Services
|
Complete
Computer Repair!
|
|
24/7
Onsite Computer Service
We are able to
come to your office and home to perform these tasks. In Canada, especially
in the winter it is advisable to maintain equipment at a constant temperature
and not take it outside to a vehicle if possible. In the summer a computer
is affected by the heat and humidity. ICI Computers can tailor a maintenance
contract to suite your business or personal needs.
On-Site Support
On site support means that we will come to your business premises or home
to help you with your computer problems. You will not have to bring your
faulty computer or equipment to us, we will come to you. If practical
we will repair, upgrade or resolve your problem at your site thereby cutting
down the time that your computer will be out of action.
If the problem
is too complex or activities required are too disruptive to your business
or home environment, then we will take it to our shop for servicing. We
can sit with your staff or yourself and work out any problems by reviewing
the symptoms and the procedures that took place prior to identifying that
there was a problem. At a personal level we can show how to avoid usage
or procedural problems that may have caused the problem to start with.
We use many different
channels to support you and your users: phone, onsite service, secure
remote screen sharing, and e-mail. These technologies enable us to fix
your problem as quickly and cost effectively as possible.
ICI Computers
can go a lot further that troubleshooting your computer problems. We can
be part of your business team, a virtual IT department, on a part-time
basis helping you plan your technology solutions, implementing them and
ensuring that you are ready for your growth. We can help you to move a
computer, enhance you network, upgrade your modems or hubs. We will do
any of those operational tasks that would normally be done by a computer
operations department.
ICI Computers
is as far as a telephone call away. Alternatively, we can set up a maintenance
contract whereby we visit your site every week or month for a few hours
to check things out and do regular maintenance.
Call ICI Computers
to see how you can save on computer operations staff and how we can support
your everyday computer needs.
Key Benefits
Cuts down on the time you are without your computer
Personal involvement of the user that found the problem.
Cuts down on the time you need to deliver and pickup your computer
Reduces the requirement to hire full time computer operations staff
Training
Training is one area of expense that immediately brings benefits to an
organization or to an individual. The immediate results are the ability
to work more effectively, optimize the functionality within a software
product and save time.
Software packages
offered today are very complete and usually contain more functionality
than the average user of business requires. By relating the software to
the way you do business we can selectively train you in the functions
that you need, not in the functions that you will rarely or never use.
We can customize
a formal or informal training session for you or your staff at your site
using your software and your computers. Part of the training plan can
be setting up real data and real situations so that after we have finished
you will be able to continue the process with confidence.
Key Benefits
Understand the functionality or capability of a product as it relates
to your business
Learn how to use it in your environment
Learn how to fit the product within your job
Troubleshooting
Troubleshooting is just part of the ICI Computers everyday activities.
If you have a problem with your computer we are the ones to call. We address
each problem with a background of experience and training, following time
proven steps to determine what the problem is and how it was caused. We
then fix the problem and will tell you all the facts that you need to
know that may prevent the problem from occurring again. We can even give
you a written report on the problem with the solution steps we took, so
that you will have a record for future reference.
Our network of
troubleshooters all have access to each other through the internet and
we help each other out with those difficult problems that crop up every
now and then. We can email a problem to all our troubleshooters and very
quickly get several responses. We also have access to knowledge databases
that are continually growing as solutions to problems are recorded.
Key Benefits
We can solve just about any technical problem
We have the experience of all troubleshooters in our network
We can troubleshoot your problem quickly
Fault
Location
Many times a user can be frustrated by a something that is happening with
the computer that is obviously not right. It may be a hardware or software
fault but it is not readily obvious to the user. Much time is lost and
eventually it will need the attention of a professional to fix it. Why
not call us to find the problem for you and save yourself some time. The
cost of interrupted business may be more that the cost of the service
call anyway.
Our maintenance
agreements can provide an economical way of addressing all your computer
problems and fault location. With a maintenance agreement we may be able
to help you over the phone without having to charge you for a visit.
Fault location
becomes more critical in older computers as they wear out and become obsolete.
Many parts are not in stock anymore and are difficult to find. We will
advise you of the availability of parts and assess your alternative solutions.
Key Benefits
Reduce business interruption time
Lower employee or user frustration level
Reduced overall computer maintenance costs
Virus Removal
A virus is a program designed to corrupt other programs and alter
the way those programs work. The impact of a virus can range from making
your computer crash when a certain key or series of keys is pushed, to
deleting important files, and to the extreme: possibly rendering your
computer inoperable.
Viruses embed
themselves into the code of software; they are harmless until the infected
program is actually started (executed). Once you have started an infected
application or opened an infected file, the virus in it can spread to
other applications and files on the computer. If this happens, software
or files you send to friends, family, or coworkers via diskette, the Internet,
or Local Area Network may be infected, passing the virus to their computers.
Are
all Viruses Harmful?
Every computer virus ever written
takes up disk space, and many of them are able to remain in the computer's
memory taking control over some computer functions. In addition, some
viruses are poorly written and may cause the computer to halt, or damage
files. Many viruses make the computer's memory unstable, or cause programs
to run improperly. Then there are viruses created in recent years that
have been deliberately designed to destroy data on the disk. Sometimes
viruses will even be on a timer and won't start replicating until a certain
time or date, like the April Fool's bug, the millennium bug, etc.
Viruses cause strange things to happen including: slower processing, decreased
memory, a disk drive LED lighting up for no apparent reason, or even a
screen going blank when you touch a certain letter on your keyboard .
However, legitimate software can also cause these effects. And while some
viruses are very obvious, displaying messages, or even playing musical
tunes, many give no sign of their presence. So it's important not to assume
your computer is infected, just because strange things happen.
Anti-virus software is not a cure all. There are many viruses that Anti-virus
software may not even recognize on your computer. There are also many
instances where Anti-virus software may be able to recognize a virus,
but not be able to do anything about it. This can be frustrating when
you purchase software that supposed to fix your computer, only to find
out it can't help you with your particular situation.
Trojan:
program that appears desirable but actually contains something harmful;
"the contents of a trojan can be a virus or a worm"; "when
he downloaded the free game it turned out to be a trojan horse"
Malicious code that hides behind a legitimate programs waiting for a certain
time or a certain program to be ran to release itself.
What is Spam
Alert and how to prevent spasm: Recent research estimates that
80 percent or more of all e-mail sent these days is spam. An astonishing
figure, yet you may see only a tiny portion of that deluge.
Many Internet Service Providers (ISP) or e-mail programs provide junk
e-mail filters that can serve as the first line of defense against spam.
For example, MSN Hotmail uses patented Microsoft SmartScreen Technology
and other tools to keep more than 3.2 billion (yes-billion) messages from
reaching its customers' e-mail accounts every day.
You, too, can take advantage of technology to help you deal with the spam
that evades these filters.
Spyware
& Adware Removals
Spyware:
A general term for a program that surreptitiously monitors your actions.
While they are sometimes sinister, like a remote control program used
by a hacker, software companies have been known to use Spyware to gather
data about customers. The practice is generally frowned upon.
Secret code hidden in an otherwise harmless program. Spyware permits unauthorized
access to a computer, allowing someone else to observe the user, read
data, or even control the computer. Open source is transparent, so it's
nearly impossible to hide spyware.
Identifying and
blocking spyware's adbots
The term "spyware" is a slang which is not well defined. It
is commonly used mainly for various adware (and adware is a program that
is supported by presenting advertisements to the user), and that during
their installation process, they install an independent program which
we shall call "adbot". The adbot runs independently even if
the hosting adware is not running, and it maintains the advertisements,
downloads them from the remote server, and provides information to the
remote server. The adbot is usually hidden.
There are many
companies that offer adbots, and advertisements services to adware.
The information that the adbots deliver to their servers from the computer
where the adbot is installed, is "how much time each advertisement
is shown, which was the hosting adware, and whether the user clicked on
the advertisement. This is important so that the advertisements server
will be able to know how much money to get from each of the advertised
companies, and how much from it to deliver to each of the adware maintainers.
Some of the adbots also collect other information in order to better choose
the advertisements to the users. The term "spyware" is more
generic, but most of the spyware fall into this category.
Adware: Adware can do
a number of different things to your system. It can monitor and profile
your web usage and direct pop up ads based on your surfing habits. most
peer-to-peer file sharing programs come bundle with Adware and the user
is only notified of this is in the fine print of the End User License
Agreement. Adware is not as dangerous as other infections, but it can
be incredibly annoying. These are the types of programs that download
files onto your computer by saying they are necessary for certain websites
to work.
Backups
Data Backup and Storage are essential to ensure recoverability of lost
or corrupted data. Think of it as an insurance policy without an insurance
company. It is very rare that data is lost or corrupted but it is something
that can happen at the most annoying or inconvenient time. In the corporate
world, planning for possible data loss may be part of the disaster recovery
plan. Our service examines the type of data that you are using in the
course of your business or at home. Then we sit with you to establish
a plan that will satisfy your needs. Backups of your programs is already
taken care of by having the software on CD-ROM or Diskette. The data that
you need to store consists of those transactions and records that you
created or calculated yourself. They may be accounting files, spreadsheets,
inventory records, payroll detail, letters or other key business records.
At home it may be personal financial records, letters, photographs, projects
and other records that are of value and that you would have a hard time
replacing.
Our service will:
Identify data that you cannot afford to lose as it will disrupt your business
or life
Identify the volume and size of data to define storage requirements
Identify the best storage media for back ups
Organize your directory and folders to simplify the backup of data
Acquire and install the necessary storage media
Set up back up procedures and schedules
Arrange for off-site storage if required.
Key Benefits
Ensure that any computer hard drive problems cause a minimum disruption
All valuable data is recoverable regardless of the severity of the disaster
If your data is attacked by a computer virus you can still recover
Networking
Computer Networking is the direction that technology is taking us. Stand
alone computers are limited in the benefits they can provide compared
to two or more computers that can communicate with each other, shares
hardware resources and data. The basic introduction to networking for
most users today is through access to the Internet. The Internet is accessed
using a modem and a communication network through your telephone line
or cable company. It allows a user to see or share data on another computer
on the internet. This has evolved form the early days when networks were
private with limited access. These local area networks (LAN) are now affordable
and easy to install in small businesses and in homes. Networking has come
a long way.
A LAN can be installed using you existing telephone wiring or by running
separate cables between your computers. By having you computers connected
this way you can share data and files, share a common printer or have
multiple printers shared by everyone. If you have internet access on one
computer you can let other networked computers access the internet through
the same modem.
In today's networked computing environment, with geographically dispersed
employees and customers, success means staying connected with optimal
performance. Keeping your network fast, reliable and secure is the key
to streamlining your business, reaching new markets and gaining the competitive
edge you need to increase your revenues.
When it comes
to networking in the business environment, no two companies' requirements
are the same. That's why we design your network based on your needs. ICI
Computers have a great deal of experience setting up networks in the office.
We provide consulting, setup, preventative maintenance and repair of your
network. There are many different ways to network your computers. We will
work with you to help you decide the best way to connect your computers.
ICI Computers can professionally install network cable and jacks with
wall plates. We also install server software, network interface cards,
switches, and wiring closets.
Whether you are looking for Inter-Building Wireless, Building-to-Building
Wireless, LAN, WAN, or Remote connectivity, The ICI Computers can install
and maintain the solution that is designed for your needs.
ICI Computers has an array of services geared at creating, maintaining
and upgrading many different types of networks. We can do performance
tuning, network wiring, server setup, remote support, backup management,
as well as many other services to keep your business up and running. Phone
us for a free consultation.
Network Advantages:
- Do you want Internet access
for everyone at home or in the office?
- Would you like to send
e-mail to coworkers and clients?
- Do you share files with
others?
- Are there more computers
than printers in your office?
- Do you need to back up
files for all your computers?
If you answered
yes to any of the questions above, then a network installed in your office
can save you time, money, and hours of frustration, while providing increased
productivity, greater communication, higher security, and peace of mind.
It doesn't matter what size your company is. A network can be beneficial
to both small and large companies.
Increase Productivity:
Networked computers can share resources
files, databases, printers,
modems, scanners, or any other peripheral. Sharing files and databases
decreases data entry time, while simultaneously increasing data input
accuracy and productivity. Text files can be shared and re-used in other
documents. Logos and custom headers can be copied from one document to
another, creating a unified corporate appearance throughout your entire
office. Networking increases productivity.
Communicate:
E-mail provides you and your employees with a quick and easy way to communicate
with coworkers, customers, and vendors! No more "phone tag".
You can even send attached files, including graphic images, reports, and
invoices. Networking helps you communicate.
Save money:
Using a network, the entire office can access a single printer. No need
to buy modems for every computer; access e-mail and the Internet over
your network. A tape or CD rewritable drive, centrally located on a server,
can back up files on every computer in the office. A single scanner can
process documents and graphics for everyone, transferring the scanned
files to the appropriate computer. Save money on hardware peripherals
and Internet connections! Networking saves you money.
Parts Replacement
Nowadays many computer parts are cheaper to replace than repair. However
the modular construction of computers does allow us to change a single
component or part very quickly and relatively cheaply.
Every now and then a part will need replacing in your computer or in one
of your peripherals such as a printer or scanner. The size, sensitivity
and fragility of many parts makes it a difficult task for those that are
not trained or experienced in parts replacement. You may put in a part
incorrectly and break or damage it and then have to buy another one. Let
us handle these problems for you.
Our technicians can replace
anything from a motherboard, a CPU to an ink cartridge for you. We will
first check for the correct part and the need to replace it and then pick
it up for you from a local supplier or order it so that you do not have
to worry about it. We will advise you of the cost of the replacement part.
After the part has been replaced we will test it to ensure that it is
working properly or as expected.
Key Benefits
Parts will be installed correctly and tested
Reduced possibility of damage to components
Reduced expense due to not replacing a part that was OK
Software Installation
Although software is usually easy to install by following the vendors
instructions, occasionally you may run into software that requires that
little extra knowledge. Here we can help you with the install or reinstall
of software and check out that it works.
Many software packages cause
internal conflicts after they are installed. We can analyze the conflict
and advise on the best way to resolve it. After the install we can go
through some basic training on how to use the software so that you can
get up to speed more quickly.
Key Benefits
Reduced conflicts between software packages
Brief training on how to use the new software
Reduced time spent on resolving problems
Firewall Protection
A firewall is a tool that monitors communication to and from your computer.
It is a security system intended to protect an organization's network
against external threats, such as hackers, coming from another network,
such as the Internet. It sits between your computer and the rest of the
network, and according to some criteria, it decides which communication
to allow, and which communication to block. It may also use some other
criteria to decide about which communication or communication request
to report to you (either by adding the information to a log file that
you may browse whenever you wish, or in an alert message on the screen),
and what not to report.
Identifying and blocking remote access Trojans
Perhaps the most common way to break into a home computer and gain control,
is by using a remote access Trojan (RAT). (sometimes it is called "backdoor
Trojan" or "backdoor program". Many people simply call
it a "Trojan horse" although the term "Trojan horse"
is much more generic).
A Trojan horse, is a program that claims to do something really innocent,
but in fact does something much less innocent. This goes to the days where
the Greek soldiers succeeded to enter through the gates of Troy by building
a big wooden horse, and giving it as a present to the king of Troy. The
soldiers allowed the sculpture to enter through their gates, and then
at night, when the soldiers were busy guarding against an outside attack,
many Greek soldiers who were hiding inside the horse went out and attacked
Troy from the inside.
This story, which
may or may not be true, is an example of something which looks like something
innocent and is used for some less innocent purpose. The same thing happens
in computers. You may sometimes get some program, via ICQ, or via Usenet,
or via IRC, and believe this program to be something good, while in fact
running it will do something less nice to your computer. Such programs
are called Trojan horses.
It is accepted
to say that the difference between a Trojan horse and a virus, is that
a virus has the ability to self-replicate and to distribute itself, while
a Trojan horse lacks this ability.
A special type
of Trojan horses, is RATs (Remote Access Trojans, some say "remote
admin Trojans"). These Trojans once executed in the victim's computer,
start to listen to incoming communication from a remote matching program
that the attacker uses. When they get instructions from the remote program,
they act accordingly, and thus let the user of the remote program to execute
commands on the victim's computer.
To name a few famous RATs, the most common are Netbus, Back-Orifice, and
SubSeven (which is also known as Backdoor-G).
In order for the attacker to use this method, your computer must first
be infected by a RAT.
Prevention of infections by RATs is no different than prevention of infection
by viruses. Antivirus programs can identify and remove most of the more
common RATs.
Personal firewalls can identify and block remote communication efforts
to the more common RATs and by thus blocking the attacker, and identifying
the RAT.
Blocking and identifying other
types of Trojans and worms
There are many other types of Trojan horses which may try to communicate
with the outside from your computer. Whether they are e-mail worms trying
to distribute themselves using their own SMTP engine, or they might be
password stealers, or anything else. Many of them can be identified and
blocked by a personal firewall.
Think your computer has a Virus?
SCAN NOW
with
FREE House Call
FREE Online Virus Scanner
|