No matter where you purchased your product, we have the knowledge and experience to set it up, repair (where possible and feasible), or offer recommendations on what can be salvaged as needed. Stop by, tell us what you would like us to do or your concerns, and we are happy to diagnose, fix, optimize and fulfill your needs.
Example Setup Options:
1. Computer Setup: we will conduct the initial setup the right way, complete system updates, configure the setup menu and power settings, clean out unnecessary temporary files, and ensure everything is functioning correctly and optimized.
2. Software Installation: Nearly every customer with a new or used computer is interested in installing some new software such as Microsoft Word, a different internet browser, a printer, a mouse and more.
3. Software Removal: We can get rid of unwanted programs that came pre-installed or pose a security risk, such as browser bars and programs that may violate your privacy, also games or apps that are of no interest to you can be removed as well.
4. Email: We can create a new account or set up and existing email account on your new or used computer, and configure it as needed including installation of an email app if available.
5. Personal: Personalizing your computer, getting training, and getting acquainted with any of your technologies can be accomplished by setting up a one-on-one session with a member of our experienced staff.
One of our Professionals will come to your home or business to install your new computer or tablet. This may involve any of the following setup processes:
1. We can help you defining the space where you want to use the computer or tablet and running any wires or power supply cords as needed.
2. Conduct a computer or tablet setup: the same as we would in our store, with software installation or removal and email setup.
3. We will connect your device to a monitor or other computer display as needed.
4. Getting you connected to your network, may include network hardware setup and accessing wired or wireless networks, as well as configuration, mobile device access, printer cable or network setup and other diagnostics related to issues you may be experiencing.
5. We can perform diagnostics as needed, (also see our other service options below).
6. We will test, confirm, give a demonstration of the device, and supply a password list as needed. The customer will have the ability to ask questions.
7. We can remove and recycle old computer equipment for you in an eco-friendly way as well.
Your files, photos, music, videos, records, and work information can accidentally be deleted from a computer drive, camera SD card, USB drive, DVR, NAS and other media sources.
1. GOOD NEWS: We can recover your lost files in most situations and are happy to help you get them back!
2. WHAT YOU SHOULD DO: Call us or bring your Computer or other data storage, hard drives, SD cards, Phones, DVR’s, tablets, recorders, and NAS drives, and we can discuss what exactly you are interested in recovering and potential recovery options.
3. DIAGNOSTIC: This is the process of (definitively) determining what happened to your data.
4. IDENTIFYING AND LOCATING: This is the process of scanning your hardware and locating your missing data on your device. We can identify all the most common files and hundreds of other file types.
5. RECOVERY: This is the process of collecting the deleted, corrupt, or lost files from the customer’s device. The difficulty of the recovery will depend on the severity of the issue. In general, we can usually identify and recover ALL deleted files, and data lost due to a drive being formatted as long as the files are not overwritten or severely corrupt. We can also carve and fix many corrupt files automatically, depending on the condition. File system issues aka “orphaned” files can be recovered, as well as entire deleted Operating Systems (depending on the circumstance). If you’ve lost some BitLocker encrypted files, we can recover them, and decrypt them if you have the password. We fix other software and hardware issues and damages related to the customer’s data loss as well. Also, if your hard drive is locked, we may be able to recover your files depending on the circumstances.
6. NEW STORAGE: The processes we use ensure that nothing is written to the customer’s device (this ensures that nothing else is lost), therefore, we transfer all identified files to a new data storage device. We can provide the customer with a new storage device, or the customer may be able to bring their own.
7. DISCUSSION: Once the data has been recovered, it may be necessary to sort out any additional hardware, software, data safety, and storage issues, and explore options that will ensure the customer will have their important files secured in the future.
We have many different capabilities we use, that are chosen based upon a specific client situation or requirement. Here are some of the most frequently requested options below.
1. We can back up your hard drives, disks, Network (NAS) drives, USB flash drives, SD cards, and more.
2. We can backup and transfer files from PC’s/Microsoft, Mac/Apple, Linux, RAID, and other file systems.
3. We can take an exact bit-for-bit copy of the media and duplicate “clone” it to some other storage drive.
4. We can make an “image” of an operating system with all of its files, data, and “System State” to be transferred to a new device.
6. We can manually collect all or some of a customer’s files, and organize the data for transfer as needed.
7. We can create new automated back-up options, cloud storage options, and entire computer networks containing the backups as per the customer’s request.
1. We can supply the new file storage device for the back-up or transfer, or the customer may be able to provide their own as needed.
2. We can transfer all or part of the contents of your hard drives, disks, Network (NAS) drives, USB flash drives, SD cards, and more to a new storage device and file system as required.
3. We can transfer files from a standard hard drive to a Solid State Drive (SSD).
4. We can transfer files between different types of file systems as needed.
We know what delivers optimal computer performance and satisfaction from years of experience in the field. We can do most any type of upgrade, modification, replacement or repair as requested by the customer. Some of the most frequently requested options are as follows:
1. Memory expansion or upgrades - Memory is both motherboard size and speed contingent, and therefore, we identify, discuss, and order the best memory options to enhance our customers computers.
2. SSD Upgrade - We upgrade customers from standard mechanical hard drives to Solid State hard drives (SSD). This improves nearly all responsive actions of the system that are hard drive contingent, (because the mechanical moving parts are eliminated) non-existent in SSD’s. We have noticed a major boost in software performance (launch, navigation, and termination), computer startup and shut down, gaming, and more.
3. Graphics Cards – Customers that use software for graphics intensive projects or are serious about video games know they must have a powerful graphics card. We can provide these customers with options, order and install upgrades for them.
4. Port, media, CD/DVD or other hardware installations or upgrades - We look at what options the customer needs and try to find them the best solutions.
5. Computer Security – We determine the security status, resolve conflicts, recommend options, and can install and configure software or hardware as needed.
6. System File errors – We have multiple ways to recover and fix corrupt or missing system files.
7. Disable or remove – We can stop services and software from starting up on your computer. We can remove software that is not in use, or as per the customer’s request, that may be slowing down the machine.
8. Tweaks: We can make files contiguous and defragment the Master File Table (as well as trim or defrag the normal way). We can enter into the Management Console Snap-ins and shut down processes that waste customer computer resources and much more.
9. Junk removal – We use software and manual methods to determine what is slowing down your computer, remove junk and useless files, redundancies, and have a variety of techniques to clean and tune-up the computer system.
10. Malware removal is a separate process see the section below.
Not all software is compatible with all systems or other software. At the customers request, we can identify, obtain the software, set up accounts, install it, configure and update it, as needed. This commonly includes:
We are happy to discuss software requirements with our customers!
Malware includes: computer viruses, spyware, worms, trojans, rootkits, ransomware, bots, hacker-ware, adware, scare-ware, and other unwanted software, vulnerabilities and executables built into seemingly normal Apps that may upload your information or hijack your system. In all cases, we can discuss the problem, troubleshoot, identify next best steps and solutions, recommend ways to get you back on track, and create future protection and prevention strategies.
Malware removal and repair belongs in its own category, because the tasks involved can be complicated, and relate to several categories. For instance, we have plenty of special software to take a customers infected drive offline and scan for malware, quarantine and delete it, however here are several other FAQ scenarios that complicate the situation:
1. What happens if I have Ransomware on my computer and it has encrypted everything on the drive? (now we need to remove the disk, create a clone of it, and apply some strategies to recover the encrypted information)
2. What happens if a virus has deleted system files? (You may get a blue screen, or the system won't boot, or crashes, the internet browser or other software is locked or doesn't function correctly, therefore after we remove the virus, we will need to use special tools to repair the system such as e.g. comparing known good system files vs the customers system files, or locating the the last known good copy of the master boot record or the BCD, or collecting the mirrored copy of the Master File Table or Partition Table and restoring it to recover a damaged file structure or RAW partition)
3. What happens if malware deleted personal or work files? (now we need to apply different strategies to recover your data)
4. What happens if a "Worm" malware replicated itself and has spread to my flash drive? (We must have a discussion of everywhere the malware could have spread and fix it if that is the customers objective)
5. What happens if a Trojan created an exploit, backdoor, or command and control on my computer, or has made it part of a botnet? (we have ways to detect, remove, or otherwise fix the problem)
6. What happens if I have a rootkit? (the problem could be located in a hidden partition, could be in a special area in your computer such as the Host Protected Area, an extended area, the Boot sector, or in the DCO, we can get to these areas and fix the problem)
7. What happens if my browser was hijacked and I got a Pop-up message to call a phone number? (every attack attempt may employ a different payload or technique to get what they want from the target computer, and will require scanning and other diagnostics to consider the status of the attack)
8. What happens if I keep getting malware over and over again? (Then you are likely getting it from a social media, email, or other common site that you frequently use, or a friend that has malware and is unaware, or a storage device that you frequently use, and in very rare circumstances malware can infect a computers firmware, Graphics card, and even reside outside of the computer on the customers modem [all require different approaches])
9. What if someone has connected to my computer video camera and is watching me? (We have software to detect certain activities, internal cameras can be disabled through the bios or by removing the driver until the problem is resolved, a firewall can block intrusions, sometimes we can track down whose IP it may be from the modem logs as well)
10. What if my internet is slow and the connection keeps going offline, and the event log says DDOS? Malware may slow the internet speed, (because it is using it intensively), however, DDOS is a denial of service attack (not malware) and can be mitigated through special configuration of your modem, or a firewall, or getting a higher quality modem and configuring it to reject the activity, some sever cases, there are other steps that can be taken as well)