FAQ (Frequently Asked Questions)

Table of Contents:

Performance and Mantenance

Wireless Networking

Viruses/Malware

Website Development

Miscellaneous

Performance and Maintenance

  • Question:

    • My computer has been running very slow lately. Is there anything I can do?
  • Answer:

    • Why yes, there is! If you are feeling adventurous, you may take some basic steps to clean up your data and speed up your computer, without costly repairs. Keep in mind, these steps should be done on at least a monthly basis to keep your PC running fast and clean. The procedures are as follows:

      Program Clean-up

      One of the most basic things you can do to speed up your computer is to start by uninstalling whatever programs you don't use. These include old programs/games not used anymore, or can be substituted by other programs already being used more frequently, as well as any and ALL toolbars that may have been installed on your internet browser. Yes, these toolbars may, at times, seem helpful. The truth is, they do more harm than help, and are better off not being installed in the first place.

      Data Clean-up

      Find whatever documents you don't use anymore, such as projects, homework from two semesters ago, any work-related documents that may not be relevant or necessary anymore, and either delete them or send them to an outside archival source, such as an external hard drive or CD/DVD.

      Hard-drive defragmentation

      This can be a bit more advanced for users who aren't familiar with this tool. Windows comes with a tool that will scan your hard drive for any broken, damaged, or "Fragmented" files and fix whatever it can. This is NOT to be confused with Windows' Check Disk, which scans your hard drive for corruption and fixes errors in the filesystem. To run Defragmentation, go to the bottom-left corner of your screen, and click on the "Start" menu. From there, go to All Programs>Accessories>System Tools>Disk Defragmenter. When the window comes up, click on the "Analyze" button, and let Windows scan your Hard Drive for fragmentation. Once completed, a message box will appear, telling you that "You need to Defragment this volume," or "This volume does not need to be fragmented." Either way, it is another step to cleaning your PC that should also be done on a regular basis.
  • Question:

    • I have a friend who knows someone that knows computers, and he says that I should go through my registry with X program and clean out whatever it says. What is the Registry, where is it and how can I find it? Is this even safe?
  • Answer:

    • NO. The Windows Registry is a very sensitive, very volatile list of anything and everything installed in your computer, as well as computer settings, individual user settings, and network settings. Trusting a program you've never heard of to go through the registry - especially because someone that knows someone said to try it - is very dangerous. This can also lead to your computer freezing, programs can stop responding, or opening certain files, amongst many other issues. When it comes to something as sensitive as the Registry, it is best to just leave it to more advanced professionals like us. If your computer gets error messages that you can't explain, it is best not to go mucking through the Registry just because you might have heard from someone that knows someone who tried something that worked for them.

    Wireless Networking

  • Question:

    • I just got a new internet connection/laptop/netbook/nettop, and I want to go online wirelessly. What can you do to help me? How is everything set up? What if I can't get signal in certain parts of my house? How secure is the wireless connection?
  • Answer:

    • Glad you asked! In fact, wireless networking has become a staple of today's household, and any home would seem incomplete without it. We use specially-customized wireless routers tailored to your specific needs, whatever they may be. A certified tech will first go to your residence to perform an evaluation to determine exactly what you may need installed. We then customize your setup in-house, followed by installing the equipment at your residence. Each piece of network equipment we deploy comes with a 12-month limited service plan to ensure you get the most out of your wireless network.
    • If you can't get wireless signal in certain areas your house, we then set up something known in the industry as a Wireless Repeater. This piece of networking equipment will intercept, amplify, and increase the range of your wireless signal, giving you access to your home network anywhere throughout your house, with the same speed and reliability as if you were sitting right next to the router itself.
    • When it comes to your security, we take no risks. Our three-step security keeps all of your data safe and secure. Using Industry-Standard techniques, we ensure that your internet access is safe and sound. First, we are sure to make the wireless signal encrypted throughout your entire network, so there is no chance that a hacker can intercept your data over the air. Also, we work with you to create a strong, personalized password, so you can control who has access to your internet and who doesn't. Lastly, we hide your network broadcast, so it can't even be seen unless you give out the name of the network specifically to whomever you give access to.
    • For more information about our wireless networking services and security, or for more detailed security options, please send us an e-mail at Support@TLGSolutions.net.

    Viruses/Malware

  • Question:

    • HELP! I have a Virus on my computer, and I can't get rid of it! Is there something you can do, or is my data all gone?
  • Answer:

    • Have no fear, virus removal is our forte. You may visit our Virus Removal page here for more details on our procedures.
  • Question:

    • How did I get this virus? What kinds of viruses/malware are out there? Should I be concerned? What can I do to protect myself?
  • Answer:

    • Unfortunately, there are many ways a user can get a virus on their computer these days. It can be through opening an infected e-mail, a website laced with malware, illegal downloading of music and/or videos, or downloading/running an unfamiliar program packaged with malware.
    • There are many kinds of computer viruses in the internet today, with more being created every day. For now, we will cover the most prominent viruses you should be aware of.
    • Scareware:

      As we have referenced on our Virus page, these types of viruses mask themselves as a fake/rogue antivirus program. Usually, the common names are as follows:
      • XP Antivirus 2011
      • Vista Security Center Pro
      • Windows Security Center (This one is tricky!)
      • XP Defender
      These names are just examples of rogue software. Normally, the virus will give itself an interface that is reminiscent of a real antivirus program, and begin a fake scan of your computer. Upon scan "completion," the virus will tell you that your computer is infected with X amount of viruses and to clean it immediately. After providing you with links and various other tactics, the virus then directs you to some variant of a credit card entry screen, where it tells you to purchase the "program" for a certain amount of money (Monetary value changes with each virus, usually between $29.95 and $59.95). The information is then transmitted to the hacker that originally wrote the virus, and now your credit card information, date of birth, (possibly) social security number, home address, and whatever other information you may have provided is available to anyone.

      Trojan:

      A Trojan virus is one of the most popular viruses used by hackers around the world today. Disguised as something friendly or harmless, Trojans sneak into your computer and wreak havoc on your hard drive. They do an abundance of different tasks, including:
      • Deleting/modifying important system files and databases
      • Hijacking personal address books and e-mail accounts, sending out virus-laced messages to your contacts
      • Stealing personal information such as stored passwords, financial information, and even work-related documents
      The largest distribution method for these types of viruses are through music/video downloads (Example: Limewire, BitTorrent, etc...), unfamiliar program installations, infected e-mails and IMs, and infected websites using code exploits.

      Worm:

      The triumph of international hackers, Worms spread from computer to computer without any interaction from the user at all. You won't even know it's there. Worms can do a variety of different tasks, such as:
      • Deleting personal files
      • Opening "backdoors" and downloading other viruses to infect the system
      • Use the infected systems to attack governments/organizations
    • While it is prudent for any user to be concerned about online safety, there is little to fear. The chances of being infected are as high as ever, but as long as you follow some basic steps to online safety, the risk is exponentially reduced. Some of the things you can do include the follwing:

      Stay up-to-date with current antivirus definitions and system updates

      Whatever antivirus program you are using, it is always important to keep your virus definitions up to date. This can be done by simply opening up your antivirus program, and clicking the "Update" button. "What are definitions" you ask? Virus definitions are coded, updated lists that are created by your antivirus company and applied to your antivirus program. These definitions provide your antivirus program with specific behaviors to look for while actively monitoring your computer for threats. Also, you can make your operating system periodically check for updates to core system files and folders. Every week, Microsoft releases updates and patches to Windows that increases the security of the operating system. This is one of the most important steps in staying safe online.

      Practice safe online habits

      Another important step to staying virus-free is to be wary of your habits as an internet-enabled computer user. If you get a feeling that a particular wesite or link to a website isn't safe, it's probably best not to go to it. Chances are, the site can be infected with malware just waiting to infect your computer at first chance. This also includes being cautious when opening suspicious e-mails, even if they are from someone you know. The most popular e-mail virus is the one that spreads with a subject title such as "Hello, have not spoken to you in a long time!" or "How are you?" and come from e-mail addresses that seem randomly-generated. It is best to not even open these e-mails and just delete them right away. Better safe than sorry. And, if someone you know, with an e-mail address you trust, sends you an e-mail, and the message body contains links or strange lettering, the best option here is to NOT click on anything and contact this person personally, asking if they had sent the e-mail. If they did in fact send it to you, then it doesn't hurt to be cautious and scan the message with an antivirus program anyway. If they do not recall sending the e-mail, chances are they have become infected with a virus, and should clean their computer (Or call us to do it for them!).

    Website Development

  • Question:

    • How about websites? I have a business that specializes in ... and I want to expand. I think a website can do that for me, is there anything you can do?
  • Answer:

    • Yes, we do websites as well! In fact, our website was built from the ground up. Just visit our website-building page here for more information.

    Miscellaneous

  • Question:

    • Surely you charge X amount of dollars just to show up, like the other guys? I hate having to pay just for a tech to come over and tell me what's wrong. I know what's wrong, just tell me what needs to be done to fix it!
  • Answer:

    • Nope! Any time one of our techs comes to your place of residence, there is no charge, unless actual work is to be performed*. We make sure we don't follow the lead of other big companies by charging you just for showing up.
  • Question:

    • My question isn't listed on this page, and I still need help. Is there a way I can contact you for assistance?
  • Answer:

    • Of course! This page is steadily growing with common questions, so your problem may or may not be on here yet. If you have a question to ask, we are always more than willing to answer for you. Just send us an e-mail at Support@TLGSolutions.net and we will work with you to answer your questions as quickly as possible.
  •  

    *Evaluations include, but are not limited to the following: Hardware Inspections and Troubleshooting, Virus Diagnosis, Performance Troubleshooting, and Network Troubleshooting (Wired and Wireless). There is no charge for these services, however; depending on the client location(s), there may be a small Destination Fee incurred by the client, and the client is solely responsible for the payment of aforementioned fee upon initial evaluation.