Gudroe Technology Group > Support > F.A.Q.

1. General Computing

2. Viruses

3. Other

1.1 Why does a computer run slow?
Here are some possible causes:
  • Your hard-disk is fragmented.
  • Your do not have enough RAM.
  • You are running low (or set too high) on virtual memory.
  • Your windows registry contains many invalid entries.
  • Your system files became corrupt.
  • You enabled additional visual effects.
  • Your CPU is overheating.
  • Your network or Internet connection is slow.
  • Your computer is running too many programs in the background.
  • Your hardrive is not partitioned properly.
  • Your operating system drive (C:) free space will be too low.
  • You have a Trojan/Virus/Malware/AdWare/Spyware using resources.
  • You have Norton Anti Virus installed.
  • Too may startup programs & Startup service
Call Us and we'll find and fix the problem for you!
1.2 What should you do when your computer stops responding?
There are many possibilities. Reboot and try cleaning your systems with a virus scanning software along with and Ad-aware spy blocker cleaner. To get more specific to your problem, please provide what may be happening. Such as your mouse stops working, screen freezes, operating systems does not boot, etc. These types of questions will help solve your problem.
1.3 Why does my computer freeze when going to certain web sites?
Probably because the certain websites are too big for your internet connection to open, like, your internet would take a long time to load it, and I realized that if you try and click it a lot of times or it takes too long to load then this can cause the website to not respond. Then your computer freezes as the website does. And perhaps because your computer has too many programs open too. This sometimes happens to my computer, the internet sites suddenly stop responding and my computer begins to freeze. Try closing most of the other programs and websites, then try entering into the site again.
1.4 What do you do after pressing the reset button to turn on a laptop that does not come on at all?
If it would not turn on, and you removed the battery, and you pressed reset, and then reinserted the battery, and attached the battery charger/power adapter, and the AC power light comes on, and then you pressed power, and it still won't come on, and you also tried to power on without the battery installed, running on just the charger/ adapter, *then, your laptop has a serious problem.
1.5 What is the "Blue Screen of Death"?
The Blue Screen of Death signals a major problem with the computer, usually involving video or hard disk problems. Make a note of the message that you see on the screen. This is often useful when trying to solve the problem. Other problems that you may encounter are invalid page fault messages that will close the open program, possibly causing a loss of unsaved data. Save your data frequently. In either case, rebooting your computer will usually solve the problem temporarily. If it happens often, investigate the problem and solve it by reloading the corrupt files named in the message. Sometimes adding memory to the system will solve the invalid page fault messages. Check the web site for the company that made the program to see if they have a patch or fix for the program that you can download onto your computer.

2.1 What is a computer virus?
A computer virus is a program designed to spread itself by first infecting executable files or the system areas of hard and floppy disks and then making copies of itself. Viruses usually operate without the knowledge or desire of the computer user.
2.2  What kind of files can spread viruses?
Viruses have the potential to infect any type of executable code, not just the files that are commonly called 'program files'. For example, some viruses infect executable code in the boot sector of floppy disks or in system areas of hard drives. Another type of virus, known as a 'macro' virus, can infect word processing and spreadsheet documents that use macros. And it's possible for HTML documents containing JavaScript or other types of executable code to spread viruses or other malicious code.
Since virus code must be executed to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, etc., as well as plain text in .txt files. For example, just viewing picture files won't infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file, that the computer will actually try to execute.
2.3 How do viruses spread?
When you execute program code that's infected by a virus, the virus code will also run and try to infect other programs, either on the same computer or on other computers connected to it over a network . And the newly infected programs will try to infect yet more programs.
When you share a copy of an infected file with other computer users, running the file may also infect their computers; and files from those computers may spread the infection to yet more computers.
If your computer is infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and the virus copy on the hard disk will try to infect still more floppies.
Some viruses, known as 'multipartite' viruses, can spread both by infecting files and by infecting the boot areas of floppy disks.
2.4 What do viruses do to computers?
Viruses are software programs, and they can do the same things as any other programs running on a computer. The actual effect of any particular virus depends on how it was programmed by the person who wrote the virus.
Some viruses are deliberately designed to damage files or otherwise interfere with your computer's operation, while others don't do anything but try to spread themselves around. But even the ones that just spread themselves are harmful, since they damage files and may cause other problems in the process of spreading.
Note that viruses can't do any damage to hardware: they won't melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. Warnings about viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings.
2.5 What can I do to reduce the chance of getting viruses from e-mail?
Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with an up-to-date virus scanner before opening the file.
If your E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly recommend that you disable this feature.
My personal feeling is that if an executable file shows up unexpectedly attached to an E-mail, you should delete it unless you can positively verify what it is, who it came from, and why it was sent to you.
The recent outbreak of the Melissa virus was a vivid demonstration of the need to be extremely careful when you receive E-mail with attached files or documents. Just because an E-mail appears to come from someone you trust, this does NOT mean the file is safe or that the supposed sender had anything to do with it.
2.6 Some general tips on avoiding virus infections:
1. Install anti-virus software from a well-known, reputable company, UPDATE it regularly, and USE it regularly.
New viruses come out every single day; an antivirus program that hasn't been updated for several months will not provide much protection against current viruses.
2. In addition to scanning for viruses on a regular basis, install an 'on access' scanner (included in most good antivirus software packages) and configure it to start automatically each time you boot your system. This will protect your system by checking for viruses each time your computer accesses an executable file.
3. Virus scan any new programs or other files that may contain executable code before you run or open them, no matter where they come from. There have been cases of commercially distributed floppy disks and CD-ROMs spreading virus infections.
4. Anti-virus programs aren't very good at detecting Trojan horse programs, so be extremely careful about opening binary files and Word/Excel documents from unknown or 'dubious' sources. This includes posts in binary news groups, downloads from web/ftp sites that aren't well-known or don't have a good reputation, and executable files unexpectedly received as attachments to E-mail or during an on-line chat session.
5. If your E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly recommend that you disable this feature.
6. Be extremely careful about accepting programs or other files during on-line chat sessions: this seems to be one of the more common means that people wind up with virus or Trojan horse problems. And if any other family members (especially younger ones) use the computer, make sure they know not to accept any files while using chat.
2.7 Will my firewall protect me from viruses?
No. While some firewalls may save you from worms scanning the Internet for open ports, a firewall will not save you from Human error virus infection, such as opening email attachments or partaking in file sharing.

3.1 What is remote computer repair?
Remote Computer Repair is the the process of repairing computer over the internet. Remote software allows a technician to take control of a computer in a different location and fix it as if it were their own.
3.2 Why use remote computer repair?
When you have a problem, help is just a mouse click away. Through your high speed internet connection, we can log-on remotely and provide on-site support, in real-time, without ever coming to your home or office no matter where you are!

Using Remote Computer Repair we can:
  • Diagnose problems
  • Resolve problems faster
  • Increase customer satisfaction, and get another competitive edge.
Computer users have experienced overwhelming frustration and dissatisfaction with the computer support process. Warranty service and drop off service centers can take weeks, and many consumers do not feel comfortable with on site service visits.
3.3 What is computer security?
Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.
3.4 Why should I care about computer security?
We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications "top secret," you probably do not want strangers reading your email, using your computer to attack other systems, sending forged email from your computer, or examining personal information stored on your computer (such as financial statements).