| |
HOME
PC / COMPUTER REPAIRS
SUSSEX AND SURREY
We wont blind you with science! |
DOS recommend Open Office
click here to download
|
HOME COMPUTER REPAIRS & UPGRADES
Contact Us
01293 537827 |
CALL OUT
|
£20.00 |
LABOUR |
£40.00 |
WORKSHOP |
£20.00 |
PER HALF HOUR ALL
PRICES INCLUDE VAT |
|
Accessories
The towns in
which we will repair pc / computer equipment
ARUNDEL
BILLINGSHURST
BURGESS HILL
CATERHAM
CRAWLEY
CHARLWOOD
COPTHORNE
COWFOLD
CRANLEIGH
DORKING
EAST
GRINSTEAD
EDENBRIDGE
EWELL
EPSOM
FOREST ROW
GODSTONE
HAYWARDS
HEATH
HORLEY
HORSHAM
LEATHERHEAD
LINGFIELD
OXTED
PARTRIDGE
GREEN
REDHILL
REIGATE
SALFORDS
SOUTHWATER
WESTERHAM
|
We
offer a Home PC / Computer repair service in
Crawley, Horsham, Dorking, Reigate, Redhill,
Horley, Oxted, Caterham, East Grinstead,
Hayward's Heath, Burgess Hill, Partridge Green &
Billingshurst, West Sussex, & Surrey .
- All our engineers are
trained by the manufacturer.
Each engineer attends
manufacturers recognised training courses,
junior engineers are college trained, our
senior engineers all have in excess of 10
years experience.
-
We do not offer
"No fix, no fee" gimmicks
what we will do is attend
your site at a rate of £20 inc vat callout
fee plus £40.00 per half hour labour if we
feel that the repair is uneconomic we will
assess & quote for the repair, you
can then decide whether it is economical to
repair a machine. We will offer advice on
what alternative's (new & refurbished) that
we would recommend. We will then credit this
against a replacement should you wish to
purchase a new machine from ourselves.
Contact Us
01293 537827 |
PC dead,
|
Do you have any lights on the
front of the tower, if no then this is an
indication that the PC's power supply has
failed, replacement power supplies can supplied
and fitted from £35.00 (larger quieter power
supplies can cost up to £100) |
Very slow to load, |
The older the pc the slower
it will become, uninstall all unused programs,
run defragmenter, increase your ram memory
(memory upgrades start from £25 fitted), as a
last resort use a software pc cleaner (be very
careful here this is really a job for somebody
who knows what their doing) you can drop your PC
of at our office and we will clean it for you. |
Blue screen of
death,
|
This
is very serious something has corrupted your
pc's operating system this is defiantly a job
for the professional as the operating system
will need repairing. If you can start the
machine in safe mode (this is usually achieved
by re-starting the PC, during boot up repeatedly
press F8) once in safe mode you can try using
the system restore feature. |
Buzzing noise, |
Get the machine looked at
immediately, any kind of unusual noises can be
an indication of impending disaster, hard drive
failing, processor over heating! |
Keeps
switching itself off, |
Definitely an indication of
overheating, seek immediate assistance. |
No internet, |
Could be anything, firstly
check phone line and adsl filters, do you have
lights on your router, pull the power connector
out of the router wait 15 seconds and reconnect,
wait for 60 seconds and try to reconnect. Check
your local area connection, then call us. |
E-mail faults, |
Check all of the above, have
you got internet access, then call us. |
No sound, |
Are the speakers plugged in,
has the volume been turned right down, check
that the speakers have not been muted in control
panel. |
Corrupt
operating system, |
see blue screen off death |
Contact Us
01293 537827 |
Back to the top |
1.
|
Slim Optical Disk
Drive |
2.
|
Eject Button (for
ODD) |
3.
|
Microphone (Pink)
|
4. |
Headphone (Green)
|
5.
|
USB Ports
|
6.
|
Power On/ Off
Button |
7.
|
HDD Access LED
|
8. |
PC Power LED |
|
|
1.
|
PS/2 Mouse Port
(Green) |
2.
|
PS/2 Keyboard Port
(Purple) |
3.
|
VGA Port (D-Sub)
|
4.
|
DVI Port
|
5.
|
S-Video Port
|
6.
|
LAN Jack (RJ45)
|
7.
|
USB Ports
|
8.
|
Serial Ports |
9.
|
Line-In (Blue)
|
10.
|
Line-Out (Green)
|
11.
|
Mic (Pink)
|
12.
|
DC-In Jack |
|
|
Home
Networking / Wireless
Contact Us
01293 537827 |
The
PowerLine AV Ethernet Adapter lets you turn the
existing powerlines in your home or office into
a high-speed network. Now you do not have to
drill through the walls and climb through the
attic or cellar to install network cables just
use the wires that already run through the
building! from £39.00
Experience NEXT generation
300Mbps wireless and gigabit wired networking
What does RangeMax™ NEXT Wireless Router –
Gigabit Edition do?
Complies with draft 802.11n,
backwards compatible and with 11b/g WiFi
Delivers a Steady-Stream
connection for all of your PCs and applications
Interoperates at 300Mbps with
other products with TopDog
Maximizes wired performance
with Gigabit ports Ensures optimum performance
and maximum coverage with preset internal
antennas
Back to the top
|
Hardware Upgrades
Contact Us
01293 537827 |
- Memory upgrade from £20
- Hard Drive upgrade from £40
- Graphics upgrade from £30
- Silent running
- Blue-ray
- Operating Systems
- Monitor upgrades
- Extra USB sockets
- Front mounted Media Card readers
- Web Cams
- Skype
- Power supplies
Back to the top |
Network Storage
Contact Us
01293 537827 |
Combining
a heavy-duty power supply and cooling system,
quick-swap SATA hard drives, and Gigabit
Ethernet networking, TeraStation Live allows
users to have a simple, cost-effective data or
media server to their office or home network in
literally minutes without cutting corners on
features or expandability. Buffalo's TeraStation
Live Multimedia Storage Server NAS offers
powerful DLNA Certified multimedia server
solutions for both the SMB and consumer markets.
With its sleek, aesthetic design and
ultra-silent operation, the TeraStation Live
will get envious looks whether it is located in
a busy office environment or on the
entertainment system in your living room without
adding any distracting fan noise or taking up
much space. TeraStation Live is best suited for
home and SOHO users who want reliable RAID 5 NAS
and the ability to stream multimedia content to
their entertainment devices.
Back to the top |
Laptop Upgrades
Contact Us
01293 537827 |
- Memory upgrade
- Hard Drive upgrade
- Operating Systems
- Mobile data
Back to the top |
Malware Threats
Contact Us
01293 537827 |
Malware
takes many different forms.
Here are the top offenders:
Viruses:
As malicious programs that
are buried within an
existing program, viruses
replicate themselves and
spread from machine to
machine. Viruses are a top
malware headache, generating
everything from relatively
harmless prank messages to
commands that destroy
valuable programs and data.
A virus may activate
immediately or lay dormant
for a year or more before
attacking its host system.
Worms:
Worms and viruses are
similar in that they both
self replicate. But a worm
is designed specifically to
spread extremely rapidly and
surreptitiously. It can hurt
a system by rapid
reproduction, sucking up
storage and memory resources
or network bandwidth. It may
also deposit a Trojan horse.
Trojan horses:
Like a virus, a
Trojan horse is a
destructive program that
presents itself as a
harmless application. Unlike
viruses, however, Trojan
horses don't replicate
themselves. On the other
hand, they do perform one or
more destructive tasks once
activated, such as stealing
identity or financial data.
A Trojan horse may also be
designed to make its host
more vulnerable to future
attacks or simply activate
to destroy hard-drive
applications or data.
Typically, Trojan horses
gain access to systems by
masquerading as a useful
program or item.
Rootkits: A
rootkit is a specialized and
particularly dangerous from
of malware. Rootkits
essentially subvert the core
operating system and its
loading mechanisms,
inserting their own code
into the basic core software
operating the system. This
makes them extremely
difficult to detect and
eradicate.
Backdoors or
Trapdoors: A hidden
bypass to a program's
security area, a backdoor or
trapdoor may be created by a
programmer to expedite
troubleshooting or for some
other innocuous purpose. But
once discovered, the
technique may be used by an
attacker to damage, destroy
or steal data. A program
with a known backdoor or
trapdoor may itself be
considered malware.
Spam:
Unwanted email, besides
being a nuisance, is often
used by attackers as a tool
for leading unsuspecting
recipients to Web sites
where viruses, worms,
spyware and other types of
malware can be installed on
their systems.
Spyware:
Spyware is software
surreptitiously installed on
a computer to send
information about a user's
Web-surfing habits to an
external location. Some
spyware is relatively
innocuous, designed to
generate data about
shopping, viewing or other
habits without revealing the
identities of individual
users. Malicious spyware,
however, may be used to
hijack Web browsers in order
to change their home pages,
receive waves of pop-up ads
or ignore user navigation
commands.
Botnets:
Armies of "zombie" computers
infected by a Trojan horse
and commanded by an
attacker, botnets can be
used to launch spam email
campaigns, viruses or DDoS
(distributed denial of
service) attacks on Web
sites for either amusement
or extortion purposes.
Typically, these botnets are
built up secretly over
several months before being
activated.
Malware Protection DOS
recommend
AVG Antivirus
Since
malware consists of multiple
threats, many methods and
technologies are employed to
safeguard systems.
Firewalls, for example, are
used to filter out
potentially destructive
data. Spam filters, spyware
blockers, IDSes (Intrusion
Detection Systems) and IPSes
(Intrusion Prevention
Systems) are other popular
tools are used to fortify
networks and their computers
against potentially
destructive data. Anti-virus
programs, one of the most
powerful anti-malware
defenses, are designed to
protect computers from the
threats posed by many common
types of malware, including
viruses, worms and Trojan
horses. Over the past
several years, anti-virus
software publishers have
gradually enhanced their
products to provide
protection against a growing
number of malware threats,
such as spam and spyware.
The malware threat has
multiplied over the course
of many years, and it's
highly unlikely that the
problem will vanish soon, if
ever. It's therefore
important for businesses to
carefully create an IT
defense system that includes
tools covering the full
spectrum of malware threats.
Back to the top
|
| |
|