Archive for the ‘Computer Tips’ Category

How to prepare your computer for repair

Posted by

Mac Laptop Repair in St. LouisRemove computer from any computer case, computer box, computer packaging, or computer bag. Do not leave us with your computer case, computer packaging box, or computer bag. We do not have room to store this stuff for you.

Remove all usb drives, usb dongles, external hard drives, blue tooth dongles, and any extraneous hardware such as mouse, keyboards, printers, speakers, microphones, headphones, and monitors, attached to your computer or device before dropping off at South City Computer.

Remove all CD/DVD or other media from drives. We can not be responsible for your 2nd season of “Friends” DVD left in the DVD drive so please remove it before dropping it off at South City Computer.

Bring the power cord with your laptop, tablet, phone, all-in-one computer, or device. Most desktops use a standard power cord. Bring it, and the service technician will instruct you whether or not South City Computer will need it to perform your computer repair service.

Ensure your computer is clean and free of food, dust, and other debris. We know that most people eat, drink, and even pick their nose at their computer. Please do not bring us a computer covered in food, dust, boogers, and other unspeakable fluids! We are trying to provide you computer repair service, we are not a computer cleaning service. We will disinfect the computer at the time of drop off, however we do not want to have to scrub boogers and debris from the keyboard and cracks of your computer. If your computer is exceptionally disgusting, we may have to charge you a cleaning fee.

Let us know if you or somebody else is sick and has used the computer or if you are bringing your computer in because you or somebody else vomited on/in it. Let us know ahead of time so we can make special preparations to handle your computer with latex hospital gloves and respiratory masks.

Let us know if you dropped your device into a toilet or other unsanitary conditions so that we can prepare to handle your device accordingly with latex hospital gloves.

Provide the service technician clear and accurate description of your issue. Be sure to include what you were doing when the computer stopped working, any error messages you recall, any strange pop-ups, any strange behaviors or sounds your recall coming from the computer, any programs you installed or uninstalled before the issue started, also if there were any other anomalies such as power outages or electrical storms that could be related to the computer issue.

Provide all passwords and user accounts that South City Computer will need to access the computer.

Let us know if you need the data backed up on the computer. If data needs to be backed up, provide the service technician all files, file types, directories, and file names that you would like attempted to be backed up.

Inform the service technician of any programs you use that put their data files in places outside the Windows user directory such as Quick Books, Quicken, or Microsoft Outlook.

Be prepared to wait for service. Our typical turn around on a computer diagnosis is 2 to 5 business days. If you need expedited service talk to a support service technician about the options South City Computer offers customers who need computer repair service fast! Also, South City Computer Club Members always enjoy concierge services and get moved to the front of the line on most computer repair services. Don’t call or email constantly to check the status of your computer repair, this does not speed things up, as we are answering your phone calls and emails instead of repairing computers.

Bring cash, check, or credit/debit card to make the initial payment for service. We cannot begin work on your computer repair service until we receive payment up front.

Please know that we do not offer refunds on any payment you make to South City Computer, even if you choose to forgo the initial diagnosis or other service. If you are professional, friendly, courteous, and easy to do business with, we will most likely offer you in-store credit if you decide to not move forward with a repair, but this is not a guaranteed, and totally up to managements discression.

10 ways to avoid getting a virus

Posted by

Registry Reviver JunkwareThe Internet can be very tricky at times, much like the streets of a large city, people can easily be fooled if they don’t use their “street-smarts” in every situation they encounter online. People who let their guard down online can easily be fooled into installing unwanted spamware, ransomeware, malware, virus, trojans, or worms. Avoide the following 10 most common ways our customer’s typically have gotten a computer virus on their computer.

1. Have an anti-virus program installed and running. Having anti-virus protection can help to reduce your risk of getting a computer virus. But do not rely too heavily on these programs, as many new viruses are still unknown to the anti-virus programs and there is always a lapse in full protection. Many new viruses have not been documented and released in the most recent virus definitions. Also most anti-virus software only do system scanning and do not do real-time system monitoring, and the ones that do offer real-time system monitoring may not always catch viruses getting installed on the computer.

2. Keep anti-virus software up-to-date with the latest virus definitions. Just having an anti-virus software installed on your computer is not enough to protect you from the latest virus and computer threats. Keep your anti-virus definitions up-to-date with the latest virus definitions. It is recommended to run anti-virus definitions updates on a daily basis to ensure the most effective anti-virus protection.

3. Keep your operating system up-to-date. This means run those pesky Windows Updates whenever your computer prompts you to. Updates oftentimes contain security patches and fixes that have been identified by the software distributor as vulnerabilities. It is best to set your computer to automatically update at a time that you would most likely not be using your computer, such as 3AM. Just remember to leave your computer on and connected to the Internet overnight to install these critical updates.

4. Only open email attachments from trusted sources and in believable situations. Most people get computer viruses by downloading attachments to emails. The attachments can seem legitimate such as a attached document, media file, or picture sent to you from friends or family. However you should be very careful not to download a virus. Sometimes friends, family, or coworkers email accounts can get hacked and will send out malicious software. Always check the file extension that is attached to an email before downloading it onto your computer. If the file extension is a .exe, .bat, .msi, .zip, .msm, .msp, .mst, .idt, .cub, .pcp file this could be a malicious software application. Common pictures file types are .jpg, .png, .gif, .tif, .bmp, and some common document file types are .doc, .docx, .xls, .xlsx, .odt, .txt. If you get an email with a strange file attached to it that doesn’t look like any of these common extensions, it is probably best to first verify with the trusted sender that they indeed sent the file. Also never click on links sent in emails that seem vague like “hey look at this link” or “click here to see my pics”.

5. Never install programs from the Internet that claim to fix a computer issue. While it may seem like a good idea to ask “Google” to fix your computer issue for you. Unfortunately most websites that claim to fix a computer issue by installing a program are not legitimate and are likely just fishing websites to get spam-ware, and other malicious software installed on your computer. Always take your computer to a legitimate computer repair business to fix your computer issue, and never search for a fix using a software program from the Internet.

6. Never illegally download pirated software, music and movies. Most illegal pirating networks, file sharing networks, and file link website will contain malicious software disguised as the newest software, movies or pop music albums. Always purchase software, music, and movies legally to avoid getting a virus from these untrusted file sources.

7. Do not try to install extraneous video and audio codecs. Sometimes you may find a file that has a strange extension. It seems logical to try to find a audio or video codec, or other program that could read this extension, however it is more likely that you would download and install a virus than the actual solution for your file type.

8. Do not install programs that claim to enhance the performance of your computer. There are some programs online that will claim to speed up your computer, or enhance the performance of your computer, or even promise to enhance the graphics capabilities of a computer. These are most likely untrusted websites that try to trick you into installing spam-ware, ransom-ware, malicious programs, and viruses onto your computer.

9. Do not install illegal software on your computer. You may find yourself in situations where a friend, family or other acquaintance has a “hot” copy of a popular software app like Microsoft Office or Adobe Creative Suite for FREE. If it sounds too good to be true…well then it probably is. Do not be fooled, these types of software cost hundreds to thousands of dollars, and the pirated “hot” copies tend to be packaged with malicious software. Always purchase software legally from trusted software distributors. Never install “hot” or “cracked” versions of a licensed software or service.

10. Do not click on pop-ups! Really, DON’T DO IT! Some pop-ups mimic Windows operating system alerts, and can look very convincing at times. Here are a few dead give-aways that you may have an untrusted pop-up:

  • has strange unfamiliar icons
  • the error message has improper English
  • the pop-up box has a message in it promissing to fix your computer issues
  • the pop-up moves around
  • the pop-up says your computer is infected with a virus

Even the most cautious computer user can sometimes be fooled into installing a computer virus. If you think you may have a computer virus on your computer, contact South City Computer for a tech visit today.

5 Great Holiday Tech Gifts

Posted by

Holiday Tech GiftsWith the holidays only a few weeks away you may be scouring the Internet or going from big box store to big box store in St. Louis looking for some ideal tech gifts. The following are 5 really cool new tech gift ideas that could be just the right gift for the tech savvy person or the not so tech savvy person on your gift giving list.

South City Computer Club Membership

Possibly the best possible gift you can give this holiday season is peace of mind. The South City Computer Club allows members to get exactly that, “peace of mind”, and at a reasonable price of just 24.99 per month! Members can get support when they need it most, like installing a software program, troubleshooting a computer issue, getting a new printer to work, or just getting a computer question answered. South City Computer Club members also enjoy discounts on all of our computer and smart phone repair services. But that is not all, South City Computer Club members get 50 GB of private cloud storage backup for important data, and if that is not enough members can even buy more storage as needed. Contact South City Computer today to find out more information.

IPad USB and SD Card Reader

Apple iPads lack standard inputs like USB and SD Card readers, and can be frustrating when trying to use standard plug and play devices like digital cameras. The iPad CF and SD Card Reader by Photojojo is the perfect solution to turning your iPad into a plug and play device for your digital camera.

External Hard drive

If the South City Computer Club cloud storage doesn’t appeal to you, than this is a no brainer gift idea! Give an external hard drive to back data up onto. An external hard drive is an easy and affordable gift idea for anybody that has a large music and movie collections, or important documents that need to get backed up! External hard drives also range in price from super cheap to super expensive based on the amount of storage you purchase. At South City Computer we have many external hard drives available of purchase.

The OontZ Angle

Do you wish you could listen to music or watch movies on your smart phone or tablet, but can’t stand the the tinny sound that these small devices output. The OontZ Angle is an ultra-portable wireless Bluetooth speaker by Cambridge Soundworks. The speaker offers better sound, better volume, at an incredible price! The Oontz Angle works with both iPhone and Android devices.

Amazon Echo

The Amazon Echo is a voice activated personal assistant device for the home. The device activates to the sound of a chosen keyword. The device is much like Apple’s Siri in that you can ask it for relevant information as you think of it. It can tell you the current time, your weather forecast, play your music, or even tune you into the current news. The Amazon Echo device can also do your laundry and clean your house, just kidding!, but it is a pretty handy addition to any household. The device only requires an wall outlet and wireless Internet. The device is currently available for purchase to Amazon Prime members.

How to Be Safe Online This Holiday Season

Posted by

As the holidays rapidly approach and ordering online from the comfort of one’s laptop is the norm for gift giving, one must be wary of scams, downloading malware, and getting their credit card numbers stolen. Looking for gift ideas and deals online can be a great deal of fun. Sites like Pinterest, Etsy, E-bay and even Amazon can give you hours and hours of gift browsing and buying fun. With the power of Google search having price comparisons instantly at your fingertips is easier now than ever. But given how easy it is for anyone to put up a website or online store with too good to be true cheap gifts, sometimes you have to look deeper to make sure you aren’t getting phished for your credit card number!
Credit cards

1. Be careful of phishing websites. A phishing website is a website that entices or fools you into putting in your personal information, your password, or your credit card information. Oftentimes you will encounter a website that has products at amazing too good to be prices, so you go through the entire order process and you never get your order. In fact, you may never see a charge at all from that website. Instead your credit card information was silently harvested to be later sold by criminal cyber gangs to commit fraud at a future date.

2. So stick to name-brand familiar sites like Amazon, Ebay, etc.. that have reputation scores for sellers, verified bank accounts, channels for mediation and resolving complaints, and other buyer protections. Also it may be worth mentioning that big sites all use encryption and are under more scrutiny for PCI-DSS data protections than smaller sites. When you run your credit card with Amazon you know they are fully staffed with experts in data security, there are anti-fraud measures in place, and your order will be handled in an expected manner.

3. Be careful that the connection is secure. If you do choose to buy from a merchant that has their own shopping cart, chances are the purchase is ok. Look to make sure the connection is secured (ie: HTTPS). Also look for a telephone number and an address of the company or person you are buying from. It might not hurt to try to email or call them too first if you have any doubts. But just be vigilant, the site needs to have a secure connection if you are ordering with your credit card.

4. Double check emails that have attachments are coming from who they say they are. Anytime you get an email from anyone that has an attachment it’s good practice to verify the identity of the sender. You can do this by viewing the headers in your email. Look for the originating address. It should match the sender you expect. It’s easy to fake the sender address so it always pays to be extra careful with email attachments.

5. USPS, FedEx, and UPS will not send you emails with attachments. If in doubt, call their published customer service numbers. We have seen an uptick in emails from postal and other delivery services saying the packing slip is attached, or there is a document you need to download and sign in order for them to release the package, etc… Don’t fall for it. See number 4.

6. Don’t fall for customer service calls from online vendors. Not only will scammers and cybercriminals try to steal your information online, they will call you and ask you to verify your account information. Do not give your personal information to someone calling you on the phone, always offer to call them back. You should always be careful even if the caller ID is the same as the company they say they are calling from. It is very easy to spoof/fake caller ID. Don’t trust the caller ID as the number to call back, or if they give you a number to call them back don’t trust that one either.Look the company up, and call them at their published number. If they really did call you there will be a note on your account and a customer service rep will be able to help you.

7. Monitor your bank account more closely for unusual activity or purchases you didn’t make. The sooner you see an error the easier it is to correct it. Take a proactive approach to monitoring your own bank accounts. With online account access and Phone Apps it’s never been easier to keep up in real time with your account balances.

Could your computer screen be damaging your health?

Posted by

Iphone 4You’ve probably heard before that using your computer too close to bedtime can cause sleep loss. Many have dismissed this as something of an urban legend, or something your mother would tell you because she thinks that you’re not getting enough sleep. If that’s true in your case, don’t let her see the results to this study, because it shows that there may indeed be some truth to such statements.

So, what can you do to prevent eye strain when using your computer? There’s a variety of options, the simplest of which would be wearing orange lenses when on the computer. Of course, this is a bit impractical, as you probably don’t want everything on your screen to look orange. Fortunately, there is another option. You may be familiar with screen protectors for phones, but did you know you can get ones that filter out the harmful UV wavelengths? South City Computer offers such protectors for a variety of devices, including phones, tablets, laptops, and even desktop monitors. We also offer professional bubble-free installations! Contact us for more information.

What free anti-virus software do you recommend?

Posted by

Microsoft Windows Defender Anti-Virus SoftwareOften we are asked what anti virus software to use? While it is totally preference at this point since most anti-virus software’s do the task of scanning and monitoring your computer for suspicious programs, viruses and malware, not all anti virus softwares are free. We usually recommend a free anti-virus software since subscription renewals can be easily ignored, and it is better to have current anti-virus definitions than to have none at all.

Miscrosoft Security Essentials

Microsoft Security Essentials is anti-malware and anti-virus program put out by Microsoft for Windows XP, Windows Vista and Windows 7, but not for the Windows 8 operating system.

The software provides real-time protection and scans new files as they are downloaded or created, and disables detected threats. The software scans the computer routinely and updates the virus definitions database automatically. The software integrates seamlessly into the Windows operating system.

Microsoft Security Essentials license agreement allows home users to download, install and use it on an unlimited number of computers in their households free of charge, so long as each computer has a legitimately licensed copy of Microsoft Windows.

Unfortunately due to its popularity a few malware programs try to impersonate or resemble it to fool users into installing them instead of Microsoft Security Essentials. A few virus/trojan programs disguised as Microsoft Security Essentials called “Security Essentials 2010” and “Microsoft Security Essentials 2011” have appeared on the Internet and closely resembles Microsoft Security Essentials. The virus uses sophisticated social engineering to deceive users into infecting their systems, under the guise of five different fictional anti-malware products. It also terminates and prevents the launch of many popular programs, including Registry Editor, Windows Command Prompt, Internet Explorer, Mozilla Firefox, Opera, Safari and Google Chrome.

If you think you may have a rouge anti-virus software that is trying to mimic Microsoft Security Essentials, take your computer to South City Computer or a local computer repair shop to be scanned for malware.

Windows Defender

Windows Defender is released by Microsoft and started out as an anti-spyware program for Windows XP, Vista and 7, however the most recent releases has expanded to an anti-virus, anti-spyware and anti-malware software and comes as the standard anti-virus on Windows 8.

Windows Defender provides real-time protection and integrates with Internet Explorer enables files to be scanned as they are downloaded to try to avoid accidentally downloaded malicious software. Microsoft Windows Defender does not scan files downloaded with other web browsers like Firefox or Chrome.

Windows Defender greatly resembles Microsoft Security Essentials and uses the same virus definition updates. As a result, Microsoft Security Essentials is not compatible with Windows 8.

There are seemingly new computer viruses created everyday, and while no anti-virus software can protect you 100% of the time, luckily, there are a few free anti-virus programs available that to attempt to make your computer safer.

Change a Windows Password using Linux Boot CD and Command Prompt

Posted by

If you are unable to Administer a Windows Users password on a computer you may need to modify the way Windows normally functions in order to bypass this issue.

Using a Linux Boot CD, on the hard drive where the Windows operating system is installed.

cd /Windows/System32/

mv Ultilman.exe Utilman.exe.bak

cp cmd.exe Utilman.exe

So by switching Utilman.exe to be the cmd.exe program, we can get a command prompt when you click on the accessibility button on the log in screen.

Boot the computer into Windows. When you get to the log in screen click on the accessibility button, you will get the Windows command prompt.

In the Windows command prompt run the command:

net user Username password

To change a Windows User’s password using the command line, you must set the password to something, it cannot be left blank. So you could set the password to “password” if you like.

In the case that its Windows 8 and it is a Microsoft account, you cannot reset the password like the previous example, however you can use this command on the command prompt:

net user Administrator /active:yes
net user Administrator password

Then reboot the computer and log in to the new administrator account. Change the Windows User’s account to local, then set/unset the password.

This activates an Administrator account so you can go in and manually administer the users password through windows.

How does Junkware get on a computer?

Posted by

Do you have software programs that appear to be trying to keep your computer safe from spyware, malware, viruses, trojans, worms, and ransomeware however are more annoying than good? Do you not know how these software programs got onto your computer in the first place?

Oftentimes this “bloatware” or “junkware” is installed on a computer via a third party installer possibly bundled with free computer games, media players or CD burning software. The “junkware” will sometimes even get installed on a computer by tricking a user by popping up a fake “windows-like” alert that offers a “fix” to an “issue” on a computer. Junkware is often installed on a computer without the direct knowledge or consent of the computer owner.

Junkware usually is installed on a computer as “freeware” as in it is Free to install and use, however oftentimes the real intent of the software is to sell an upgraded version to the computer user.

The real disadvantage of having junkware on a computer is that it is using the processor and RAM and ultimately making the overall speed of the computer slower. When several junkware programs are running at the same time, it can really make a computer crawl!

Examples of Junkware

SUPERAntiSpyware JunkwareSUPERAntiSpyware is a “Freeware” software application which can detect and remove spyware, adware, trojan horses, rogue security software, computer worms, rootkits, parasites and other potentially harmful software applications. Although it can detect malware, SUPERAntiSpyware is not designed to replace antivirus software.

Registry Reviver Junkware“Registry Reviver” is another common “junkware” software application that people often have on their computer. Registry Reviver is registry utility whose purported purpose is to remove redundant items from the Windows registry. The software helps to automate the process of looking for invalid entries, missing file references or broken links within the registry and resolving or removing them. The necessity and usefulness of registry cleaners is a controversial topic, in which most experts are in disagreement over their benefits.

Registry Reviver software is typically bundled with third party installers. The software attempts to trick a user into installing it with a message that the software will “Offer your users a registry scanner and optimization tool designed to let novices find registry errors and help maintain peak Windows performance.”

Can Junkware be Uninstalled

Sometimes a computer user can uninstall junkware via the Windows uninstaller in the Control Panel. However oftentimes these programs will leave “junk” in your registry that may cause issues in the future with the computer. To insure that the “junkware” is properly uninstalled from a computer, take the computer to a local computer repair store where a computer repair technician can properly uninstall the junkware from the computer. To be sure this junkware get removed from your computer Call South City Computer today to scheadule an appointment.

Does your computer have Malware?

Posted by

Windows MalwareWatch out for a new piece of malware and spyware that has been popping up on many computers that are coming into our computer repair shop in St. Louis this past couple months. Malware is short for “malicious software” and is unwanted software that can hijack certain functions of your computer, steal sensitive information, and can put your personal information and data at risk. Malware is usually bundled with tojans, worms, rootkits, spyware, adware, ransomware and viruses. Unfortunately most malware can be very tricky to remove. The new malware we have been seeing has no easy removal method at this time and reeks havoc on the computer’s Windows registry. The Windows registry is the place where Windows stores Operating System and program configurations.

All malware is annoying and potentially harmful to the data and personal information on your computer. You should not continue to use your computer if you believe it has been infected with Malware, and should bring your computer into a local computer repair store like South City Computers for repair as soon as possible.

You should never attempt to download any programs that claim to remove or fix a certain malware program or virus you may have on your computer. Often times these programs just install more malware and viruses on your computer and make matters a lot worse.

You should never interact with malware programs since they are malicious in nature and could cause serious harm to your computer.

Signs that you may have Malware

When you attempt to go to certain “most visited” websites like Google.com, Facebook.com, or check your email the malware will redirect your browser to a malicious website and you can never get to the website you requested. This usually happens regardless of the web browser you attempt to use be it Internet Explorer, Google Chrome, or Firefox.

When you try to uninstall the malware through the Windows uninstaller, the malware will attempt to get you to actually install more malware onto the computer, or takes you to a website to download an “Uninstaller” program.

If you are noticing pop-ups and mysterious program notifications from programs that claim to be “Optimizers”, “Anti-Malware”, “Anti-Virus”, “Registry Cleaner”, or “System Repair” software.

Your computer is running slow, and seems to be doing a lot of processing even when the computer is sitting idle.

Your computer will not longer run Windows Updates.

Your computer is unable to run your Anti-Virus software.

Your computer is unable to run an anti-virus scan.

Your computer is unable to update your Anti-Virus software.

Your computer throws missing .dll errors when you try to launch certain programs.

Your computer will no longer connect to the Internet.

Your computer is prompting you for payment information to “fix” your computer.

Your computer will no longer print or communicate to external devices such as printers.

If your computer is doing any of the strange behaviors listed above, or you think that you may have installed malware on your computer bring it to the computer repair experts at South City Computers in St. Louis today.

Local Computer Repair in St. Louis

Posted by

buy-local-computer-repairAre you looking to support local business? We offer local computer repair in St. Louis offering computer repair, new and refurbished computer sales, and south saint louis business IT services to individuals, organizations, churches and businesses. We are specialized in computer repair, data recovery, virus removal, malware removal, networks, computer support, screen repair and replacement, motherboard repair and replacement, as well as VOIP phone systems, and smartphone/iPhone/Android iPad/tablet repair.

There are lots of great reasons to buy local computer repair in St. Louis services beyond just feeling good about supporting small business in your community. Did you know your dollars have significantly more impact when you buy from a small locally owned shop than from a national chain? Here are ten reasons you may not have thought of:

When you buy local you actually support yourself: Many economic impact studies have shown that buying from independent, locally owned businesses, rather than from giant nationally owned corporations considerably more of your dollars are used to buy from other local businesses, service providers and farms. South City Computer actively buys from other local businesses so you can rest assured that your money is staying in our neighborhood which strengthens the economic base of our community. Economic impact studies show these that locally-owned businesses generate a significant economic impact to the community and our tax base.

Local businesses support more community groups: Non-profit organizations get on average 250% more support from small businesses than from large corporations.

Local businesses help to make our community unique: Our shopping choices like where we get our computer repaired or where we have fun all creates a unique take on community. One-of-a-kind businesses help to create the distinct character of our neighborhood. Visitors to our community businesses also benefit. South City Computer has gotten many customers while on vacation or businesses trips through local Google searches seeking a local computer repair shop that can offer them the feeling of being someplace unique, not in just a big box store.

Local businesses reduce their impact on the environment: Locally businesses purchase more from other local businesses which reduces the required transportation. South City Computer sources much of its refurbished computers from a local St. Louis computer recycling company. South City Computer is easy to walk to, is a neighborhood shop, and requires less driving and hassle to get to, creates less pollution, CO2 emissions, etc…

Local business creates more jobs: Small local businesses employ more local people in our community and provides a lot of jobs to residents. All of South City Computers’ employees live in the neighborhood!

Local businesses provide higher quality service: We hire people with a better understanding of the services we sell and we spend significant time providing ongoing coaching training and mentorship. We also take time to get know our customers, send surveys, and create real relationships.

Local businesses make investments in our community: South City Computer bought and rehabbed its own building into a live/work on Ivanhoe. The owners live upstairs anmd actively participate in the Lindenwood Park community, are unlikely to move, and are heavily involved in the community’s future.

Local businesses’ taxes go good things: Local businesses in the city needs less government and utility investements in infrastructure and are more efficient when using public services as compared to nationally owned big box stores, that tear down housing for parking lots and giant warehouse stores.

At local businesses you can buy what you need, not what someone wants you to buy: When you shop at South City Computer we provide you with the service of helping you to find the right computer for your needs, not high pressure commission based sales on inventory that needs to get moved. This actually gives you more choices since we are not wed to any one distributor or computer brand.

Local businesses generate local prosperity: A large body of economic research proves that in an increasingly corporatized one size fits all homogenized world, small community entrepreneurs and highly skilled workers are more likely to make investments and live in communities that preserve their one-of-a-kind businesses and unique character.

So when you are thinking of buying a new computer or getting your old one fixed, we would appreciate it if you would keep in mind your dollars not only get spent on your computer, but will also be reinvested in your community, helping other merchants you shop at and love to keep their doors open and their lights on.

// //
//