Computer Repair Service and Support - Australia
I have solutions to solve all your IT technical problems. Windows, Macs, iPhones & iPads. Victor Harbor, South Australia.
Welcome, I am your technical support, service and help for all issues related to the operation of your Desktop, Laptop and Macintosh device Windows & Apple .
Tablets. Networking. Email. Servers. Notebooks. Virus removal. Security. Apple-Windows Integration. System Recovery. Remote support.
- How I Work
I offer technical support and services for Laptops (Windows & Mac), iPads (Tablets), and iPhones (Apple). Highly skilled in Apple, PC and Linux platforms (software & hardware). 30 years technical experience .
30 years certified with Electronics Servicing, Engineering and Design background with; Radio, TV, VCR Electronic Servicing, Electronics Audio & Radio Frequency design, Computer Troubleshooting, Software and Networking.
Services are work-shop based (only) 6 days per week from 10:00 AM to 6:00 PM. Job turnaround-time is typically 24 - 36 hours with a hourly workshop cost (average) of $45.00 per hour. Call or Email
Computer Support & Maintenance
Making the most out of technology involves more than investing in the right services and hardware solutions. Equally imperative, you must ensure proper customisation and support to realize their best potential. Technology is my passion, and I have spent over 30 years cultivating the necessary IT skills and expertise to support and equip those users in the Fleurieu Peninsula.
My support ranges from troubleshooting errors, to resolving issues, to optimizing your computer for better performance, computer data migration, recovery and and much more. If. you are experiencing a problems or you just want better peace of mind, then please contact me .
I know how worrying and frustrating it can be when the gadgets you depend on stop working properly. So I talk in plain English and explain what we can do about a problem. You won’t ever be left scratching your head. And when I have fixed your problem, you can join with others and write a review to say thank you. It’s always a pleasure to share encouragement for I work some long hours to help you and for considerably less than others standard service charge fees.
I provide value by recommending certain IT products and helping to educate customers on how to make technology work for them (usually as a free part of other paid workshop services ).
Remote Support capabilities & Maintenance
Apple - Windows Integration
For most of us computers, tablets and mobile phones have become integrated into our everyday life. For all the great advantages that this technology provides, setting up and maintaining your devices can often be tricky and time-consuming. So, to ensure your support needs are met, and everything runs smoothly, I am here to share my knowledge and help you get the best from your purchase. New computer, old computer, even really old computer (yes even that old Windows XP).
I have the skill to transfer your data and (often) programs from your old machine to your new one, whether it be PC to PC, Mac to Mac, or PC to Mac. Additionally, I can build you a multiple operating system; such as running Windows 10 on a Mac OS X . And that is often a technical challenge for the average computer owner. I can even downgrade operating systems if required and without losing your current data. I use external disk imaging (archiving) to with your data to make sure nothing gets lost.
Both Windows and Mac have access to Adobe Reader, iTunes, iCloud, Thunderbird, Gmail, Google Chrome and Firefox. To Sync from your iPhone to your PC is easy enough with iCloud.
Do I need [want] a Windows laptop, iPad, MacBook or Chromebook?
Current devices broadly run on three different operating systems that run on the four main varieties of portable devices:
Some of the most common devices run Microsoft"s Windows operating system. They are able to perform wide-ranging tasks and have the greatest variety in models, brands and pricing. Microsoft recently released Windows 10 S , which is designed to compete with Chrome OS, limiting some apps and downloads. Windows laptops have also been considered [much] more vulnerable to virus's. Update: Microsoft have recently released a new Surface Pro Ultra-light and versatile "3-in-1" device.
The common tasks people perform on their laptop or desktop PC are the very same tasks in which the iPad excels: surfing the web, checking email, finding out what friends and family are up to on Facebook, playing games, balancing the checkbook, writing a letter or a document for school, etc. General productivity has also become increasingly easy on the iPad. The virtual touchpad makes manipulating text easier, the iPad supports Microsoft Office and includes a free version of Apple's iWork, and if you need to do a lot of typing you simply connect a Bluetooth keyboard.
The MacBook Pro, MacBook and MacBook Air are all Apple laptops running on Mac OS. They are generally seen as powerful, smooth and reliable (require less service). They are best for high performance software and connectivity to other Apple products, but are [likely] more expensive.
Google’s Chrome OS used on Chromebooks is largely limited to online use, essentially operating like a web browser. Rather than installing programs users access them through Google's Chrome web store. They have limited storage capacity, but are fast and inexpensive.Generally businesses lean more towards Windows cloud-based solutions, which is a fancy way of saying they are building software on the web, many business users use software that requires Microsoft Windows.
iPad with external bluetooth keyboard and stand
MS Surface Pro and Apple MacBook Pro
Computer Security Precautions
Precautions for Computer Users
Cyber Crime Targets
Social Media Attacks and Threats
Secure Your Online Banking
- Never use same PIN CODE or PASSWORD for multiple bank accounts
- Never use unprotected computers at cybercafe's for internet banking
- Do not keep your pin code and cards in the same location
- Never leave the computer unattended when using internet banking in a public location
- Register with your personal mobile for SMS / Email alerts for funds transactions
- Never respond to emails asking for your password or pin code
- Be safe! Visit bank websites by always typing the URL in the address bar
- Log off and close your browser when you are finished using internet banking
- When using a public ATM always conceal the keypad before entering your pin code
- Before using a public ATM, check that there is no extra device installed in the surroundings
Secure Your FaceBook
- Use the optional extra security features to access account (Login alert etc)
- Consider using a login notification alert
- If possible, only allow specific individuals to view your FB contents (Videos, Photos and Friends etc.)
- Control who can contact you
- Consider blocking your personal profile from search engines
Secure Your Wi-Fi Devices
- Do change the default administrator password and Username of any Wi-Fi Router
- Use a complex password and try to change the password at regular intervals
- Position the Router or Wi-Fi Access Point safely out of sight
- Turn off the Network / Wi-Fi routers if you are leaving the location for a few days
Safer Internet Browsing
- Do not click on links inside e-mails or messages (think)
- What you put (post) online will nearly always remain there
- Never trust any free online content!
- Do not provide personal information online to get something free
- Only download programs and apps from approved (trusted) sources
- Do keep up with operating system updates - as often as you can!
- When browsing or shopping on your phone or computer, always look for "https" in the url instead of "http"
Social engineering is a growing technique used by cyber criminals to get access to your confidential information. With social engineering, attackers use emotive manipulation and deceit to trick victims into giving out confidential information. Some of the basic social engineering methods used by attackers are:
- Sending messages (emails) that contain dangerous attachments (e.g. malware) with text (bait) that encourage people to open the attachments
- Sending messages (emails) that contain links to dangerous sites (e.g. malware) with text (bait) that encourage people to visit the links
- Claiming to be the main administrator of a local network and asking for the victim’s password in order to perform a maintenance check
- Telling a victim over the phone that he/she has won a prize, but in return they ask for a credit card number to deliver it
- Telling a victim over the phone that he/she has a virus / problem on their computer (hang up immediately!)
Identity theft refers to a crime where an individual maliciously obtains and uses another individuals personal/sensitive information to commit frauds/scams by using the stolen identity. Mostly this crime is committed for economic gain. The cyber criminal tries to gain access to an individuals information by stealing e-mail details, any stored information on a computer. Identity thefts includes but is not limited to shoulder surfing, dumpster diving, spamming, spoofing, phishing, and skimming.
Alert: Read a more in-depth article about Cyber Crime prevention, Safety and Tips here .
Where & When
South Australia. 5211
Saturday: 10AM - 2PM