I take the necessary time to do the job right, which always involves an extensive checklist best on best practices in the area of computer (operating system, software), network, and security troubleshooting. I document everything profesionally and I mentor my customers on how they got themselves in trouble and how to prevent it from happening again. I often give free advice and coach my customers on how to avoid unncessary repairs from unscrupulous competitors.
I love my work because it is an opportunity to unselfishly serve others by giving back to them the many blessings of my skills bestowed upon me by God. I do this by giving them of my time. I never charge by the hour, it is always a modest flat fee.
Harry was extremely knowledgeable, provided excellent instruction on computer safety and set up, honest and ethical.
Mr. Stein was very helpful in explaining the problem I was having in detail.
Every new customer is a new experience. We speak for 15 to 30 minutes and I describe how things will go in the best and worst case and then I remote in and begin to go through my extensive checklist mentioned earlier. I do this over the course of as many hours and perhaps days as necessary -- always working around the customer schedule and respecting their sense of urgency and/or time pressures. I either work alone or with the customer on the phone: it's always their choice (some love to learn; others can be overwhelmed). At the end, I need to review my documentation to show them the results and make any recommendations about how they should manage their computer going forward.
I read endless articles from the top security experts across the country and am continuously evaluating third-party tools and observing in amazement how little they can do to stop the onslaught of malware. However, these companies (Norton, Symantec, Avast, Kaspersky, AVG, TrendMicro) are most appreciated as they are a perfect complement to an educated computer user. I have a Bachelor's Degree double majoring in Computer Science and Mathematics at the University of Pittsburgh where I grew up (however I have been a 25+ year resident in my home in Texas).
I started out as a key employee software developer and eventually desired to focus on all layers of the OSI model, incliuding the physical layer (switches, routers, network cards) of networking. This mean switching my attention to I/T work where I managed hundreds of workstations and servers of ten years and finally changed my attention to the most interesting area, computer forensics and security whereby I leverage my experience and skills to hunt down malware and viruses that are undetectable by all anti-viruses combined.
I have worked with people from all walks of life, small business owners (in a storefront or home office), and missionaries and non-profits.