BitLocker On Windows 11

BitLocker—Windows Drive & Device Encryption

Why Does Windows 11 Require the TPM 2.0 Chip? The short answer, to enable a Windows computer security feature called BitLocker. Windows 11’s hardware requirements are notably different from previous versions of Windows. One of the Windows 11 system requirements that often causes confusion is a Trusted Computing feature known as the TPM chip. TPM stands for Trusted Platform Module. The Trusted Platform Module makes it possible for the Windows operating system to protect the user’s sensitive data. Different PC hardware manufacturers may have their own type of TPM. But, to support Windows 11, they must meet the TPM 2.0 security standard.

BitLocker Encryption

TPM 2.0 Simplified

To use an analogy, the TPM is like a secure vault that helps to keep sensitive data like your Windows PIN, or anything that you store on your PC, secure from unauthorized access. That is why Windows 11 requires the TPM 2.0 chip, or a Firmware (software) version of the TPM chip also known as fTPM. Intel also has its own version of TPM known as Intel Platform Trust Technology (Intel PTT). While Windows 11 system requirements may add unwelcome expenses for users, the demand to protect Windows users from sophisticated computer threats necessitates these system requirements for Windows 11. The TPM 2.0 security standard and the secure boot requirements on the new Windows operating system is a security measure that helps to keep Windows safer to use, especially with malicious software attacks that can compromise your computer as it starts up.

The TPM Chip Before Windows 11

TPM technology has been around since 2009. Until Windows 11, Microsoft used early versions of the TPM chip with their drive encryption feature known as BitLocker. This security feature was only available on the Professional and Enterprise versions of the Windows operating system. But since Windows 8.1, Microsoft added another type of BitLocker called Device Encryption. So now Microsoft enables Device Encryption by default on all eligible devices from Windows 8.1 to Windows 11.

Device Encryption Pros and Cons

Pros: Whether you handle sensitive data or you don’t want your data falling into the wrong hands, device encryption is a great solution for that. It’s quite easy to access data on an unencrypted device. But that is not the case when you encrypt your device. Device Encryption comes in handy in the event of theft or loss of your computer. Unless you put a sticky note with your password on your computer, you can rest easy knowing that you encrypted your device. Data privacy and security is the biggest pro for device encryption. If you also have your data backed up to Microsoft’s One Drive, or your preferred back up method, you can resume your normal operations with minimum loss. 

Cons: The biggest issue that I’ve seen come up with device encryption is that most home users are unaware of this feature. Microsoft has Device Encryption turned on by default for any eligible PCs set up with a Microsoft account. Since some users are reluctant to create a Microsoft account to begin with, they don’t keep track of their Microsoft account information. Sometimes the users are surprised to learn that their device has encryption on it. As a result, there is a potential for data loss for users unfamiliar with the Device Encryption that has become standard on most Windows 11 PCs.        

The Two Types of BitLocker

BitLocker is available for all eligible devices for Windows 11 Home, Pro, and Enterprise editions. If your PC’s hardware meets Microsoft’s system requirement for BitLocker, you will have one of the following types of BitLocker:

Device Encryption: this type of BitLocker is available on Windows 11 system set up with a Microsoft account. If Windows should ever prompt you to enter your BitLocker recovery key, you will find it under your Microsoft account, your School, or Business account, depending on how or who set up your Windows 11 machine.

Drive Encryption: this BitLocker type is available on the Pro and Enterprise Versions of Windows. It allows you to encrypt your Windows system drive and gives you the option to encrypt specific storage devices, including removable drives. The Drive encryption BitLocker also gives you the option to choose how you want to save your recovery key. If you choose to print or save your recovery key to a thumb drive, be sure to keep them somewhere safe. Otherwise, you will lose access to your data without BitLocker’s recovery key.

While what Microsoft is trying to achieve with Windows 11 is understandable, I think they should make the Microsoft account and Device Encryption BitLocker optional during the initial setup, especially for Windows 11 home users. Based on the feedback that we get from our customers; the mandatory Microsoft account is one of the least favored features of Windows 11. If there are features that you think make Windows less user friendly, you can play a proactive role by sending Microsoft your feedback.

Windows 11 Upgrade

Are you ready to upgrade to Windows 11? If yes, we are here to help. You can save money on tech upgrades that give you the speed you want, without changing your setup. Also, if you have a loved one who is frustrated by how slow their PC runs, consider some hardware upgrades. For those of you ready to bite the bullet and transition to Windows 11, we can help make that process seamless. If your computer is less than 5 years, and still running Windows 10, its hardware might support Windows 11. Give us a call and schedule your free Windows 11 upgrade assessment.  

Windows 11 & 10, Pin vs Password


When you setup a Windows 10 or 11 machine, you have the option to setup a PIN to make it easier to login. While that is convenient for the user, there is also a downside to using a PIN. During the setup of a Windows 10 or 11 computer, Windows requires a password first before you can set up a PIN. If you setup your computer with a Microsoft Account (Online Account), your computer’s password is usually whatever you use for your Microsoft Account. If you setup your computer without a Microsoft account, the password you set before setting up the PIN will be the administrator’s password.  

Why is this important? Glad you asked. An issue that comes up often is that users don’t always remember the administrator’s password when they bring their computer in for service. Without the administrative password, we cannot access the advanced features to perform needed repairs—not without some wizardry.

When you are working on a budget, the last thing you want is the extra cost from the workarounds we need to do to access the administrative features. So, whenever you or someone else sets up your Windows 10 or 11 machine, make a note of your password before you set up the PIN. That will save you money if you should need to have your PC serviced.  The main take away from this is that a PIN does not give us access to the backend advanced service and repair tools. So always make a note of your admin password in addition to the PIN.

If you have a desktop computer and are considering replacing it with something newer and faster, let us know. We build durable, high quality, and high-performance desktop computers backed by our 1-year local warranty! If anything goes wrong, you don’t have to worry about shipping your computer off somewhere. Custom-built computers typically last an average of about 10 years. Feel free to give us a call if you are interested in a custom-built Windows 11 PC.

Computer Upgrades

Laptop Batteries & Liquid Spills

As most of you know laptops, electronics and liquids don’t mix. Unless your notebook or laptop is waterproof, there is a risk of structural damage or fire due to liquid spills. Unlike older laptops that had an easily removable battery, newer notebooks now come with internal batteries. So, you cannot easily take out the battery in the event of a liquid spill. Since liquids can pass electricity, they can create a connection between electrical components normally separated by insulation. This is what causes damage to electrical components, including the battery. 

Why Remove The Battery

Recently, we have seen an increase of laptops coming in with structural damage from batteries on the verge of bursting from neglected liquid spills (See battery image below). While some notebooks come equipped with safety mechanisms to prevent fire from liquid spills, it’s better not to wait and find out what happens should that safety mechanism fail. That’s why we strongly recommend that you have your laptop checked by a computer professional as soon as possible. Removing the battery in time can help save your laptop and your data.

Liquid spill can cause a short circuit in laptop batteries. This damages the insulation that helps to regulate how batteries store and discharge electricity, which then accelerates the chemical reaction that produces oxygen. In a nutshell, the accelerated chemical reaction in batteries releases gas too fast, causing the battery to swell up. You may notice that your touch pad or some keys on the keyboard won’t go down all the way when you push on them. You may also hear what some describe as a “simmering” or “hissing” sound. Do not keep your laptop plugged in at that point. Take your laptop to your local repair shop as soon as possible to prevent any further damage to you or your device.

Swollen Laptop Battery vs Normal Laptop Battery

Although technology has come a long way to prevent major mishaps, it’s always a good idea to error on the side of safety in the event of liquid spills on electronics, whether it’s a phone, laptop, or a desktop computer. Using the wrong, or cheap charger can also damage laptop batteries and cause them to swell up. The indication for this type of damage is that the battery may no longer hold a charge well while the laptop is relatively new.  So, if you need to have your laptop’s battery replaced, feel free to contact us through our website or through our Facebook page. We are here to help.

On that note, we hope you found this information useful. If you did, pass it along to friends or family members who can benefit from this information.

Rogue Browser Extensions & Scams

Browser extensions are add-ons that people often use to improve the look and functionality of their web browser. However, among the good browser extensions, more rogue browser extensions seem to be popping up, and some users are installing them without realizing their potential risk to online privacy. In recent years, our computer repair shop has helped people who have been scammed through their phone or computer in some way. As we looked closely at each of the instance where someone was scammed, or almost got scammed – the common denominator in most of those cases was that the attacker knew something about the user’s recent online activities. Whether the user was trying to track a package, or contact support for an internet-based company – the attacker seemed to know enough information to come across to the user as legit. So, this raised the question of how the scammers were getting information about the user’s online activity?

Knowing the “how” is the key to preventing more scams of this nature. So, let us dive in.

Extensions Secretly Tracking Users Online

In the instances that we helped someone whose computer had been compromised, one thing that stood out is that the attacker seemed to know something about the user’s recent online activities. So, there had to have been a leak. What was interesting however was that there were no major threats on these computers –only a few seemingly innocent browser extensions.

Risky Browser Extensions

Digging further, I found that these browser extensions had permission to read the users search history, make changes to the user’s search settings, etc. With the right configuration, these rogue extensions could read or change your data on certain sites! Yet, some of the most commonly used computer protection software did not even flag these browser extensions as a potential risk. Anything the user searched for, or any sites that the user visited could be recorded by these rogue browser extensions. So, all it takes is having one of these malicious browser extensions to have an information leak! And that information in the wrong hands, with a bit of social engineering can be a source of trouble for unsuspecting computer users.

Malicious Extensions

Malicious browser extensions affect PCs and Apple (Mac)  computers alike. Mac users are not immune to this type of attack. Rogue browser extensions are a subtle type of threat that cyber criminals can use to collect data about the computer’s user without being obvious. Once an attacker has enough information about the computer’s user, they can usually execute a cunning confidence game on unsuspecting victims without raising any red flags.

The Solution

Not all browser extensions are malicious. You can find useful extensions that help you block ads for example, or help you lookup words. However, you have to do some research to find reputable browser extensions before you install them. On the other hand, rogue extensions are just trouble from the get go. They often pretend to be “useful” to the user in some way, while secretly collecting information about the user’s online activity. Sometimes they end up on the user’s browser through deception and they might remain unknown to the user until a computer whiz spots them.

If you suspect that you have rogue browser extensions, and you want to know how to get rid of unwanted extensions, check out our article on how to remove extensions. If you do not feel comfortable removing unwanted extensions by yourself, we encourage you to contact your local, trusted computer professional. They can help you remove the unwanted extensions and also help you configure your web browser’s privacy settings for better protection. If you found this information to be useful, pass it on. Thank you!

How To Remove Extensions

Unwanted Browser Extensions

Extensions are a type of web browser add-on that can add more functionality to your web browser. However, you might find yourself in a situation where a malicious Extension is installed on your web browser without your knowledge. In that case, it helps to know how to remove the unwanted Extension in order to protect your personal information. We have only chosen Google Chrome, Firefox, and Microsoft Edge for this how to. So without further ado, let’s dive into it.

Please keep in mind that the following “How-to-s” are based on the standard configuration for each browser at the time of writing this article. Please note: the Extensions shown in the images below are not to be considered malicious. We are simply using these Extensions for illustration purposes, nothing more. If you feel comfortable removing browser Extensions by yourself feel free to follow these instructions. Otherwise we recommend that you get help from a computer expert.

Depending on the browser, removing the Extension can be as simple as right clicking on the extension and clicking the remove option. If that doesn’t work, you can follow the instructions for your browser below.

How To Remove Extensions From Microsoft Edge

  1. Click on the three horizontal dots on the top right hand corner of Microsoft Edge to open the options menu as shown in the image below.
  2. Navigate to the Extensions option
  3. Choose from the list of Extensions which one you want to remove
  4. Click on the Extension to show more info and options for that browser Extension
  5. Locate the uninstall button and click on it to remove the unwanted Extension. A confirmation box will show up, so click on the OK to complete removing the unwanted browser Extension.

How To Remove Extensions From Google Chrome

  1. Click on the three vertical dots on the top right hand corner of Google Chrome to open the options menu. See image below.
  2. Navigate to “more tools” and then click on Extensions from the list of options which pops up when you hover over the more tools option. At this point, you should be presented with a list of tiles for the currently installed web browser Extensions.
  3. Select the Extension that you want to remove and click on remove.
  4.  A confirmation box will show up. Click on the remove button to remove the unwanted browser extension.

How To Remove Extensions From Mozilla Firefox

  1. Click on the menu bars on the top right hand corner of Firefox to open the options menu. See image below.
  2. Navigate to and click on Add-ons from the list of options.
  3. On the left of the next screen, click on Extensions if your browser does not automatically open the Extensions.
  4. Select the Extension you want to remove from the list of extensions.
  5. Click on the three horizontal dots on the right of the Extension tile to open the menu options for that Extension.
  6. Select and click on “Remove” from the Extension’s menu list.
  7.  A confirmation box will show up. Click on the remove button to remove the unwanted browser Extension.

As you remove these Extensions you will also have the option to report the Extension and give your feedback. We recommend that you take a few moments to report any malicious Extensions so that they can be blocked from each respective browser. Hope you found this information to be useful. If so, please share and help others stay in the know.