Author Archives: Daniel Gauthier

About Daniel Gauthier

work as a peace officer in various forms. Daniel wrote a book in 2009 called “Tech-Knowledgy” which got him on television and radio a few times. The concept behind the book was “to level the playing field between computer techs and non-techies so they don’t get take advantage of”. Daniel has a couple certifications including MCP and A+; he is preparing to write the Network+ exam and has studied CEH (Certified Ethical Hacker) and CHFI (Computer Hacking Forensics Investigator). Daniel has run his own computer service business “TwinBytes” since 2004. He has done a few talks on cyber security and generally enjoys training, educating and helping others.

FIX Trust relationship between this workstation and the primary domain failed

      Comments Off on FIX Trust relationship between this workstation and the primary domain failed

How to fix “The trust relationship between this workstation and the primary domain failed”, without rejoining the domain! I have tried the suggestions previously when I first heard about it and for the life of me it just wouldn’t work.  I thought I was typing it wrong, until I found the problem I was having and the solution to fix… Read more »

How can I protect myself from hackers?

      Comments Off on How can I protect myself from hackers?

I’ve been asked this question so many times and continue to get asked.  Now lately I’ve been asked by existing clients that we do regular maintenance for “Are we doing enough?”, “Are we doing everything we can to protect ourselves against hacker threats?” The short answer in my professional opinion is “yes, you can always do more and no, it… Read more »

Wireless security and WPS

      Comments Off on Wireless security and WPS

You may have the newest router available on the market with the latest security encryption and a strong complicated password, but you may have forgotten something.  Did you know most likely there is a WPS button on your router which can allow a hacker to get into your wireless network much easier than hacking the wireless password you have in… Read more »

Spring cleanup

      Comments Off on Spring cleanup

Now that spring has finally arrived, it’s a good reminder to think about spring cleaning.  Not just the house, but about your computers.  Whether it’s for business or just personal use, we use our computers for just about everything imaginable, and so they are huge targets for hackers to find lots of juicy information or simply take over your computer. … Read more »

Making your Facebook private

      Comments Off on Making your Facebook private

I’ve been asked to help many people with locking down their Facebook either for themselves after being separated/divorced so their spouse can’t see all their activity, or for their children to make sure public in general can’t see them, especially school bullies viewing their profiles even though they are not friends.  Hackers use this to gain information about you to… Read more »

Problems with thin notebooks

      Comments Off on Problems with thin notebooks

People are buying into the idea that thinner and lighter is better.  Sure light weight helps when you’re carrying around a notebook/laptop all day, however to make it lighter you are giving up a few features such as now having a smaller screen, smaller battery, no DVD drive, and a thin screen.  So you’re probably wondering why I say a… Read more »

Replace expired Windows Live Mail

      Comments Off on Replace expired Windows Live Mail

According to Microsoft, Windows Live Essentials Mail program has discontinued support on January 10, 2017.  If you have the program installed already, you can continue using it, however if you format your hard drive you will not be able to download it to reinstall. It has become a security threat now, the longer you keep it, the more vulnerabilities it… Read more »

How do you know you’ve been hacked?

      Comments Off on How do you know you’ve been hacked?

I get asked fairly often recently “how do you know if you have a hacker in your system”.  There is no short answer.  It would require hiring a security expert such as a penetration tester who tests networks for vulnerabilities to find if there is a sign of a hacker.  A regular computer technician will not be good enough.  If the hacker… Read more »

Windows 10 arbitrarily removing programs

      Comments Off on Windows 10 arbitrarily removing programs

I’ve noticed this after a few phone calls from clients where programs (Specifically anti-virus) just disappeared on it’s own.  It seems this has been happening after major Windows updates are done in Windows 10.  Windows 10 is different from all the previous versions of Windows as it has two ways of doing updates. Regular Windows updates (Security patches and fixes) Major… Read more »

How to avoid hackers while surfing

      Comments Off on How to avoid hackers while surfing

There are many ways a hacker can get into your system.  Two ways are by either sending you a fake link to click on in an email, or there could be a fake link in a discussion forum where you are looking for answers to fix a problem yourself.  Our focus will be on the second today. Although everyone likes… Read more »