I can be YOUR PC GEEK. 

I have worked with PCs for over 30 years and have 15 years of full-time professional computer experience.  I am knowledgeable in all Windows operating systems from DOS through Windows 8; Server 2003 through Server 2012; in Hyper-V and VMWare ESXi as well as physical environments; and am a Microsoft Certified Technology Specialist (Windows 7, Configuration).


Individuals and smaller businesses usually do not have their own "computer department" to assist with the wide range of tasks (and occasionally problems) associated with setting up and maintaining the computers which we all now rely upon. YOUR PC GEEK can fill this void by providing all of the services commonly provided by a corporate Information Technology (I.T.) Department plus much more.


Whether your computing needs include basic system selection and setup, network & WiFi design and configuration, or troubleshooting, maintenance and support, you can call on YOUR PC GEEK to help you.




YOUR PC GEEK can save you time and money by allowing you to focus on your goals.  While we provide the full range of services to support your computing needs.


Whether the help you need is:

Troubleshooting , maintaining or setting up your PC's or software

Creating and maintaining a computer network for sharing internet access, files & printers

Creating and troubleshooting WiFi networks

Virus and Malware removal

Computer help over the phone or remote access


We can be your partner to help you with all of your computing needs.


Remote access and telephone support allow YOUR PC GEEK  to serve you from ANYWHERE!




Phone:   (440) 897-4112


Email:    TheGeek@yourpcgeek.com





Outline of “Best Computing Practices”

1.      Back up important files, regularly.

2.      Utilize current antivirus software, properly configured, and updated accordingly

3.      Utilize a software-based personal firewall, properly configured, and updated accordingly

4.      Utilize a router/firewall device for your Internet connection, properly configured, and updated accordingly

5.      Practice the principle of least privilege (PoLP)

a.       Operate as a Standard User for normal tasks

b.      Reserve Administrative Rights for planned installation tasks

6.      Update your operating system with security updates

7.      Update your applications with security patches

8.      Use strong passwords or strong authentication technology to help protect your personal information.

9.      Know who you're dealing with online

a.       Do not click random links

b.      Beware unknown email and attachments

c.       Don't download unknown/unverified software off the Internet;

                                                              i.      Don’t install “enabling” software without verifying it’s trustworthiness

1.      Coupon Clipper, Emot-Icons, etc.

2.      Pornographic web sites

3.      Illegal music (MP3) and movie downloading sites

4.      Software Piracy web sites

5.      Peer-to-peer file sharing programs and networks

                                                            ii.      Don’t click on suspicious web-site activity

1.      Pop-up and pop-under advertisements

2.      Fake anti-virus and anti-spyware tools

3.      Free games, screen savers, media players, etc.

4.      Malicious web pages with harmful scripts

d.      Don't propagate hoaxes or chain mail

10.  Beware links to popular or titillating videos, images, etc.

a.       just because it comes from a friend, does not make it safe

11.  Remove unnecessary programs

12.  Update your skills and knowledge, constantly