Theme Green Blogs - GoGo Geek: Latest News
Bookmark and Share (Home)
Subject: All Computers Repaired
(Posted on Jul 7, 2010 at 10:39AM)

Tags: Installation, troubleshooting, wired networks, wireless security

ALL COMPUTERS REPAIRED
 
Hardware failures, hardware upgrades and installations, new computer sales and setup, printer. scanner setup, and much more

Virus/Spyware: removal of all viruses and spyware.  Installation of software to prevent re-infection,, modifications to firewalls, and teaching virus/spyware prevention methods

Networks: Installation, troubleshooting, and additions to all wired networks, installation and configuration of wireless networks and securing wireless networks

Server Work: working on a  servers including Windows NT, 2000 Server, 2003 Server and other operating systems


Data: Data back-up and recovery.

 - and so much more

If you are looking for professional Computer Repair in Vancouver, or anywhere in Canada Call Us Today:

1-800-404-4335 Or Visit Us Online: http://www.gogogeek.com

No comments.

You need to be logged in to post a comment.
Subject: Why is Cyber Security a Problem?
(Posted on Jul 6, 2010 at 11:18AM)

Tags: Cyber security, Hacker, attacker, intruder, computer Vulnerability

You've heard the news stories about credit card numbers being stolen and email viruses spreading. Maybe you've even been a victim yourself. One of the best defenses is understanding the risks, what some of the basic terms mean, and what you can do to protect yourself against them. 

What is cyber security?
It seems that everything relies on computers and the internet now — communication (email, cellphones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system?
Cyber security involves protecting that information by preventing, detecting, and responding to attacks.

What are the risks?
There are many risks, some more serious than others. Among these dangers are viruses erasing your entire system, someone breaking into your system and altering files, someone using your computer to attack others, or someone stealing your credit card information and making unauthorized purchases. Unfortunately, there's no 100% guarantee that even with the best precautions some of these things won't happen to you, but there are steps you can take to minimize the chances.

What can you do?

The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with them.
Hacker, attacker, or intruder - These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain. Although their intentions are sometimes fairly benign and motivated solely by curiosity, their actions are typically in violation of the intended use of the systems they are exploiting. The results can range from mere mischief (creating a virus with no intentionally negative impact) to malicious activity (stealing or altering information).
Malicious code - Malicious code, sometimes called malware, is a broad category that includes any code that could be used to attack your computer. Malicious code can have the following characteristics:

It might require you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page.
Some forms propagate without user intervention and typically start by exploiting a software vulnerability. Once the victim computer has been infected, the malicious code will attempt to find and infect other computers. This code can also propagate via email, websites, or network-based software.
Some malicious code claims to be one thing while in fact doing something different behind the scenes. For example, a program that claims it will speed up your computer may actually be sending confidential information to a remote intruder.
Viruses and worms are examples of malicious code.

Vulnerability - In most cases, vulnerabilities are caused by programming errors in software. Attackers might be able to take advantage of these errors to infect your computer, so it is important to apply updates or patches that address known vulnerabilities.

For more information about your computer security online call Canada's #1 choice for computer support GogoGeek: 1-800-404-4335

No comments.

You need to be logged in to post a comment.
Subject: GoGoGeek Rapid Response Race Car
(Posted on Jul 2, 2010 at 11:16PM)

Tags: computer news canada, Home computer repair comes to you
Check out the rapid response computer repair racecar.

 
Showing 1 Comment:

Posted by: GoGo Geek on Jul 3, 2010 at 13:09
This picture was taken at Van Dusen gardens Last year at the All British Feild Meet.  There were over 500 British cars from all over B.C.


You need to be logged in to post a comment.
Subject: Home Computer Repair On The Rise
(Posted on Jun 16, 2010 at 03:21PM)

Tags: Home computer repair comes to you
More and more people are getting online as the cost of computing equipment continues to fall while the proliferation of smart phones and now Apple's new offering the iPad. With all the Internet activity, there are more and more times to attract viruses or just attract clutter that slows your computer down. GoGo Geek can help. We have fast friendly tech that come to you. On call does is all!
No comments.

You need to be logged in to post a comment.
Subject: GoGo Geek Fresh From The Oven
(Posted on Jun 16, 2010 at 11:40AM)
GoGo Geek unveils its newest WCM (web content management) driven web presence today.  As everybody seems to be moving to an online business strategy, upgrading our web presence to a more interactive offering made the most sense.
No comments.

You need to be logged in to post a comment.