URTech Mouse logo-dark-80
  • Home
  • How To’s
    • Windows 11 & Windows 10Windows 2000, XP, Vista, 7 and more How Tos
    • Windows Serverwindows 2003, 2008, R2 how tos
    • Microsoft 365, Azure & HostingHelp with Office 365 Issues
    • Office: Word, Excel, Outlook…Office Apps like Word, Excel, Visio, Outlook, Project, Powerpoint, 2003, 2007 and 2010
    • Mobile: Android, Samsung, LGBlackberry, BES, and BIS news and how tos
    • Microsoft Exchange ServerExchange 2003, 2007, 2010 how to and demos
    • System CenterEndpoint Protection
    • JokesThis category is for I.T. relates gags and practical jokes
    • Product Reviews & Other TechnologiesOther Technologies like firewalls, VoIP, Skype, Hardware Comparisons and other how tos
  • Windows 10, 11 & Server
    • Windows 11 & Windows 10Windows 2000, XP, Vista, 7, Windows 8 and more How Tos
    • Windows Serverwindows 2003, 2008, R2 how tos
  • Office 365 & Azure
    • 25 User FREE Office 365 Trial
    • Office365 & Azure HelpHelp with Office 365 Issues
  • IT Business News
  • YouTube Channel
  • Contact
    • Discount Hosting
    • On Site SupportHARDWARE & SOFTWARE We have found that most customers are tired of the excuses from ICT vendors… “… it’s the softwares fault” “…it’s Dell’s fault”. Fault is not important when you are having problems… getting it fixed is. We typically take end to end responsibily for anything that plugs into the wall, from desktops and laptops, to photocopiers and phone systems… it’s all our problem. Server hardware Server Software (like Exchange, Server 2008, Print Sharing, Sharepoint, Dynamics…) Desktops (from any vendor, IBM/Lenovo, Dell, Toshiba, White box…) Laptops Switches and Firewalls (from any vendor, like Dlink, Cisco, Linksys, FortiNet, Netgear…) Uninteruptable Power Supplies (UPS) network, phone and electrical cabling land line systems (like Nortel, Avaya and Toshiba) photocopiers (like Xerox, Kyocera, Mita, Canon, Toshiba…) cell phones Blackberry’s Blackberry Enterprise Server and even the Apple Mac’s… we handle it all CONTRACT MANAGEMENT & NEGOTIATIONS Many companies simply take the “rack rate” on their purchases and leases.  We are skilled and experienced at managing and renegotiating all sorts of contracts.  Cell contracts will Telus, Bell, Rogers… are often Service contracts with photocopy companies Land Line contracts with Bell, Telus, Rogers, All-stream Evergreen renewals and sooo much more We can reduce your costs and increase…
    • Computer Recycling
    • Hardware & SoftwareNEW HARDWARE & SOFTWARE We sell and support all of the ‘Tier 1′ and ‘Tier 2′ brands. Toshiba, HP, Dell, Samsung, Logitech, Lenovo, Intel, AMD, Colubris, AOC, Kingston, Microsoft, Symantec, Kaspersky, McAfee and on and on…                                                                                                                                                                                                      HARDWARE REPAIR AND UPGRADE We will support, repair, and upgrade hardware from any brand or manufacturer.  From Dell to Toshiba, to Lenovo/IBM we service it all.  Up & Running will also perform a security wipe and dispose of your old hardware, networking equipment and software to all firms in the Calgary Region. DATA RECOVERY Our qualified technicians provide full data recovery from failed or deleted hard drives and memory sticks for anyone in Southern Alberta.
    • Privacy Policy

security

encrypt-android-samsung-s9

VIDEO: How To Easily Protect Your Android Cell From Lock Screen PIN Code Hacks

If you are worried about security on your Android cell, you need to make sure that a thief or hacker cannot easily get around your PIN code to unlock it. We show you how to protect yourself on our Samsung Galaxy S9 demo unit. The idea is to EASILY encrypt Read more…

By Ian Matthews, 6 yearsJanuary 29, 2019 ago
Practical Cyber Security in 2019

VIDEO: Practical Cyber Security in 2019

This presentation titled, “A Guide to Practical Cyber Security in 2019” was given to a parents association at middle school in Calgary. It has some teen discussion but as stated in the video, Cyber Security is now everyone’s problem and so the course is intended primarily for adults. The DON’Ts Read more…

By Ian Matthews, 7 yearsJanuary 16, 2019 ago
get-around-two-factor-authentication

SOLVED: VIDEO: 4 Ingenious Ways Hackers Get Around Two Factor Authentication

If you are like most people, you think two factor authentication is nearly impossible to get around.  This is because two factor includes: something you know (like a username and password) something you have (like your cell phone that has a PIN code texted to you) So if a hacker Read more…

By Ian Matthews, 7 yearsJanuary 3, 2019 ago

What is the Most Important Account You Have? The Answer Will Shock You

If you were thinking your bank or Facebook were the most important accounts you have, you would be wrong.  The key to the question is asking yourself, what guards your accounts?  The answer is email. Email is the single most important account you have because it is most often used Read more…

By Ian Matthews, 9 yearsMay 28, 2016 ago

SOLVED: What is Near Field Communication (NFC)?

Near Field Communication, or NFC as it is now commonly referred to, is very much like a two way Radio Frequency Identifier (RFID) that is built into newer smart cell phones, such as the Blackberry Bold 9790 and Google Nexus S (but not any of the Apple iphones… yet).  If you Read more…

By Ian Matthews, 13 yearsFebruary 18, 2012 ago
I stand with ukraine fist donate
USEFUL LINKS:
Guide to Creating a Blog
Who Invented the Personal Computer?
Guide to Making a Website
Whats Next in Electric Vehicles?
Guide to the Best Website Builders
  • Calgary Computer Recycling
  • Privacy Policy
  • Who We Are
  • On Site Support
  • Hardware & Software Services
  • Office 365 & Hosted Services
  • Contact
Written Permission Required For Use of Any Materials or Text - Powered by URTech.ca