HOME ABOUT CONTACT SERVICES SPECIALS SERVICE REQUEST FAQ NEWS LINKS TEAM
This is a list of frequently asked questions. Please read through these to see if your question may already be answered here.

You may also call us at:
(04) 973 2082
 SERVICE RELATED
What are your business hours?
What makes you different from other service companies?
What areas do you service?
 COMPUTER QUESTIONS
Do you sell used computers?
What is a virus?
What is a worm?
What is a Trojan?
How do I know if I have a virus?
What is Spyware?
Q: WHAT ARE YOUR OPENING HOURS?
A: Our regular business hours are 8:00am to 6:00pm Monday to Friday.(Excluding public holidays)
Q: WHAT MAKES YOU DIFFERENT FROM OTHER SERVICE COMPANIES?
A:

People and Businesses around the world depend on Computer Troubleshooters. We're the world's #1 network of computer professionals. There are many reasons our customers call Computer Troubleshooters instead of someone else. Here are just a few:

  • We understand computers and technology issues.
  • We come to you with onsite and professional service.
  • Computer Troubleshooters Wellington South care about our customers.
  • We won't call a job complete until the problem is resolved.
  • Computer Troubleshooters Wellington South provides the service and peace of mind you deserve. Call us today!


Q: WHAT AREAS DO YOU SERVICE?
A: We service Wellington City and Wellington's Southern and Eastern suburbs. Please see a list of suburb names below If you need service elsewhere in the Wellington region, please call (04) 973 2082 for the availability of a Computer Troubleshooter in your area.
Q: DO YOU SELL NEW COMPUTERS ANS PARTS?
A: Yes, we sell new computers and can source used ex-lease computers plus we carry stock of new parts to repair your PC. We also specialise in custom parts to make your PC run quieter such as Silent PSU, Water cooling Kits and low noise fans.
Q: WHAT IS A VIRUS?
A: A computer virus is a program – a piece of executable code – that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file and are spread as files that are copied and sent from individual to individual.

In addition to replication, some computer viruses share another commonality: a damage routine that delivers the virus payload. While payloads may only display messages or images, they can also destroy files, reformat your hard drive, or cause other damage. If the virus does not contain a damage routine, it can cause trouble by consuming storage space and memory, and degrading the overall performance of your computer.

Several years ago most viruses spread primarily via floppy disk, but the Internet has introduced new virus distribution mechanisms. With email now used as an essential business communication tool, viruses are spreading faster than ever. Viruses attached to email messages can infect an entire enterprise in a matter of minutes, costing companies millions of dollars annually in lost productivity and clean-up expenses.

Viruses won't go away anytime soon: More than 60,000 have been identified, and 400 new ones are created every month, according to the International Computer Security Association (ICSA). With numbers like this, it's safe to say that most organizations will regularly encounter virus outbreaks. No one who uses computers is immune to viruses.
Q: WHAT IS A WORM?
A: A worm is a computer program that has the ability to copy itself from machine to machine. Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly. For example, the Code Red worm replicated itself over 250,000 times in approximately nine hours on July 19, 2001. A worm usually exploits some sort of security hole in a piece of software or the operating system. For example, the Slammer worm (which caused mayhem in January 2003) exploited a hole in Microsoft's SQL server.

Worms use up computer time and network bandwidth when they are replicating, and they often have some sort of evil intent. A worm called Code Red made huge headlines in 2001. Experts predicted that this worm could clog the Internet so effectively that things would completely grind to a halt.

The Code Red worm slowed down Internet traffic when it began to replicate itself, but not nearly as badly as predicted. Each copy of the worm scanned the Internet for Windows NT or Windows 2000 servers that do not have the Microsoft security patch installed. Each time it found an unsecured server, the worm copied itself to that server. The new copy then scanned for other servers to infect. Depending on the number of unsecured servers, a worm could conceivably create hundreds of thousands of copies.
Q: WHAT IS A TROJAN?
A: A Trojan is a piece of code that performs unexpected or unauthorized, often malicious, actions. The main difference between a Trojan and a virus is the inability to replicate. Trojans cause damage, unexpected system behavior, and compromise the security of systems, but do not replicate. If it replicates, then it should be classified as a virus.

A Trojan, coined from Greek mythology's Trojan horse, typically comes in good packaging but has some hidden malicious intent within its code. When a Trojan is executed users will likely experience unwanted system problems in operation, and sometimes loss of valuable data.
Q: HOW DO I KNOW IF I HAVE A VIRUS?
A: You must remember that there are very many things that can go wrong with your computer and a virus is not always to blame.

The only way you can know whether or not your computer is infected is by scanning your machine with an up to date anti-virus program.
Q: WHAT IS SPYWARE?
A: Spyware apps sneak onto your computer when you open infected e-mails, click on infected Internet pages or download infected software. They can make background changes to your system settings (such as disable your anti-virus software), record your key strokes, software used & sites visited. Spyware can also steal your passwords and credit card numbers. Depending on their degree of aggressiveness, they can steal your privacy or even your identity. And they can be terribly difficult to remove.
 


Computer Troubleshooters Wellington South travel to your site to Fix your PC in these New Zealand suburbs:

Te Aro, Wellington & Mt Victoria, Wellington & Oriental Bay, Wellington & Roseneath, Wellington & Aro Valley (South side), Wellington & Brooklyn, Wellington & Kowhai Park, Wellington & Vogeltown, Wellington & Mornington, Wellington & Kingston, Wellington & Mt Cook, Wellington & Newtown, Wellington & Berhampore, Wellington & Owhiro Bay, Wellington & Happy Valley, Wellington & Island Bay, Wellington & Houghton Bay, Wellington & Melrose, Wellington & Southgate, Wellington & Hatatai, Wellington & Evans Bay, Wellington & Kilbirnie, Wellington & Lyall Bay, Wellington & Rongotai, Wellington & Strathmore Park, Wellington & Mirimar, Wellington & Seatoun, Wellington & Maupuia, Wellington & Shelly Bay, Wellington & Scorching Bay, Wellington & Karaka Bay, Wellington & Worser Bay, Wellington & Breaker Bay, Wellington.

or
You can drop off your PC for repair at our workshop in Brooklyn, Wellington. To book your PC repair please see our Service Request page for details.

Computer Troubleshooters Wellington South is a member of the Computer Troubleshooters New Zealand group and the worldwide Computer Troubleshooters franchise network.
| Home | About | Contact | Services | Specials | Service Request | FAQ | News | Links | Team |

Computer Troubleshooters Wellington South - 5 Fortunatus Street, Brooklyn, Wellington, 6021, New Zealand ; (04) 973 2082
Copyright CTSWS Ltd








CTSWS Supported Web Pages:


MAD | Counselling | Therapy | Accomodation | Art | Art For Sale | Writing | FAQ | Links | MAD Home