Computer Diagnostics & Repair

A computer virus, a type of malware, is exactly what it sounds like, a virus that affects computer software and hardware. A computer virus is a small piece of programming code that is created to “attack” the data files found on the computer. Viruses can often sit dormant within a machine for a very long time, waiting for a particular file to be booted. Some of the worst viruses in history caused billions of dollars in damage, and weakened security systems, exposing vulnerabilities and halting productivity. Computer viruses, like biological viruses that infect human beings, require a host to survive. While a computer virus is running, it can affect other programs and documents, crippling the machine even further.

Computer viruses come in many forms and similar to the viruses that affect human beings, they can affect your computer in different ways. A computer virus can delete files, steal data such as your passwords or credit card information, or damage other devices on your network.
There are several types of computer viruses, each triggered by different actions and all affecting various parts of your machine.
Boot Sector Virus
A Boot Sector Virus is difficult to remove and almost always requires a full system reformat. A boot sector virus is often spread through removable media, such as floppy disks or USB drives or even in email attachments. These viruses are not as common as they were in the 1990s.
Trojan Horses
One of the most common and well-known virus types are Trojan Horses often sent to your computer by a program hidden inside of it. Trojan horses are often hidden in highly desirable download files such as games, music, movies, or software. These viruses can capture your login information for sites that you use or personal data which can be sold and be profitable to the thieves.
Overwrite Viruses
Overwrite Viruses can take over a file and infect it with information or even delete it. Overwrite viruses remove the content from the file, which means the owner loses the original data.
Browser Hijacker
A Browser Hijacker virus takes over parts of the Internet browser being used and can redirect it to specific sites. Usually, these viruses aim to market a specific brand or item to the computer user.

There are many concerning signs that your computer may be infected with a virus and the signs are not the same across the board. Unfortunately, some computer viruses don’t even show signs that they are present. But, with a little bit of education about the most common viruses and their symptoms, you will know the warning signs and can act accordingly.
Malware is often downloaded when you download a new program, software, or file on your computer. If you have downloaded malware on your machine, you may notice a slow down with your Internet speed or the speed of your applications. Your applications may also start crashing randomly, forcing you to reboot. Some malware will also force annoying and unexpected pop-ups.
A memory resident virus will install itself as part of the operating system when it is executed. Once it installs itself, it will overwrite functions, files, or disk sectors of the computer. These files can lay dormant until the computer owner activates them, but when they do become active, they can delete files, take up memory causing pop-up warnings that you are low on disk space, and corrupt files.
Browser hijacker viruses are often spread via free download and will hijack certain browser functions, usually in the form of redirecting the user to a particular site. One of the most common malware programs is called CoolWebSearch but plenty others are out there as well. The biggest sign that you have downloaded this type of virus will be a change to your default search page of the browser, home page, or an increased number of links to advertisement web pages.
If you think your computer is slower than normal or if you notice that files are missing, it would be a good idea to have your computer checked.

We need our computers to accomplish so much for us so when they are not functioning at full capacity, it can hinder our lives. Our computers are also finicky, working fine one minute and then not functioning correctly the very next and sometimes this can signal a computer virus has infected your computer. Here are some common indications that your computer is not just having an off day and could be infected with a virus.
A sudden slow down when a resource heavy application is running could mean that a virus is infecting your machine via your memory.
A surge of pop-up ads while you are surfing the Internet can be a serious annoyance, especially if there are a lot of them at once. If you are bombarded with pop-ups, an anti-spyware software can determine if it is a virus or the webpage that you visited.
If people in your contact list or network begin contacting you about messages that they received from you that you did not write, you need to look at a few things. Keep an eye on your Sent folder on social networks, email programs, and any tools you send messages through. If you notice emails and posts that you didn’t send, it is likely that you have a virus.
Sometimes you may have a virus but have no signs of it because some computer viruses are dormant until the user boots the corrupted file. An anti-virus software is the only way to ensure your computer is running at full capacity and that no virus is lurking in the shadows.

Computer, Network Setup & Configuration

A home network is a type of network that connects multiple computers to each other.
A home network is useful because you can share resources between multiple machines over a single Internet connection and security settings. Setting up a home network may seem like a complicated task but with a few simple steps, you will be up and running quickly and effectively.
Before you get started, determine what type of connection you will need based on your usage. If you are looking to connect a couple of laptops and wireless devices to your network, you will probably be fine with a standard connection whether hard wired or wireless.
Before you start setting up your network, you need to have an Internet connection, Ethernet hub or switch, and a wireless router.
Your Internet Service Provider (ISP) will often supply you with a modem that has built-in Wi-Fi for a small monthly rental fee. You can use this option or you can purchase your own.
A technician from your ISP will likely set up your modem for you. You will need to ensure that the lights are properly lit, showing Internet activity. You can then log in to your router and set up your network name and password.
Connect all of your devices to the network and begin browsing the Internet.
Need help getting your home network setup? Contact Geeks on Site today! We can help you get your home Wi-Fi network up and running in no time!

To setup your printer to print from your computer, you will need to have the software associated with the brand and model of your home printer. The software that your printer came with is most likely in the form of a disc and is included with the manual, warranty, and service information in the box. Although this was included by the manufacturer, we recommend installing the driver from the manufacturer’s site because it’s usually the most updated version available. CDs become outdated rather quickly.
Some printers will automatically boot up after being plugged into your personal computer. If that is the case, once you plug your printer into your computer, the software will download automatically as long as you have an Internet connection. If you do not have this type of printer, you will need to take a few steps to start printing documents.
You will need to find the required drivers online by searching for it on the manufacturer's website. For example, if you purchased a Canon printer, visit https://www.usa.canon.com/internet/portal/us/home/support and search for your printer’s model. A selection of up to date drivers is available for you to download. Just confirm that the driver you selected is labeled with the same make and model of your printer.
As part of this process, you may be prompted to register your printer with the manufacturer. Registering your printer lets the manufacturer know when the product was purchased so that a warranty can be triggered. If you held on to your receipt, that should suffice, however, registering your product is also beneficial in the event of a recall. Use your best judgment when deciding whether or not to register your product.
Once your driver is installed, your printer will show up under “file” in any program you select. Test that your installation was a success by selecting print.

To setup a wireless printer, the first step is to make sure it can connect directly to the wireless network. This will allow access to print from any computer or device also connected to the network. Next, make sure the printer is within the range of the wireless router.
The process can slightly vary depending on each printer. However, most modern options have Wi-Fi capabilities. Make sure to have documented the Wi-Fi network name and password. This is needed when making the connection. For most printers, there is a built-in menu system. This system will allow an easy way to find the Wi-Fi network name to connect.
For older wireless printers, it sometimes does not have a built-in menu. This may require a computer connection via USB before setting up. After the configuration is complete, the USB can be disconnected, and the printer can move to a more desirable place.
Once the wireless printer is connected to the network, it still needs to be added to the computer. For a Windows computer, open the control panel and search for “View Devices and Printers” to add a new device. The PC will find available printers connected to the network. Select the new printer and install any drivers, if prompted.
If using a Mac, go to the Apple menu and choose “System Preferences.” Select the “Print and Scan” icon and then add a new printer. The new printer from the list should appear and will advise if any software needs installation.

Your router is one of the most important pieces of your home network so it is important that you pick the right one to fit your needs. Most Internet service providers (ISP), such as Comcast or AT&T, will provide their customers with routers. Unfortunately, these are usually not feature rich models and you are forced to pay a monthly rental fee for them.
For homes that have a lot of devices such as phones, tablets, laptops, TVs, etc. that are going to be accessing the Internet, purchasing a more powerful router than the one supplied by your ISP is a great option.
For a wired setup:
To set up your router, connect one end of the Ethernet cable to your modem and the other end to your Internet, Uplink, WAN or WLAN port on the router and then connect your computer to the router using an Ethernet cable. Reboot your computer and upon startup, your computer should detect that you are connected to the Internet.
For a wireless setup:
Before you get started, make sure you have a wireless router. Plug the Ethernet cable into your modem and connect it to the Internet, Uplink, WAN, or WLAN port on the router. Once the Internet, WAN, or WLAN lights up, the router is successfully connected to your modem. Restart your computer and upon startup, your computer should detect that you are connected to the Internet.

Data Recovery

We rely so heavily on the content stored on our computers, smartphones, and tablets; it is shocking to think of how many of us do not back up our data. Backup data is essentially creating a mirrored version of the content within your device and storing it elsewhere for safekeeping. Creating a copy of a document and storing it on the same device is not the same as backing up. A copy of your data should be transferred outside of its current device, not copied and stored locally. By saving your documents outside of the original device, you ensure that in the event of theft or damage, your documents are still accessible.
We are fortunate enough to have access to many options when it comes to backing up our devices. In the early 2000s and late 1990s, zip drives were the easiest and most popular way to back up data. Each time we wanted to create a backup of the data on our computer, we would insert a USB device and save everything to this device. The files on our machine were compressed and stored for safe keeping.
Nowadays, the average computer owner will purchase a large external hard drive that they attach to their computer and set an automatic backup to run manually or on a fixed schedule such as daily or weekly. External hard drives often create a replica of the file name, structure, and location of your personal computer onto the external hard drive. They can create multiple backups or be set to override the previous.
Cloud-based backup systems are considered the most convenient method for backing up files by many users. The data is stored "in the cloud" and runs in the background, taking new data from your device and storing it on an outside server.
In most cases, software is already included within the external device and will be triggered once you plug it into your computer. For cloud storage, simply create an account on the website of the company whose service you wish to use and set up your preferences. Cloud storage will cost a monthly fee but it is often minimal.

Accidentally deleting important files can cause panic and stress at the idea of them being gone forever. Fortunately, if the lost files are discovered soon enough, they can usually be restored.
Restore Deleted Files from the Trash
If you have only moved files to the Trash bin, you can restore them with little effort. Just right click on the folder or file within the Trash and hit “restore” or click the file and drag it to the Desktop. You can then easily move it to wherever you need it to be. If you have emptied your recycling bin, you still have options.
Stop Using Your Computer Immediately
As soon as you determine that you have deleted or modified a file, stop using your computer. When you delete a file, the data is temporarily hidden from the directory even after you empty your Recycling Bin. Depending on the computer you use (Windows or Mac) a built in restore feature or one from a third-party could restore your hard drive to a previous version.
Restore from an External Hard Drive or Cloud Service
If you set up a backup system, your deleted files are probably preserved within that system. Accessing your backup files varies based on the type of system you use, but most are easy to navigate. If your system is Cloud-based, you can log into the platform that stores your files and restore to a previous backup.
An external machine will more than likely be accessible by searching your computer for “backup” or the device's name.
Hire Professionals
Professional tech service providers, such as Safebox Technology, can handle recovering missing files for you. Additionally, professional tech support can get you set up with a backup system that will ensure that you do not ever accidently delete folders or files again in the future.

In most cases, we can solve your problem by accessing your system remotely. However, in some rare cases, we will need to have your device physically in front of us. In that case, we will schedule an on-site technician to visit your home or business and fix your problem in person at a time that is convenient for you.

The hard drive in your computer is the main storage hardware within the device and is, therefore, a critical element of your computer. This is where your computer’s operating system is stored, along with software programs and other files such as documents, photos, etc. that you have either created or downloaded.
If your hard drive has crashed due to physical damage to your computer and you want to know how you can recover your hard drive, you will likely have to contact an IT professional to determine if it can be fixed. If you are willing to give it a try, there are many types of free software available for download that allow you to recover data on your hard drive. That being said, the safest route is to turn off the machine and not touch it further until an experienced professional has had a chance to take a look. If you continue to use the computer, you decrease the chances that anything can be done to save your hard drive (or the data on it).
Need help with recovering your hard drive? Safebox Technology is here to help and is available to fix your computer today on-site or remotely anywhere in the country.

Computer Repair Services

When your computer breaks, it is hard to find the time to take it to a specialist to be analyzed and possibly repaired.
And sometimes, our computers are large and difficult to transport to a facility. Additionally, connecting all of the components correctly upon bringing it back might prove to be another challenge for most users. Online remote computer support makes it possible for us to have a professional access our machine, run an analysis of the issue, and determine what can be done to correct the problem without requiring us to leave our homes or workstations.
When you contact a professional service, they may ask you if remote computer support is something that you would be interested in. They will then ask you to visit a website where you will grant the business permission to access your computer remotely. This usually requires a special software which you will be prompted to download after granting permission. In most cases, their technician can walk you through the process if this is not something you are comfortable doing on your own.

The benefits of online computer support include:
Fast: Receive help instantly without having to wait for a tech to arrive to you.
Convenient: No need to take the bulky computer to a shop or wait for an expensive in-home visit. Affordable: Our costs are much lower than sending a tech to you.... this lets us charge much more affordable prices for the same high quality service as you would receive from an onsite technician.
Who is doing the work? The troubleshooting of your system is performed by one of our industry certified technical experts. When you call us to request service, you will speak to one of our technically trained customer service representatives who will find out details of your problem and delegate it to one of our expert technicians.
Can you help me with my computer if I’m outside of the U.S.? Yes, our online PC repair service works through an internet connection no matter where in the world you are.
What if you can’t fix my problem remotely online? There are times when an online remote session will not be adequate to remedy a particular problem. In those cases we will schedule an onsite technician to be physically sent to your location.

No matter what type of computer usage you have, there is a high chance you will need tech support for your machine at one point or another. When you reach out to a tech service to handle your computer problems, they will often ask for remote access to your computer in order to troubleshoot the problem.
This process can be very intimidating to someone who has never experienced it before. You may worry that the technician can gain access to your personal files or that they can continue to access your computer long after the call ends. Fortunately, none of these are true.
When you download the software needed to grant access to a third party, you are given a few key safety features. For starters, computer owners can see everything that the technician is doing on the computer. No software can be downloaded, files viewed, or content removed without the owner being able to see what happens.
As the computer owner, you can also stop the process at any time via a Control Panel.
Remote computer support is safe and secure but make sure that you use a business that is reputable and willing to share their security measures before they gain access to your computer. If the tech has something to hide, do not give them access to your computer.

Most personal computers, whether used for email and social media access or for photo editing and Internet research, will need to be serviced at some point during their lifetime. From virus removal to software updates and even major hardware replacements, each repair will cost the computer owner an additional charge for that machine. The average cost of an in-home repair is determined by the work that is needed to fix the PC and how long this work takes to complete.
Computer repair, like auto repair, is not a one size fits all service. As we are sure you have heard, when it comes to your car, the harder the broken part is to get to, the more time the work will take. This is also often the case with computers.
The most common repairs that are needed for personal computers include virus or malware removal which can take hours to remove and then restoring the computer’s files can also take a substantial amount of time. Upgrades such as adding more memory or replacing a hard drive can take an hour for a desktop to several hours for a laptop. Installing software, diagnosing the issue and connecting to external devices such as scanners or printers, can take anywhere from a few minutes to a few hours. This will determine the overall cost of the repair.

We rely on our home computers for so much including, but not limited to, managing our bills, keeping up with our family members, and storing our personal memories such as our photos, videos, and relevant documents. In a business setting, it is difficult to imagine accomplishing your daily tasks and communicating with clients with a computer that is not working reliably. As a result, when our computers are on the fritz, we want it to be repaired as quickly as possible. PC repair costs can add up quickly and if you are not computer savvy, it can be very frustrating.
It is not always convenient to pack up your computer, whether it’s your personal or business computer, and bring it to a repair center which is why it is sometimes beneficial to have the tech come to your home or office. The cost of a repair for your PC that takes place within your home or office can vary widely on what the repair includes, how complex the issue is, and how long it takes for the tech to resolve the issue making it difficult to budget for PC repair costs.
What to Take into Consideration Standard in-home or business PC repairs include Wi-Fi setup, software updates, virus removal, and suspected malware removal. The more intensive the repair, the longer it may take and for services that charge by the hour, the cost for PC repair may add up.
Before you decide to have repairs take place in your home or office rather than bringing it to a tech center, confirm whether it will be a fixed rate or hourly and in most cases, you could get an estimate of the hours up front so you can make sure you are comfortable with PC repair costs.

Business Networking

A computer network is a collection of more than two computers that are linked together via communication channels and share resources between them. Network computers can include switches or routers to exchange information and transport data to an endpoint. There are many types of computer networks including a personal network, local area network, or wide area network.
Many network systems can be used for general purposes, such as sending files to a printer or accessing the Internet while some networks serve a strategic purpose such as a storage area network or a private enterprise network.
Here are some common networks:
Personal Area Networks (PAN) - a computer network that is organized around a single building or individual. A personal area network may be located within a private residence or a small office. If multiple individuals use the same network within their residence, it may be referred to as a home network.
Local Area Network (LAN) - consists of many computer networks at a single location such as an office building. LANs are very useful for sharing resources, such as storage or printers.
Metropolitan Area Network (MAN) - often consists of many computer networks spread across a city or college campus. Depending on the infrastructure, a MAN can run over several miles.
Wide Area Network (WAN) – span larger areas than a MAN and can cover an entire country or the world. The Internet is the most obvious example of a WAN.
To set up a computer network, confirm that you have the necessary equipment such as a cable or DSL Internet connection and a wireless router.
Obtain the router's default user name, or SSID, and password, along with the router’s web address. This information is usually provided when the device is purchased.
Connect a cable modem to the live cable jack or DSL modem to a live phone line. Connect the wireless router to the modem.
Connect the host computer to the wireless router using a network USB or Ethernet cable.
Configure the wireless router by opening the web browser and typing in the URL or IP address to access the router’s configuration page.
Follow the steps on the configuration page including setting up a name for your network and providing a security key or password.
In order to keep your network secure, select the setting you wish to use such as “WPA” or “WPA 2.”
Connect your other machines to the same network.

A server is a computer that captures data from one machine and delivers it to another machine on the same network or over the Internet. Even though any computer that is running a special software can be used as a server, they are often high-powered, large machines that can manage multiple computers.
While some servers are committed, or dedicated, to a particular task, others handle various. For example, a dedicated email server would just store, send, and manage the emails sent on that network. On a small scale, servers may be used to maintain file storage, communication, and website and communication services.
The most common servers are:
File Transfer Protocol (FTP) Servers - Used to move files between computers to devices. Proxy Servers - When your computer or smartphone access a proxy server, it will update its IP geographical location and let you access any limited data. Gaming Servers - Used by gamers who are attempting to gain access to a game server.
Web Servers - Host web data and files that are used on the Internet. Servers are often considered the unsung heroes of the Internet. It is because of servers that communication data can be passed from one computer to the next. And since we rely so heavily on servers, an outage can be catastrophic.
While businesses commonly use servers, they are becoming more popular for personal use. On a personal scale, home servers are ideal for storing large amounts of personal data including streaming media such as movies and music.

For a small business owner, setting up a dedicated on-premises server can seem like a complicated task. As businesses expand, the addition of a server becomes more necessary to store files safely, run applications, and so much more. For businesses without a dedicated IT Department, server installation can seem even more daunting but if you follow a few simple tips, your server will be set up properly and serving your business quickly. Purchase from a Reputable Business When selecting what size server fits your business’s needs, lean on professionals to help guide you to a server that can grow with you. If you have a clear road map for your business it should be easy to assume what your needs will be in the next few years so purchase for that.
The Right Storage for Your Server
Storing your server can become a challenge if you do not invest in proper rack mount storage. A rack-mount has shelves, drawers, and other items that are specifically designed for mounting onto servers for safe keeping and easy accessibility. Keeping your server room organized from the onset will have long term benefits.
Find a Quiet Place to House Your Server
Servers are noisy and require additional cooling which can be distracting in a small office. If a small room is available, consider adding your server to this space so that it is away from your employees and not a distraction. If a separate space is not available, a server can be placed in the corner of a room where there is less chance of it distracting your team.
Manage Wires and Label Everything
Keep your server organized by labeling everything and keeping the wires organized and easy to manage. Having to locate a specific wire when you are trying to work on something can be easily avoided if cable management is properly done in the beginning.

About Safebox Technology

We can usually have a tech out to you the same or next day.

Honesty and integrity are the pillars our company was founded on, We have Certified Technicians that have decades of professional experience in the industry and take pride in their craft. Our skilled technicians are required to pass A+ and Microsoft Certifications, as well as other factory requirements for the computer components and systems that we service.

Most support sessions take about two to three hours. The session may be much shorter or longer depending on the number of and severity of issues. In some cases when a computer is heavily infected with viruses and/or spyware, work may need to continue by doing an in-home or in-office onsite visit by one of our certified technical experts.

We will always work with you to make sure you’re satisfied with our work. If you ever have a question or concerns over a service, our customer satisfaction team is ready to make sure you are happy with our service.
Please understand the volatile nature of computers, and that some problems can be recurring but not necessarily due to poor service on our part. For example, some computers are reinfected with the same virus or spyware after a user repeats the same actions that got the system infected in the first place.
If you have service performed and are not happy with the results we will work with you to complete the job to your satisfaction.

We support both Windows and MAC through our onsite service. Our remote service does handle all Mac repairs.
Please understand the volatile nature of computers, and that some problems can be recurring but not necessarily due to poor service on our part. For example, some computers are reinfected with the same virus or spyware after a user repeats the same actions that got the system infected in the first place.
If you have service performed and are not happy with the results we will work with you to complete the job to your satisfaction.

Our Location

571 Bald Eagle Dr. Marco Island, FL 34145

24/7 Tech Support

(239) 778-0808

Email Us

info@safeboxtech.com