About Me

My photo
Lithonia, GA, United States
Your Neighborhood PC Guy can solve your home PC, laptop and network problems without the high prices of the retail stores. Because "Your Guy" is your neighbor and works out of a virtual office, the prices are low and the service is friendly. I never charge by the hour, and my flat price is cheaper than one hour with the competition!

Simple Flat Rate Pricing

Home Visit - $50
- I'll come to you and complete the work at your home
Overnight - $40
- You drop it off or I'll pick it up

Your Neighborhood PC Guy is always about respecting customers by charging the guaranteed cheapest flat fee while still providing top notch customer service. All of this with a smile of course. : ) If I accomplish this, I know you will call me again when the time comes.

Thursday, July 14, 2011

How can you tell if your computer is infected?

I will describe some symptoms and indications of Virus infection:
  • Your computer has unwanted pop-ups informing you about computer infection. You aren't offered a safe way to remove the malicious files without paying;
  • You are redirected to certain websites to purchase fake security software;
  • You aren't able to access web site which offer antivirus software or any other security software;
  • You aren't able to use windows update to patch your system;
  • You can't access any Microsoft web sites;
  • Your search engine redirects you to web sites that have no connection with the thing you were searching for;
  • Running programs are closing by themselves;
  • Your browsing is slower then before, your internet connection is slower due to traffic that's  made by your computer but not by your genuine programs.
  • Limited or no access to Registry Editor(regedit), Task Manager (taskmgr.exe), Command Prompt (cmd.exe),
  • System configuration utility (msconfig), Group Policy Editor(gpedit.msc), Folder options, Internet Options and other features is denied;
  • In some cases you are denied to boot in Safe Mode or Safe mode with Networking;
  • You will notice decreased system performance because system's resources are used by hidden malicious software;
  • You can hear sounds in your speakers even if you aren't playing any music or movie files;  You system may restart without any warning;
  • Your installed programs stop responding frequently.

Note: These are common signs of infection, but these signs may be caused also by hardware or software issues, that have nothing to do with a computer virus.
In most cases once the computer is infected the user is denied access to various tools which can help him to disinfect the computer. If you find yourself in this kind of situation you will need to retake partial control of computer functionality to install a security software and run a full scan.

Wednesday, July 6, 2011

Recommended PC Maintenance Schedule


To keep your PC and network up and running all the time, just follow this recommended maintenance schedule.  Let Your Neighborhood PC Guy perform any of the following services for you.

Data Backup — Every Month
  • Data protection helps keep all your files safe.  Whether its pictures from a past vacation, important records or your MP3 collection, it’s imperative that you back up your files every month.  Let me help you transfer your files to a safe device or online service.
System Security Check — Every Three Months
  • My System Security Check keeps you protected from outside threats.  To ensure your machine is properly protected, get a System Security Check every three months through a complete System Analysis.  Your Neighborhood PC Guy will find out if your security protection software is doing its job.
PC Tune-Up — Every six months
  • Let your PC perform at its best.  Get a PC tune-up every six months and keep your system safe and clean from uninvited visitors like viruses & spyware.
Wireless Network Security Check — Every six months
  • Protect your network.  Just because your network is working doesn’t always mean it’s secure.  Your Neighborhood PC Guy will run a diagnostic on your network to check your settings, configurations and security features.

Tuesday, July 5, 2011

Prepping Your Computer for Disposal


Ready to give your old computer the heave-ho? Before you do, remember that computers often hold all kinds of personal and financial information that thieves could find valuable—passwords, account numbers, license keys or registration numbers for software programs, addresses and phone numbers, medical and prescription information, tax returns and other personal documents.
To ensure your hard drive doesn’t become a gold mine for thieves, there are things you must do before you shut down for the last time.

Save important files. Back up your files to an external hard drive or online backup service, or transfer them to a new computer. Drives as large as 1TB cost a little over $125 and there are good free and low-cost online backup options, such as Dropbox (2GB free), Carbonite (unlimited backup for $54.95 per year) or SugarSync (30GB for $49.99 per year).

“Wipe” your hard drive clean. When you delete a file, the file name is removed from the list of available files and the computer knows it can use that space to save new data. The old file data is still there, though, until it is overwritten. And the data can be retrieved with a data recovery program. To remove data from your hard drive permanently, it needs to be wiped clean—preferably overwritten multiple times with a dedicated hard-drive wiping program. For Windows PCs try Eraser (free) and for Macs try ShredIt X (free).
Ideally, you'll want to completely reformat your hard drive, as well. But if that sounds a little daunting to you, at least try to follow the additional steps we recommend below.

Uninstall your programs. Some programs, such as Microsoft Office, may contain personal information such as your name and address or other details. While others, such as iTunes, only allow you to install on a limited number of computers. So be sure to deactivate iTunes and uninstall any programs before disposing of your PC.

Delete your browsing history. Most browsers save information about your browsing history and, if you set them to, even your user names and passwords for sites you visit. So it is critical that you delete this information from your browser before disposing of your computer. For Internet Explorer, you click on the Safety tab and then Delete Browsing History. Make sure all of the check boxes are selected so everything gets removed. Repeat this for any other browsers on you computer—Firefox, Safari, Chrome.

Consult your employer about data disposal policies. If you use your computer for business purposes, check with your employer about how to manage business-related information on your computer. The law requires businesses to follow data security and disposal requirements for certain information that’s related to customers.

Once you have a “clean” computer, consider recycling, donating or trading it in – and keep the environment in mind when disposing of your computer.

Saturday, June 25, 2011

Safe Computing

Like the rules of road safety we teach our kids, the rules for safe computing are simple and well known:

1. Be very careful where you surf. To help you stay away from bad sites install a website rating browser plug-in like WOT and make sure you only visit websites rated "Green" by the plug-in.
2. Never click on email attachments from unknown sources however tempting and attractive such attachments may seem.
3. Only download files from trusted sources. These include:
  • Files hosted on reputable download sites such as download.com, snapfilescom, softpedia.com, majorgeeks.com and other similar sites.
  • Files mentioned in the editorial sections of major computer websites and publications such as PC World, CNet, Lifehacker and Gizmo's Freeware.
  • Open source software hosted on sourceforge.net, Mozilla.org and similar large open source sites.
  • Files available for download from Microsoft, Google, HP, Dell and other reputable vendors.
4. Never install programs obtained from P2P networks including BitTorrent, eMule, LimeWire and others as many of these files are infected with malicious programs. Some of these malicious programs are so powerful they are capable of overwhelming all your security defenses.
5. Never install programs that friends give you on removable media unless you have verified that they are clean by submitting them to free web based file scanning services such as Jotti or Virus Total.
6. Never accept free toolbars, media players or other unsolicited software offered to you by a website.
7.  If you are not using Internet Explorer 8 then I recommend you upgrade to this version or better still, switch to an  alternate browser such as Mozilla Firefox, Opera or Google Chrome.  All these have a track record for better security than Internet Explorer and are arguably superior browsers as well.
8. Seriously consider using a Windows limited user account (LUA) rather than a normal account with full administrator privileges. LUA will block the majority of malware including, among others, all kernel mode rootkits. More details here.
9. You should seriously consider creating a fresh installation of Windows and then back up your PC using a drive imaging program. Then if in the future your PC ever becomes infected you can use the drive image to restore it to a pristine, infection free condition. If you are using the Business or Ultimate versions of Vista/Windows 7 you already have drive imaging capabilities built into Windows. See here for details. If you're using other versions of Vista/Windows 7 you can find a number of free drive imaging programs here.

By following these simple rules the chances of your PC becoming infected will be dramatically reduced. Combine these practices with the security software suggested above and you are well on the way to safe, secure, infection-free computing.

The Most Important Security Advice of all

The task of protecting your PC from infection is similar to crossing a busy road unharmed.
There are two, very different ways of crossing that road:

The first way is to be very careful about where you cross and to be watchful and aware of the dangers. In other words, make sure you don't get hit. The other approach is to protect yourself with something like an army tank and cross anywhere, anytime. If you get hit, you rely on the tank to protect you.

Now no sensible person would adopt the latter approach to crossing a road, yet when it comes to computer security that's exactly what many folks do.

If you want real computer security, you need to adopt safe computing practices rather than rely totally on security products to protect you. No security product or combination of products can or ever will, provide perfect PC security just like no car can provide you with perfect road safety.  With both cars and PCs you need to be careful  in your own behavior.

Wednesday, June 22, 2011

Data Backup List



1. Backup Plan
Don't know where to start with backup? I do!
With this option, Your Neighborhood PC Guy will meet with you, evaluate your individual backup needs and provide you with the best backup plan for your situation. You will have the information you need to execute the plan yourself, or you can pick from the services below and have Your Guy do the installation and setup for you.

2. Set Up Automated Recurring Backup (Online)
Protect your valuable data off-site.
This service helps you choose the best online backup solution for your situation, then provides installation and setup of your choice and teaches you how to use it.

3. One Time Data Backup
A single backup is better than no backup at all!
This value-priced service will provide a 1-time backup of your precious photos, music, financial files, etc to a DVD. If you're not sure, Your Guy will help you to identify the data that should be backed up. This is available up to 9.4G of data. If you have more data than 9.4G to back up, choose the External Hard drive Backup Solution above.

Data Backup

Data backup is one of those things that people typically don't think about until its too late. Many people don't do it because it's too hard to keep up with, costs too much or they are blinded by all the choices out there. Don't risk losing your treasured photos, videos, music and financial files. Let "Your Guy" show you how simple data backup can be! Whether you need basic data duplication, off-site backups or a combination of both - let Your Neighborhood PC Guy offer you a plan that meets your needs and will give you peace of mind knowing your data is always safe and secure.

Individual Services List




1. Diagnostics
Computer not working right and you don't know why?
Duplicate and identify problem. Once you know what it is, you can decide what makes sense to do next.


2. Diagnostics (With data backup)
Computer not working right and you don't know why?
Duplicate and identify problem. Once you know what it is, you can decide what makes sense to do next.


3. Email Setup
Get your email working!
Troubleshoot or connect 1 existing and active email account to a PC


4. Software Install
Can't get that new software to work?
Determine compatibility for, install/repair and configure 1 software title, perform updates, create desktop, start menu and quick launch shortcuts.


5. Hardware Install
Just buy some new hardware?
Install an internal or external PC component, such as a graphics card, hard drive, optical drive, MP3 player, printer or scanner. Install any included software that is necessary for functionality on one computer. Configure the PC component for applicable use.


6. Email Backup to DVD
Don't risk losing years worth of email and contacts!
Back up your email and contacts from your email program OR from your online email (Hotmail, Gmail, AOL, etc) to a DVD.


7. Convert Email to web-based Gmail
Using a cloud-based (online) email system has many benefits over keeping it locally (on your computer). Create Gmail account, convert old email, set up transition plan from old email.


8. Setup External Hard drive Backup Solution
Copy your valuable data to a second location.
Advise and help you chose the best local backup solution for your situation. Configure software and explain its use.


9. Add a Device to your Network
Add a PC, iPhone, iPad, etc to your network and share files and the internet.


10. 1 hour PC training
An expert all to yourself! While basic advice is always free, this offering provides 1 hour of training on basic computer skills and the ability to have all your questions answered by an expert without having to spend hours searching the internet. This can also be used for advice in purchasing a new PC, so you can go shopping armed with the right information!


11. Virus/spyware removal
Troubleshoot computers and remove all viruses, spyware and malware. Repair any operating system issues, windows critical updates.


Individual Services

These individual services are to take care of single problems that you might be having with your PC or installations that you might not have the time or experience to do. Let "Your Guy" handle these quickly and cheaply.

Packaged Services List




1. Computer Tune-up
Make your PC run faster
Install Windows updates, system optimization, remove unwanted software.


2. Computer Tune-up with Security Add-on
Make your PC run faster and safer
All of the aspects of the computer tune-up plus antivirus & antispyware, migrating your browser to Firefox with security-enhancing add-ons and user account lock-down.


3. Home Networking
Get on the internet or get your computers talking
Set up your router & internet connection, network cards, security, and wireless. Set up sharing of internet, printers and media between two computers


4. New Computer Setup & Data Transfer
Get everything connected and working properly
Physically set up 1 PC system, including the computer, monitor, keyboard, mouse, speakers & printer. Configure to access existing internet and email account. Move data from old PC to new PC (up to 10G).


5. Complete Windows Reinstall with Data Backup
Sometimes the best thing for your PC is a fresh installation of Windows.
Backup your personal data, erase your drives, install a fresh copy of your Windows operating system & move your personal data back. Your PC will be as fast as the day you bought it. Includes Windows configuration and Security Package (#2 above). Original software can be reinstalled from your discs at an additional cost, or choose one of the Free Software packages.


6. Upgrade to Windows 7
Get the latest Windows operating system!
This is the same service as the Complete Rebuild above, but also includes the software to upgrade to Windows 7 Home Premium.
Not sure if you want/need the latest Windows or if your PC can handle it? Choose #5 and your PC will be evaluated for compatibility.


Package Deals

Your Neighborhood PC Guy's package deals group several related services together to enhance your home technology experience and make your PC or laptop run faster, more stable and secure. Custom packages created on request - just tell me what you need!

Your PC Guy Services

Some of the things that "Your Guy" can do for you include:

  • Backup & Online Storage
  • Computer Training
  • Computer Tune-up
  • Computer Setup
  • Data Recovery
  • Email Setup
  • Hardware Installation
  • Hardware Repair
  • In-Home PC Hookup
  • Mobile Broadband
  • Printer Setup
  • Printer Troubleshooting
  • Technology Consultation
  • Social Media Training
  • Software Install & Setup
  • Virus & Spyware Removal
  • Wireless Networking

Wednesday, June 8, 2011

Clean Up Old System Restore Points

I'll be covering a lot of PC maintenance in this blog, you may want to clean up old restore points to save space on your hard drive: I'll be posting info on that later -- Clean up old Windows System Restore Points.

Change and Limit System Restore Options

If you’d like to customize system restore options (i.e. how much space on your hard disk is taken by system restore), I'll be posting that info soon -- the post will be called: Change & Limit System Restore in Windows 7.

Recover Your System by Using a System Restore Point - Windows XP

Windows XP
  1. Click the Start button, click All Programs > Accessories > System Tools > System Restore.
  2. Select Restore my computer to an earlier time and click Next.
  3. Use the calendar to select a restore point from a time when your computer worked as it should and click Next.
  4. Save your work and click Finish.
  5. Restoring your system may take some time so be patient and ensure you do not disturb the process.

Recover Your System by Using a System Restore Point - Vista/7

Creating a restore point is a good start, but it is useful to know how to use the restore point if you need it. To restore your system from a previously created restore point:

Windows Vista/7
Click the Start button, type restore, and click on System Restore.
When the system restore dialog box appears, click Next.
Select the restore point and click Next.
Click Finish.

Restoring your system may take some time so be patient and ensure you do not disturb the process.

Create a System Restore Point in Windows XP

To create a Restore Point in Windows XP:
  1. Click the Start button, click All Programs > Accessories > System Tools > System Restore.
  2. Select Create a restore point and click Next.
  3. Type a name and click Next.
  4. Once the restore point is created, click Close.

Create a System Restore Point in Windows Vista/7

To create a system restore point in Windows 7 or Vista:
  1. Press the Start button, type system, and click on System in the start menu.
  2. When the system properties dialog box appears, click on System Protection in the left-hand menu.
  3. Select/check the drive on which Windows resides and click Create.
  4. Give your restore point a name and click Create.
  5. Wait while Windows creates a system restore point for you.
You are now ready to use a cleaning program or make other system modifications.

Create a System Restore Point to Protect You from Unwanted Changes

If you’re making changes to your system and using programs such as CCleaner or Advanced SystemCare, you should always make a restore point before. There is the argument that by creating a restore point you take up almost all the space you are freeing up when using these programs. This is true; however, cleaning your system can improve performance significantly and is good practice when using your PC.

In the next few posts you’ll learn how to:
  1. Create a System Restore Point.
  2. Recover your system by using a System Restore Point.
  3. Change and limit system restore options.

Doing It In 8 Easy Steps

Let’s get right into things; to clean and maintain your PC:

  1. Create a system restore point to protect you from unwanted changes.
  2. Backup your data.
  3. Keep Windows and installed software up to date.
  4. Find and remove malware.
  5. Uninstall unnecessary programs.
  6. Delete junk/temporary files.
  7. Optimize your system.
  8. Defragment your hard drive.

By following these steps, you’ll ensure your computer is performing at its best and is error free.

Because this blog is designed for beginners, instructions on manually tweaking your PC are not included. Such optimization tips require more advanced PC knowledge and, in many cases, are unfounded and can compromise the stability of your system. Instead, I will focus on tried and tested tools, which are easy to use and make maintenance an easy task.

Maintain Your PC

The internet is flooded with tips and advice on PC cleaning. Much of this advice urges you to buy useless programs that cost hundreds of your hard earned dollars! Look no further: you can follow this guide and get your PC clean without spending any money whatsoever. I do recommend programs, which have paid upgrades; however, I am confident these programs, when upgraded, are worth every penny.

Windows Update

Windows Update – A service provided by Microsoft that downloads updates for Windows and other installed components (i.e. Microsoft Office, Internet Explorer etc.) Updates are provided to improve performance and security.

Uninstall

Uninstall – To remove a program from your computer so that it no longer occupies space on your hard drive and cannot be used anymore. Uninstallation includes deletion of program files, registry entries, associations, supporting libraries, user data, plugins, extensions, and other features specific to a program.

System Optimization

System Optimization – The act of cleaning your PC and making changes to gain the most performance.

Temporary Files

Temporary Files – Files created by programs on your computer that are temporary. Thus, these files can safely be deleted after the program, which created them, is finished using them.

Spyware

Spyware – Spyware tracks a user’s activity by monitoring browsing habits and key board activity and can even take screenshots while you use your PC. This information is sent back to the creator or beneficiary of the spyware. Signs of spyware include: modified browser homepages, slow internet, and suspicious looking sites in place of legitimate sites (usually banking sites.)

Malware

Malware – The generic term used for all forms of software designed with malicious intent. Viruses, worms, spyware etc. are all forms of malware. The term virus is often used when malware should really be used as it describes all forms of malicious software.

Registry

Registry – A control center for your computer. Windows settings, individual program settings, and other important configuration information are stored here.

Junk Files

Junk Files – Similar to temporary files, but used to describe files left behind by programs—even after the program is uninstalled from your PC.

Defragment

Defragment - When you constantly add and delete files on your hard drive, they become fragmented.

Think of it like this: You have a library full of collections of books. Each of these collections represents a file on your hard drive. You take one book from the collection and put some sticky notes in the book and make it too big to fit back on the shelf–so you put it on the end. Every now and then you get a new book for a collection; these too need to go on the end of the shelf. You sell a collection and buy a bigger one to replace it. Unfortunately, the whole collection doesn’t fit in the recently made space so you put half in the space and half at the end of the shelf. You do this for years and you have a mess on your hands. Defragmenting “re-orders your book collections” in terms of your data, and makes access to them a lot easier.

Wednesday, June 1, 2011

Maintenance 101

Many terms in this blog may be new to you; I will make every effort to explain things in a simple manner that is easy to digest. Before we begin with solutions, I will present some key terms and phrases that will assist you as you work your way through the rest of my posts. These phrases are commonly thrown out by "techies", "nerdy" PC guys and not so "nerdy" PC guys in conversation and in online discussion forums, but it’s hard to know exactly what they mean.