Security - Security - Security (revised 12/2010)

Remote Support

Hi, I'm Mark Perlstein. Without going into too much detail, let's just say I've been working as a professional in the computer field since the latter part of the last century.

I provide solutions oriented PC, Mac and networking tech support and training to small businesses and home/home office users.

While I'm based in West Los Angeles, I travel as my clients' needs dictate. I make house calls for home and home office users, and am able to provide remote support to clients anywhere in the world, (Australia, Japan, England, Tahiti, Portugal & Dubai so far!!).

My goals are to enable clients to work in as comfortable a computing environment as possible, and to encourage them to be as self-sufficient in their work space as they would like to be.

Here are some of the ways in which I'm able to help your business or at home:

Computer setup and installation
Microsoft networking
Hardware upgrades
Telephone and remote control tech support
Microsoft Windows - all versions
Internet connectivity and security
Microsoft Office - all versions
Wireless network solutions and security
WordPerfect Office
Network design, analysis & upgrade
Malware (see Q&A below) removal and protection
Hardware and software purchase consulting
One-on-One training
Office relocation planning and coordination
Project management
Backup solutions

Computer Q & A

Q: What is malware?

A: Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. Wikipedia

Q: What is Spyware?

A: Spyware is computer software that is installed surreptitiously on a computer to collect information about a user, their computer or browsing habits without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. Wikipedia

Q: What is a virus?

A: A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. Wikipedia

Q: What is a worm?

A: A worm is a self-replicating computer program. It uses a network, the Internet, to send copies of itself to other computers and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted compute. Wikipedia

Q: What is a trojan?

A: A trojan describes a class of computer threat that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save their files on the user's computer or even watch the user's screen and control the computer.

Trojans can be easily and unwittingly downloaded. For example, if a computer game is designed such that, when executed by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a Trojan horse. However, if the computer game is legitimate, but was infected by a virus, then it is not a Trojan horse, regardless of what the virus may do when the game is executed. Wikipedia

Q: What is a rootkit

A: Rootkit:"Software that hides itself or other objects, such as files, processes, and Registry keys, from view of standard diagnostic, administrative, and security software."

Q: What are Cookies?

A: "Cookies: tiny files stored on our computers that hold the memories of web sites we've visited. They may remind web sites who we are, what we did during our last visit, and what we're trying to accomplish during our current visit. These bits of data make possible such conveniences as automatic logins and shopping carts." Karen Kenworthy

Website design by Marine Marketing and Consulting http://www.marinemkt.com/