Our company is based on the belief that our customers' needs are of the utmost importance. Our entire team is committed to meeting those needs. As a result, a high percentage of our business is from repeat customers and referrals.
We would welcome the opportunity to earn your trust and deliver you the best service in the industry.
Our goal is to provide such good customer service that our clients will refer us to their family and friends. In Herkimer County, "word of mouth" advertising is very important to a business' success or failure. If we can leave a good impression with our clients and they in turn refer us to someone else, that is the biggest compliment we can get. We understand that computer issues can be frustrating and we will help you in anyway possible without the huge repair bill. There are no initial charges for looking at your computer and we will not fix anything till we discuss it with you.
Compufix was started in 2008 by Dan & Todd Platts due to the high demand for computer services targeting both personal use and small businesses. Many people cannot afford to hire a full or even part-time IT Specialist to handle computer issues that come up on a daily basis. Compufix is your on-call solution for all your computer needs.
Born and raised in Ilion, Todd is a graduate of the HCCC college with a Associates degree in Information and Network Technology. He has over 14 Years exp. with computers and networking. Dan has 11 years exp. in computer technology.
Some Computer Issues We Run Into
Generically, ad ware is any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. The justification for ad ware is that it helps recover programming development cost and helps to hold down the cost for the user.
Ad ware has been criticized because it usually includes code that tracks a user's personal information and passes it on to third parties, without the user's authorization or knowledge. This practice has been dubbed spyware and has prompted an outcry from computer security and privacy advocates, including the Electronic Privacy Information Center. Noted privacy software expert Steve Gibson of Gibson Research explains: "Spyware is any software (that) employs a user's Internet connection in the background (the so-called 'back-channel') without their knowledge or explicit permission. Silent background use of an Internet 'back-channel' connection must be preceded by a complete and truthful disclosure of proposed back-channel usage, followed by the receipt of explicit, informed consent for such use. Any software communicating across the Internet absent of these elements is guilty of information theft and is properly and rightfully termed: Spyware."
Spyware is a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behavior to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. If you see new tool bars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spy ware. Even if you don't see the symptoms, your computer may be infected, because more and more spy ware is emerging...
Malware (a combination of the words malicious and software) is software code designed to infiltrate and/or damage a computer system without the owner's knowledge. Sometimes people use the term "computer virus" interchangeably with the term malware. Surveys report that 95 per cent of people use antivirus software, but infections remain common.
Computer professionals consider viruses to be a subset of malware. Malware includes computer viruses, worms, adware, spyware, trojan horses, and other malicious software.
There is a war underway between malware professionals from companies like Norton and McAfee, and the bad guys who are often from Eastern Europe. As of today, the bad guys are winning.
Barack Obama has promised to appoint a "Cyber Czar" to lead the fight. Obama emphasized that the cyber threat is "one of the most serious economic and national security challenges we face as a nation. It's also clear that we're not as prepared as we should be, as a government or as a country."
An unacceptable percentage of PCs are infected. According to Harvard Law professor Jonathan Zittrain's interview on 60 Minutes, 30% of computers have malware on them at any one time. PandaLabs Security estimates that just one virus, Conficker, infects 6% of the world's computer population.
According to Symantec, unsolicited e-mail (spam) makes up over 90 percent of all messages on corporate networks. Symantec further reported that almost 60 percent of spam is now generated by malware botnets, computers that have been hijacked by criminals. Dunbot, the worst of the spamming botnets, generates over 18 percent of all spam.
Malware gangsters now commonly use websites that sell fake anti-virus software or offer bogus downloads to distribute their malware. Video "Codecs", which is software for viewing on-line video, is a commonly infected download.
Panda Security estimates that up to 35 million computers worldwide may be infected with fake antivirus programs each month.
- A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software [source: Johnson].
Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.