I can be YOUR PC GEEK. I have worked with PCs for over 30 years and have 15 years of full-time professional computer experience. I am knowledgeable in all Windows operating systems from DOS through Windows 8; Server 2003 through Server 2012; in Hyper-V and VMWare ESXi as well as physical environments; and am a Microsoft Certified Technology Specialist (Windows 7, Configuration). |
Individuals and smaller businesses usually do not have their own "computer department" to assist with the wide range of tasks (and occasionally problems) associated with setting up and maintaining the computers which we all now rely upon. YOUR PC GEEK can fill this void by providing all of the services commonly provided by a corporate Information Technology (I.T.) Department plus much more. |
Whether your computing needs include basic system selection and setup, network & WiFi design and configuration, or troubleshooting, maintenance and support, you can call on YOUR PC GEEK to help you. |
|
YOUR PC GEEK can save you time and money by allowing you to
focus on your goals. While we provide the full range of services to
support your computing needs. |
|
Whether the help you
need is: |
|
|
Troubleshooting ,
maintaining or setting up your PC's or software |
|
Creating and
maintaining a computer network for sharing internet access, files & printers |
|
Creating and
troubleshooting WiFi networks |
|
Virus and Malware
removal |
|
Computer help over the
phone or remote access |
We can be your partner
to help you with all of your computing needs. |
|
|
Remote access and telephone support allow YOUR PC GEEK to serve you
from ANYWHERE! |
|
|
|
Contact YOUR PC GEEK: |
Phone: (440) 897-4112 |
|
|
Email: TheGeek@yourpcgeek.com |
|
Outline of “Best
Computing Practices”
1.
Back
up important files, regularly.
2.
Utilize
current antivirus software, properly configured, and updated accordingly
3.
Utilize
a software-based personal firewall, properly configured, and updated
accordingly
4.
Utilize
a router/firewall device for your Internet connection, properly configured, and
updated accordingly
5.
Practice
the principle of least privilege (PoLP)
a.
Operate
as a Standard User for normal tasks
b.
Reserve
Administrative Rights for planned installation tasks
6.
Update
your operating system with security updates
7.
Update
your applications with security patches
8.
Use
strong passwords or strong authentication technology to help protect your
personal information.
9.
Know
who you're dealing with online
a.
Do
not click random links
b.
Beware
unknown email and attachments
c.
Don't
download unknown/unverified software off the Internet;
i.
Don’t
install “enabling” software without verifying it’s trustworthiness
1.
Coupon
Clipper, Emot-Icons, etc.
2.
Pornographic web sites
3.
Illegal music (MP3) and movie downloading sites
4.
Software Piracy web sites
5.
Peer-to-peer file sharing programs and networks
ii.
Don’t click on suspicious web-site activity
1.
Pop-up and pop-under advertisements
2.
Fake anti-virus and anti-spyware tools
3.
Free games, screen savers, media players, etc.
4.
Malicious web pages with harmful scripts
d.
Don't
propagate hoaxes or chain mail
10. Beware links to
popular or titillating videos, images, etc.
a.
just
because it comes from a friend, does not make it safe
11.
Remove
unnecessary programs
12. Update your
skills and knowledge, constantly