Tuesday, March 11, 2025

Intel CPU Instability Issues; 13th & 14th Gen Processors

​Intel has addressed instability issues in its 13th and 14th Gen Core desktop processors, particularly the K, KF, and KS-series Core i5, i7, and i9 models. These issues were linked to elevated operating voltages causing premature aging and system instability.
(​The Verge)

To mitigate these problems, Intel released microcode updates, including version 0x12B, which limit voltage requests above 1.55V. This update aims to improve stability without significantly impacting performance. ​
(techpowerup.com)

It's important to note that processors already experiencing instability due to this issue cannot be repaired through software updates. Intel has extended the warranty for affected processors by two years, allowing users to seek replacements if necessary.
(​The Verge)

Intel's 13th and 14th Gen mobile processors, including the HX-series, as well as non-K-series Core i5, i3, and Xeon desktop processors, are not affected by this voltage instability issue. ​
(Hacker News - The Verge)

For users with affected desktop processors, it's recommended to update the BIOS with the latest microcode to prevent potential instability. If instability symptoms are already present, contacting Intel Customer Support or the original place of purchase for assistance is advised.

*Intel does claim the problems HAVE been indeed fixed through the 0x12B micro code update via manufacturer-released BIOS updates!

Here Are Some Key Concerns:

  1. High Power & Heat – The Alder Lake architecture introduced a hybrid core design, but the i9-12900K was known for running hot, especially under heavy loads, requiring strong cooling solutions.
  2. Voltage Spikes & Instability – Some motherboards pushed aggressive power limits by default, leading to overheating and potential thermal throttling.
  3. BIOS & VRM Issues – Some motherboards had BIOS issues that didn’t properly regulate power delivery, causing instability and even damage to some chips.
  4. Windows 11 Performance Issues (Early On) – Some early issues with Windows 11’s scheduler not properly utilizing the P-Cores and E-Cores led to performance inconsistencies.
  5. DDR4 vs. DDR5 Compatibility – Early motherboard BIOS versions sometimes had stability issues when using DDR5.
  6. Melting 12VHPWR Connectors (Rare Cases) – Some reports suggested high power draw causing issues with PSU connectors in extreme overclocking scenarios.
  7. Potential Degradation – Overclocking (even within Intel’s own limits) has led to faster degradation of some 13900K chips, requiring undervolting or power limit adjustments for longevity.

If You’re Using ANY of The Affected CPUs, We Recommend The Following:


1. BIOS & Firmware Updates

  • Keep BIOS Up to Date: Intel often releases microcode updates to fix performance issues and bugs.
  • Disable Unused Features: If you're not using E-Cores (Efficiency Cores), you can disable them for better single-threaded stability.

2. Cooling and Thermal Management

  • Use a High-Quality Cooler: Both CPUs run hot, so an AIO liquid cooler (240mm or larger) or a high-end air cooler (Noctua NH-D15, Deepcool Assassin III, etc.) is recommended.
  • Apply Good Thermal Paste: Use high-quality thermal paste like Thermal Grizzly Kryonaut or Arctic MX-6 for better heat transfer.
  • Enable Thermal Limits: In the BIOS, set PL1 and PL2 (Power Limits) to reasonable values to prevent overheating.2. Power Delivery & Motherboard Settings
  • Use a Good Motherboard: Ensure you use a Z690/Z790 board with strong VRMs (e.g., ASUS ROG Maximus, MSI MEG, Gigabyte Aorus Master).
  • Disable or Adjust Power Limits: Some motherboards default to unlimited power limits, causing excessive heat and power draw.
  • Set Load-Line Calibration (LLC): Adjusting LLC to a moderate level (Level 3-4) can help with voltage stability.

3. Memory and Stability Tuning

  • Use Stable RAM Speeds: DDR5-6000 to 6400 CL30 is the sweet spot for Raptor Lake (13900K).
  • Avoid XMP Issues: Some boards struggle with XMP. If you have stability issues, try manually adjusting VDDQ, VCCSA, and IMC voltages.

4. Preventing VRM and PSU Problems

  • Use a High-Quality PSU: A minimum of 850W (Gold-rated or better) is recommended.
  • Watch for VRM Throttling: If using a budget board, check VRM temperatures under load to avoid power throttling.

5. Avoiding Warping/Bending Issues

  • Use a Contact Frame: The Intel LGA1700 socket is prone to CPU bending, causing poor contact with the cooler. Consider a Thermalright or Caseking contact frame to maintain even pressure.
  • Check for Uneven Cooling Contact: If you see uneven thermal paste spread, your cooler might not be making proper contact.

6. Undervolting for Efficiency

  • Try Intel’s Adaptive Undervolting: You can reduce power draw and temps without losing performance by setting a negative voltage offset in BIOS (-0.05V to -0.1V).
  • Use Intel XTU (Extreme Tuning Utility): You can experiment with undervolting without committing changes in BIOS.

7. Monitor Performance and Stability

  • Use HWMonitor or HWInfo: Keep an eye on temps, voltages, and power draw during gaming or heavy workloads.
  • Run Stability Tests: Use Cinebench, Prime95 (small FFTs), or OCCT to ensure system stability.


QuickBooks Desktop: Error 350

Error 350 in QuickBooks Desktop during a rebuild process usually indicates corruption within the company file that QuickBooks' built-in tools (Verify/Rebuild and File Doctor) are unable to fix. Since you've already worked with QuickBooks support and used their repair tools without success, here are some advanced steps to try:

1. Create a Portable Company File & Restore

A portable company file (.qbm) strips out some data corruption and can sometimes fix issues that a regular backup cannot.

Steps:

  • Open QuickBooks and go to File > Create Copy
  • Select Portable company file (.qbm) and follow the prompts to save it
  • Close QuickBooks
  • Reopen QuickBooks and restore the portable file by going to File > Open or Restore Company > Restore a portable file
  • Try running the Verify/Rebuild Data tool again

2. Manually Recreate the File via Excel & IIF Import

If the file is heavily corrupted, you may need to manually extract and re-enter data:

  • Export lists and transactions to Excel/IIF
  • Create a new company file
  • Import back-in the data

3. Use QuickBooks Auto Data Recovery (ADR) – If Available

QuickBooks Auto Data Recovery (ADR) creates backups of your company file. If enabled, you can attempt a restore.

Steps:

  • Navigate to your QuickBooks company file folder
  • Look for the .adr files (e.g., CompanyName.qbw.adr)
  • Rename your damaged .qbw file and copy the .adr version, renaming it back to .qbw
  • Open QuickBooks and check if the issue persists

4. Try Third-Party QuickBooks Repair Tools

Intuit’s built-in tools have limitations. Third-party tools like Stellar Repair for QuickBooks or DataNumen QuickBooks Repair can sometimes recover data from a corrupt QuickBooks file when standard tools fail.

5. Consider Professional Data Recovery Services

If the corruption is severe and you cannot rebuild the file at all, Intuit offers a QuickBooks Data Recovery Service where they manually repair the file. Alternatively, we at Pacific Northwest Computers can assist with QuickBooks data file recovery.

If none of these steps resolve the issue, your best bet may be to restore from a recent unaffected backup and manually re-enter any missing transactions. 

Let me know if you have any questions or need further guidance!



HIPAA-Compliant Cloud Storage


If you're looking for HIPAA/HITECH-compliant cloud storage, you'll need a provider that offers encryption, access controls, audit logs, and a Business Associate Agreement (BAA) to ensure compliance with HIPAA regulations. Here are some of the best options!

Top HIPAA/HITECH-Compliant Cloud Storage Providers


1. Microsoft OneDrive for Business / SharePoint (via Microsoft 365)

  • Compliant: Yes, with a signed BAA
  • Encryption: AES-256-bit encryption in transit and at rest
  • Access Controls: Role-based access, multi-factor authentication (MFA)
  • Best For: Businesses already using Microsoft 365
Microsoft offers a HIPAA BAA as part of its Microsoft Online Services Terms (OST) agreement.
You can review and accept the BAA through the Microsoft Service Trust Portal:
  1. Go to Microsoft Compliance Center
  2. Sign in with your Microsoft 365 admin account
  3. Navigate to Compliance > Reports > Audit and Compliance Reports
  4. Look for the Business Associate Agreement (BAA) and review the terms
  5. If you have Microsoft 365 Business, Enterprise, or Government plans, the BAA is included automatically once you agree to the terms.

2. Google Drive (via Google Workspace Business & Enterprise)

  • Compliant: Yes, with a BAA (requires Business Standard, Business Plus, Enterprise, or G Suite for Nonprofits)
  • Encryption: AES-256-bit encryption
  • Access Controls: Admin controls, data loss prevention (DLP), audit logs
  • Best For: Teams using Google services
Google offers a BAA to Google Workspace Business (Standard & Plus), Enterprise, and G Suite for non-profit customers.
You can sign a BAA with Google through the Google Admin Console:
  1. Go to Google Admin Console (admin.google.com)
  2. Click on Account Settings > Legal & Compliance
  3. Select Review and Accept the HIPAA Business Associate Amendment
  4. Confirm acceptance

3. Dropbox Business (Dropbox Enterprise)

  • Compliant: Yes, with a BAA (only for Business and Enterprise plans)
  • Encryption: AES-256-bit encryption
  • Access Controls: User permissions, MFA, activity tracking
  • Best For: Simple file storage with team collaboration
Dropbox offers a BAA for Dropbox Business, Advanced, Enterprise & Education plans. You must contact Dropbox sales or support to request a signed BAA:
  1. Log in to your Dropbox Business Admin Console
  2. Navigate to Settings > Account Settings
  3. Find the HIPAA Compliance section and request a BAA
  4. Dropbox will provide a custom agreement for you to sign
            📌 More info: Dropbox HIPPA Compliance

4. Box (Enterprise Plan)

  • Compliant: Yes, with a BAA
  • Encryption: AES-256-bit encryption
  • Access Controls: Advanced permission settings, integration with identity management systems
  • Best For: Large businesses with strict compliance needs
Box provides BAAs for Business and Enterprise customers. The BAA is not automatically signed; you must request one:
  1. Upgrade to Box Enterprise or Business
  2. Contact Box Sales or Support to request a BAA
  3. Box will provide the agreement for review and signature

5. Amazon AWS (S3 with HIPAA Controls)

  • Compliant: Yes, when properly configured and a BAA is signed
  • Encryption: AES-256-bit encryption at rest, TLS for data in transit
  • Access Controls: IAM policies, audit logs
  • Best For: Companies needing a scalable, customizable cloud solution
AWS offers a BAA for HIPAA customers, but you must manually request one:
  1. Log in to AWS Management Console
  2. Navigate to AWS Artifact (AWS Compliance Center)
  3. Under Agreements, select "Request Business Associate Addendum".
  4. Sign the BAA electronically
  5. AWS will activate HIPAA-compliant features once signed

6. Tresorit

  • Compliant: Yes, with BAA
  • Encryption: End-to-end encryption (Zero-Knowledge architecture)
  • Access Controls: User and device management, MFA
  • Best For: Maximum security with zero-knowledge encryption
Tresorit provides a BAA with their Enterprise Plan.
You must contact their support team to request and sign the agreement.

Choosing the Right Solution

  • If you're using Microsoft 365 or Google Workspace, OneDrive or Google Drive will be the easiest to integrate.
  • If you need advanced security and compliance, Box or Tresorit are great choices.
  • If you require a highly customizable and scalable option, AWS S3 is ideal but requires more setup.

Final Notes:

  • You must configure security settings properly after signing the BAA. A signed BAA alone does not make you HIPAA compliant—you must follow encryption, access control, and audit log best practices.
  • Need help setting up your HIPAA-compliant cloud storage? Contact Pacific Northwest Computers at 360-624-7379 or text 503-583-2380, and we can help assist you! 😊


Monday, February 17, 2025

Convert Existing Windows Installation from MBR/CSM to GPT/UEFI!

Convert an existing Windows 10 Installation from Legacy BIOS to UEFI

One of the critical system requirements for Windows 11 is having a GPT partition scheme for installation, which must be based on UEFI. This article explains how to convert existing Windows 10 Installation from the Legacy MBR partition scheme to the more modern GPT UEFI partition scheme, using Microsoft's MBR2GPT.exe tool; all without losing any data or settings!

Convert MBR to GPT Without Data Loss

Windows has an in-built tool, called MBR2GPT which can help to convert a Legacy Windows 10 Installation(also called MBR), to modern UEFI, based on a GPT partition scheme. There are multiple steps involved in the process and some pre-requisites, discussed below:

Pre-requisites:

  1. The MBR disk must have at most 3-partitions.
  2. The OS must be 64-bit.
  3. Bitlocker or encryption must be turned off.
  4. There should be an Operating system on the disk.
  5. One of the partitions must be active (typically the system partition; you confirm that from disk Management).
  6. No dual boot is currently being used.
  7. Windows 10 version must be at least version 1703.

How MBR2GPT works.

MBR2GPT tool works by first validating the disk. An EFI system partition is created if the disk is validated and UEFI boot files are installed. After that, layout and Boot configuration data are updated, matching with the new values.

Step 1: Boot to the Recovery environment

  1. To boot to WinRE, from where Windows can trigger the MBR2GPT tool, please see the steps below:
  2. On the Lock screen, press and hold the Shift key while choosing Restart from the Power menu. Continue pressing the shift key until you see the Windows Recovery environment, asking you to select an option.
  3. Click Troubleshoot>Advanced options>Command Prompt.
  4. The computer will restart.
  5. Login to your account.

Step 2: Validate if the MBR2GPT tool can convert your disk

  1. On the Command Prompt Window, our next step would be to check if the tool can convert the disk to GPT. To do this, execute the following command:

    mbr2gpt.exe /disk:0 /validate

    *You may need to use 'diskpart' to identify the disk number of the drive your Windows Installation is on.

  2. The output should tell you if the validation is successful. If the disk is validated, conversion is possible.

Step 3: Convert the disk.

  1. The next step is to convert the disk. For that, use the /convert switch.

    mbr2gpt.exe /disk:0 /convert

  2. The process would take some minutes and tell you the output.

Step 4: Change Motherboard/BIOS Settings & Boot Order

Now to boot from the newly converted GPT drive, the settings in the BIOS/Motherboard firmware need to have a few things changed. Boot to the PC's Motherboard BIOS settings, and make sure of the following settings changes:
  • Boot method: UEFI from Legacy
  • CSM: Disabled
  • Secure Boot: ON
  • TPM: Enabled
  • Edit the boot order, so the boot order shows 'UEFI: Windows Boot Manager' at the top
  • Save the changes and exit the BIOS
The device should now have a UEFI boot method with a GPT disk layout and should be ready to boot via UEFI now!!

Troubleshooting

If the MBR2GPT tool is failing to convert your installation, here are some steps you can try.
  1. Make sure the existing MBR disk has only three partitions or less: If the qualifying hard disk has more than three partitions, this tool would not work. To confirm the number of partitions, you can invoke the disk management tool from the Start menu. The three-count includes System partitions as well. If that is the case, decrease partitions using the Disk Management tool by merging and try again.
  2. Run a disk check: If there is corruption on the disk, the tool may fail. To fix this, run a full disk check, preferably from the Recovery environment. See the steps here.
  3. Try running from a USB Installation media: Another option to invoke the MBR2GPT tool from a USB Installation media. After the computer has booted from the Installation media, click Repair your computer>Troubleshoot>Command Prompt.
  4. Return codes: If the conversion failed, the tool would return a code, which would tell you what went wrong. 
  5. Investigate Log files: If nothing has helped, it may be wise to look at the logs to see what went wrong. By default, the MBR2GPT tool creates Setupact.log and Setuperr.log in the C:/Windows directory, which records the process. Setuperr.log contains all the errors encountered during the conversion, which may give a hint. In addition, /logs switch can also redirect logging to a custom path if you need, like for an external drive which helps investigate later. The command for logging to a custom path would be like this(replace D:\Work with your desired path). mbr2gpt.exe /convert /logs:D:\Work
  6. If nothing has helped, perform a clean installation of Windows 10 using the GPT partition scheme. You must back up the data before, as a clean install would remove everything. As the Media Creation tool makes the media according to the existing method, which is likely MBR, use Rufus to create Installation media and choose GPT partition scheme for UEFI. My colleague Shawn has a good tutorial on this on Tenforums.

Appendix 1:

Return Code / Details
0 = Conversion completed successfully.
1 = User canceled.
2 = Internal error occurred.
3 = Disk initialization error.
4 = Command-Line parameters were incorrect.
5 = MBR2GPT could not read the disk layout.
6 = One of the volumes was encrypted on the disk.
7 = The disk does not meet the requirements.
8 = EFI Partition could not be created.
9 = Error installing boot files.
10 = Error while applying GPT layout.




Wednesday, February 5, 2025

Free Technical Certifications

There are several free technical certifications available that can help build IT skills boost your resume and to start you on a path towards a career in IT. While some certifications are entirely free, others may require a small testing fee. Here are some of the best options:


Cybersecurity & IT Fundamentals

  1. Google Cybersecurity Certificate (via Coursera - Free with Financial Aid)

  2. Microsoft Security, Compliance, and Identity Fundamentals (SC-900)

    • Covers security, compliance, and identity solutions in Microsoft.
    • Free training, but exam costs around $99.
    • Microsoft Learn
  3. AWS Cloud Practitioner Essentials (Free Course, Paid Exam)

    • Free training in AWS cloud computing fundamentals.
    • Exam fee applies ($100).
    • AWS Training
  4. IBM Cybersecurity Analyst Professional Certificate (Free with Financial Aid)


Networking & Cloud Computing

  1. Google IT Support Professional Certificate (via Coursera - Free with Financial Aid)

  2. AWS Free Digital Training

    • Free online training for AWS cloud services.
    • Certifications require an exam fee.
    • AWS Training
  3. Cisco Networking Academy - Intro to Cybersecurity & Networking Essentials


Programming & Development

  1. Harvard CS50: Introduction to Computer Science

    • Covers programming fundamentals in C, Python, and SQL.
    • Free course; optional certification for $90.
    • Harvard CS50
  2. Google Python Crash Course (Free)

  3. Microsoft Learn - Azure Fundamentals (AZ-900)

  • Free training on Microsoft Azure cloud services.
  • Exam costs around $99.
  • Microsoft Learn

Data & AI Certifications

  1. Google Data Analytics Professional Certificate (via Coursera - Free with Financial Aid)
  1. IBM Data Science Professional Certificate (Free with Financial Aid)
  1. Microsoft AI Fundamentals (AI-900)
  • Covers basic AI concepts and Azure AI services.
  • Free training; exam fee applies.
  • Microsoft Learn

Other IT & Tech Certifications

  1. Red Hat System Administration I (Free Course, Paid Exam)
  1. CompTIA IT Fundamentals+ (FCO-U61)
  • Free study resources available; exam costs around $100.
  • CompTIA ITF+
  1. Google Cloud Digital Leader Training

How to Get Certifications for Free

  • Look for financial aid on platforms like Coursera and edX.
  • Join free training programs from Google, AWS, Cisco, and Microsoft.
  • Take advantage of free learning resources before paying for exams.


Monday, December 23, 2024

Improvised Diagnostics using the "OODA Loop"

Improvised Diagnostics: The "OODA Loop"

The OODA loop is a decision-making model that helps people respond to crises and make better decisions

OODA Stands For:

  • Observe: Use all five senses to gather information about the situation
  • Orient: Analyze the information to determine response options
  • Decide: Choose the best response based on what is known
  • Act: Carry out the action plan and evaluate the approach


The OODA loop was developed by U.S. Air Force Colonel John Boyd and is often used in military campaigns, commercial operations, and learning processes. It can be applied to a wide range of incidents, including natural disasters, terrorist attacks, and data breaches.

The OODA loop encourages critical thinking and decision-making skills. It's a closed system that flows sequentially from one section to the next. The loop continues as the situation evolves, and new decisions and actions may need to be made.


The OODA loop can be an effective model for in-field IT diagnostics by structuring and improving the decision-making process when troubleshooting and resolving IT issues. Here's how each phase can be applied in this context:


1. Observe

  • Gather Data: Use diagnostic tools and methods (logs, monitoring software, physical inspections) to collect information about the system's current state.
    • Check error messages, symptoms, hardware indicators (e.g., lights or beeps), and user feedback.
  • Context Awareness: Note the environment, potential user interactions, or recent changes (e.g., updates, new software, or hardware installations).
  • Sense Issues: Use your IT knowledge to identify anomalies or irregularities (e.g., high CPU usage, unusual network traffic).

2. Orient

  • Analyze Information: Process the collected data to identify patterns or root causes of the issue. For example:
    • Compare symptoms against known problems or documentation.
    • Use tools like task managers, network analyzers, or event logs to narrow down potential causes.
  • Prioritize Problems: Determine the severity and impact of the issue on operations to decide what to address first.
  • Contextual Factors: Consider the specific system configuration, software environment, and user requirements.

3. Decide

  • Develop Response Options: Brainstorm potential solutions to resolve the issue.
    • Example: If a system isn’t booting, consider whether to reseat hardware, run a system recovery, or test for power issues.
  • Evaluate Solutions: Choose the best approach based on efficiency, resource availability, and risk assessment.
    • Example: Decide whether to apply a temporary fix to restore functionality or take the system offline for a permanent solution.

4. Act

  • Implement the Solution: Execute the chosen fix while minimizing disruption (if possible).
    • Example: Replace a faulty component, reboot the system, update drivers, or patch software vulnerabilities.
  • Evaluate Results: Verify if the action resolves the issue, and if not, loop back to Observe to reanalyze the situation.
    • Example: Test the system’s performance or monitor for recurring issues.

Continuous Looping

  • IT systems and networks are dynamic, so issues may evolve. Reapply the OODA loop as new problems arise during or after the initial fix.

Examples in Practice

Imagine you are a technician troubleshooting a server that has unexpectedly gone offline:

  1. Observe: Check server logs, hardware lights, and user reports to identify the symptoms of the issue (e.g., power failure or overheating).
  2. Orient: Analyze whether the issue is hardware-related (e.g., power supply failure) or software-related (e.g., misconfigured updates). Consider the server's workload and criticality.
  3. Decide: Choose to test the power supply and reseat connections as the first step, delaying non-critical updates.
  4. Act: Perform the chosen actions, monitor the server's response, and verify system stability.

This structured approach helps streamline diagnostics, ensure critical thinking, and adapt to evolving situations, which is essential for in-field IT diagnostics.


Pacific NW Computers

Thursday, December 19, 2024

Lenovo M720Q Slim PC: Testing the Limits of a Mini Gaming PC

Lenovo M720Q Slim PC: Testing the Limits of a Mini Gaming PC

Mini PCs have become increasingly popular for their compact design and versatility, but how well can they perform when pushed to the edge? I recently set out to test the Lenovo M720Q Slim PC—an affordable and compact system rumored to be a surprisingly capable mini gaming PC. Here’s the journey of my testing, modifications, and results.

Initial Impressions: A Hot Start

Right out of the box, the Lenovo M720Q impressed me with its size and potential. However, during initial tests, the Southbridge chipset temperatures skyrocketed to nearly 100°C under load. Without even adding a GPU, I realized cooling would be a major challenge.

To start addressing this issue, I added a simple heat sink to the chipset. This brought temperatures down to around 90°C, but I knew more work was needed if I wanted to maintain long-term stability, especially once a GPU was installed.


Thermal Tweaks and Modifications

My next step was to focus on cooling improvements for both the CPU and VRM components. Here's what I did:

  1. Reworked Thermal Interfaces:

    • Removed the CPU cooler.
    • Reapplied thermal grease to the CPU.
    • Thermal pads were added to the VRM components near the CPU.
  2. Southbridge Cooling Stack:

    • Using thermal tape, a 1.2mm copper shim, and another thermal pad, I built a cooling "sandwich" for the Southbridge chipset.
    • This reduced temperatures to 88°C under load—an improvement, but still not ideal.
  3. Exploring Alternatives:

    • Lenovo offers an optional heat diffuser for the Southbridge chipset, but it conflicts with the installation of a full-size 2280 NVMe drive (which was pre-installed). I opted to stick with my custom solution for now.

Customizing for Airflow

Cooling improvements weren’t just limited to the internal components. The stock M720Q case design lacks proper airflow, so I sought out an innovative solution: a 3D-printed top panel with fan cutouts.

Using my Bambu Labs X1 Carbon, I printed a replacement cover in PETG, along with a GPU bracket and vertical stand. The new panel significantly improved airflow, especially for the GPU and CPU areas.

You can find the design here: 3D Printable Cover on Thingiverse.


Adding a GPU

Once the modifications were complete, it was time to install the XFX Low Profile AMD RX 6400 GPU. The GPU installation required a riser card adapter, but the process went smoothly, and the system powered on without issues.

With the GPU installed, further tests showed the following temperature improvements:

  • Southbridge chipset: Dropped from 98°C to around 84°C under moderate load.
  • VRM: Dropped from 96°C to 74°C.
  • CPU: Held steady at 67°C during stress tests.

However, under more intense 3DMark benchmarks, the chipset temperatures crept back up to 96°C, and the GPU reached 81°C. Still, these results represented a significant improvement over the stock configuration.


Gaming Performance

With hardware testing complete, I moved on to gaming. Using a resolution of 1900x1200, I tested the M720Q with games like Insurgency: Sandstorm, The Finals, and BattleBit. Here’s how it performed:

  • Graphics Settings: Medium to low, with reflections, tessellation, and anisotropic filtering off.
  • FPS: Ranged between 30–50 FPS, with occasional spikes above 50 FPS.
  • Overall Experience: Playable, though not mind-blowing. The system handled games better than I expected for its size and specs.

Even with these optimizations, the Southbridge chipset hit 103°C during extended gaming sessions. I plan to revisit my cooling setup to see if decoupling the southbridge from the GPU can yield better results.


Conclusion: A Capable (but Limited) Mini PC

While the Lenovo M720Q Slim PC isn’t going to compete with high-end gaming rigs, it has proven itself capable of handling casual gaming with the right modifications. It also serves as a fantastic home lab system for those looking to experiment with small-scale projects.

For those interested in a portable gaming or travel PC, the M720Q is worth considering—provided you’re ready to invest time in cooling upgrades and manage your expectations for performance. I’ll continue testing and tweaking this little powerhouse, but for now, it’s earned a spot as a fun, compact system to tinker with.

What’s next? Maybe I will track some drums or explore other creative applications. Stay tuned for updates!

UPDATE ~ 2-15-2025:

With the resolution for games reduced down to 1600 x 900, I have been able to use AMD's Super Resolution technology to run the game at a lower resolution overall, but then upscale the resolution when/how it can! AMD Radeon Super Resolution (RSR) is a driver-based feature that improves performance in games by upscaling the resolution to a higher quality, with the overall graphics being turned down a bit. It's powered by AMD FidelityFX Super Resolution (FSR) technology. I still have to have my graphics settings set to medium or low overall. But with the RSR image quality and frame rates can be DRAMATICALLY improved! However, it does ultimately depend on the game, its settings, it's hardware capabilities, etc.

How AMD Radeon Super Resolution Works:

  • RSR works by upscaling the final output of a game that's rendered at a lower resolution to your display's native resolution.
  • RSR can be configured globally or customized for individual games.
  • RSR is ideal for games where FSR may not be present.

Benefits of Using RSR on Lower-Performance Systems:

  1. Improved performance: RSR can achieve up to 78% faster performance.
  2. Lower latency: RSR can lower latency.
  3. Smoother gameplay: RSR can improve gameplay by rendering games at a lower resolution and upscaling them to a higher resolution.

Let me know what you think, or reach out if you have questions about this build. If you’re local to the Vancouver, WA area, Pacific Northwest Computers can help with custom builds and upgrades like this one. Contact us at www.pacificnwcomputers.com or call 360-624-7379.


Thursday, December 12, 2024

Power Tester/Injector - GPUs & Electronics; Diagnostics & Testing, etc.

"Homebrew" Power Tester/Injector - Electronics Diagnostic Tool!!


I built this device to allow me to measure the power being drawn by a device (meter on the right). If a device is working, it'll pull a certain amperage and voltage when power is applied.
But it can also inject power (meter/device on the left) to force very low amperage into a device, so I can check that device's board with a thermal camera for shorts.

Device Functionality Breakdown:
  1. The meter at the top is just to verify the power coming in from my adjustable bench DC power supply is accurate and not higher or lower than it should be.
  2. The toggle on the right lets me change the outputs from the main terminal outs to the banana jacks and also can kill the power going out altogether.
  3. The toggle on the left lets me activate/deactivate the power injection (so I can pulse it on/off) as well as switch the left device's outputs to its banana jacks.
  4. The banana jacks (round ports) are so I can hook up probes directly to interface with either device/meter for manual probing.

Initial research, brainstorming, and drawing out the rough idea/design.


All of the needed components, connectors, switches, etc.


Test layout of the top panel using cardboard to test fit and lay out how everything is going to look, but will also making sure I have the needed room/clearance on the back side for getting stuff connected and wired up.


TinkerCad design of the 3D Printed Top Panel.


Had to print twice due to some minor adjustments, but the top panel came together great!


Bottom case of TinkerCad design.


Added some bottom vents, a DC power jack input on the rear, and also moved the external terminal power output to the rear of the enclosure in the final version of the bottom case.


Initial wiring of the device to test and shows the location of the terminals used for wiring things up.


Final working version!!!


Parts List:


3-Way Switches:
Digital Ammeter Voltmeter:
Adjustable Buck/Boost Converter:
Volt/Amp Meter:
Banana Jack Ports:
Ring light, push-in power button:
Wiring terminals with jumpers:
DC power jack:


CAD Software:

Tinkercad.com


3D Printer/Printing:

  • Bambu Labs Carbon X1
  • Generic PETG Fillament
  • 0.4mm Nozel
  • Standard Print Settings; Z-Seam set to Random


Wiring Diagram:

Coming soon!!


Monday, October 14, 2024

Your Online Account(s) Got Hacked & You Are Locked Out: What Do You Do!?


Online security is becoming increasingly critical as more of our daily lives move onto the internet. If you believe one or more of your online accounts have been hacked or compromised, it’s essential to act swiftly. If you are locked out of an account, the situation becomes even more urgent. Below are detailed steps you can take to mitigate damage, regain control, and enhance the security of your other online accounts.


*Note: One takeaway from my own personal "getting hacked" experience is that the new "Verified" model that most social media platforms use now is being leveraged to push users into paying for the verification, just to receive any kind of personal support if they happen to have any problems or issues with their account. Going forward I recommend (and will personally practice) that you verify ANY and ALL online social media accounts that are important or critical to your life/work. You can use the services for free, but if you have an issue like an account hi-jack/take-over, it can be next to impossible to get ANY help if you are un-verified.


1. Report the Incident Immediately!

Reporting the compromise to relevant authorities and service providers is crucial. This not only helps you recover control of your account but also aids in preventing further damage.

  • Local Police: If you suspect identity theft or fraudulent activity, file a report with your local police department. Keep copies of the report for further use.
  • Websites or Software Providers: Contact the customer support teams of any websites or services involved in the breach. Most platforms like Google, Facebook, and financial services have processes in place to assist users in recovering hacked accounts.
  • IC3/FBI: If the incident involves significant financial loss or cybercrime, file a report with the Internet Crime Complaint Center (IC3), which is a division of the FBI focused on internet-based crimes.

2. Recovering a Locked-Out Account:

If you are locked out of an account, follow these steps (and see further details at the end of the blog):

  • Use Account Recovery Options: Most services offer account recovery options like email or phone verification, but this may not be safe if these are compromised. Prioritize recovery methods like trusted devices or backup codes (which many services provide when setting up 2FA).
  • Contact Customer Support: If recovery options fail, reach out to the service provider’s customer support. Be prepared to verify your identity through personal information or past account details.
  • Keep Documentation: If you’ve filed reports with the police or the IC3, share these reports with the service provider, as this may help speed up the account recovery process.

3. Secure Any Associated Payment Services

If you're completely locked out of an account, especially one that’s linked to financial services, take immediate action by logging into any associated payment services and removing access to the hacked site or account. For instance:

  • PayPal
  • Venmo
  • eBay
  • Banking apps or credit card accounts

This helps to stop any unauthorized transactions that could stem from the compromised account. Be sure to carefully review recent activity on these services to identify any fraudulent activity and report it to your payment service provider.

3. Change Passwords on Any/All Online Accounts You Have!

Once you've safeguarded your payment methods, it's essential to change your passwords across all your online accounts. Start with the most important and sensitive accounts first:

  • Email Accounts: Your email is often the gateway to all your other accounts, so this is the highest priority.
  • Financial Accounts: Banking, credit cards, PayPal, Venmo, CashApp, Zelle, etc.
  • Shopping Platforms: Amazon, eBay, and any other sites where your payment information is stored.

Use strong, unique passwords for each account. Consider using a password manager to generate and securely store complex passwords, reducing the chances of reuse or weak password issues.

4. Monitor and Secure All Other Online Accounts

Even if only one account was compromised, hackers may have attempted to access other accounts through the use of the same password or linked email addresses. Take the following additional precautions:

  • Review all recent account activity for suspicious logins or transactions.
  • Revoke access to any suspicious devices or apps that are connected to your accounts.
  • Update security questions and answers, ensuring they aren't easily guessable or derived from public information.

5. Setup, Use, and/or Check Any Credit or Data Monitoring Services

If you use any sort of data monitoring or ID monitoring service(s), this would be the time to check on them or even ask the provider to run an up-to-date check of your personal information.

  • Guardio: We do use and recommend Guardia as an "Umbrella" service to not only monitor your personal information but also look for password leaks and even provide email/web filtering and monitoring. The service is not free, unfortunately. But their products and services have GREATLY helped us with similar issues in the past.
  • Free Credit Monitoring such as Experian, Equifax, Credit Karma, the FTC, and other resources.

6. Enable Two-Factor Authentication (2FA)

Where available, always enable two-factor authentication (2FA) for your accounts. However, be cautious with the type of 2FA you use:

  • Do not rely on 2FA through SMS or email, as these can be intercepted through SIM-swapping attacks or email compromises.
  • Use an authenticator app such as Google Authenticator, Microsoft Authenticator, or Authy.
  • Security Keys: For the highest level of protection, use your security key for 2FA on any accounts that support it.

Make sure to set up both security keys on all accounts that support them for redundancy in case one is lost or stolen.

7. Implement Security Keys for Two-Factor Authentication (2FA)

Using a security key (like a YubiKey) is one of the most effective ways to protect your accounts. Security keys provide an extra layer of security beyond traditional passwords by requiring physical confirmation for account access.

  • Buy Two Security Keys: Setting up two keys ensures that if one is ever lost, stolen, or damaged, the backup key can be used to regain access to your account.
  • Register Both Keys: Set up both keys on every account that supports their use (e.g., Google, Dropbox, Microsoft, social media, financial services, etc.).

8. Ongoing Protection and Monitoring

After recovering your accounts and enhancing their security, adopt good online security practices going forward:

  • Use a Password Manager: This helps you create and store strong, unique passwords for all your accounts.
  • Monitor Credit Reports: If financial information is compromised, regularly monitor your credit report for unusual activity. You can also consider placing a fraud alert or credit freeze.
  • Watch for Phishing Attempts: Be especially cautious of phishing emails or texts that may follow a breach, as hackers may try to gain further information by impersonating legitimate companies or services.

By following these steps, you can effectively respond to an account compromise and significantly reduce the chances of future breaches. The key is to act swiftly, report incidents, and continuously improve your security practices.


Sunday, September 15, 2024

Mac Self-Service System Configuration: How-To

Apple Self-Service
System Configuration: How-To

System Configuration may be required at the end of your repair. System Configuration is a postrepair software tool that completes the repair for genuine Apple parts. System Configuration has a number of purposes that vary based on the part replaced. Refer to the Introduction section of the model you’re repairing for a complete list of details.

Before initiating System Configuration, ensure that the Mac is running the latest version of macOS. You’ll have one attempt to complete System Configuration. If the attempt is interrupted, canceled, or encounters an error, the Mac will display a message instructing you to contact the Self-Service Repair Store team for assistance.

If you don’t want to update the Mac to the latest version of macOS or need assistance initiating the System Configuration process, contact the Self Service Repair Store team.
Initiate System Configuration

Important: If the Mac automatically starts up to diagnostics mode, skip to step 6.

If you use Ethernet to connect the Mac to the internet, plug the Ethernet cable into the Mac before turning on the computer. If you use Wi-Fi, you'll connect the Mac to the internet during step 5, after the computer starts up to diagnostics mode.

  1. Press and hold the power button on the Mac to turn on the computer. On laptop computers that have Touch ID, press and hold the Touch ID button.
  2. Continue to hold the power button or Touch ID button as the Mac turns on and loads startup options. Release the power button when “Loading startup options...” appears on the screen.
  3. When the startup options screen appears, press and hold Command (⌘)-D on the keyboard to put the computer into diagnostics mode.
  4. If you're using Wi-Fi to connect the Mac to the internet, choose the network from the Wi-Fi menu in the upper right corner of the diagnostics mode screen.
    Note: The Wi-Fi menu may take a few seconds to appear. This is normal behavior.
  5. A list of languages will appear on the diagnostics mode screen. Choose your preferred language and click "OK."
  6. When the Diagnostics & Repair screen appears, click “I agree“ to begin System Configuration.
    Important: If you replaced the lid angle sensor on a laptop, skip to step 9.
  7. If System Configuration is successful, the Mac will display a message that says, “Suite completed. Restarting to Diagnostics Mode.”
  8. Important: If you encounter an error, contact the Self-Service Repair Store team for assistance.
    Complete steps 9 through 14 only if you replaced the lid angle sensor on a laptop.
  9. When the Action Required alert window appears on the screen, click "Continue." Then immediately close the display.
  10. Keep the display closed for 20 seconds.
    Caution: If the display isn’t fully closed during the System Configuration process, 
    you’ll need to install another new lid angle sensor.

  11. Open the display when you hear the startup chime or after waiting 20 seconds.
  12. If System Configuration is successful, the Mac will display a message that says, “Suite completed. Restarting to Diagnostics Mode."
  13. The Mac will automatically restart to diagnostics mode. Then choose Restart from the Apple menu.
  14. After the Mac restarts again, confirm that you can put it to sleep by closing the display. The Mac should sleep when the display is almost completely closed.
    • Important: If you encounter an error, or the Mac doesn't sleep when expected or wakes unexpectedly, contact the Self Service Repair Store team for assistance.

Restore the Mac Before Initiating System Configuration

You may need to restore the Mac before initiating System Configuration for the following reasons:

  • If you replaced the logic board and the replacement logic board isn't running the latest version of macOS.
  • If you replaced the logic board or SSD modules on a Mac Pro or Mac Studio.

To restore the Mac you will need the following:

  • Another Mac running macOS Sonoma (14.1 or later) or another Mac using the latest version of Apple Configurator.
  • Internet access
  • A USB-C charge cable. The USB-C cable must support both power and data. Don’t use Thunderbolt cables.

Follow these steps to restore the Mac:

  1. Choose one of the following methods to restore the repaired Mac, then continue to step 2:
      • If you replace the logic board, the Mac will start up in diagnostics mode.
      • If you replace SSD modules, the Mac will start up to Setup Assistant. Shut down the Mac before continuing.
  2. Follow the steps above to Initiate System Configuration
  3. The Mac will automatically restart to diagnostics mode. Then choose Restart from the Apple menu.
  4. After the Mac restarts, follow the onscreen instructions to activate the Mac.
Published Date: May 08, 2024