Pest Control

GLBA? What is GLBA and does it effect how I do business?
read on >

Storage? How can I free up room on my PC or have access to it anywhere in the world?
read on >

Cloud Computing 101. Is the right for me?
read on >
Home Page Cloud Computing Cloud Bundles Networks Installation Home Computers About us Contact us FAQs

Pest Control...

Everyone knows about residential pests, but I am talking about computer pests; Viruses, Spyware, malware, Trojans, key loggers and all the rest.

If you have no idea what some of these are, have no fear. We do know what they are and how to get rid of them.


Viruses are software programs written by people who do not have your best interests in mind. They steal your information, including login names and passwords, make pop up ads come up on your screen and slow down your system.


They are bad, but we have the cure.


Each of our field reps caries the tools need to clean up your system and will leave them on you system when they leave to keep you clean.


Our techs will come to your house and do the clean up right there. You don't have to unplug the system and bring it to us (and figure out how to hook it back up later). If you want to bring it in, call us and we can tell you the way to the loading zone at our building.


Give us a call; we will take care of the pests!


Trojans! (Trojan Horses)


A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves, but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid a computer of viruses but instead introduces viruses onto the computer.


The term comes from the Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.

Malware! (Spyware)


Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.


While the term spyware suggests software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet connection or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is provided by the term privacy-invasive software.


In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.



Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords. They can be implemented via BIOS-level firmware, or alternatively, via a device plugged inline between a computer keyboard and a computer. They log all keyboard activity to their internal memory.



Back to top