Jul 23

Complete PC Tune-Up (HOT!)

Tune-Up Includes:

  • Install all necessary Security and Recommended Windows Updates from Microsoft

  • Update all hardware drivers and software

  • Testing all hardware for conflicts or imminent failure

  • Clean and defragment Windows Registry, delete unused registry entries

  • Optimize startup and disable unnecessary programs

  • Cleanup desktop and taskbar of unused icons and shortcuts

  • Blow dust and dirt and grime out of internal hardware components to keep system running cool and quiet!

A complete tune-up can greatly enhance both the usability and speed of your computer, along with increasing it’s lifespan.  Send me a message today!

Sep 23

Do you like donuts?

It’s that time you’ve all been waiting for!
 
Don’t roll your eyes at me.
 
Bring your slow, broken, frozen dead computer to me today! Or tomorrow, I’m flexible.
 
I have three donuts left. Blueberry cake, jelly, and Boston crème. Get in early enough, one of them is yours. And by early, I mean you have like three minutes before I destroy each one in rapid succession with my face.
 

Sep 17

Come see us today!

Check us out on Facebook too!

http://facebook.com/joecanfixthat

Aug 30

Laptop Pro-Tip

Laptop Pro-Tip:

Never set your laptop on a blanket, your bed, a cushion, or anything soft while using it. This can cause serious damage as it blocks the intake and exhaust fans located on the bottom of the laptop. The fans work too hard to move air through the system to keep it cool and can eventually fail, causing the laptop to overheat. In some cases you will notice slow-downs, loud noises, crashes, freezing, and even permanent damage where the only repair is no repair, just replacement of the laptop.

It should always be on a hard, flat surface to allow air to move underneath and through the grills over the fans to keep the processor and the rest of the inside cool and quiet.

Get Service

 

Aug 18

New Groupon Deal for new and old customers!

Awesome deal on Groupon!  Up to 54% off all services!

Click the picture to go to Groupon, that’s just a screenshot.  🙂

 

https://www.groupon.com/deals/joe-can-fix-that-computer-repair-1

 

Aug 13

Computer repair near you in Leominster, MA.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Hi! I’m Joe. Offering computer repair in Leominster, MA and surrounding towns.
area. I’ve been in the computing industry for 20+ years and my services
are known around town. I do both residential and small business work.
You’ll see me among the top spots if you search for computer repair in
Leominster on Google or Bing. Respond to this ad and receive 50% off any
service you see on my sites:

My website: Joe Can Fix That!

Facebook: JCFT! on Facebook

Some services I offer:
Desktop & Laptop repair
Virus, malware, adware and pop-up removal
Wireless device setup
Hardware & Software troubleshooting
Parts upgrades and replacement
Windows OS Upgrades
Smartphone & Tablet setup

Want service or have questions, don’t hesitate to contact me here, or you
can fill out the contact form on my website or on Facebook. Mention this
ad and get your 50% off!

Thanks for reading and happy computing!
Joe
(Best computer repair in Leominster!)

 

Aug 13

Dr. Seuss Explains Why Computers Crash

 

If a packet hits a pocket on a socket on a port, and the bus is interrupted at a very last resort, and the access of the memory makes your floppy disk abort, then the socket packet pocket has an error to report.
If your cursor finds a menu item followed by a dash and the double-clicking icon puts your window in the trash; and your data is corrupted cause the index doesn’t hash, Then your situation’s hopeless and your system’s gonna crash!

If the label on the cable on the table at your house, says the network is connected to the button on your mouse, but your packets want to tunnel to another protocol, that’s repeatedly rejected by the printer down the hall, and your screen is all distorted by the side effects of gauss, so your icons in the window are as wavy as a souse; then you may as well reboot and go out with a bang, ‘Cuz sure as I’m a poet, the sucker’s gonna hang!
When the copy of your floppy’s getting sloppy in the disk, and the macro-code instructions cause unnecessary risk, then you’ll have to flash the memory and you’ll want to RAM your ROM. Quickly turn off the computer and be sure to tell your Mom!

Get Service

Jul 29

What is spyware?

What is Spyware?

I have lost count of the number of times that we have been called out to repair a personal computer and found that the system was damaged by “Spyware”. Spyware is Internet jargon for Advertising Supported software (Adware).

Advertising Spyware is software that is installed alongside other software or via ActiveX controls on the internet, often without the user’s knowledge, or without full disclosure that it will be used for gathering personal information and/or showing the user ads. Advertising Spyware logs information about the user, possibly including passwords, email addresses, web browsing history, online buying habits, the computer’s hardware and software configuration, the name, age, sex, etc of the user.

In addition to privacy and security concerns, resource-hogging Adware and Spyware can cause system and browser instability and slowness.

Here are a couple of scenarios indicating a Spyware “infection”.

– Scenario 1:

Your search engine is New: Google. You visit the Google website and do your search. All of a sudden you have advertisements popping up all over your screen. Annoying right? The Google web site does not use pop-ups! It is against their company philosophy (another reason why I love Google). So where are the pop-ups coming from? There is software (Spyware) on your PC monitoring your key strokes and hard drive contents and sending the information to a third party on the Internet which then presents advertising pop-ups to you based on your search interests or the web sites you have been visiting.

This scenario illustrates how Spyware can be extremely annoying. But worse, consider the security and privacy issues that are highlighted by this type monitoring. How secure are your passwords that you use locally or online? Is this information being sent back to a server along with other personal or business information scanned from your hard drive? Maybe, maybe not. It is not worth taking a chance. We will discuss how to identify and prevent Spyware from “infecting” your system a little later.

– Scenario 2:

You start your computer in the morning. The PC was never the fastest on the block to boot up and be ready to work but it was never as slow as it is now. Now the computer’s hard drive’s light stays on continuously and you can hear the hard drive thrashing away in your computer. This abnormal disk activity is a clue that there may be Spyware scanning your hard drive and sending the results to a third party which in turn is using it to aim advertising at you based on your interests.

The second scenario illustrates not only the privacy and security issues mentioned in scenario one, but also the resources that the Spyware appropriates for it’s own use. The most noticeable resource degradation is that of the PC itself. Valuable RAM, CPU cycles, and hard disk reads are being used by the Spyware for it’s own use. On a slower PC this resource use is very noticeable creating an unusable and unstable PC for periods of time. User productivity is sure to suffer because of this. Network and Internet bandwidth is also being used by the Spyware which results in slower access for legitimate network communications and can result in reduced productivity and higher costs of network ownership.

 

How to Identify a Spyware “Infestation”

There are some clues that indicate spyware could be installed on a computer.
You are bombarded with pop-up ads every time you use the web browser.
The PC is showing sluggishness and increased disk activity is noticed.
The PC becomes increasingly unstable and more prone to crashes and blue screens.
Icons appear in the taskbar tray that weren’t there before.
Network activity is observed when the computer is not being used.
An increase in the amount and frequency of email spam is observed.

There are many freeware titles available that install Spyware on your system. One of the most identifiable types of Spyware is from a company called Gator Advertising(http://www.gator.com/). Their Spyware is installed alongside free programs such as Precision Time, Date Manager, and Offer Companion. You may have seen one or more of these programs after they magically appear in your Taskbar Tray (where your computer clock is displayed). See figure 2-1 and 2-2. Ever wondered how they got there? You’re about to find out.

 

How Spyware is Installed

Some Internet websites utilize additional software to enable special features available on the site. One of the most common sites using this technology is the Microsoft Windows Update site. Before installing updates, you are required to accept the installation of a small piece of software called an ActiveX control. Shockwave enhanced sites also require the acceptance of additional software. It is okay to accept this software. Provided that your Web Browser security settings are enabled you will be shown a screen asking permission to install the software. See figure 2-3 and 2-4

Now this is where it gets confusing. Have a look at the figure 2-5 and 2-6 below. Not much difference from the Shockwave and Windows Update Security Warnings shown above. These usually popup when you are first entering a website which gives the impression that they are required in order to view the site. Not so. That’s where they get you. Most users will assume they need to install the software, they click <Yes> and the Spyware payload is downloaded to their PC. Other forms of spyware infection are a result of saying OK to offers like the ones shown in Figure 2-7 and figure 2-8.

How to Prevent Spyware “Infection”

The chance of keeping a PC free of Spyware infection is greatly increased by following a few simple rules.
Ensure that your internet browser settings are set to at least default levels. Internet Explorer security settings are accessible by going to the Internet Explorer Tools menu and choosing Internet Options. Go to the Security tab to view or modify the settings.
Read all security warnings before hitting the Yes button. If you are unsure, choose No. If it turns out the webpage to be viewed requires the download, hit the Refresh button on the web browser or use the F5 key to refresh the screen.
Avoid using peer-to-peer file sharing services such as Kazaa. They are notorious for packaging Spyware with their programs.
Check your start menu, desktop, and Add/Remove Programs module for unknown installed applications.
Regularly clean out the internet browsers temporary files and cookie cache. This can be performed from Internet Explorers Internet Options on the General tab.
Whenever possible, close advertising pop-ups using the Close “X” in the top right corner of the window. If there appears to be no way of closing the window without clicking a button within the window, don’t. Press the Alt and F4 key at the same time. This will close the window in focus.
Use a firewall product that monitors and prevents unauthorized applications and data from both entering and leaving the PC.
Use Spyware cleaning software such as New: AdAware from New: Lavasoft. Scan for Spyware regularly.
In a corporate environment it is good practice to disable a users ability to install software on the PC.
Educate yourself and other users about what Spyware is and how it can be prevented.
Have your computer examined by a qualified computer technician who can access vulnerabilities and suggest ways of increasing your computer’s security.

 

In Conclusion

There are millions of useful websites on the Internet that survive exclusively due to their use of various forms of advertising. Internet advertising has evolved to the point where it is possible to aim advertising to a very precise target audience. This capability has brought with it a hornet’s nest of privacy and security issues.

A lot of the targeted advertising is possible because of Spyware software. Spyware is a tool that provides advertisers with data about a target computer and user. It is often installed accidentally or without the users knowledge. Spyware logs information about the user, possibly including passwords, email addresses, web browsing history, online buying habits, the computer’s hardware and software configuration, the name, age, sex, etc of the user, and sends this information to a third party on the Internet, usually an advertiser.

Advertising pop-ups, system instability, sluggishness, and increased hard drive and network activity are all symptoms of a Spyware “infestation”.

To prevent Spyware “infestations” there are some simple rules that a user should follow. They include such things as ensuring that Internet settings are set to at least default settings. The use of a good firewall, which monitors activity both in and out of your computer, can assist in identifying and preventing Spyware. Avoid installing peer-to-peer file sharing software and offers to install software that may pop-up on your screen. Educate yourself about Spyware and how it can be prevented.

For a thorough examination of your system and its vulnerabilities contact a qualified computer technician. They will be able to identify areas of concern and suggest ways to increase your computers security.

Glossary

ActiveX Control – A control using ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information. ActiveX controls have full access to the Windows operating system. With this power comes a certain risk that the applet may damage software or data on your machine. To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it.

Cookie – A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and possibly prepare customized Web pages for them. When you enter a Web site using cookies, you may be asked to fill out a form providing such information as your name and interests. This information is packaged into a cookie and sent to your Web browser which stores it for later use. The next time you go to the same Web site, your browser will send the cookie to the Web server. The server can use this information to present you with custom Web pages. So, for example, instead of seeing just a generic welcome page you might see a welcome page with your name on it.

Shockwave – A technology developed by Macromedia, Inc. that enables Web pages to include multimedia objects.

Spyware – Also called adware , spyware is any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.

 

Jul 25

Hours, Pick-Up & Delivery

So, because I work a full-time job on top of running this little business, I just don’t have the time or resources to keep an open office.

To make up for that, as long as you’re in my local area I offer free pick-up and delivery within ten miles of Leominster, MA.  Most of my time is spent in Leominster, although you’ll also find me in Gardner, Fitchburg, Acton and all the places in between.  Some people are more comfortable dropping their equipment off to me or meeting somewhere; that’s fine also.

I usually prefer doing most work in my home office.  This will guarantee I’ll have everything I need to complete the work efficiently.  There also tends to be a lot of down time in computer work, especially software and virus/malware cleaning, where I click a few things, adjust some settings, tell it to start a scan… and wait.  Some of these scans can take hours, and I think it would be preferable to both you and I if I weren’t sitting there like a lump looking like I’m not doing anything.

If you’d prefer I do work on site, that can be arranged, and sometimes things (usually internet related) absolutely must be done on site anyway.  We figure that out as we go.

I’m available most nights and weekends, and I don’t mind picking up your equipment early morning before work and dropping it off the same evening if I’m able to get everything done.  I also do like the occasional day off, but I almost always respond to emails and voice messages the same day.

Contact me, I’m pretty flexible.

Jul 23

Laptops, Smartphones, Tablets

So, as far as software goes, laptops are generally identical to desktops.  Y0u install software and configure programs the same way you would any other computer.

Hardware repair is a little different.  In general terms, installing memory (RAM), hard drives (storage) and most external devices is the same.

I can also replace most laptop screens.  I say most because there are a few that are just designed to be impossible for a third party as you need special tools and other considerations, so there are some I just won’t touch.  Alienware is one, anything Apple/Mac is another, and beyond that I would just need the manufacturer and model information so I can do a little research before taking on the job.

Smartphones and tablets I do on a case-by-case basis.  I won’t mess with Apple products, I’m not a certified Apple technician and there’s just too much that can go wrong during a screen replacement, sorry about that.

If you’re not sure, just fill out the form and I’ll let you know right away!

 

 

Contact me here for other inquiries.

Jul 23

Hardware & Peripheral Installation

Get a new printer and want to get it on your wireless network?  Maybe you bought a new video game, but your video card just isn’t up to par so you bought a new one, but you’re not sure how to install it or configure it.  Invested in one of those big IPS monitors and you don’t know which input you should use or how you should set the resolution?  Smart devices, network connected phones and tablets, smart watches, fitness gear, video game systems; I can help you with all of your upgrading and installation needs!

Just so you know, I generally do not have a stock of products.  I do keep some common items around (hard drives, memory) for smaller upgrades or repairs, but I usually order what I need when I need it and can get it within a day or two.

Here’s a list of the most common items I install, by no means is this complete.  If you have something you want done, let me know!

Internal

Hard Drive
Solid State Drive
Memory (RAM)
Video Card
Sound Card
Card Reader
Optical CD/DVD/Blu-Ray Drive
Network Card
And more!
External

Printers
Webcam
Scanner
Keyboard/Mouse
Monitors
Television
Sound System
USB Hard Drive
NAS/Media Server
Wireless Router
Access Point
Anything!

 

Older posts «