 10 in October 2025, and this created one of the largest forced hardware refresh cycles since the retirement of Windows 7.

A significant percentage of older systems especially those purchased between 2015 and 2018 could not upgrade to Windows 11 due to missing TPM 2.0 support or incompatible processors. As a result:

  • Businesses replaced far more workstations than in a typical year

  • MSPs saw a surge in procurement and deployment labor

  • Equipment spending spiked across nearly every industry

  • Per employee IT costs rose in many organizations

For many companies, 2025 wasn’t just a normal refresh cycle it was a mandatory modernization event.

2025 IT Spending Benchmarks (Real Data)

  • 15 Person Firm
    Total: $22,598
    Labor: $13,265
    Parts: $9,333

  • 12 Person Firm
    Total: $25,188
    Labor: $16,037
    Parts: $9,151

  • 6 Person Firm
    Total: $10,855
    Labor: $6,620
    Parts: $4,235

  • 4 Person Firm
    Total: $2,977
    Labor: $2,525
    Parts: $452

  • 11 Person Firm
    Total: $16,862
    Labor: $9,476
    Parts: $7,386

  • 11 Person Firm
    Total: $16,862
    Labor: $9,476
    Parts: $7,386

  • 61 Person Firm
    Total: $68,639
    Labor: $37,452
    Parts: $31,187

  • 130 Person Firm
    Total: $136,990
    Labor: $83,065
    Parts: $53,925

Average per‑employee IT cost across companies <20 employees : $1,538 per employee
Average per-employee IT costs for the larger firms :$1,410 per employee

This falls within the typical national range of $1,200–$2,200 per employee annually, though the upper end was more common in 2025 due to hardware replacement demands.

Key Insights From 2025 IT Spending

1. Labor Remained the Largest Cost Driver

Labor made up the biggest portion of overall IT spending, consistently outweighing equipment and other expenses across all organizations.

2. Equipment Costs Were Higher Than Normal

The Windows 10 retirement created a one time spike in workstation replacements, pushing equipment spending well above typical levels.

3. Smaller Companies Paid More Per Employee

Fixed costs spread across fewer employees naturally increased per employee averages.

4. Larger Organizations Benefited From Scale

Larger companies enjoyed noticeably lower per employee IT costs because their expenses were spread across a bigger workforce, making support more efficient and cost effective.

Was Your MSP Overcharging You in 2025?

Higher than normal spending in 2025 doesn’t automatically indicate MSP overbilling. You may have simply been caught in the Windows 10 replacement wave.

However, you may have been overpaying if:

  • Your per employee cost exceeded $2,000 without major hardware upgrades

  • You saw unexplained labor spikes

  • Your MSP pushed unnecessary equipment

  • You were billed premium rates for basic tasks

  • You paid for services you didn’t use

A healthy MSP relationship should be predictable, transparent, and proactive even in a year with unusual industry events.

Final Takeaway: 2025 Was an Abnormal Year for IT Budgets

Looking back, 2025 stands out as a year where IT spending surged not because MSPs universally raised prices, but because the industry underwent a forced modernization event.

  • Windows 10 reached end‑of‑support

  • Many older systems couldn’t run Windows 11

  • Businesses replaced more hardware than usual

  • Equipment and deployment labor costs rose accordingly

Most organizations should expect their IT spending to normalize in 2026 and beyond, returning closer to traditional refresh cycles and more predictable MSP costs.

Read More
Roger Ahuja Roger Ahuja

How to Keep Your Email Address When Switching Internet Providers

For a lot of people, an ISP provided email address has been part of their digital life for years sometimes decades. But when it’s time to switch internet providers to save money, improve speed, or upgrade reliability, one big worry always pops up:

“What happens to my email?”

The good news is that you can switch ISPs without losing access to your long time email account. With a little planning, you can transition smoothly and avoid missing important messages.

Here’s a clean, practical workflow you can follow.

1. Check Whether Your ISP Offers Email Only Service

Many internet providers now allow customers to keep their email accounts even after canceling internet service. This is often called:

  • Email only service

  • Standalone email

  • Legacy email retention

Before doing anything else, call your ISP and ask:

  • “Can I cancel my internet service but keep my email address?”

  • “What is the monthly cost for email only service?”

If they say yes, you’re already halfway there.

2. Create Your New Long Term Email Address

Even if you keep your ISP email temporarily, you don’t want to rely on it forever. ISP emails are tied to a company you may not stay with long term.

Choose a permanent, provider independent email service such as:

  • Outlook.com

  • Gmail.com

If you prefer using the Outlook desktop or mobile app, Outlook.com integrates more smoothly than Gmail. It’s simply a better experience for Outlook users.

Create your new address now you’ll use it during the transition.

3. Set Up Email Forwarding From Your ISP Email

Log in to your ISP’s webmail portal and enable email forwarding to your new Outlook or Gmail address.

This ensures:

  • You don’t miss messages during the transition

  • Everything continues to arrive in one inbox

  • You can start replying from your new address immediately

Forwarding is the key to a painless migration.

4. Install Your New Internet Service

Go ahead and sign up with your new ISP and get everything installed. Your old ISP email will continue working during this time.

5. Cancel Your Old Internet Service (But Keep the Email)

Once your new internet service is up and running, call your old ISP and cancel the internet portion of your account but keep the email only plan.

This stops the billing for internet service while preserving your inbox.

6. Notify Everyone of Your New Email Address

This part takes time, but it’s important.

Start updating:

  • Banks and financial institutions

  • Online accounts and subscriptions

  • Friends, family, and coworkers

  • Business contacts

  • Any mailing lists you care about

Because forwarding is active, you won’t miss anything while you update your contacts.

7. After About Six Months, Cancel the Old ISP Email

Six months is usually enough time for:

  • Everyone to update your contact info

  • Mailing lists to switch over

  • Old senders to stop using your ISP address

Once you’re confident nothing important is still coming through, cancel the ISP email service entirely.

You’re now fully independent of your old provider and your email address will never be tied to an ISP again.

Need Help Making the Switch?

Email migrations can be confusing, especially if you’ve had the same address for years. If you want a smooth, stress‑free transition, R‑Tech can handle the entire process for you.

Give us a call we’re happy to help.

Read More
Roger Ahuja Roger Ahuja

QuickBooks Stopped Sending Email Through Outlook? Here’s What Happened — And How to Fix It

Over the past few weeks, many QuickBooks Desktop users suddenly found themselves unable to send invoices, estimates, or statements through Outlook. Everything had been working fine… until it wasn’t.

If this happened to you, the timing wasn’t a coincidence.

What Caused the Problem

In late December 2025 and early January 2026, a QuickBooks Desktop update rolled out that unintentionally broke the connection QuickBooks uses to send email through Outlook. After that update installed, QuickBooks could no longer communicate with Outlook’s mail interface.

The symptoms were consistent everywhere:

  • QuickBooks worked normally

  • A QuickBooks update installed

  • Email sending stopped immediately afterward

  • Reinstalling QuickBooks temporarily fixed it

  • As soon as QuickBooks updated again, the problem returned

This made it clear the issue wasn’t user error — it was the update.

The Fix Arrived on January 13th

On January 13th, Microsoft released a new Office/Outlook update that restored compatibility. Once that update installed, QuickBooks and Outlook began talking to each other again.

If you updated Office recently and everything suddenly started working, that’s why.

To manually update Office:

  1. Open Outlook

  2. Go to File → Office Account

  3. Select Update Options → Update Now

  4. Restart Outlook and QuickBooks

For most users, this resolves the issue immediately.

If QuickBooks Still Won’t Send Email

If updating Office doesn’t fix it, try refreshing QuickBooks’ email settings:

  • Close both QuickBooks and Outlook

  • Reopen QuickBooks as Administrator

  • Go to Edit → Preferences → Send Forms

  • Re‑select Outlook as your email option

  • Save and test again

This forces QuickBooks to rebuild its connection to Outlook.

Still Having Problems?

If QuickBooks and Outlook still refuse to cooperate, there may be deeper issues with the update, the MAPI interface, or the QuickBooks installation.

Still having problems? Give us a call — we can help.

Read More
Roger Ahuja Roger Ahuja

Got a Hand‑Me‑Down Computer… But It’s Locked? Here’s What to Do

So your uncle passed down his old computer—great! But there’s one small problem: he can’t remember the password. The system is locked, you can’t get in, and he’s not worried about keeping any of his old data. You just want a clean, fresh machine you can call your own.

Good news: you can reset the computer and start from scratch. Even better news: you don’t have to do it alone.

Let’s walk through your options.

Option 1: DIY — Wipe and Reinstall Windows

If you’re comfortable doing a little hands‑on tech work, you can reset the system yourself. Here’s the basic process:

1. Create a Bootable Windows USB

You’ll need access to another working computer. From there, download the Windows installation media and create a bootable USB stick.

2. Boot From the USB

Plug the USB into the locked computer, restart it, and boot from the USB drive. Most systems let you do this by tapping a key like F12, F2, or ESC during startup.

3. Wipe the Hard Drive

Once the Windows installer loads, choose the option to delete the existing partitions. This clears out all old data—including that forgotten password.

4. Reinstall Windows

Follow the prompts to install a fresh copy of Windows.

5. Install Drivers & Updates

Once Windows is up and running, install any necessary drivers and run all Windows Updates to make sure the system is secure and fully functional.

It’s a straightforward process, but it does take time, patience, and a bit of technical comfort.

Option 2: Let Us Handle Everything

If all of that sounds like more work than you want to deal with, we’ve got you covered.

Bring the computer to R‑Tech Computers, Inc., and for the cost of one hour of billable time, we’ll:

  • Wipe the system

  • Reinstall Windows

  • Install all necessary drivers

  • Run all Windows updates

  • Ensure everything is running smoothly

Our typical turnaround time is 1–2 business days, depending on our current workload.

You can check our current pricing anytime here:
http://www.r-tech.com/pricing

Final Thoughts

A forgotten password doesn’t have to mean a dead computer. Whether you want to tackle the reinstall yourself or prefer to hand it off to professionals, you’ve got solid options. And once the system is refreshed, you’ll have a clean, fast machine ready to make your own.

Read More
Roger Ahuja Roger Ahuja

Broken Laptop Hinges: Repair or Replace?

The Problem:
Your laptop screen hinges have finally given out. After four years of daily use, the wear and tear has caught up, and now you’re faced with a decision: fix it or move on to a new machine?

The Cost of Repair

  • Labor: Around $120

  • Parts: Between $50–$150, depending on whether it’s just the hinges or the plastic frame they’re screwed into.

  • Total Estimate: $200–$300

Since hinge parts are often special order, expect 3–10 days before your laptop is back in action. That’s a week or more without your device—can you manage without it?

Is It Worth Fixing?

Here’s the tough truth:

  • A laptop that’s 4+ years old has likely given you solid value already.

  • Even if repaired, other components (battery, storage, performance) may soon show their age.

  • Spending $200–$300 on repairs might not be the best investment if your budget allows for a replacement.

When to Repair

Consider repairing if:

  • You’re on a tight budget and can’t afford a new laptop right now.

  • The laptop still meets your performance needs (no lag, decent battery life).

  • You’re okay waiting up to 10 days for parts and repair.

When to Replace

Consider replacing if:

  • You can afford a new laptop.

  • You rely on your laptop daily and downtime isn’t an option.

  • You want modern features (faster processors, better battery, lighter design).

Final Thoughts

Broken hinges are frustrating, but they’re also a sign your laptop has served you well. If your budget supports it, upgrading to a new device is often the smarter move. If not, repairing can buy you more time—but remember, it’s a short-term fix for a long-term problem.

Read More
Roger Ahuja Roger Ahuja

The Ultimate Lightroom Editing PC: What You Really Need

If you’re serious about photo editing in Adobe Lightroom, your computer setup can make or break your workflow. Nothing slows down creativity faster than laggy previews, sluggish exports, or running out of storage mid-project. So, what kind of machine should you invest in? Let’s break down the essentials.

Processor: The Heart of Your Editing Rig

Lightroom thrives on strong single-core performance, but modern multi-core processors help with batch exports and multitasking.

  • Recommendation: A 14th Gen Intel i7 processor or faster. This gives you the speed you need without overspending on diminishing returns. If you’re juggling massive catalogs or dabbling in video editing, stepping up to an i9 is worth considering.

RAM: Smooth Multitasking

RAM is where Lightroom stores active data while you edit. Too little, and you’ll feel the drag. Too much, and you’re just wasting money.

  • Recommendation: 32GB–64GB of RAM. Lightroom rarely benefits from more, so don’t bother with 128GB unless you’re running multiple heavy apps side by side.

Storage: Fast, Spacious, and Reliable

Photo libraries grow quickly, and Lightroom loves fast drives for previews and catalogs.

  • Primary Drive: A 4TB NVMe SSD for lightning-fast access. If you’re a heavy shooter or work with large RAW files, consider 8TB.

  • Backup Drive: A 20TB external USB hard drive ensures your work is safe. Pair this with reliable backup software to protect against data loss.

Backup Strategy: Don’t Skip This

Even the best hardware can fail. That’s why a solid backup plan is non-negotiable.

  • Recommendation: Veeam Endpoint Backup software. It’s robust, easy to configure, and keeps your photo library secure.

Graphics Card: Do You Really Need One?

Lightroom isn’t as GPU-dependent as video editing software, but a good graphics card speeds up rendering, zooming, and AI-powered features.

  • Recommendation: Depending on your workload, an NVIDIA RTX 5070 with 12GB of VRAM is a strong choice. If you mostly edit smaller catalogs, you can scale down—but if you’re handling thousands of RAWs or using AI tools, the extra GPU power pays off.

Final Thoughts

Building the right Lightroom PC is about balance. You don’t need to chase the most expensive parts—just the right ones:

  • CPU: 14th Gen i7 or better

  • RAM: 32–64GB

  • Storage: 4TB NVMe (8TB for heavy users) + 20TB external backup

  • GPU: RTX 5070 w/12GB VRAM (optional, but recommended for large workloads)

  • Backup Software: Veeam Endpoint Backup

With this setup, you’ll have a machine that keeps up with your creativity, handles massive photo libraries, and protects your work for the long haul. Give us a call and we can build the right machine for you.

Read More
Roger Ahuja Roger Ahuja

Why Your Sound Works in One App but Not Another: The Mystery of Default Audio Settings

Have you ever had this happen: you’re watching YouTube in your browser, sound is working perfectly, but the moment you join a Zoom meeting—silence. Or maybe the opposite: Zoom works fine, but YouTube videos play without a peep. It feels like your computer is playing tricks on you, but the truth is much simpler: each program needs to know which audio device to use, and sometimes those settings get out of sync.

System Sound vs. Application Sound

Your operating system (Windows, macOS, etc.) has a default audio output device—usually your speakers or headphones. When you play a test sound in the system settings, it uses that default device.

But here’s the catch:

  • Browsers like Chrome or Edge may remember a different device than your system default.

  • Zoom (and other conferencing apps) often let you pick a microphone and speaker separately, and they don’t always update automatically if your system default changes.

That’s why you can have sound in one program but not another: each app is “listening” to its own instructions.

Why Defaults Get Messed Up

Several things can cause mismatched audio settings:

  • Plugging in or removing headphones/USB devices

  • Switching between Bluetooth and wired connections

  • Updating drivers or the operating system

  • Apps “remembering” an old device that’s no longer connected

When this happens, the app may keep trying to send sound to a device that doesn’t exist—or isn’t the one you’re actually using.

How to Fix It

Here’s a step-by-step approach:

  1. Check System Default

    • On Windows: Right-click the speaker icon → Sound settings → make sure the correct device is set as Default Output.

    • On macOS: Go to System Settings → Sound and confirm the right output device.

  2. Check the App’s Settings

    • In YouTube (via your browser), right-click the tab → Select Audio Device (in some browsers) or check system mixer settings.

    • In Zoom, go to Settings → Audio and make sure the correct speaker and microphone are selected.

  3. Test and Adjust

    • Play a test sound in the app.

    • If it still doesn’t work, close and reopen the app after changing the settings.

The Takeaway

If sound works in one place but not another, it doesn’t mean your speakers are broken. It usually means the app is pointing to the wrong output device. By double-checking both your system default and the app’s own audio settings, you can get everything back in harmony.

Read More
Roger Ahuja Roger Ahuja

Unexpected Outlook Invitations: What’s happening and why you should care

You open your Outlook calendar and find an appointment you never created. That unsettling moment — someone else added an event to your schedule without your consent — is exactly what many people are finding lately. Scammers are exploiting a loophole in Outlook’s meeting-handling behavior to push unwanted invitations into calendars, clutter schedules, and even try to trick recipients into clicking links or joining fake meetings.

How the loophole works

  • Scammers send meeting invitations that appear legitimate enough to be accepted automatically or to show on your calendar.

  • Because Outlook can add online-meeting metadata to every appointment and has automatic accept/decline behaviors, those invitations can appear without you taking any action.

  • Once the invite appears, a malicious link or meeting join button can be used to phish credentials, install malware, or socially engineer you.

Quick fix — stop Outlook from auto-adding online meetings

Follow these steps in Outlook to prevent automatic insertion of online meeting details into every new meeting:

  1. Open Outlook.

  2. Click File, then select Options.

  3. Choose Calendar from the left-hand menu.

  4. Uncheck Add online meeting to all meetings.

  5. Scroll to the bottom of the Calendar options and click Auto Accept/Decline.

  6. In the Auto Accept/Decline dialog, make sure nothing is checked (no automatic processing of meeting requests).

These two changes stop Outlook from automatically stamping meetings with online-join info and from processing invitations without your explicit action.

Best practices to reduce risk

  • Never click links or join meetings from calendar items you did not expect.

  • Verify unexpected invites by contacting the organizer through a trusted channel (email address you know, phone, or your organization’s directory) rather than using the meeting’s reply/join controls.

  • Train staff and family to recognize unsolicited calendar invites and to follow the same verification steps.

  • Keep Outlook and your OS patched; many threats rely on known vulnerabilities already fixed by updates.

When to get help

If you still see strange invites after changing these settings, or if you think you or your organization may have been targeted, get assistance. We can walk through the settings with you, check account rules and delegates, and verify if your account has been abused.

Give us a call and we’ll help secure your calendar and make sure nothing slips through the cracks.

Read More
Roger Ahuja Roger Ahuja

Accidentally deleted files and nothing in the Recycle Bin with no backup

Losing important files with no backup is stressful. The single most important thing to do right now is stop using the computer. Every keystroke, application launch, or background task can reduce your chances of recovery.

Shut down the computer now and don’t use it

  • Power off immediately. Shut down the system instead of logging off or restarting.

  • Do not boot into Windows or open apps. Any normal use writes data to the drive and can overwrite the exact sectors holding your deleted files.

  • Avoid accessing the drive for any reason — even opening File Explorer or installing recovery tools on the same machine risks permanent overwrites.

Why you must avoid using the PC

When you delete a file in Windows, the operating system typically removes the file’s reference (the pointer) from the file system table; it does not immediately erase the file’s contents on the disk. The data remains on the drive until Windows writes new data to those same disk sectors. Temporary files, Windows updates, pagefile activity, application caches, and even antivirus scans can quickly write to the disk and overwrite deleted-file data, making recovery impossible.

Best recovery approach — remove the drive and recover from another system

  1. Remove the drive from the PC

    • Power down and disconnect the computer. Physically remove the hard drive or SSD. This prevents any further writes from the original system.

  2. Attach the drive to a different computer as a secondary drive

    • Use a SATA-to-USB adapter, external enclosure, or install it into a second desktop. Do not make it the boot drive on the recovery machine.

  3. Use specialized recovery software from the other computer

    • Run reputable file-recovery software on the host machine, targeting the removed drive as the source. Let the software scan for deleted files and recover to a different physical drive (never recover onto the same drive you’re scanning).

    • Save recovered files to another external drive or the host system’s internal drive.

  4. If you’re not comfortable doing this

    • Call us. Continuing to try random fixes can reduce recovery chances.

Practical tips and precautions

  • Do not install recovery software on the affected drive. Always install and run tools from another system or USB drive.

  • Recover to a separate drive. Writing recovered files to the same drive can overwrite other deleted content you still need.

  • Consider read-only imaging. Advanced users or professionals often create a full disk image and perform recovery from that image to avoid touching the original sectors.

  • Act quickly. The sooner you stop using the drive, the better the chance of complete recovery.

  • If the data is mission-critical (legal, financial, irreplaceable), consider contacting a professional data-recovery service right away. They have tools and clean-room procedures that raise the odds of success.

Need Help

Need Help, give us a call. We can walk you through safe next steps or handle the drive removal and recovery for you.

Read More
Roger Ahuja Roger Ahuja

Dispose of Windows PC Securely Using System Reset

So you want to dispose of an old Windows PC and make sure nobody can recover your data. Use the built‑in System Reset, but do it the right way. This guide gives a clear, step‑by‑step plan: prepare, perform a secure reset, verify, and know when to escalate to full drive sanitization or physical destruction.

Why a simple delete is not enough

Deleting files or emptying the Recycle Bin only removes directory entries; the underlying data remains on the drive and can be recovered with widely available tools. A properly executed Reset that includes data cleaning or a full drive wipe reduces or removes the chance of recovery and is the practical choice for most users.

Preparation steps (do these first)

  • Backup important data. Copy documents, photos, and any settings you want to keep to an external drive or cloud storage.

  • Export account data and credentials. Export browser bookmarks, passwords, and application settings if needed.

  • Deauthorize services. Sign out or remove the device from accounts that use device limits (iTunes/Apple ID, Office, Adobe, Steam, Dropbox, etc.).

  • Remove removable media. Take out SD cards, USB keys, and any secondary drives you plan to keep.

  • Decide what to keep physically. If you plan to reuse the internal drive, remove it now; if not, proceed with secure wipe options below.

Use Windows Reset correctly

  • Open Settings. Go to Settings > System > Recovery in Windows 11 or Settings > Update & Security > Recovery in Windows 10.

  • Start Reset. Click Reset this PC then Reset PC.

  • Choose Remove everything. Select Remove everything rather than Keep my files.

  • Choose data cleaning. When offered, select Remove files and clean the drive (or Fully clean the drive) instead of just removing files. This option makes recovery much harder by overwriting sectors and is recommended when giving away, selling, or recycling the PC.

  • Finish and wait. Confirm and let the process complete. Expect it to take significantly longer when you choose the full clean option.

Verify the result

  • Boot to the Windows setup screen. After a successful reset the machine should boot to OOBE (Out Of Box Experience) or show no user accounts.

  • Check disk state. If you can boot from a rescue USB, verify partitions and that no personal folders exist. If the drive shows only system partitions or unallocated space and setup prompts for account creation, the reset likely succeeded.

  • Optional recovery test. If you have the skill and tools, run a quick file-recovery scan to confirm there are no recoverable personal files; if you find recoverable data, proceed to full drive overwrite or physical destruction.

When to escalate: full wipe or physical destruction

  • Highly sensitive data. If the device contained sensitive business, legal, medical, or financial data, do not rely solely on the Reset. Use a certified disk-wiping tool to perform multiple overwrites, or remove the drive for secure destruction.

  • Use a secure wipe tool if removing drive. Boot a trusted wipe utility from USB and perform a full-disk overwrite (single-pass is usually sufficient for modern drives; multi-pass optional for specific policies).

  • Physical destruction. For drives that must never be recovered, physically destroy the platters (HDD) or shred/disintegrate the SSD. Follow organizational policies or certified destruction services for compliance.

Practical checklist before disposal

  • Backup data.

  • Deauthorize accounts.

  • Remove external media.

  • Run Reset > Remove everything > Fully clean the drive.

  • Verify OOBE or absence of user accounts.

  • Escalate to disk wipe or destruction if data sensitivity requires it.

Bold, deliberate steps protect your privacy without unnecessary complexity. Use the Reset with the full clean option for most situations and choose a full wipe or destruction for high‑risk data.

Read More
Roger Ahuja Roger Ahuja

Streamline Your Team Communications with Exchange Distribution Lists

Setting up a distribution list in Exchange lets you route incoming messages—like queries sent to info@yourcompany.com—to multiple team members automatically. This approach ensures everyone stays in the loop without relying on manual forwarding or risking a single point of failure. It’s perfect for shared mailboxes handling support, sales, or general inquiries.

What Is a Distribution List?

A distribution list (also called a distribution group) is a mail-enabled object in Exchange that contains multiple recipients. When an email is sent to the group’s address, Exchange automatically delivers it to every member. This saves time, reduces administrative overhead, and ensures consistency in client responses.

When to Use an Alias Instead

If you only need all messages to go to one person, an alias is a simpler option. An alias is an additional email address attached to a single mailbox. Incoming mail to that alias lands directly in the user’s primary inbox without the need for a separate distribution object.

Best Practices

  • Naming Conventions

    • Use clear prefixes (e.g., info@, support@, sales@)

  • Access Control

    • Limit who can send to critical lists to prevent spam

  • Membership Reviews

    • Quarterly audits to remove inactive or departed employees

  • Documentation

    • Maintain a record of group owners, members, and settings for compliance

Need help managing your Office 365 accounts on a day-to-day basis? We can help. Give us a call.

Read More
Roger Ahuja Roger Ahuja

When Your Emails Disappear Into RSS or Deleted Items

If you suddenly find every incoming message bypassing your inbox and landing in your RSS Feeds folder or the Deleted Items folder, your account has very likely been compromised. Attackers have hijacked your mailbox to send mass spam or phishing emails and created hidden rules to keep you from noticing the activity.

Signs Your Account Is Compromised

  • No new messages in your main inbox despite people confirming they’ve emailed you

  • Unfamiliar rules in Outlook moving or deleting mail automatically

  • Sent items full of messages you didn’t send

  • Notifications from contacts about strange emails coming “from you”

Step-by-Step Recovery Guide

  1. Change your email password immediately

  2. Identify any other service where you reused that password and update it there as well

  3. Enable two-factor authentication on your email account if it isn’t already active

  4. Review your Outlook rules and delete any that move incoming mail into the RSS Feeds or Deleted Items folders

  5. Check for automatic forwarding settings and disable any you don’t recognize

Advanced Cleanup Tasks

  • Verify there are no app-specific passwords you didn’t create

  • Sign out of all devices and web sessions connected to your account

  • Revoke access for any third-party apps or services you don’t recognize

  • Audit your account’s login activity or security logs for unfamiliar IP addresses

Beyond the Basics: Strengthen Your Email Security

  • Use a reputable password manager to generate and store unique passwords

  • Schedule regular password rotations and security audits

  • Train your team or family on phishing awareness and suspicious-email reporting

  • Consider advanced email filtering or a dedicated security gateway

If you need hands-on assistance restoring your mailbox or reinforcing your security posture, give us a call. We’ll help you reclaim control of your email and lock down your account for good.

Read More
Roger Ahuja Roger Ahuja

Preparing for Windows 10 End of Life: Upgrade, Extend, or Adapt

Windows 10 reaches end of support on October 15, 2025. After that date, Microsoft will no longer release security patches or quality updates for consumer editions. You’ll still be able to use your PC, but it will become increasingly vulnerable to emerging threats and software incompatibilities.

Is It Time to Replace Your PC?

If your machine is more than five years old, it’s likely approaching hardware obsolescence. Components such as batteries, spinning hard drives, and aging thermal paste degrade over time, leading to sluggish performance, unexpected shutdowns, or even data loss.

  • Look for signs of hardware fatigue: noisy fans, slow boot times, and frequent hangs.

  • Consider your workload: modern productivity suites, web apps, and virtualization demand more RAM and CPU cycles than older systems can reliably deliver.

  • Factor in warranty and repair costs: a new entry-level laptop or desktop often costs less than a single major repair on a legacy machine.

Extending Windows 10 Support on a Budget

If replacing your PC isn’t feasible right now, you can still receive critical security updates through Microsoft’s Extended Security Updates (ESU) program for Windows 10. This program offers up to three additional years of paid patches after end of support.

  1. Click the Start button and type Windows Update.

  2. Select Check for updates in the Settings window.

  3. Look for an Enroll now link or button under the “Quality Updates” section.

  4. Sign in with your Microsoft Account—or create one—when prompted.

Once enrolled, your device will download and install ESU patches just like any regular security update.

Read More
Roger Ahuja Roger Ahuja

Why Wired Beats Wireless (Whenever You Can)

In today’s always-on world, reliable network performance isn’t a luxury—it’s a necessity. Whenever possible, running a wired connection delivers unmatched speed, stability, and security. If you must go wireless, investing in enterprise-grade gear gives you visibility into your access points and makes troubleshooting far easier.

The Case for Wired Connections

Wired networks deliver consistent throughput without the interference or congestion that often plagues Wi-Fi.

Devices on Ethernet experience near-instantaneous data transfers, reducing latency for time-sensitive apps like video conferencing or VoIP.

Physical cables also isolate traffic, making it harder for attackers to eavesdrop or launch man-in-the-middle exploits.

A wired backbone simplifies quality-of-service (QoS) policies, ensuring critical applications always get priority over spare bandwidth.

When Wiring Isn’t an Option

Sometimes walls, desks, or shared spaces prevent you from running Ethernet everywhere.

Mobile devices like tablets and smartphones simply can’t plug in.

Legacy buildings or historic sites often prohibit new cabling for aesthetic or regulatory reasons.

These scenarios force you into the wireless realm—so you’ll want tools that tell you exactly what’s happening on your network.

Investing in Smart Wireless Solutions

Enterprise-level access points and controllers provide real-time dashboards, alerting you to congestion, rogue clients, and spectrum noise.

Look for systems that include built-in heatmaps or spectrum analyzers so you can pinpoint dead zones and interference sources without guesswork.

High-end gear often integrates with cloud-based management, letting you push firmware updates and configuration changes remotely across multiple sites.

APs with multi-band radios and beamforming adapt automatically to shifting environments, preserving performance as your floor plan or user density changes.

Key Wireless Deployment Tips

  • Segment guest traffic on a separate SSID and VLAN to protect your core network.

  • Enable band steering so clients automatically choose the optimal frequency (2.4 GHz vs. 5 GHz).

  • Schedule regular firmware and driver updates to patch vulnerabilities and performance bugs.

  • Monitor client counts per AP and redistribute load when thresholds are exceeded.

Wired vs. Wireless at a Glance

When push comes to shove, wired connections remain the gold standard for mission-critical networks. But if cabling isn’t feasible, the right wireless infrastructure and monitoring give you near-wired confidence.

Call us if you need help designing, deploying, or troubleshooting your wired and wireless networks. We’ll guide you to the fastest, most reliable solution every time.

Read More
Roger Ahuja Roger Ahuja

When Your Acct Folder Vanishes from Documents

You open File Explorer, navigate to Documents, and your entire Acct folder is gone. Heart sinks. Before you call IT or start crying into your backup drive, run a quick investigation: often the “missing” folder isn’t deleted at all — it’s been moved. This guide walks you through a calm, methodical recovery plan: find it, return it, or restore it from backup.

Quick triage — what to do first

  • Open File Explorer and stay calm.

  • Don’t create, rename, or move other files in Documents — that can make recovery harder.

  • Limit your actions to searching and checking obvious places.

Step 1 — Search for the Acct folder

  • Click into the Documents folder, then use the search box in the top-right.

  • Type: Acct

  • Expand the search scope to This PC if nothing appears under Documents.

Why this works: folders are frequently dragged into nearby folders during routine file work. A simple search often finds the folder intact but misplaced.

Step 2 — If you find the folder in a different location

  • Note the current path shown in File Explorer’s address bar.

  • Drag the Acct folder back to Documents, or right-click → Cut, navigate to Documents → Paste.

  • Verify contents: open a few files to confirm they’re intact.

Checklist after moving back:

  • Folder appears under Documents.

  • File timestamps and sizes look correct.

  • Recent files open without error.

Step 3 — If the folder is truly missing

If the search returns nothing, assume the folder was deleted or corrupted and proceed to recovery.

Options, in order:

  1. Check Recycle Bin

    • If present, right-click the Acct folder → Restore.

  2. Restore from File History (Windows)

    • Documents folder → right-click → Restore previous versions → choose a date → Restore.

    • If you use File History, pick the most recent snapshot that contains Acct.

  3. Restore from cloud sync (OneDrive, Google Drive, Dropbox)

    • Open the cloud client or web interface → look for deleted items or version history → restore.

  4. Restore from offline backup

    • Use your backup software (Acronis, Veeam, Windows Backup, etc.) and restore the Acct folder to Documents.

    • If you have image-based backups, mount the image and extract the folder.

  5. Use recovery tools as last resort

    • If no backups exist and the Recycle Bin is empty, consider professional file-recovery software or services.

    • Stop using the drive to prevent data overwrite; recovery success falls with continued writes.

Prevent this from happening again

  • Enable versioned backups

    • Turn on File History, set up periodic backups, or use cloud backup with versioning.

  • Use cloud-synced Documents

    • Keep Documents under OneDrive or similar to get automatic version history and recovery.

  • Turn on Confirm before moving

    • Get into the habit of using cut/paste and double-checking paths before drop operations.

  • Adopt folder permissions and structure

    • Keep sensitive folders in an obvious top-level structure and avoid deep nesting where accidental drags hide items.

  • Routine verification

    • Monthly quick check: search for critical folders and ensure backups are healthy.

Quick decision flow (two-minute rule)

  1. Search for Acct across Documents and This PC.

  2. If found: move back and verify files.

  3. If not found: check Recycle Bin, cloud trash, then File History/backups.

  4. No backups: minimize disk use and run recovery tools or contact a recovery specialist.

Conclusion

A missing Acct folder is usually a misplaced folder. Search first, move it back if you find it, and only then escalate to recovery from backups or tools. Build a simple backup habit (File History or cloud sync) so the next time something vanishes, restoration takes minutes instead of hours or days.

Read More
Roger Ahuja Roger Ahuja

Protecting Your Free Software Downloads: A Cautionary Tale with Sage Thumbs

Free tools can be productivity gold mines until they’re Trojan horses. Recently, one of our clients decided to install Sage Thumbs, a handy utility that lets you preview PSD file thumbnails directly in File Explorer. What seemed like a routine install quickly turned into a lesson in vigilance and defense in depth.

The Sage Thumbs Incident

Our client clicked what appeared to be a legitimate download link for Sage Thumbs. After repeated failures, they reached out for help. We discovered the site they were using wasn’t the official provider; it was a cleverly disguised imposter hosting a potentially dangerous installer.

Rogue Download Sites: A Growing Threat

Attackers set up fake download portals for popular free software to:

  • Distribute malware, adware, or cryptojacking scripts

  • Harvest user data through stealth installers

  • Trick organizations into bypassing internal protections

These sites often mimic official branding including logos, fonts, and URLs to lower your guard. Without a solid verification process, anyone even savvy users can fall prey.

How SonicWall Stopped the Attack

Luckily, our client’s SonicWall firewall had Application Control enabled to block unauthorized free software installations. As soon as the malicious installer tried to execute, SonicWall flagged and quarantined the file, preventing any compromise.

Key features that saved the day:

  • Application Control signatures for known freeware hosts

  • Real time intrusion prevention blocking suspicious payloads

  • Web filtering rules enforcing approved download categories

Best Practices for Safe Software Downloads

  1. Verify the Source
    Always navigate to the official vendor site rather than relying on search engine results or third party reposts.

  2. Leverage Web Filtering
    Block or warn against known malicious or untrusted download sites with URL category policies.

  3. Enforce Application Control
    Prevent unauthorized installers from executing based on hash or signature analysis.

  4. Maintain a Whitelist of Trusted Vendors
    Approve only the domains and software publishers your organization has vetted.

  5. Educate Your Team
    Train users to recognize fake URLs, phishing pages, and installer baits.

Secure Your Organization’s Downloads Today

Free utilities shouldn’t come with a hidden cost. If you don’t yet have protections like SonicWall’s web filtering and application control reach out to us. We’ll assess your environment, recommend the right security, and help you keep every download safe and legitimate.

Read More
Roger Ahuja Roger Ahuja

How Good Is Your Backup? A Simple Test to Ensure Your Data Is Safe

Your backup solution might be humming along in the background, but how can you be certain it’s actually protecting your files? If you’ve never verified that your backups succeed and your data can be restored, you simply don’t have a reliable backup. This article walks you through a straightforward test to confirm your backup is working—and shows you how to set up email notifications so you’ll always know its status.

The Myth of “Set and Forget”

Many people assume that once a backup schedule is configured, it will forever safeguard their data. In reality, hardware failures, software bugs, misconfigurations, or full storage targets can all silently derail your backup jobs. Without verification, you risk discovering corrupt or incomplete backups only when disaster strikes—far too late to recover critical documents.

A Foolproof Backup Test

Verifying your backup doesn’t require specialist tools or complex scripts. Follow these simple steps to confirm end to end functionality:

  1. Create a small test document on your computer (for example, “backup_test.txt”).

  2. Run or wait for your next scheduled backup to include this file.

  3. Delete the test document from your local drive.

  4. Initiate a restore operation and recover “backup_test.txt” to its original location.

  5. Open the restored file to ensure it’s intact.

If this process completes without errors, your backup pipeline is working as intended. If not, you’ve uncovered a critical weakness that needs immediate attention.

Setting Up Email Notifications

Waiting for a backup to fail is like waiting for a storm without a weather alert. Most backup solutions offer built in reporting or notification features—enable them to receive automatic email alerts:

  • Notify on success or failure for every backup job.

  • Customize thresholds (e.g., alert if a job runs longer than expected or if free space drops below a safe level).

  • Include detailed logs or summaries in the notification to speed troubleshooting.

With notifications in place, you’ll know within minutes whenever backups succeed or stumble, giving you time to fix issues before data is lost.

Turning Tests Into Routine

Verification shouldn’t be a one off exercise. Embed backup tests into your maintenance calendar:

  • Perform a test restore quarterly or after significant system changes.

  • Rotate test documents or use unique filenames each time to avoid confusion.

  • Document results in a simple log date, result, and any follow up actions.

By treating backup verification as a regular task, you transform uncertainty into confidence. You’ll always know your data is secure, and you’ll sleep better knowing you’ve done the due diligence.

Your Data’s Lifeline

Backups only protect what you can successfully recover. If you don’t know whether your backups work, they’re as good as non existent. Run the simple test outlined above, enable email alerts, and make verification a routine. Your future self and your organization will thank you for the peace of mind when the unexpected happens.

Read More