Providing personalized computer repair, laptop repair, training, and network installation in Duluth, MN for your business and home.

Home sticky icon

Duluth Computer Repair
At Evolution Electronics LLC we specialize in providing personalized in home in business service, repair, and installation for all your computer needs. The security and privacy of our clients is paramount. We work to protect your information.

Evolution Electronics LLC takes the hassle out of computer repair, computer installation, computer consulting. We will schedule a visit to your home or office to diagnose and repair your system's issues. At Evolution Electronics LLC we go above and beyond, customizing your system to your personal taste. After the service is complete, we will show you ways to better utilize your technology.

We understand your need for security and privacy at Evolution Electronics LLC. Remember, it's your computer, your life.

At Evolution Electronics LLC we believe in treating people with respect. So if you are done with the so called "Computer Guy," done being asked what your customer number is, and done paying insane amounts of money for someone to do the bare minimum and never solve your problem, then give us a call. Start a relationship as one of our clients and be treated as a person.

4929 Matterhorn Dr
Duluth, MN 55811

Thank You,
Justin M. Bisted


How do I reinstall Windows 8 on a Dell Inspiron 20

How do I reinstall Windows 8 on a Dell Inspiron 20, and other Windows 8 computers, without disc's?

Windows, from most major manufactured computers, can be reset "Refreshed, Reinstalled, Reimaged, set back to factory default, or a OEM clean install" by restarting the computer in recovery mode.
You would do this if the computer can't boot to the Login Screen, or the computer is running slow.

1. Turn off the computer.
2. Hold down Shift and Turn on the computer and press and release F8 at a fast pace until the Windows "recovery mode" screen shows up, then stop pressing F8 and shift. (If Windows wants to login, turn off the computer and repeat the process.) Also if this does not work go into the BIOS and turn off fast boot.
3. Make sure all external devices are not connected Printers, Scanners, Media Card Readers, Small Media cradles (iPod, PDA, MP3 player, etc.), Digital Cameras and Video Recorders, USB storage devices, CDs or DVDs from all optical drives.
4. Click Troubleshoot.
5. Click Reset.
7. Click Reset, this will take hour's even over night. the computer may reboot many times while the system is reinstall
8. When you see the screen asking for "language and region" the reinstall is complete.

Preventing Electrical Fires

Preventing Electrical Fires in Duluth
Electrical fires are one of the leading types of home fires, especially in manufactured homes.

The Problem
During a typical year, home electrical problems account for 67,800 fires, 485 deaths, and $868 million in property losses. Home electrical wiring causes twice as many fires as electrical appliances.

The Facts
December is the most dangerous month for electrical fires. Fire deaths are highest in winter months which call for more indoor activities and increase in lighting, heating, and appliance use. Most electrical wiring fires start in the bedroom.

The Cause

- Electrical Wiring

* Most electrical fires result from problems with "fixed wiring" such as faulty electrical outlets and old wiring. Problems with cords and plugs, such as extension and appliance cords, also cause many home electrical fires.
* In urban areas, faulty wiring accounts for 33% of residential electrical fires.
* Many avoidable electrical fires can be traced to misuse of electric cords, such as overloading circuits, poor maintenance and running the cords under rugs or in high traffic areas.

- Home Appliances

* The home appliances most often involved in electrical fires are electric stoves and ovens, dryers, central heating units, televisions, radios and record players.

Prevent Electrical Problems
Studies of electrical fires in homes show that many problems are associated with improper installation of electrical devices by do-it-yourselfers. Common errors that can lead to fires include the use of improperly rated devices such as switches or receptacles and loose connections at these devices. Both can lead to overheating and arcing that can start fires. Fires are still caused by people using the wrong size fuse or even putting a penny behind a fuse when they don't have a spare. These practices are very dangerous. The fuse is a safety device designed to limit the electricity carried by the circuit to a safe level. Electricity and water are a bad combination. All electrical devices installed outdoors should be specially designed for outdoor use. Outdoor receptacles as well as those in kitchens, bathrooms, and anywhere else near water should be the ground fault circuit interrupting type (GFCI).

Use Electrical Devices Safely
Light bulbs, especially the newer halogen types, get very hot and can ignite combustible materials that get too close. Clothing or towels should never be placed atop a lampshade and table lamps should not be used without a shade where they might fall over onto a bed or sofa. Most light fixtures are labeled to show the brightest bulb that can be safely used in that fixture; too high a wattage bulb can cause the fixture to overheat and start a fire. Extension cords are a common cause of electrical fires. You must be careful to use only extension cords that are rated for the power used by the device they are powering. Extension cords should never be used as a long term solution to the need for another receptacle. Extension cords must never be run inside walls or under rugs or furniture. Extension cords can get warm in use and must be able to dissipate this heat or they can start a fire.

Maintain Electrical Safely
The insulation on electrical cords can become damaged by wear, flexing, or age. Do not use any cord that is stiff or cracked. Some clues that you may have an electrical problem are:

* Flickering lights. If the lights dim every time you turn on an appliance that circuit is overloaded or has a loose connection.
* Sparks. If sparks appear when you insert or remove a plug, they could be a sign of loose connections.
* Warm electrical cord. If an electrical cord is warm to the touch, the cord is underrated or defective.
* Frequent blown fuses or broken circuits. A fuse or circuit breaker that keeps tripping is an important warning sign of problems.
* Frequent bulb burnout. A light bulb that burns out frequently is a sign that the bulb is too high a wattage for the fixture.

Safety Precautions

* Routinely check your electrical appliances and wiring.
* Frayed wires can cause fires. Replace all worn, old or damaged appliance cords immediately.
* Use electrical extension cords wisely and don't overload them.
* Keep electrical appliances away from wet floors and counters; pay special care to electrical appliances in the bathroom and kitchen.
* When buying electrical appliances look for products which meet the Underwriter's Laboratory (UL) standard for safety.
* Don't allow children to play with or around electrical appliances like space heaters, irons and hair dryers.
* Keep clothes, curtains and other potentially combustible items at least three feet from all heaters.
* If an appliance has a three-prong plug, use it only in a three-slot outlet. Never force it to fit into a two-slot outlet or extension cord.
* Never overload extension cords or wall sockets. Immediately shut off, then professionally replace, light switches that are hot to the touch and lights that flicker. Use safety closures to "child-proof" electrical outlets.
* Check your electrical tools regularly for signs of wear. If the cords are frayed or cracked, replace them. Replace any tool if it causes even small electrical shocks, overheats, shorts out or gives off smoke or sparks.

How To Set up VPN Connections in Windows XP

How do I setup a VPN connection in Windows XP Pro or Home.

Step By Step How-to:

  1. Open the Windows Control Panel.
  2. Open the Network Connections item in Control Panel. A list of existing dial-up and LAN connections will appear.
  3. Choose the 'Create a new connection' item from the left-hand side of the window. The Windows XP New Connection Wizard will appear on the screen.
  4. First click Next to begin the wizard, then choose the 'Connect to the network at my workplace' item from the list and click Next.
  5. On the Network Connection page of the wizard, choose the 'Virtual Private Network connection' option and click Next.
  6. Enter a name for the new VPN connection in the 'Company Name' field and click Next. The name chosen need not match the name of an actual business.
  7. Choose an option on the 'Public Network' screen and click Next. The default option, 'Automatically dial this initial connection' can be used if the VPN connection will always be initiated when the computer is not already connected to the Internet. Otherwise, choose the 'Do not dial the initial connection' option. This option requires that the public Internet connection be established first, before this new VPN connection will be initiated.
  8. Enter the name or IP address of the VPN remote access server to connect to, and click Next. Company network administrators will provide this information.
  9. Choose an option on the "Connection Availability" screen and click Next. The default option, 'My Use Only,' ensures that Windows will make this new connection available only to the currently logged on user. Otherwise, choose the 'Anyone's use' option.
  10. Click Finish to complete the wizard. The new VPN connection information has been saved.

Connecting to your VPN connection

  1. Place a shortcut of the connection on your desktop by right clicking, on the connection you have made, and clinking on create shortcut. A window will ask you "Windows cannot create a shortcut here. Do you want the shortcut to be placed on the desktop instead?" Click Yes
  2. Double click on your the new icon on your desktop.
  3. The connection will ask you for a user name and password that has been created for you from your network administrator.
  4. It is highly recommend that you do not click "Save this user name and password for the following users" for security responses.
  5. Click Connect

Disconnecting to your VPN connection.

After you're done working with the VPN connection, you will want to disconnect the VPN connection because the network you're connecting to may filter sites or other security restrictions. Also disconnecting prevents others from accessing network resources from your computer.

  1. Right click on the VPN connection on your desktop and click on disconnect.

The Power of Google

Google's mission statement can be found, aptly enough, at It states quite simply, “Google’s mission is to organize the world’s information and make it universally accessible and useful.” Another interesting fact is that Google was not founded until 1998. I graduated high school in 1997. I did not begin attending college until 2009, at 30 years of age. The internet technology that most helped me as a student is Google.

It is difficult to convey the profound impact Google had on the internet and a student's ability to use it effectively. Before Google, performing a search on the internet was more difficult than trying to use the hand-typed card catalogs in a library. In a library it was reasonably certain the books were relevant and written by reliable sources. With the dawn of the internet and its easy accessibility to students, it was quickly considered an unreliable source. Not just specific sites, but the internet as a whole was suspect. Finding relevant, useful information required hours upon hours of wading through block text on sites and following embedded links to sources just to find the right key words to use to narrow your search down to the topic you were researching.

By organizing information Google has made it universally more useful. Google Books and Scholar give every student with the internet access to databases of information that, prior to this invention, required that students belong to a university that spends thousands, even millions, of dollars every year for access. What is more, Google is actually easier to use than these formal databases.

When I begin researching a topic, I simply type it into the Google Search bar and read about it on sites like Wikipedia. This allows me to learn enough to do a more refined search to find news articles that enable me to conduct further searches. Finally Google Books and Scholar give a much more detailed, scientific base to my knowledge as well as sources to quote.

Before Google the internet was like a warehouse full of loose pages torn from books. There was a ton of information but searching through it required starting in one corner and scanning every page for pertinent information. Google became the library, organizing the information, searching out and creating links to relevant topics, stripping away the dross to leave bright nuggets of solid gold fact behind. Yet, Google is more than any library. It is every library, and it is accessible from the home, the office, even the phone in my pocket. Students are no longer limited to the information contained within the walls of a library, the world is now, quite literally, at our fingertips.

Removal of the BIOS password from an Acer Aspire One Netbook

How do I remove the BIOS password from a Acer Aspireone Netbook?


  1. Turn off and unplug the laptop from power
  2. Remove the battery
  3. Open the smallest door on the bottom of the computer with a #1 Phillips screw driver
  4. Look for two small metal contacts labeled RTC(RST). Using a flat head screw driver, touch both contacts at the same time for 30 seconds.
  5. Re-install the battery
  6. Plug in your computer

At this point you can turn on your computer and the BIOS password should be gone. If not, redo all the steps again.


Our company does not support, endorse, or recommend replacement, resetting, installing, removing or repairing of hardware or software without hiring our company. Damages resulting from customer replacement of hardware is not covered under warranty and is NOT RECOMMENDED. Proceed at your own risk.

Evolution Electronics does not offer phone, or email support for any hardware or software posts on our website.

We recommend that you hire us to come to you, or for you to send us your hardware and we will repair it for you.

Online Learning

In May of 1995 Bill Gates wrote in a memo, “. . . improvement in computer power will be outpaced by the exponential improvements in communications networks. The combination of these elements will have a fundamental impact on work, learning and play.” He was right. Colleges and universities are realizing the vast market potential of the online student.

As a 30 year old enrolling in college courses for the first time I was only interested in traditional learning. In high school I learned best by listening and taking notes. I thought I wouldn't have that option in online courses. They also meant self-motivating as there was no “period” I had to be in class. It wasn't long, however, before I was forced into an online class due to conflicts with my schedule. The very reasons I was interested in traditional courses became the very reasons I preferred online courses. They offer more flexibility in my schedule with a full 24-hours to work with rather than the brief time school was open. I didn't have to sit through entire lectures since I could watch the video. I could even work ahead allowing me to concentrate on other courses when I knew a test or project was coming up.

Furthermore, I found online courses offered more learning tools than a traditional course. I could pause, rewind, or fast-forward a lecture. Rather than crudely drawn sketches I saw animated diagrams. Discussions between students continued indefinitely through the class blog rather than restricted to the time allotted in class. When examining options for education I encourage everyone to consider online courses. To paraphrase what Gates said, as communication networks become more capable, online learning will become more prevalent. Be prepared. The future is here, and it is online learning.

~Brian Sanner
Undergraduate Biomedical Engineering Candidate
Georgia Institute of Technology
Atlanta, Georgia


How To Create A Secure Password

How To Create A Secure Password.

It’s not enough to use passwords. Some PC users will pick a password they like and can remember and use that password for the rest of their lives. This is not a safe password policy, even if that password is tough to crack. Instead, you need to look at how often you change your passwords and the types of passwords we are choosing. Only then can you hope to close that particular door in network and computer security.

How long should a password be?

A password needs to be at least six characters long and contain a mixture on letters, numbers and possibly symbols. The longer the password, the better. So you need to find a way to generate and memorize these passwords so you can use them in real life. One possible technique is to use a pattern on the keyboard. For example, you could use all of the center keys, then all of the number keys like so: “a-s-d-f-g-h-j-k-l-1-2-3-4-5-6-7-8-9-0.” That’s a long password and it’s easy to remember because you have selected a pattern on the keyboard. To make it even stronger, you can hit the shift key and do it twice: “a-s-d-f-g-h-j-k-l-1-2-3-4-5-6-7-8-9-0-A-S-D-F-G-H-J-K-L-!-@-#-$-%-^-&-*-(-).” This was the same key combination twice, except the second time around we held the shift key. You can also use a phrase and take the first letter from each phrase. To make it more secure, try adding a number before the first letter and maybe an exclamation point at the end. For instance: “I like apples because they are red.” That would translate to “7-i-l-a-b-t-a-r!”

How often should I change my password?

Depending on what you do and how you use your computer will determine how often you need to change your password. If you only check Emails at home and do not do any online banking or go to WiFi hotspots and surf with your laptop, you may only want to change your password every six months. If you are an avid Internet surfer, and if you frequent places that share Internet connectivity, then you’ll want to change it much more frequently.

Storing your passwords.

Passwords should be kept in your brain. Do not write them down and tape it below your monitor for easy access. If you must write it down, be sure to lock it away in a safe, lock box or encrypted database such as keepass. This is why it’s a good idea to come up with a password technique, such as a keyboard combination or phrase as mentioned above.

Having a secure password is only part of having a secure computer. It plays a major role and forces us to be reminded about the dangers of Identity Theft and other forms of criminal behavior. Have a policy and be sure to stick with it and you’ll feel more secure in the end.

Develop Good Computer Security Habits

Develop Good Computer Security Habits

Computer security is something we all need to consider. With email spam, phishing schemes and viruses on the rise, PC users need to know how to protect their data and privacy. Learn more about phishing, email, antivirus and other tips in this article written to help make users more aware of the increasing dangers of the Internet.

Having good computer security habits is something we all need to develop. As hacking and viruses evolve, so does the user. Operating System like Vista and XP have made improvements on security by turning on security features like Windows Firewall and User Account Control, but at the end of the day, the user must take a proactive approach to protecting their computers.

While it seems obvious to have a complex password, many users do not. There are tools on the Internet that give hackers and viruses the ability to crack simple passwords in seconds. Having a password of at least eight characters mixed with number, letters and symbols make it harder. Users should also rotate and create new variations of this difficult password and not use the same one on all websites.

Phishing is a hacking technique used commonly in emails and websites that try to obtain sensitive information from users, such as login's to bank accounts and other private information. Never click links in emails, as they can be faked. And never give out information to sites that you go to through email. If you have an online bank account for instance, be sure to manually type in the URL if you are sent an email from them. Typing in your bank’s website ensures that you are actually going to that site and not being re-directed to a site that looks like it.

Email can also be used by worms, which are viruses that procreate by emailing themselves to everyone in your email address boot. Never open attachments from friends or relatives unless you are expecting an attachment from them. Worms can send themselves in an executable attachment that installs the virus when it is opened.

Turn off the Internet
While this may be a tough pill to swallow for some users, consider turning off your computer when you’re not using it. If you are not on the Internet, you become a smaller target for random scans.

Have an Antivirus and Firewall Installed
Ubuntu, Windows Vista, Windows 7 and XP Service Pack 2 will have a firewall installed by default. A firewall can protect you from viruses and other mal-ware by blocking certain ports or ignoring traffic that hackers send out as feelers for unprotected PCs.

Being aware and having good computer security habits is only part of staying safe online. You must also keep your compute up to date.

Passwordless SSH connections using a RSA key

In the command line. Build your user ID or called keygen
ssh-keygen -t rsa
Then after you make a RSA key then trasfer it to the server or "host" you want to access.
The hostname will be the domain or IP address of the computer you want to copy the key to. "The computer your trying to access without a SSH password.

The username is the user you are using to log in to the computer your trying to connect to.

ssh-copy-id -i ~/.ssh/ username@hostname

After pressing enter at this command you will be asked once for the password for the remote computer. This allows the key to be copied to the remote computer.

After the key has been copied try to connect to the remote computer.

ssh username@hostname

If everything worked right you will be logged in to your remote server without a password.