PCMOGAWAKO Computer Setup Preventive and Corrective Maintenance - Services
   site map

home
services
  TOS 
  on-call
  contact
  certs
  links
  values 

Services

If you have not read the Terms of Service, please do so now by clicking here.

As part of the growing demand for customer service, The PC Tech is glad to announce the creation of the following services. The old services posted here have been simplified and grouped together, while other types of services relating to safe computer use, networking, and security have been created to adapt to the changing demands of modern computer operation. Please take time to read the following and see if you or your organization can benefit from any of these.



preventive maintenance routines
Preventive Maintenance - various preventive maintenance routines have been created here in the past. Now, it has been simplified by making this as the new clean only service routine. Concentrating more on giving care to your hardware, making sure that all necessary routines are completed to lengthen its service life. Remember, in the final analysis, fixing your computer problems will always cost more the moment they appear. So, help avoid them by a regular preventive maintenance service.


hand helld tools
Hardware Setup and Troubleshooting - installs and configures your computer hardware and peripherals. Checks your PC for problems. Utilizes various tools in detecting hardware failure problems, like vendor related diagnostic softwares, hand-held tools and loop-back plugs, POST diagnostic card in detecting motherboard problems, as well as using advanced memory testing software. Network troubleshooting is also now being provided. Utilizing tools from basic cable tester up to the sophisticated network protocol analyzer in detecting network problems.


software tools, setup and updates
Software Setup, Update and Troubleshooting - install, updates, and troubleshoot your Windows Operating System, as well as those common applications bundled with it. Checks your system for the application of critical security updates, making sure your system is less prone to vulnerability attacks from intruders while connected on the Internet. The use of third party software is often times recommended to further enhance security.


software liability check
Software Liability Check - assists your company in determining your software liability. Brings to your attention softwares used in your organization that need proper licensing. Makes recommendation on what options are available to you, depending on your budget and your needs. The use of legal software is always emphasized.


checks your system for bugs
Bugs, Virus, and Spyware detection / removal - checks your system for computer Viruses, Trojans and Worms, as well as hiding malware -- more often called -- spywares. Uses various methods and third party tools in detecting and preventing system re-infection to ensure your safe computer use while connected on the Internet. The purchase of these third party tools are often times necessary. Please read the Virus Removal section of the Terms of Service before availing this.


secure e-mail communications
Secure e-Mail Communications - Sending unsecured e-mail on the Internet is like handing over your letter to just about anybody on the street for them to read. Securing your e-mail will not prevent hackers from seeing it. However, they could only see the locked message inside, should it fall in their hands. It will also prevent anybody from tampering with your e-mail undetected. Uses various e-mail technologies, from e-mail clients using secure e-mail protocols, the use of digital certificates for e-mail signing and encryption, up to utilizing secure e-mail service from third party providers. Again, please read the Terms of Service before availing this.


Computer Networking, Cabling and Internet Connection
Computer Networking, Cabling, and Internet Connectivity - connects your computers forming a network; layout cables or utilize wireless devices for local area networking; and connects your PCs to the Internet via currently available technologies like broadband, DSL, and dial-up-networking. Shares Internet connection to multiple-computers. Uses several hardware/software technologies in securing your network connection. Can also configure your network for remote access functionality.

 
Data Backup
Emergency Data Backup and Backup Policy - assists clients in creating a backup policy, which involves specifications for the backup software; backup hardware; backup media; backup schedule and scheme; backup testing plan; as well as designating administrative responsibility for the system. Also provides assistance in emergency data backup, using hardware technologies such as: removable backup drive, as well as the utilization of other removable recordable media.


The PC Tech is glad to customize any of the services to suit your needs. Feel free to 
send your requirements at any time. For the resolution of your current computer problems, please report it here.


   pizarra (12/24/06)
about piracy:
Why settle for counterfeit software? Do you know that only genuine softwares enjoy technical support and updates from their manufacturers? Why miss those precious updates? Pirated Softwares, aside from being illegal, will fail from time to time. Why subject yourself to needless headaches? Below are important links to see if you have paid for counterfeit software.

1. Is your Microsoft Software genuine? Please click here 
to find out.

2. For additional information regarding software piracy, or to report vendors selling one, please click
here .

announcement:
Important announcements have been made on the pizarra found on the main page. If you missed it, you may click 
here to get there.

user tips:
Working in a clean environment all the time makes your PC and your data safe.
Several minutes spent in cleaning your work area on a weekly basis help you in keeping your PC healthy. You can do this on a shorter or even longer time intervals, depending on how fast your place of work accumulates dirt.

Begin by dusting-off your PC's external case, your monitor, as well as your keyboard. Then, proceed with dusting the surrounding areas where your computer is located. You may choose, instead, to dust higher areas first, and then proceed to the lower ones.

As a tool, you may use a one and 1/2 inch size (or bigger) ordinary, unused, household paintbrush in sweeping-off dirt. The bristles
must be made of natural fibers. Avoid nylon, plastics, or any synthetic materials because these create static charge dangerous to your PC.

Always keep your paintbrush dry. When wet, it acts like a butter-knife spreading dust and grime to other areas. Be sure to gather the debris on a piece of paper or a cardboard serving as a miniature dustpan. You may then throw it later.

The exhaust fans or blowers inside your computer will suck-in what you are trying to remove. So,
be sure to turn-off your computer when you do this.

Sure, you may always wait until your office maintenance personnel do this for you. After all, isn't that's what they are paid for? But then again, no one could say if your computer has already gobbled-in dusts before they do. ;-) Remember, the data and the workstation you are saving is your own. Well, sort of. Somehow, like it or not, it is your headache too. Now you know what to do.

One final thing. Did I fail to mention anything about maintenance costs? (More company expense... Less profit... ...hmm) Ah, now you are getting the entire picture! ;-)

— justice, fairness, and humanity to others —

There is no genuine support for pirated softwares. Use only licensed softwares.
Copyright© 2006. All rights reserved.