Posts Tagged ‘Computer Repair’

DIY How To Create a System Restore Point in Windows XP & Windows 7

digg_url = “http://www.sanantoniocomputerrepair.net/blog/2010/10/diy-how-to-create-a-system-restore-point-in-windows-xp-windows-7/”;digg_title = “DIY How To Create a System Restore Point in Windows XP & Windows 7″;digg_bgcolor = “#FFFFFF”;digg_skin = “normal”;digg_url = undefined;digg_title = undefined;digg_bgcolor = undefined;digg_skin = undefined;

San Antonio IT Consulting

San Antonio IT Consulting Includes:

Computer Repair

* Laptop Repair
* Computer Help
* Computer Help Desk
* Computer Maintenance
* Computer Services
* Computer Support
* Computer Upgrade
* Software Installation
* Hardware Installation
* Computer Diagnostics
* PC Tune-Up/Speed-Up
* System Optimization
* Troubleshooting

* Virus Removal
* Spyware Removal
* Malware Removal
* Rootkit Removal
* Worm Removal

* Computer Security
* Wireless Networking
* Printer Support

Data Recovery

* Hard Drive Recovery
* Digital Media Recovery
* Disaster Recovery
* RAID Recovery
* CD/DVD Recovery
* Zip Disk Recovery

Backup

* Data Backup
* Data Redundancy
* RAID FAQ’s
* Disk Imaging

Transfer

* Data Transfer

Internet Marketing

* SWOT Analysis
* Competitor Analysis
* GEO Marketing
* Article Marketing
* Viral Marketing
* Social Bookmarking
* ECRM
* SMO
* ORM
* SERM

SEO/SEM

* SEO
* Back-Linking
* Organic SEO

Web Design

* Web Design
* Copywriting
* Copy Editing
* Proofreading
* Typesetting

Joomla CMS

E-Commerce

DIY How To Guides

* Hardware Repair
* Upgrade Memory
* Software Repair
* Spyware Removal
* Defragment System Drive
* Create System Restore Point
* Increase Startup Speed
* System Backup
* Format Hard Drive & Install Windows

DIY How-To Defragment system hard drive

There are many different causes for a computer system to run slow.  From the very first day that you unpacked the boxes, set up your new computer, and powered it on, it began to accumulate and store many different types of data.  Music, videos, letters, pictures, emails and more; the list gets larger and larger as more and more of our everyday lives become digitized to some degree.

All of this data is stored on the system hard drive and is managed by the computer’s operating system.  There are file allocation tables that store pointers to the exact address on the hard drive where each file, no matter how large or small, is stored.  The file’s name, size, type, date modified, date created, attributes,  status, along with about 15 other parameters all get saved there.  In addition to whatever data files the computer user stores on the hard drive, the computer’s operating system has literally hundreds of files that it uses to perform its various functions stored there as well.

As the operating system prepares to write data to the hard drive it merely looks for the first available empty region on the hard drive that it can find.  If the file to be stored is 10 megabytes in size and the first available empty region that is found contains at least 10 megabytes of contiguous storage space, then the entire file will be laid out there, in a contiguous fashion.  When a computer is new, this is what tends to happen at first since the hard drive is largely empty.  However, it doesn’t take long for this nice neat little scenario to change as files are constantly being stored temporarily and then removed as they are no longer needed.  Without getting too esoteric let’s suffice it to say that as time goes on the file structure becomes more and more ‘fragmented’.

As the operating system compensates for removed, relocated, completely new and resized data files, a single fragmented file can become spread out, in multiple pieces, across several sections of the hard drive.  Now imagine nearly every file the system needs to function becoming fragmented in this way.  That is exactly what happens to a computer’s hard drive over time.  Using a little imagination one can see how this would tend to cause the computer to run slower and slower as the system has to piece together, from various locations, all of the fragments necessary to retrieve an entire data file.

At this point you must be thinking, ‘there must be something I can do?”  Well, fortunately there is.  To return the computer’s hard drive back to a more organized state, similar to the way it looked when the computer was new and to reverse the ill effects of file ‘fragmentation’, we will be performing a process called, ‘De-Fragmentation!’  Of course I’m sure you had already guessed that is where we were heading.

Depending upon the size of the hard drive to be defragmented, the amount of data that is stored on it, the level of fragmentation and the speed of the computer’s processor, along with several other factors, a defragmentation can regularly take many, many hours!  The standard defragmentation tool that is included in the Windows disk utilities should be performed while the computer is idle.  This means that while Windows is defragmenting the hard drive the computer should not be used to perform any other functions.

Be sure to allocate enough time for the defragmentation so as to allow it to successfully complete a full defragmentation of the entire system drive.  You may wish to begin the defragmentation just prior to retiring for the evening thereby allowing it to run all night if need be.

It is also important that no other applications be running in the background during this process.  Take note if you use anti-virus or anti-spyware software, these programs are notorious for causing a defragmentation to abort prematurely.  Disconnecting the computer from the Internet and Network would also be a good idea.

Assuming all of the aforementioned conditions have been met it is now time to proceed to starting the defragmentation.

  • Click on ‘My Computer’.
  • Locate your System Drive (Typically drive letter C: is the system drive).
  • Place your Mouse Pointer over the System Drive and Press the Right Mouse Button.
  • From the Menu choose ‘Properties’ (found at the bottom of the menu).
  • This brings up the Local Disk C: Properties Sheet.
  • Select the ‘Tools’ tab.
  • Press ‘Defragment Now’ to start the Defragmentation Utility.
  • Be sure that the System Drive Letter is highlighted.
  • Press ‘Defragment’ to start the Process.

Well that raps it up.  Remember this process could take anywhere from 30 minutes to 8 hours so be patient and you will be rewarded with a snappier, more responsive computer system.

Find out how our San Antonio Computer Repair specialists can help to optimize and update your computer system.

San Antonio Computer Repair

San Antonio Laptop Repair

San Antonio Fix Computer

San Antonio Computer Support

DIY How-To Virus or Spyware Removal

Windows based PCs are notoriously susceptible to Trojan Viruses and Spyware infections.  This can be caused by a number of different factors but making sure that your system is fully updated at Microsoft’s update site is one of the best ways of preventing problems.  You can verify that your system is completely up to date by visiting Microsoft’s update site:

http://www.update.microsoft.com/microsoftupdate/v6/default.aspx?ln=en-us

This guide explains in detail how to get rid of a Trojan Virus or Remove Trojan Horse infections from your computer system.

If you suspect that your computer system may have become infected with a Virus or Trojan Horse Virus, this guide will step you through the process of downloading, installing and configuring a free version of anti-virus / anti-spyware software on your computer system.

Many good free Virus Removal Software titles are available online today that are quite effective in eradicating most Trojan Virus infections.  AVG Free is one that I have tried and have had good success in using.  The free version that is available to download online will delete Spyware, get rid of Trojan Viruses, and perform a Malware scan as well.  It is a great Spyware Removal Tool that I highly recommend.

You can find the AVG web-site here: http://free.avg.com/us-en/homepage

On the website you will find the option to either download the free version or a more advanced version for a fee.  After choosing the package that best suits your needs, download the virus removal software and save the file to your system hard drive.

Once the download has completed press ‘RUN’ to begin the installation.

You will be presented with the AVG setup program and for the most part you should be able to use all of the system default settings.

avg setup

Click Next to proceed.

The installer will need to download additional support files to complete the installation so be sure that you have an active Internet connection during the installation.  You may be prompted again to choose which package that you wish to install.  This decision is up to you.  Choose a version and press Next.

choose avg

Once all of the installation files have been downloaded you will be prompted to accept the license agreement.  As long as you agree with the terms simply check the box and hit Accept.

avg license

You are now given the choice of either the Standard Installation or a Custom Installation.  For most typical users the standard installation should suffice but feel free to experiment with the custom installation if you wish to manually choose which components you would like to install.

installation type

Enter your name to activate the Free License and press Next.

activate license

Choose a destination path (the default path is normally fine) and press Next.

(If you have chosen a custom installation you will decide which components to install at this point.)

component selection

Choose whether or not you would like to install the AVG Security Toolbar or set Yahoo as your default search provider.  Press Next.

The software may force your web browser to close but we’re almost finished with the installation at this point.

As the installation process concludes you will be prompted to ‘Optimize Scanning Performance’.  This takes a few minutes to complete but helps improve the performance of future scans.

optimization scan

After the optimization process is complete a full system scan should be performed.

AVG may have minimized itself to the taskbar so you might have to open the AVG Command Console by either clicking on the taskbar icon or using the desktop shortcut.

Once you have opened the AVG Command Console select ‘Computer Scanner’ from the menu on the left and then select ‘Scan Whole Computer’ from the menu that opens.

scan whole

This could take some time so you may wish to engage yourself with some other activity and check back periodically to monitor the progress.

With any luck any infections your system may have harbored will have been detected and quarantined.

Keep in mind removing Viruses and Spyware can be tricky; it is possible that not every infection will have been detected by just this one attempt at removal.

If our San Antonio Virus or Spyware Removal Specialists can be of assistance click the button below:

San Antonio Computer Repair

San Antonio Laptop Repair

San Antonio Fix Computer

San Antonio Computer Support

DIY How-To Troubleshoot Software Errors

If one of the software applications that you use on a regular basis suddenly generates an error message and will not allow you to continue you can try this simple guide to correcting the issue.  Use this guide at your own risk.  You should have a general understanding of how to install and uninstall applications and programs on your system if you plan to use this guide. If you aren’t sure what you are doing, please call and speak to one of our technicians before using these procedures.  Techheads is not responsible for any data loss or other damage that may occur from using the following procedures.

 Techheads cannot be held responsible for any problems that may result from the use of this checklist – if you are unsure of what you are doing please call us at 210-260-0045.

  1. If you are experiencing a problem with a software application that was recently working properly, but now generates an error message when you try to use it; the first thing to do is retrace your steps.
  2. Have you installed any new software on your system between the last time you were able to successfully use the broken application and now?
  3. If so, there may be a conflict between the old software and the new software that you have installed. Consult the documentation that accompanied the new software and the formally working software to see if there is any mention of restrictions or conflicts.  Also, verify that your computer hardware meets the minimum requirements for the application(s).  You can find this information listed on the software installation guide(s) or packaging.
  4. If you cannot think of any new software that has been installed or that might be causing a problem then uninstalling and reinstalling the program might correct the issue.  If you feel that no new software has been installed and you wish to uninstall and reinstall then skip to step 9 otherwise continue to step 5.
  5. Uninstalling any new program(s) that have been installed recently may free up your application to start working again. If you would like to try doing this be sure that you have at least a basic understanding of how to install and unistall software applications on your system before continuing.
  6. Proceed to uninstalling the suspect application(s) – being very sure to use the proper uninstallation procedure.  If you are not familiar with the steps used to uninstall programs and applications from your system do not try these procedures.
  7. After uninstalling each new application that you suspect may have been causing an issue; completely power your system down and wait at least 2 minutes before powering back up.
  8. If after uninstalling any new software applications installed recently, and you have made sure to reboot your system, you are still getting an error with the problematic software; you can try uninstalling and reinstalling the application itself - But WAIT, read on.
  9. Before you uninstall your application make sure that you have the installation disk and guide that will be needed to reinstall your software.  Read the installation guide carefully!  Verify that all the installation disks are present and that you have the proper license key to perform a re-installation after you have uninstalled the application.  Failure to do verify these facts can lead to a situation where your software cannot be reinstalled.
  10. Ok now, if are sure that you feel comfortable knowing that you have everything you will need to reinstall the software, you can go ahead and uninstall your application now.
  11. If you are not familiar with the process that is required to uninstall software on your system then you shouldn’t even be trying to use this guide.
  12. After the uninstall is complete – power the system all the way down. Do not use restart. Do a complete system shutdown and wait at least 2 minutes before you power the system back up.
  13. You can now attempt to reinstall your application and hopefully your software will be working once again.

Find out how our San Antonio Computer Repair specialists can help to either upgrage or repair your computer system.

San Antonio Computer Repair

San Antonio Laptop Repair

San Antonio Fix Computer

San Antonio Computer Support

DIY How-To Upgrade System Memory – Increase RAM

Increasing system memory is usually the cheapest and easiest way to increase system performance.  However, not every system can be upgraded and it is possible that you may already have the optimal amount of system memory for your hardware/software configuration.  The first thing to do is determine how much memory is currently installed in your system and how much total memory your system is capable of utilizing.  Depending on the operating system that you are using the amount of optimal memory varies.  As a general rule of thumb Windows XP users will want to have 3 gigs for optimal performance and Windows Vista 3 gigs for the 32 bit version and 4 to 8 gigs for the 64 bit version.  Windows 7 should also use 3 gigs for the 32 bit version and 4 or more for 64 bit.  (Windows 7 will actually run faster than Vista with the same amount of memory installed.)  To find out how much memory your system currently has installed use one of the following methods:

  • Right-click on the ‘My Computer’ icon, and select Properties from the drop-down menu.
  • Look under the ‘General’ tab to find the amount or RAM in megabytes (MB) or gigabytes (GB).  Remember 1000 MB’s is equal to 1 GB.

 

sp

  • Another way to find system memory is to Click Start-> All Programs-> Accessories-> System Tools-> System Information.  Then look for ‘Total Physical Memory’ in the panel on the right.

 

si

One of the easiest ways I have found to determine the maximum amount of memory a system is capable of utilizing is to use the ‘memory advisor’ tool that is located on the www.crucial.com website.  To use the tool simply enter the manufacturer and model number of your PC.  After entering your PC manufacturer and model number you will be given detailed information regarding the maximum memory capacity for your particular system, and the type of memory and maximum size of memory boards and configurations that are available for your system.

Another option to determine maximum memory capacity would be to consult the website of the manufacturer of your PC for details regarding your particular system.  Note:  If you have a custom built machine you will need the specification sheet that accompanied  the motherboard that is currently in your system to find out the details concerning maximum memory capacity, memory type, speed, etc.  In the event that you do not have this information you will have to open the computer case and find the model number of your motherboard.  The model number is normally printed on the face of the motherboard but can be difficult to find.  Assuming you are able to find the model number, use it to search the manufacturers website for details about the memory specifications for that motherboard.

Before purchasing new memory be careful to ensure that the memory type that you are buying is correct for your system.  There are quite a few different types of memory available, you will want to be absolutely sure that the memory you purchase will work in your system.  If your system requires DDR or DDR2 you will need to buy two matching memory boards to perform an upgrade.  With DDR3 you will more than likely need three matching boards.  (These details can vary however, depending on the motherboard.)

There are also many different memory speeds available for each type of memory.  If you are planning on completely replacing the old memory you should be able to use faster memory for your specific memory type, if it’s available.  If you are planning to add new memory to existing memory you should try to find memory that is the same speed as the existing memory.

Installing Memory Upgrades

Installing memory can be tricky so take your time and don’t try to force a memory stick into your system if it is not easily snapping into place.  There are slots on the memory that will only allow it to be inserted in one direction so be sure to line them up when installing.  If the memory board does not seem like it is fitting in the socket correctly try turning it around.  If the slots in the memory do not match the breaks on the motherboard memory socket then you have the wrong type of memory for your system.

Removing the old RAM Memory Boards

  • Be sure your computer is completely shut down.
  • Unplug the power cord from the back of the computer.
  • Unplug any other cables that are connected to the computer including telephone lines or networking cables.
  • Remove the access panel or computer cover.  You may have to remove some screws on the rear of the computer or on some systems press a release button (usually on the bottom of the case).
  • Locate the old memory on the motherboard.  You can identify the memory by examining your new memory and looking for similar memory boards installed on the motherboard, usually near the CPU.
  • Before attempting to remove the old memory, be sure to release the latches that are used to hold the memory firmly in place.  You will find these at both ends of each memory board.
  • Grasping the memory firmly in the middle, carefully pull the memory board in a perpendicular direction, away from the motherboard until it slides out.  IF THE MEMORY IS NOT EASILY SLIDING OUT CHECK THE LATCHES TO BE SURE THAT THEY ARE COMPLETELY OPEN.

Installing New RAM Memory Boards

  • Depending on the type of memory you are installing be sure that you are installing the memory in the correct slots.
  • DDR and DDR2 will normally be installed in slots 1 and 3 or slots 2 and 4.  (Many times these slots will be a different color, either blue or possibly yellow.)
  • DDR3 will be installed in slots 1, 3 and 5 or slots 2, 4 and 6.
  • If you are installing new memory but plan to add your new memory to the existing memory and do not plan to remove the old memory then be sure that the LARGER memory modules are installed in the first slot that is closest to the CPU.  (for DDR, DDR2, DDR3 be sure the first memory stick of the largest set of memory boards is installed closest to the CPU and the matching ones are installed accordingly).
  • Be sure to line up the slot in each memory board with the break in the memory slot.
  • Press each board down until it snaps into place.  (Both latches on the ends of the memory board should lock into place.)

Close Your Computer Case or Cover

  • Replace the cover or panel that you removed earlier.
  • Replace any screws that you may have removed or loosened.
  • Plug any cables you removed earlier back in to the computer.
  • Power up your computer and pay careful attention to the boot screens to be sure that there are no error messages during the boot-up process.
  • You may see a message indicating that the amount of system memory has changed.  This is normal.

Troubleshooting – If you are Experiencing Problems with the System not Powering Back up Properly or Locking Up.

  • Ensure that all of the your memory boards are fully seated in the sockets and that they are latched firmly on both ends.
  • Be sure that you have the boards in the correct slots.  (If there are any boards of different sizes then the largest memory board must be in the slot closest to the CPU.)
  • If you are using DDR, DDR2, or DD3, you must use matching memory boards and they must be installed in groups and in the correct slots.
  • If you have added new memory to older existing memory your new memory may be a different speed than the old memory.  Some motherboards will not allow using memory of different speeds.  Try using only the new memory.

Find out how our San Antonio Computer Repair specialists can help to either upgrage or repair your computer system.

San Antonio Computer Repair

San Antonio Laptop Repair

San Antonio Fix Computer

San Antonio Upgrade Computer 

DIY How-To Hardware Troubleshooting Guide

Frequently a system that will not power-up may have inadvertently become unplugged or possibly a cable may have become loose.  The following checklist is intended to eliminate a power connection or disconnected cable as the cause for a system not powering up.

 

  • Check to be sure that all power switches are in the on position. Check the back of the computer case. Many times there will be a power switch on the back of the computer near the location where the power cable attaches to the computer.  Be sure that it is in the correct position.
  • Check to see that the voltage switch is set correctly. In the U.S. it should be set to 110v/115v.  You will find the voltage switch located on the power supply, which is normally located on the back of the computer also near the power cord.
  • Make sure that the power cord to the computer is plugged securely into the back of the computer.
  • For laptops make sure that the transformer is plugged into the laptop securely.
  • Trace the power cord from the computer back to the receptacle in the power strip or wall and make sure that the receptacle is actually ‘hot’.  You can test this by taking a known working appliance such as a lamp and testing the actual receptacle that the computer is plugged into to make sure that it is actually working.
  • If you see a power light or other L.E.D.’s on the computer case lighting up but the monitor is not showing a display then you may not have power to the monitor or the video cable may have become disconnected.  Make sure that the power cable to the monitor is firmly plugged into the back of the monitor. Trace the power cable from the monitor back to the receptacle and be sure that it is connected to a live outlet.
  • Check to see if the monitor video cable is secured to the back of the monitor and that the other end is securely attached to the video port on the computer.
  • Still no luck? Try unplugging and re-plugging all cables. Remove all cables from the computer including power, monitor, mouse, keyboard, printer, network, and any other attached devices. Make sure that you know where the cables go back again! If not, label them.
  • Now re-plug all the cords and cables and try powering up again.
  • If you are still experiencing problems please call and speak to one of our certified technicians.  210-260-0045.

 

San Antonio Computer Repair

San Antonio Laptop Repair

San Antonio Fix Computer

San Antonio Computer Support

Wireless Networking Set-up / Configuration

We offer complete network installation, setup, and configuration services for either wireless or wired network architectures.  If you are considering adding wireless to an existing network, installing a new wireless network; or if you are just having issues with an existing network, our technicians are here to help you.  Give us a call today and describe your situation.  We will provide you with a FREE estimate and, if necessary,  recommendations in case you haven’t made a final decision on what type of network would best satisfy your needs the most efficiently.

Techheads specializes in Network Installation, Configuration, Testing and Security. 

Our Network Services include but are not limited to:

  • Home / Office Internet / Network Setup (both wireless & wired; DSL, Cable, & Dial-up)
  • Network Design, Maintenance & Support
  • Network Administration & Security Implementation
  • Remote Access Servers
  • Email Setup & Troubleshooting
  • Network Virus, Spyware, & Malware Detection and Removal
  • Network Device Sharing
  • Router & Firewall Installation & Configuration
 If you are experiencing difficulties trying to get your Desktop PC, Laptop, Xbox, Wii, or other wireless capable device to connect to the Internet over your wireless network; or you would like to experience the convenience of having a wireless network setup in your home or office,  then give us a call.  We offer in-home and in-office wireless network troubleshooting, installation, setup and configuration.  Call for a quote.

Call for a quote on any services not listed in the table above.

San Antonio Wireless Networking  

San Antonio Laptop Repair 

San Antonio Computer Repair

San Antonio Malware Removal

Malware can refer to any number of malicious forms of software or code that has been intentionally designed to perform one or more of the following malicious acts:  

  • Infiltrate a users computer system without their consent.
  • Gather sensitive personal information such as credit card numbers, social security numbers, birth dates,  or system passwords.
  • Create back doors or remote entry points to allow hackers access to the system.
  • The destruction of critical data and/or corruption of system files.

 

Malware is a general term and is commonly used to include, Viruses, Worms, Spyware, Trojan Horses, and some forms of Adware. The actual intention of malware can vary but by definition it is any software that is destructive by nature.  Because the term Malware is so broad it is hard to site one specific source for the most infections.

 Symptoms of Infection:

  • Very sluggish computer performance.
  • Random system lockups or crashes.
  • Browser redirection – you are taken to websites you were not searching for while browsing the Internet.
  • Excessive number of popup windows appearing at random while surfing the Internet.
  • You are informed that your system has ‘hundreds’ of active infections and you are redirected to a website that insists you pay for and download their specific software package to remove the infections.

 

Solution:

There are many good anti-virus / anti-spyware products on the market designed to detect and remove these types of infections.  McAfee and Kapersky are good but AVG and Avast! have similar products and offer a free downloadable version.  Be sure to complete a ‘Full’ system scan and quarantine and remove all active infections.  Configure your anti-virus software to perform ‘active’ scanning or real-time system monitoring.

Prevention:

  • Do not install software you have downloaded from the Internet unless it has come from a known, reliable source.
  • Use caution if using file sharing platforms such as LimeWire or torrent sites to download files.
  • Do not open any email attachments from unknown sources.
  • Use a good anti-virus/anti-spyware application and scan your system at least weekly.  Be sure your anti-virus software is totally up to date with the latest virus definitions.
  • For Windows users:  Be sure to visit the Microsoft update site and download all the latest Microsoft security patches.  http://www.update.microsoft.com

  

In some cases your system may have become unable to install anti-virus software or has become completely unusable.  If your computer system has unwanted Viruses, Spyware, Trojan Horse, Malware, Worm, Rootkit, Keylogging or Adware installed on or infecting it and you would like to have one of our San Antonio Virus Removal specialists clean and optimize your system please click the button below.

San Antonio Virus Removal 

San Antonio Spyware Removal 

San Antonio Laptop Repair 

San Antonio Computer Repair

San Antonio Spyware Removal

Spyware is software that gathers information about a users Internet habits, browsing patterns, email passwords, usernames and even credit card information, in essence, ’spying’ on the hapless user. This type of software usually gets installed without the knowledge of the user and can transmit the collected data to a third party over the Internet secretly as well.

Symptoms of Infection:

  • Very sluggish computer performance.
  • Random system lockups or crashes.
  • Browser redirection – you are taken to websites you were not searching for while browsing the Internet.
  • Excessive number of popup windows appearing at random while surfing the Internet.
  • You are informed that your system has ‘hundreds’ of active infections and you are redirected to a website that insists you pay for and download their specific software package to remove the infections.

 

Solution:

There are many good anti-virus / anti-spyware products on the market designed to detect and remove these types of infections.  McAfee and Kapersky are good but AVG and Avast! have similar products and offer a free downloadable version.  Be sure to complete a ‘Full’ system scan and quarantine and remove all active infections.  Configure your anti-virus software to perform ‘active’ scanning or real-time system monitoring.

Prevention:

  • Do not install software you have downloaded from the Internet unless it has come from a known, reliable source.
  • Use caution if using file sharing platforms such as LimeWire or torrent sites to download files.
  • Do not open any email attachments from unknown sources.
  • Use a good anti-virus/anti-spyware application and scan your system at least weekly.  Be sure your anti-virus software is totally up to date with the latest virus definitions.
  • For Windows users:  Be sure to visit the Microsoft upate site and download all the latest Microsoft security patches.  http://www.update.microsoft.com

  

In some cases your system may have become unable to install anti-virus software or has become completely unusable.  If your computer system has unwanted Viruses, Spyware, Trojan Horse, Malware, Worm, Rootkit, Keylogging or Adware installed on or infecting it and you would like to have one of our San Antonio Virus Removal specialists clean and optimize your system please click the button below.

San Antonio Virus Removal 

San Antonio Spyware Removal 

San Antonio Laptop Repair 

San Antonio Computer Repair

San Antonio Virus Removal

A Virus or Computer Virus is a self-replicating program or piece of script or code that make copies of itself and then either attaches itself to an existing file on the infected system or store copies of itself on the system with innocuous sounding names like ‘repair tool’.

The virus is limited to spread itself only by either being transmitted or sent by an unwitting user or carried on a portable storage medium from one system to another. However, if a virus gets embedded somewhere on a network drive then anyone who opens or clicks on the infected document or file can end up getting infected as well.

Symptoms of Infection:

  • Very sluggish computer performance.
  • Random system lockups or crashes.
  • Browser redirection – you are taken to websites you were not searching for while browsing the Internet.
  • Excessive number of popup windows appearing at random while surfing the Internet.
  • You are informed that your system has ‘hundreds’ of active infections and you are redirected to a website that insists you pay for and download their specific software package to remove the infections.

 

Solution:

There are many good anti-virus / anti-spyware products on the market designed to detect and remove these types of infections.  McAfee and Kapersky are good but AVG and Avast! have similar products and offer a free downloadable version.  Be sure to complete a ‘Full’ system scan and quarantine and remove all active infections.  Configure your anti-virus software to perform ‘active’ scanning or real-time system monitoring.

Prevention:

  • Do not install software you have downloaded from the Internet unless it has come from a known, reliable source.
  • Use caution if using file sharing platforms such as LimeWire or torrent sites to download files.
  • Do not open any email attachments from unknown sources.
  • Use a good anti-virus/anti-spyware application and scan your system at least weekly.  Be sure your anti-virus software is totally up to date with the latest virus definitions.
  • For Windows users:  Be sure to visit the Microsoft upate site and download all the latest Microsoft security patches.  http://www.update.microsoft.com

  

In some cases your system may have become unable to install anti-virus software or has become completely unusable.  If your computer system has unwanted Viruses, Spyware, Trojan Horse, Malware, Worm, Rootkit, Keylogging or Adware installed on or infecting it and you would like to have one of our San Antonio Virus Removal specialists clean and optimize your system please click the button below.

San Antonio Virus Removal

San Antonio Spyware Removal

San Antonio Laptop Repair

San Antonio Computer Repair

San Antonio Computer Repair

Our computer repair services includes our complete computer diagnostics service.

  • Home Computer Repair– We offer on site home computer repair services in San Antonio and the surrounding area. One of our Comptia Certified computer repair technicians will meet you at your home and diagnose your situation.  Our technician will provide you with a written quote detailing our computer repair rates and the fees necessary to complete a total system repair, upgrade or update.
  • Business Computer Repair– We offer on site business computer repair services for small and medium sized businesses in San Antonio and the surrounding area.  A crew of our Comptia certified computer repair technicians will be dispatched to your business location to evaluate your computer repair situation.  A thorough written analysis and description of our computer repair rates and labor charges with a description of the services to be performed will be provided following the evaluation.
  • We provide service for the following computer related problems:Hardware Failures, Software Errors, Virus or Spyware Infections, Operating System Errors, Wireless or Wired Network Problems, Internet Connectivity Errors, or any other Computer Hardware or Software Failures.

San Antonio PC Tune-Up | Speed-Up

Why go out and spend a ton of money on a completely new computer when it may be more affordable to simply upgrade and/or update the system you have now?

Our PC Tune Up | Speed Up service includes:

  • System Evaluation – We will determine if your system would benefit from an increase in system memory or if it needs more hard drive space to help speed things up.  Or maybe you need a new processor or Motherboard or a faster CD/DVD.
  • Increase Startup Speed – Our technicians will remove any unnecessary applications from your start up sequence, thereby boosting performance.
  • Removal of Unused Applications – By removing unused software applications more resources are freed up resulting in increased system performance.
  • Scan for and Remove any Viruses or Spyware- Removal of any Viruses or Spyware will greatly improve system speed.
  • Scan Registry for Unused Keys – Removing unused registry keys reduces the size of the registry which results in a dramatic system performance increase.
  • Defragment System Drive- Defragmenting the system hard drive increases the speed at which the Operating System accesses data on the hard drive which in turn increases overall system speed.
  • BIOS & Operating System Settings – In addition our technicians will optimize your BIOS setting and Operating System configurations and settings for optimal speed.

We will have your system running as fast, if not faster, than it did on the day that you got it.

San Antonio Hardware Install

Our Hardware installation service includes:

  • Installation of any internal or external hardware component including: hard drives, video cards, printers, scanners, copiers, etc.
  • Installation of any drivers, applications, or support software that accompanied the hardware.
  • Configuration and testing to ensure the hardware has been installed satisfactorily and is functioning properly.

San Antonio Software Install

Our software installation service includes:

  • Before installation our computer repair technicians ensure that the software you plan to install is completely compatible with your system / configuration.
  • Our service includes complete installation of your software application including any updates that may be available from the manufacturers website.
  • In addition our technicians will create desktop shortcuts, quick launch bar and start menu shortcuts.

San Antonio Computer Repair

San Antonio Laptop Repair

San Antonio Fix Computer

San Antonio Computer Support

RAID FAQs

What is RAID?

RAID is the acronym for either ‘redundant array of inexpensive disks’ or ‘redundant array of independent disks’.  When first conceived at UC Berkley the former was the actual term that was coined but the latter is more commonly used today intentionally to disassociate the technology from the word inexpensive and the perception that RAID somehow implies a low cost solution.

 

Why Use RAID? 

RAID is a storage technology that provides increased data reliability through data redundancy.  This is achieved primarily by duplicating data across several storage drives in a configuration referred to as an array of disks.

 

How Many Different Types of RAID are There? 

There are several different types of RAID array configurations each type being denoted by a single digit numeral, 0 through 6 (and various combinations thereof).  These types are commonly referred to as RAID ‘levels’.

What Distinguishes one RAID Level From Another?

The makeup of the different RAID levels is varying combinations of redundancy, spanning, mirroring and striping.

What is Redundancy?

Redundancy is the duplication of data onto more than one physical drive to increase fault tolerance.  If one physical drive in a redundant array fails no data is lost and there is an opportunity to replace the failed device.  As long an one drive is functional, data is secure.  However, in the case of a failure, the failed device must be replaced and the array rebuilt onto the new device.  In very large data structures this can sometimes take a great deal of time.  If there were to be a failure during the process of rebuilding the array all data would be lost.

What is Spanning?

Spanning is the configuration of two or more physical drives into one ‘logical’ drive.  The logical drive is treated exactly the same as a physical drive and will appear as just one device.  Spanning is used to increase the amount of storage capacity of an array.  As an example: if three 100 gigabyte hard drives are configured as one spanned array, the result would be one logical drive 300 gigabytes in size.

Spanning alone provides no redundancy or fault tolerance and it is commonly combined with mirroring.

What is Mirroring?

Mirroring is the duplication of data onto two or more drives simultaneously to create data redundancy and increase fault tolerance.  A mirrored array sacrifices half of its storage capacity to achieve a redundant status.  If two 100 gigabyte drives are mirrored the result is a single 100 gigabyte mirrored array.

What is Striping?

Striping is a bit more complex.  Striping is used to increase performance.  This increase in performance is achieved by splitting the read and write data down into ‘blocks’ and then writing or reading that data simultaneously onto two or more physical drives on the same sector of each respective drive.

In a simplified example imagine that you are writing 100 megabytes of data out to a striped array.  If you were to take that data and split it into two 50 megabyte chunks and then write both of those chunks simultaneously, one 50 megabyte chunk to drive (a) and the other 50 megabyte chunk to drive (b), you would theoretically half the time required to perform the process.  That, in essence, is the theory behind striping.

Striping provides a significant increase in performance but it is also the most dangerous of all the RAID levels when used alone.  Not only is there no redundancy but if either or any of the drives in a striped array fails, all of the data from the entire array is completely lost.

RAID Level 0 

RAID Level 0 – (2 Drive Minimum – no Fault Tolerance) Block Level Striping without Parity or Mirroring:  Because this type of RAID offers no fault tolerance or redundancy it is technically not actually RAID.  Raid 0 offers the best performance of all the RAID levels.  Data is broken down into fragments called blocks and is then written to all drives in the ‘array’ simultaneously across what is called a ‘stripe’ (on the corresponding disks in the same sector).  When data is read it is broken down into smaller pieces which can be read in parallel thereby increasing bandwidth.  With RAID 0 if any drive fails all data is lost across the entire ‘array’.  Even at minimum the likelihood of a catastrophic loss is double that of a single drive without any RAID at all.  RAID 0 should never be used alone for critcal data.

RAID Level 1

RAID Level 1 – (2 Drive Minimum – Data Redundancy) Mirroring:  In its simplest form RAID 1 simply duplicates data onto two different hard drives simultaneously, thereby providing data redundancy.  Data redundancy means that if either of the two hard drives fails for any reason no data will be lost as there is an exact duplicate or ‘mirrored set’ of the data on the other drive.  Data integrity is maintained as long as either of the two hard drives in the array is functioning.  In the event that one of the drives does fail it is simply swapped out for a new working drive.  The ‘array’ then ‘rebuilds’ itself by duplicating all of the data onto the new drive and recreating the ‘mirrored set’.  Data is, however, vulnerable while a rebuild is in progress.

RAID Level 5

RAID Level 5 – (3 Drive Minimum – Redundancy Through Parity) Block-Level Striping with Distributed Parity:  RAID 5 combines the increased speed of striping with redundancy through distributed parity.  In RAID 5 one drive out of the array will always be sacrificed to achieve redundancy.  In other words, when there are three 100 gigabyte drives present in a RAID five, the array will be 200 gigabytes in size.  However, by using distributed parity, the redundancy is spread across the entire array.  Therefore, if any one drive in a RAID 5 fails, data integrity is maintained and an opportunity exists to replace the failed device and rebuild the array. 

RAID Level 6 

RAID Level 6 – (4 Drive Minimum – Redundancy Through Parity) Block-Level Striping with Double Distributed Parity:  Very similar to RAID 5, RAID 6 builds on the security of RAID 5 by adding an additional level of redundancy.  In a RAID 6 up to two drives can fail and no data will be lost.  RAID 6 makes very large arrays possible, where the time it takes to rebuild the array after a drive failure can be quite lengthy.  In a RAID 5 scenario data would be vulnerable for far too long while the rebuild is in progess.  RAID 6 addresses this concern by adding an additional redundancy drive.  RAID 6 is the solution that should be used where data is extremly critical or high system availability is important.

RAID Level 1+0

RAID Level 1+0 – (2 Drive Minimum (though 4 are more commonly used) – Redundancy Through Mirroring) Mirrored Sets in a Striped Set:  Fault tolerance and increased performance.  This RAID level is a combination of RAID 1 (mirroring) and RAID 0 (striping).  RAID 1+0 can sustain multiple drive failures as long as no mirror loses all of its drives.

RAID Level 0+1

RAID Level 0+1 – (4 Disk Minimum; must be even number of drives – Redundancy Through Mirroring) Striped Sets Mirrored:  Here, a second striped set is created to mirror the first striped set.  In contrast to the 1+0, in RAID 0+1, all the drives in one mirror can fail without a data loss but if drives fail on both sides of the mirror everything on the entire array is lost.

San Antonio Data Recovery 

San Antonio Hard Drive Recovery 

San Antonio File Recovery 

San Antonio Laptop Repair

San Antonio Data Backup

Data Backup – The most effective way to prevent data loss is a solid data back-up procedure.  Critical data should be backed-up at least once daily or possibly even more often for very active file systems.  The Data Backup frequency will depend upon the rate at which the protected data is modified or updated.

Data Backup falls into three basic categories:

  • Normal Backup. A normal backup copies all selected files and marks each file as having been backed up (in other words, the archive attribute is cleared). With normal backups, you need only the most recent copy of the backup file or tape to restore all of the files. You usually perform a normal backup the first time you create a backup set.
  • Differential Backup. A differential backup copies files created or changed since the last normal or incremental backup. It does not mark files as having been backed up (in other words, the archive attribute is not cleared). If you are performing a combination of normal and differential backups, restoring files and folders requires that you have the last normal as well as the last differential backup.
  • Incremental Backup. An incremental backup backs up only those files created or changed since the last normal or incremental backup. It marks files as having been backed up (in other words, the archive attribute is cleared). If you use a combination of normal and incremental backups, you will need to have the last normal backup set as well as all incremental backup sets in order to restore your data.

Normal Backup – Anytime that a new backup procedure is initiated a ’Normal’ backup must first be created before ‘Incremental’ or ‘Differential’ backups become possible.  A ‘Normal’ backup copies all of the selected files and stores a complete copy of them in the destination backup set.  Therefore, to perform a restore from a ‘Normal’ backup you need nothing more than the most recent ‘Normal’ backup set to restore every file that has been backed up.

So you may ask, what is the point of the ‘Differential’ and ‘Incremental’ backup options.  Well, it comes down to speed and storage space.  A ‘Normal’ backup can take quite a long time to perform depending on the amount of data that is being backed up as well as use a very large amount of storage space.

Differential Backup – The ‘Differential’ backup looks at the data that is stored in the last ‘Normal’ backup and compares it to the state of the data in the current system and then stores only that data that has changed in the interim.  In the typical computer environment, the ratio of the data that changes each day to the data that remains static is somewhere on the order of 1 to 2 percent.  Therefore, the size of the ‘Differential’ backup is fractionally tiny in comparison to a ‘Normal’ backup and the time it takes to generate and store a ‘Differential’ backup is minimal compared to the time it would take to create another ‘Normal’ backup set.  However, a ‘Differential’ backup set, in and of itself, is of no value.  To perform a data restore from a ‘Differential’ backup, both the original ‘Normal’ backup set as well as the ‘Differential’ backup set are required.

Incremental Backup – The ’Incremental’ backup looks at the data that is stored in the last ‘Normal’ backup set and also the changes that have been saved in the last ‘Incremental’ backup set and then compares that information to the current state of the system, storing only that data that has changed in the interim.  This type of backup uses even less storage space and theoretically can be done even more frequently (even hourly).  The biggest drawback to this type of backup is that to perform a data restore using this method you need the original ‘Normal’ backup set and all of the incremental backup sets as well.

A solid back-up procedure would normally be comprised of a combination of a periodic ‘Normal’ backup (maybe weekly or monthly) and either daily ‘Incremental’ or daily ‘Differential’ backups.  The reason periodic ‘Normal’ backups need to be performed is because of the fact that over time the ‘Differential’ backup sets grow larger and larger and take longer and longer to create.  In the case of the ‘Incremental’ backup, as time passes the number of backup sets continues to increase each time a backup is executed.  Performing a fresh ‘Normal’ backup allows this process to start over.

Every system configuration should include some form of Data Backup:

We know that your data is important to you.  A Data Backup plan is inexpensive and should be part of every basic system configuration.


Hardware Redundancy is essential if your data is extremely valuable or irreplaceable.  Our technicians can explain in detail all of the various ways to safeguard your data, from redundant hard drives to daily back-ups, on and off-site. 

We also offer data transfer to an external hard drive, USB drive or other Digital Media.   We can also migrate your data to a different computer if you would like.


Find out how our San Antonio Data Recovery specialists can create a system back up procedure for your valuable data.

San Antonio Data Recovery 

San Antonio Hard Drive Recovery 

San Antonio File Recovery 

San Antonio Laptop Repair

San Antonio Data Recovery | CD/DVD Recovery

CD/DVD Data Recovery is not always possible in all scenarios but in the majority of cases significant recovery is usually possible if the attempt to recover the lost data is made soon after the data loss occurs.

In every case the sooner the affected storage media is brought in for analysis the better the odds are that a recovery can be made.  Even in the worst case scenarios partial recovery should be possible.

Typical types of data recovered includes but is not limited to:  pictures, music, videos, spreadsheets, databases, letters, and documents of all types.


CD/DVD File Storage Disks:  CDs/DVDs can be very good storage media for backing up important data .  Sometimes however, these disks can become worn and/or scratched making it impossible for them to be read or to retrieve your important data.  We offer complete data recovery services for scratched, worn or otherwise unreadable CDs/DVDs.
If your CD/DVD data disk has become unreadable:

The sooner you attempt to recover the lost data the better.  The more time that passes when you have a worn or scratched CD/DVD the more difficult it will be to recover 100% of the data.

Find out how our team of San Antonio Data Recovery specialists can help recover your critical data.  210-260-0045.

San Antonio Data Recovery

San Antonio Hard Drive Recovery

San Antonio File Recovery

San Antonio Laptop Repair

San Antonio Data Recovery | RAID Recovery

Data recovery and/or file recovery is not always possible in all scenarios but in the majority of cases significant recovery is usually possible if the attempt to recover the lost data is made soon after the data loss occurs.  Data can be lost in many different ways, the most typical are:

  • Accidental deletion, erasure or format.
  • Malicious or intentional deletion, erasure, or format.
  • Operating system failure or software crash.
  • Physical damage to storage medium, ie. scratched CD/DVD.
  • Physical Hard Drive failure or crash.  Catastrophic hardware failure.

Typically the most severe data loss occurs with a catastrophic hardware failure.  This type of loss is usually the most complete and by far the recovery attempt is the most costly.  Thankfully, hardware failure is the least common type of data loss.

Simple accidental deletion is by far the most common form of data loss, and in most cases if the affected storage device is brought in immediately following the incident there is a near 100% recovery rate.

Malicious destruction occurs when data is intentionally destroyed or deleted, and the effectiveness of any recovery attempt from this type of loss is completely dependent upon the skill and thoroughness of the person responsible for the data destruction.  Recovery from this type of loss can range from a 100% full recovery, to a 0% total loss, depending upon the techniques that were used to destroy the data.

In every case the sooner the affected hardware is brought in for analysis the better the odds are that a recovery can be made.  Even in the worst cases, at minimum, partial recovery should be possible.

Typical types of data recovered includes but is not limited to:  pictures, music, videos, spreadsheets, databases, letters, and documents of all types.

We offer FREE hard drive or storiage media evaluation. Find out how our team of San Antonio Data Recovery specialists can help recover your critcal data.  210-260-0045.

San Antonio Data Recovery

San Antonio Hard Drive Recovery

San Antonio File Recovery

San Antonio Laptop Repair

San Antonio Data Recovery | Digital Media Recovery

Digital Media Data Recovery is not always possible in all scenarios but in the majority of cases significant recovery is usually possible if the attempt to recover the lost data is made soon after the data loss occurs.  Data can be lost in many different ways, the most typical are:

  • Accidental Deletion, Erasure or Format.
  • Operating System Failure or Software Crash.
  • Virus or Spyware Infection.
  • Malicious or Intentional Deletion, Erasure, or Format.
  • Physical Damage to Storage Medium, ie. Storage Media Has Been Exposed to Liquids.
  • Digital Media Device Experiences a Data Corruption Error.

Simple accidental deletion is by far the most common form of data loss.  In most cases if the affected storage device is brought in immediately following the incident there is a near 100% recovery rate.

The next most common data loss occurs when there has been an Operating System Crash or System Crash.  In this scenario chances are good that the data is still intact on the device, though it may not be accessible in the standard way.  A near full recovery should be possible in the majority of cases.

Virus and Spyware infections can also cause system failures and data destruction.  Data recovery in this instance varies depending upon how much damage has occurred.

Malicious destruction occurs when data is intentionally destroyed or deleted.  Once again, a data recovery in this case will vary depending upon the skill and thoroughness of the person responsible for the data destruction.  Recovery from this type of loss can range from a 100% full recovery, to a 0% total loss, depending upon the techniques that were used to destroy the data.

In every one of these cases, the sooner the affected hardware is brought in for analysis the better the odds are that a recovery can be made.  Even in the worst case scenarios, partial recovery should be possible.

Typical types of data that can be recovered include but are not limited to:  pictures, music, videos, spreadsheets, databases, letters, and documents of all types.


USB Flash Drive, Memory Stick, Thumb Drive,  or Pen Drive:  These handy little devices are becoming more and more common.  They offer convenience, affordability and portability.  However, they can be susceptible to fairly frequent data corruption errors.  We offer complete data recovery services for deleted, formatted or corrupted digital media devices.
If you suspect your Digital Media Device has experienced a data loss:

The first thing you must do is immediately power down your equipment.  After you have powered your system down, remove the flash drive and place it in a safe dry environment until you can contact a data recovery service.  Using your flash drive for any other activity can permanently modify and/or destroy your data. This is the single most important step to minimizing the amount of damage incurred in a data loss scenario.

Find out how our team of San Antonio Data Recovery specialists can help recover your critical data.  210-260-0045.

San Antonio Data Recovery

San Antonio Hard Drive Recovery

San Antonio File Recovery

San Antonio Laptop Repair

San Antonio Data Recovery | Hard Drive Recovery

Data Recovery and/or Hard Drive Recovery is not always possible in all scenarios but in the majority of cases significant recovery is usually possible if the attempt to recover the lost data is made soon after the data loss occurs.  Data can be lost in many different ways, the most typical are: 
  • Accidental Deletion, Erasure or Format.
  • Operating System Failure or Software Crash.
  • Virus or Spyware Infection.
  • Malicious or Intentional Deletion, Erasure, or Format.
  • Physical Damage to Storage Medium, ie. Scratched CD/DVD.
  • Physical Hard Drive Failure or Crash.  Catastrophic Hardware Failure.

Simple accidental deletion is by far the most common form of data loss.  In most cases if the affected storage device is brought in immediately following the incident there is a near 100% recovery rate.

The next most common data loss occurs when there has been an Operating System Crash or System Crash.  In this scenario chances are good that the data is still intact on the hard drive, though it may not be accessible in the standard way.  A near full recovery should be possible in the majority of cases.

Virus and Spyware infections can also cause system failures and data destruction.  Data recovery in this instance varies depending upon how much damage has occurred.

Malicious destruction occurs when data is intentionally destroyed or deleted.  Once again, a data recovery in this case will vary depending upon the skill and thoroughness of the person responsible for the data destruction.  Recovery from this type of loss can range from a 100% full recovery, to a 0% total loss, depending upon the techniques that were used to destroy the data.

Typically the most severe data loss occurs when a system experiences a catastrophic hardware failure.  Because this type of data loss involves physical damage to the hard drive, in some cases portions of the hard drive can be rendered completely unreadable.  To recover data from a physically damaged hard drive requires very specialized equipment and techniques which means that this type of data recovery can be fairly costly.  Thankfully, hardware failure is the least common type of data loss.

In every one of these cases, the sooner the affected hardware is brought in for analysis the better the odds are that a recovery can be made.  Even in the worst case scenarios, partial recovery should be possible.

Typical types of data that can be recovered include but are not limited to:  pictures, music, videos, spreadsheets, databases, letters, and documents of all types.


There are two general categories for Data Recovery: 
  • Logical Failure: The hard drive is mechanically sound – it spins correctly, the operating system recognizes the device, and all of the mechanical parts inside of the hard drive are functioning correctly. However, there is some reason that the data cannot be accessed through ordinary means. (This can include: accidental deletion or format, data corruption, operating system crash, or miscellaneous lost partitions or boot records.)
  • Mechanical or Physical Failure: The hard drive is somehow physically damaged. Some internal part within the hard drive is no longer functioning correctly. The hard drive may make clicking noises or is not recognized by the operating system any longer. (This can be a hard drive crash or control board failure.)

How hard drive data recovery works:
  • Logical Failure: The lost data is most likely still intact on the hard drive unless new data has been written over it. When a file is deleted or the drive is formatted, the data is not actually removed; the area where the data was stored is simply reallocated for new data storage and the file pointers are reset.
  • Mechanical or Physical Failure: The data may still be intact on the hard drive platters but is not accessible due to some mechanical malfunction. Recovering data from a physically damaged hard drive is a very delicate operation and needs to be performed using specialized equipment and processes.

In the case of either a logical failure or a physical failure there is a good chance that data can be recovered successfully if the attempt to recover the data is made immediately after the data loss occurs.


If you suspect your system has experienced a data loss:

The first thing you must do is immediately power down your equipment.  Continuing to use your system after a data loss for any other activity, even browsing the Internet, can permanently modify and/or destroy your data. This is the single most important step to minimizing the amount of damage incurred in a data loss scenario.

Find out how our team of San Antonio Data Recovery specialists can help recover your critical data. 210-260-0045.

San Antonio Data Recovery

San Antonio Hard Drive Recovery

San Antonio File Recovery

San Antonio Laptop Repair