Connect with us

Technology

Quick fixes to stop your Windows PC from crashing

Published

on

Quick fixes to stop your Windows PC from crashing

Are you dealing with a Windows PC or laptop that won’t stop crashing? Maybe your PC is constantly freezing or displaying error messages. 

We know how frustrating a PC that won’t work right can be. Luckily, there are some easy ways to fix a Windows PC that is consistently crashing. 

Today, we’ll review nine easy fixes you can do at home if you have a Windows PC that won’t stop crashing on you. Let’s get into it.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

A man working on a PC  (Kurt “CyberGuy” Knutsson)

Advertisement

1. Check all of your cable connections

While it might sound obvious, the first step to troubleshooting a computer that constantly crashes is ensuring everything is firmly plugged in. It’s often the most overlooked step, so if you’re using a desktop, you’ll want to look behind your PC and ensure everything is plugged in. It would be best to try using a different electrical outlet to first rule out any electrical issues in your home.

If you feel comfortable opening up your desktop PC, you can also go inside the case and ensure all your PCI connections are firmly plugged in. You’ll want to ensure all your cables going to the power supply are firmly connected, and the same is true with the PCI power cables that supply electricity to the GPU and CPU.

Wires coming out of a desktop PC tower  (Kurt “CyberGuy” Knutsson)

HOW TO FINALLY RESOLVE THE RED SCREEN OF DEATH ON WINDOWS 10

2. Make sure your computer isn’t overheating

Computer overheating is a common cause of intermittent shutdowns and crashes. If your CPU (central processing unit), essentially the brain of your computer, or graphics card gets too hot, your computer might shut down to ensure the components aren’t damaged. If you notice that your laptop or desktop is giving off a lot of heat, or in the case of a laptop, it is hot to the touch, or if you notice your fans running louder than usual, these are all signs of overheating.

Advertisement

If your computer is overheating, the first step is to clean it thoroughly. I recommend blowing dust out of the interior fans with compressed air and keeping your PC in an area where it can receive proper airflow. If you have a desktop PC, try not to keep it under your desk. Keeping a PC under a desk can cause issues with dust build-up and lack of airflow. It’s best to keep your desktop in a part of your home or office where it can receive a decent amount of airflow.

A man working on a PC  (Kurt “CyberGuy” Knutsson)

WINDOWS UPDATE FLAW COULD BE A HIDDEN GATEWAY TO ZOMBIE VULNERABILITIES

3. Boot your PC into safe mode

If your cables are all plugged in correctly and your computer isn’t overheating, it’s time to boot your Windows PC into safe mode. Booting into safe mode allows you to run your PC with the necessary files and drivers turned on to make the PC run. That way, you can determine if new software or hardware conflicts with your PC, causing it to crash. While in safe mode, you can access Windows error logs and run other diagnostics to figure out what is causing your PC to crash. 

TAKE YOUR WINDOWS PC’S SECURITY TO THE NEXT LEVEL WITH THESE SIMPLE STEPS

Advertisement

How to boot into safe mode (Windows 10)

There are a few different ways to boot into Windows safe mode, and it is a bit different depending on whether you are using Windows 10 or 11. To start, here’s how you can boot into safe mode on Windows 10 from the settings panel:

  • Press the Windows key
  • Click Settings

Steps to boot into safe mode (Windows 10)    (Kurt “CyberGuy” Knutsson)

Click System

Steps to boot into safe mode (Windows 10)   (Kurt “CyberGuy” Knutsson)

  • Scroll down and click Recovery
  • Click Advanced Startup – Restart Now

Steps to boot into safe mode (Windows 10)  (Kurt “CyberGuy” Knutsson)

  • Once your computer restarts, you’ll click Troubleshoot
  • Click Advanced options
  • Click Startup settings
  • Click Restart again

Your computer will restart again, and this time, your computer will boot into safe mode.

How to boot into safe mode (Windows 11)

The process is slightly different if you use a Windows 11 PC instead of a Windows 10 machine. Here’s what to do if you are using a Windows 11 PC:

  • Press the Windows key or click on the Start button
  • While holding the Shift keyclick the power icon in the bottom left corner
  • While continuing to hold the shift key, press restart

Steps to boot into safe mode (Windows 11)   (Kurt “CyberGuy” Knutsson)

Once your computer restarts, it will automatically boot into safe mode.

Advertisement

4. Check the Windows logs for errors

Now that you’re in safe mode, you should look at the Windows logs. You can access the Windows error logs through the Event Viewer. Here’s how to access the Windows Event Viewer:

  • Press the Windows icon in the start bar
  • Search for Event Viewer

Steps to boot into safe mode (Windows 11)  (Kurt “CyberGuy” Knutsson)

  • Open the Event Viewer app
  • In the left panel, double-click Windows logs
  • Click either Application or SystemApplication will show you Windows logs and errors related to applicationsSystem will show you Windows logs and errors related to the operating system
  • Application will show you Windows logs and errors related to applications
  • System will show you Windows logs and errors related to the operating system

Steps to boot into safe mode (Windows 11)  (Kurt “CyberGuy” Knutsson)

  • In both the Application and System, read through and write down the error code for any errors when your PC last crashed.
  • You can access the error code by double-clicking any error in the log.
  • Run a Google search for any error codes that come up.

5. Perform an OS update

An outdated version of Windows can cause conflicts with both your software and even hardware components in your PC. This is a major cause of PC crashes, so you’ll want to ensure your Windows operating system is entirely up to date. Here’s how to run a system update on Windows:

  • Click the Windows icon in the taskbar
  • Click the Gear (Settings) icon in the start menu
  • Click Windows Update
  • Press the Check for Updates button

Steps to perform an OS update Steps to perform an OS update   (Kurt “CyberGuy” Knutsson)

  • Download and install any new updates available for your PC

6. Run an antivirus scan

Even if you don’t own any antivirus software, you should at least run a scan with the built-in Windows Defender. Here’s how to access Windows Defender and run an antivirus scan:

  • Click the Windows icon in the taskbar
  • Click the Gear (settings) icon in the start menu
  • Click Privacy & Security

Steps to run an antivirus scan  (Kurt “CyberGuy” Knutsson)

  • At the top, click Windows Security
  • Click Virus & Threat protection
  • Click the Scan options button underneath Quick scan

Steps to run an antivirus scan  (Kurt “CyberGuy” Knutsson)

  • Select Full scan
  • Quarantine any threats detected during the virus scan.

Is Windows Defender enough to protect you?

While Windows Defender offers robust, built-in security for Windows users, it has limitations in areas like phishing and spam protection and may not update as swiftly as some premium solutions. To stay protected from malicious links, phishing scams and ransomware, consider investing in strong antivirus software. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

7. Check the hard drive for errors

You can use the Windows Command Prompt to check your hard drive for errors. If your hard drive has an error, you might need to perform a system restore, which we’ll discuss later. For now, here’s how to use the command prompt to check for hard drive errors:

  • Click the Windows icon in the taskbar
  • Type CMD and open the Command Prompt

Steps to check the hard drive for errors  (Kurt “CyberGuy” Knutsson)

  • Right-click on the Command Prompt box and click Run as administrator
  • Type sfc/scannow and press enter

Steps to check the hard drive for errors (Kurt “CyberGuy” Knutsson)

The command prompt will now check your hard drive for corrupt files and replace them. This may take some time. Once the process is complete, and you have errors that cannot be automatically replaced, you will unfortunately need to replace your hard drive and reinstall Windows.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Advertisement

8. Check for issues with your RAM

Issues with your PC’s RAM can also cause your Windows PC to crash randomly. More often than not, if you have an issue with your RAM, you’ll need to replace the RAM modules on the motherboard. This can be done at home quickly if you have the technical knowledge, but you can also go into any computer shop to get your RAM replaced for a small fee. Here’s how to check for issues with your RAM on your Windows PC:

  • At the same time, press the Windows Key + R on your keyboard
  • This will execute the Run application in Windows
  • Type Mdsched.exe and press enter; this will launch the Window Memory Diagnostics repair tool

Steps to check for issues with your RAM  (Kurt “CyberGuy” Knutsson)

  • Click Restart now and check for memory problems

Now, your computer will run through a memory check, and if you encounter an issue, beware that you might have to replace your RAM.

9. Perform a system restore

If your PC just started crashing, you might be able to fix the issue by performing a system restore. A system restore will restore your Windows operating system to a specific date and time of your choosing. This way, you can restore your OS to a point before the crash begins and troubleshoot from there. It’s important to note that when you perform a system restore, your computer will be restored as it was on the date and time you chose. This means you will lose any recent files or settings, so this should be a last-step solution in your troubleshooting process.

How to perform a system restore

  • Click the Windows icon in the taskbar
  • Type system restore
  • Click Create a Restore Point 

Steps to perform a system restore  (Kurt “CyberGuy” Knutsson)

  • Once the system restore wizard opens, you will see a notification telling you what the system restore will do, click next
  • Select a time and date for the system restore and click next
  • Click Finish

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Kurt’s key takeaways

Having a Windows PC that won’t stop crashing can be a massive headache. Luckily, there’s a lot of information out there on how to troubleshoot a PC that just won’t stop crashing. I’ve gone over nine of the most commonly used tips to fix a crashing Windows PC, but there’s other reset options out there, many of which require a higher degree of technical ability than what we’ve gone through today.

Advertisement

What do you find most challenging about using a Windows PC today? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

Advertisement

Technology

Sony’s XM5 headphones and the latest Kindle round out this week’s best deals

Published

on

Sony’s XM5 headphones and the latest Kindle round out this week’s best deals

If you’re feeling the stress of having procrastinated on your holiday shopping — and you missed out during Black Friday and Cyber Monday — we’ve got you. We’ve found a variety of gadgets on sale that make for great gifts, many of which will ship in time for the holidays. One of the standouts is the current promo on Sony’s noise-canceling WH-1000XM5 headphones, which are on sale with a free pair of wireless earbuds. Other deals you may have missed include steep discounts on Amazon’s latest entry-level Kindle and the new Echo Dot Max.

Sony’s last-gen WH-1000XM5 have consistently impressed us with their audio quality, active noise cancellation, and comfort. And right now, Amazon is offering them with a free pair of Sony’s WF-C700N earbuds for $248 ($152 off). The headphones have an updated design that includes a thinner headband, more memory foam in the ear pads, and repositioned mics that reduce wind noise when taking calls. These changes didn’t add much weight, and the headphones still get 30 hours of playtime with ANC enabled.

The XM5 sounded “more refined, detailed, and spacious” in our tests, but we noticed less oomph when listening to EDM or hip-hop tracks with a lot of bass. The headphones have eight microphones, four of which are for voice, and their excellent noise reduction on calls was immediately noticeable, even in louder environments. The $89.99 WF-C700N, meanwhile, are a midrange pair of noise-canceling earbuds with an IPX4 rating, up to seven and a half hours of battery life (with ANC enabled), and a slim design.

Amazon’s 11th-gen Kindle is our favorite budget-friendly e-reader, and you can pick up the ad-supported version for $89.99 ($20 off) at Amazon, Best Buy, and Target. The entry-level ebook reader features a six-inch 300ppi E Ink display that won’t show glare from the sun like your phone or tablet. It has enough storage space to hold thousands of books, or dozens of audiobooks from Audible, the latter of which you can play via Bluetooth headphones or speakers.

The Kindle’s built-in battery lasts up to six weeks, depending on how long you read per day and how reliant you are on its backlight, and recharges over USB-C. It has the same screen resolution and storage as the step-up Kindle Paperwhite, but it’s not waterproof, which may matter if you like to read at the beach or in the bath.

Advertisement

Amazon’s last-minute “Super Saturday” sale is underway, though, we’d argue some of the better deals are actually some the lingering discounts we’re seeing on Amazon’s own devices, many of which have been effect for several weeks. Right now, for instance, you can grab the new Echo Dot Max at Amazon, Best Buy, and Target for $79.99 ($20 off), which is the best price we’ve seen on the smart speaker since it launched.

Despite the name, the Dot Max is less of a follow up to the Echo Dot as it is the fourth-gen Echo from 2020. It’s got a compact knit fabric design, simpler controls, a better processor, and more smart home sensors and radios than prior models (it offers support for Matter, Thread, and Zigbee protocols). It still sounds great for its size, though, and like prior models, it can function as an Wi-Fi extender if you’re looking buoy a Eero mesh network. It’s also one of the first devices to offer Amazon’s AI-powered Alexa Plus out of the box, which, while still very much a work in progress, is a step in the right direction.

Continue Reading

Technology

Data breach exposes 400,000 bank customers’ info

Published

on

Data breach exposes 400,000 bank customers’ info

NEWYou can now listen to Fox News articles!

A major data breach tied to U.S. fintech firm Marquis is rippling through banks, credit unions and their customers. Hackers broke into Marquis systems by exploiting a known but unpatched vulnerability in a SonicWall firewall, gaining access to deeply sensitive consumer data.

At least 400,000 people are confirmed to be affected so far across multiple states. Texas has been hit the hardest with more than 354,000 residents affected. That number is expected to rise as additional breach notifications are filed.

Marquis operates as a marketing and compliance provider for financial institutions. The company says it serves more than 700 banks and credit unions nationwide. That role gives Marquis access to centralized pools of customer data, which also makes it a high-value target.

PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH

Advertisement

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

A major data breach tied to fintech firm Marquis exposed sensitive banking and identity data for hundreds of thousands of people. (Kurt “CyberGuy” Knutsson)

What information was stolen in the Marquis cyberattack

According to legally required disclosures filed in Texas, Maine, Iowa, Massachusetts and New Hampshire, hackers accessed a wide range of personal and financial data. Stolen information includes customer names, dates of birth, postal addresses, Social Security numbers and bank account, debit and credit card numbers. The breach dates back to Aug. 14, when attackers gained access through the SonicWall firewall vulnerability. Marquis later confirmed the incident was a ransomware attack.

While Marquis did not publicly name the attackers, the campaign has been widely linked to the Akira ransomware gang. Akira has previously targeted organizations running SonicWall appliances during large-scale exploitation waves. This was not a routine credential leak.

We reached out to Marquis for comment, and a company spokesperson provided CyberGuy with the following statement:

Advertisement

“In August, Marquis Marketing Services experienced a data security incident. Upon discovery, we immediately enacted our response protocols and proactively took the affected systems offline to protect our data and our customers’ information. We engaged leading third-party cybersecurity experts to conduct a comprehensive investigation and notified law enforcement.

“The incident was quickly contained, and our investigation was recently completed. It was determined that an unauthorized third party accessed certain non-public information within our network. However, there is no evidence indicating that any personal information has been used for identity theft or financial fraud. We have notified potentially affected individuals.  

“We know our customers place great trust in us, and at Marquis, we take that responsibility seriously by making the protection of their information our highest priority. We are extremely appreciative of the cooperation, understanding, and support of our employees and customers during this time.”

HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET 

Why the Marquis data breach creates long-term identity risk

When a data breach exposes your full identity, the danger does not disappear after the news cycle ends. Unlike a stolen password, this kind of information cannot be changed, which means the risk can stick around for a long time.

Advertisement

“With a typical credential leak, you reset passwords, rotate tokens and move on,” Ricardo Amper, CEO and Founder of Incode Technologies, a digital identity verification company, tells CyberGuy. “But core identity data is static. You cannot meaningfully change your date of birth or SSN, and once those are exposed, they can circulate on criminal markets for years. The breach is a moment in time, but the exposure it creates can follow people for the rest of their financial lives.”

That is why identity breaches are so dangerous. Criminals can reuse the same stolen data years later to open new accounts, build fake identities or run highly targeted scams that feel personal and convincing. Many attackers now combine this data with AI tools to scale their efforts. As a result, phishing emails, phone calls and even voice impersonations are harder to spot when they reference real details about your bank or account history.

The most likely scams after identity data is stolen

When criminals obtain verified identity data, fraud becomes targeted rather than opportunistic. 

“Once criminals get their hands on rich, verified identity data, fraud stops being a guessing game and becomes a targeted execution,” Amper said. 

The first major threat is account takeover. With enough personal details, attackers can bypass knowledge-based checks, reset passwords, change contact information and abuse accounts in ways that often look legitimate. The second risk is new account fraud. This includes credit cards, loans, buy now pay later services and even new bank accounts. High-quality data helps these applications pass automated systems and manual reviews.

Advertisement

The fastest-growing threat is synthetic identity fraud. Real data, like a Social Security number, is blended with fabricated details to create a new identity that matures over time before a large financial bust. 

“These attacks are hard to catch early because the data being presented is accurate and often reused across multiple institutions,” Amper noted. “If your defenses can’t reliably tell a real human from an AI-generated impersonation, you are starting every decision from a position of disadvantage,” he added.

Why unpatched firewall flaws pose such a serious threat

Ransomware groups like Akira increasingly focus on widely deployed infrastructure to maximize impact. Firewalls sit at the boundary of trusted networks. When one is compromised, everything behind it becomes reachable. 

“What we’re seeing with groups like Akira is a focus on maximizing impact by targeting widely used infrastructure. The strategy remains the same: Find a single weak point that gives access to many downstream victims at once,” Amper said. 

This approach exposes a persistent blind spot in traditional cybersecurity thinking. Many organizations still assume traffic passing through a firewall is safe. 

Advertisement

“When the perimeter device itself is the entry point, static defenses and outdated controls simply can’t keep up,” Amper explained.

Hackers accessed names, Social Security numbers and bank details by exploiting an unpatched firewall vulnerability.  (Kurt “CyberGuy” Knutsson)

How long affected consumers should assume risk remains high

Identity data does not expire. Social Security numbers and birth dates stay the same for life. 

“When core identity data reaches criminal markets, the risk does not fade quickly,” Amper emphasized. “Fraud rings treat stolen identity data like inventory. They hold it, bundle it, resell it and combine it with information from new breaches.” 

Warning signs of misuse can be subtle. These include credit inquiries you did not authorize, account recovery alerts from unfamiliar services or phone calls that convincingly mimic a bank’s verification process using deepfake voice tools. 

Advertisement

“The most damaging fraud often starts long after the breach is no longer in the news,” Amper added.

The overlooked impact of identity theft

Financial losses are only part of the damage. Victims often experience a lasting erosion of trust. 

Amper says, “The most overlooked consequence is the psychological toll of knowing that you can no longer trust who is contacting you. Deepfake impersonation turns every phone call, video message or urgent request into a potential attack.”

Ways to stay safe after the Marquis data breach

When a breach exposes Social Security numbers, bank details and birth dates, the risk does not end with a password reset. These steps focus on protections that reduce long-term identity misuse and help you detect fraud early.

1) Freeze your credit with all major bureaus

A credit freeze prevents criminals from opening new accounts in your name using stolen identity data. This is critical after the Marquis breach, where full identity profiles were exposed. Freezing credit does not affect your score and can be lifted temporarily when needed. Place a free credit freeze with Equifax, Experian and TransUnion online or by phone. Each bureau must be contacted separately. Once frozen, new credit cannot be opened unless you temporarily lift or remove the freeze using a PIN or account login.

Advertisement

2) Place a fraud alert on your credit file

A fraud alert tells lenders to take extra steps to verify your identity before approving credit. It adds protection if you are not ready to freeze credit everywhere or want an extra layer on top of a freeze. Fraud alerts last for one year and can be renewed. You only need to contact one credit bureau to place a fraud alert. Equifax, Experian or TransUnion will notify the others for you. Fraud alerts are free and last for one year.

3) Enable transaction and account alerts

Turn on alerts for withdrawal, purchase, login attempts and password changes across all financial accounts. Real-time alerts can help you catch account takeovers or unauthorized activity before serious damage occurs.

4) Review bank statements and credit reports regularly

Check statements and credit reports often, even months or years after the breach. Identity data from incidents like this is frequently reused later for delayed fraud. Watch for unfamiliar accounts, hard inquiries or small test charges.

5) Use phishing-resistant two-factor authentication

Text message codes can be intercepted or socially engineered. Where possible, switch to app-based or hardware-backed two-factor authentication. These options are harder for attackers to bypass, even when they know your personal details.

6) Rely on strong device-based biometrics where available

Biometrics tied to your physical device add a layer that criminals cannot easily replicate. Face and fingerprint authentication help block account takeovers driven by stolen identity data or AI-powered impersonation.

Advertisement

7) Use strong antivirus software

Reputable antivirus software helps detect malicious links, fake login pages and follow-up attacks that target breach victims. This adds protection against phishing and ransomware tied to identity-based scams.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

8) Consider a data removal service

Data brokers collect and resell personal information that can be combined with breach data to fuel targeted fraud. A data removal service reduces how much of your personal information is publicly available and lowers your exposure over time.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Experts warn this type of identity exposure can fuel fraud and scams for years after the breach is discovered. (Kurt ‘CyberGuy’ Knutsson)

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

9) Add an identity theft protection service

Identity theft services monitor credit files, dark web markets and account activity for signs that your stolen data is being misused. Many also offer recovery assistance in the event of fraud, which can save time and stress when dealing with banks, credit bureaus and government agencies. This monitoring is especially useful after breaches like Marquis, where identity data can resurface long after the initial incident.

Advertisement

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

10) Verify unexpected outreach through official channels

Be cautious of urgent calls, emails or texts that reference real banking or personal details. Scammers now use accurate breach data to sound legitimate. Hang up and contact your bank directly using the number on your card or official website.

11) Lock down tax and government accounts

Create or secure online accounts with the IRS, Social Security Administration and your state tax agency. Enable strong authentication and monitor for unexpected notices. Stolen identity data is often used for tax refund fraud or benefit scams long after a breach.

Kurt’s key takeaways 

The Marquis data breach highlights how dangerous unpatched infrastructure vulnerabilities have become for the financial sector. When a single vendor holds data for hundreds of institutions, the fallout spreads quickly. For you, identity protection is no longer a one-time response. It is an ongoing necessity that can last years beyond the initial breach.

What questions do you still have about protecting your identity after a major data breach like this one? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

You can buy your Xbox Ally an official pair of anti-drift joysticks

Published

on

You can buy your Xbox Ally an official pair of anti-drift joysticks

Even at $1,000, the Xbox Ally X handheld didn’t ship with magnetic drift-resistant joysticks, and neither did the $600 model. But for an extra $20 at Amazon, you can change that today — with officially Asus-approved and sanctioned TMR joysticks from Gulikit, the company that’s made a name for itself by supplying aftermarket drift-resistant sticks.

The company says it worked with Xbox Ally manufacturer Asus to create these sticks, that they’ll be “automatically recognized” when you swap them in, and that you can use the handheld’s built-in Armoury Crate app to calibrate them afterwards.

And while I haven’t tried these ones (I do have a pair in my Switch), I can confirm it’s pretty easy to pop open the Xbox Ally to install. Just loosen the Philips-head screws, poke in a guitar pick pry tool to create a small gap, and pull a little harder than you think you need to pop open the clips. The joystick modules are right underneath. There’s nothing blocking you — just pop a ribbon cable and undo their three screws.

Here’s the company’s walkthrough in case you want to see for yourself — though I do not recommend taking sharp tweezers to ribbon cables when your fingernails can do that job safer and easier. (I may have broken a few ribbon cables in my life.)

When we’re talking about TMR or the older and slightly less power-efficient Hall effect joystick technology, I usually write “drift-resistant” instead of “drift-free” because you may find your center point drifting over time — but the beauty of magnetic is you just have to recalibrate! Unlike the potentiometer joysticks that ship with Nintendo, Sony PlayStation, and Microsoft Xbox controllers, you’re not scraping away material that’ll lead to permanent drift as you use the magnetic versions.

Advertisement

Gulikit’s new Xbox Ally sticks are $20 in the US today, and should also be available in the UK for £20, and in Italy, France, and Spain for €22, this January.

Continue Reading
Advertisement

Trending