Do I have to bring my computer to you to get it repaired?
Absolutely not! We will send a technician to your home or office in as little as 4 hours to either attempt to fix the computer right then and there, or to pickup the computer for more intense diagnosis/repair. If your computer is still operational, we can even remotely access your computer using IT Advantage Quick Support to quickly diagnose and maybe even fix the problem without the need for an on-site visit!
What is your service area?
We service all of Orange County, the South Bay, Gateway Cities, and Central Los Angeles areas of Los Angeles County, as well as the Corona area of Riverside County.
Do your on-site service calls include a travel charge?
No. We do not charge to travel to your home or place of business, but we do require that we provide you with at least 2 hours of work when we arrive.
Can you repair my computers remotely?
Yes. We can be logged into your computer in just a few seconds using our Instant Support tool. Just run the file and give us your 9-digit code and we will be directly interacting with your desktop! We can even install applications that require a reboot such as anti-virus software or accounting applications, and can leave a host installed on your servers so we can quickly perform administrative tasks for you in seconds! In addition, we bill remote calls in 1/2 hour intervals, so you could pay as little as $49 for a service call if your problem is resolved quickly!
What are your prices?
- $125 per hour if we respond within 24 hours
- $135 per hour if we respond within 8 hours on the same day as the request
- $150 per hour if we respond within 4 hours on the same day as the request.
Remote & In-house service:
- $99 per hour, with remote calls being billed in 1/2 hour increments.
Hardware prices are quoted on a per-request basis.
Do you sell computers?
Yes. We sell a wide array of products from desktop and laptop computers, to servers and workstations, networking equipment, routers, monitors, TV’s, telephone systems, Apple products, OEM and retail software, printers, and even components such as memory and hard drives.
Do you provide email and/or website hosting?
Yes. We offer affordable, reliable hosting solutions for email, file storage, FTP access and websites. We can also help with domain name reservations, DNS changes, IP address configurations, and everything else that comes with setting up hosted services.
Do you create websites?
Yes. We have over 10 years of website building experience, and have a dedicated team of designers ready to turn your vision into reality. From entry-level, budget-minded solutions, to robust eCommerce sites, our team has done it all, and can use their knowledge and experience to create using best practices to ensure compatibility, functionality and aesthetics. We will work with you every step of the way, and do not consider the job done until you are 100% satisfied with the results. Please look through our gallery to get an idea of our design capabilities.
Can you fix/replace my broken computer hardware?
Yes. We have partnerships with most major manufacturers and can help you order parts under your existing warranty, or provide manufacturer or third-party replacement parts if your computer’s warranty has expired.
Can you fix my broken printer?
Yes. We have expert printer techs that can travel to your home or business to repair almost any make and model of printer, and will even advise you when the cost of repair would exceed replacement cost.
Do you sell phone systems?
Yes. We provide Toshiba phone systems customized to your needs, whether you need just 5 phones or 500!
Do you offer phone service or fix phone-related problems?
While we do not sell or resell phone service, we do have many years of experience working with top-tier phone companies such as AT&T, Verizon, and Telepacific in order to provide integration services on behalf of our customers. Our phone techs have many years of experience and can perform tasks such as punching lines down to a 66-block from an MPOE, connecting multiple office jacks to dial tone, troubleshooting dial tone and line issues, and installing phone cabling.
Can you remove the virus from my computer?
Yes. Viruses, malware and spyware are the most disruptive threat your business, costing businesses globally billions of dollars annually in lost productivity and repair costs. We have years of experience with virus removal, and can quickly determine the likelihood of a successful removal versus a complete wipe and re-installation of a machine to provide you with the lowest-cost eradication solution. We can then recommend solutions to help reduce and possibly eliminate future infections to keep your computers and data safe.
Can you recover my data?
That really depends on the scope of the damage or loss. If data from a RAID array on a server was deleted over a year ago and there is no backup, that data is never going to be recovered. However if your hard drive just recently crashed or your computer stopped booting and is making a “clicking” sound, we have several methods that usually are able to retrieve your data. One of the most important things to do if you suspect your hard drive is failing is to TURN OFF YOUR COMPUTER IMMEDIATELY! The longer it is on, the more damage that is being done to the platters, and the less likely it will be to inexpensively retrieve the data. In severe cases, we send drives out to a clean-room facility that recovers the data onto removable media which is very costly and should be considered a last resort. Data loss can occur from accidental deletion, hardware failures, or software failures, so having experience helps in determining the proper course of action for each situation. Having comprehensive backups is the best way to prevent data loss, and the backups should be verified daily and tested at least once a month.
Do you setup wireless networks?
Yes. We can setup either a single wireless router or a WIFI “net” of repeaters and access points to cover hundreds, even thousands of square feet, using the latest in wireless security and encryption to keep your data safe.
Can you help me setup my iPhone, Blackberry or Android device?
Yes. Mobile technology is essential to business productivity, and we can help you setup your device to browse the web, access email, help you with directions and connect to your Bluetooth device.
Can you block all of this SPAM that I am getting in my Outlook?
Not all, but almost all – up to about 99% of it. No SPAM filter blocks 100% of SPAM, but ours comes close. We are a Google reseller and use their powerful SPAM filtering system to block the SPAM before it reaches your computer saving you time, bandwidth and storage space. We typically block around 95 – 99% of SPAM for most users, and simultaneously perform virus scans to keep any harmful emails from ever reaching your servers.
Can you help me work on my office files from home?
Yes. We can help you with simply accessing your office PC, installing a VPN, or installing a terminal server to allow many simultaneous users secure access to all of your files and applications.
Can you provide me with an email solution?
Yes. There are multiple options when it comes to email, from a hosted solution to an on-site Exchange server. We provide very affordable hosting services for those who need simple email functionality, and install robust Exchange servers for those who need the capacity and collaboration features that Exchange/Outlook can provide.
Can you make sure that I never lose any of my important files?
Never is a very long time, but with proper procedures, it is possible to securely store and backup all of your data in both a comprehensive and cost-effective manner. Using local on-site backup hardware/software solutions in combination with offsite backup solutions, we can virtually eliminate the possibility that your data will be compromised.
What is a Computer Virus?
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
A virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.
Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it’s from and you are expecting it.
Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
To help avoid computer viruses, it’s essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet, download files, and open attachments.
Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.
What is Adware?
Adware or advertising-supported software is any software application in which advertisements are displayed while the program is running. These applications include additional code that displays the ads in pop-up windows or through a bar that appears on a computer screen. Adware helps recover programming development costs, and helps to hold down the price of the application for the user (even making it free of charge)—and, of course, it can give programmers a profit, which helps to motivate them to write, maintain, and upgrade valuable software.
What is Spyware?
Strictly defined, spyware is computer software that gathers and reports information about a computer user without the user’s knowledge or consent. More broadly, the term spyware can refer to a wide range of related malware products which fall outside the strict definition of spyware. These products perform many different functions, including the delivery of unrequested advertising (pop-up ads in particular), harvesting private information, re-routing page requests to illegally claim commercial site referal fees, and installing stealth phone dialers.
What is Phishing?
Phishers use many tactics including creating and sending links to fraudulent Web sites or e-mail messages that appear to be valid in an attempt to fool you into submitting personal, financial, and password information.