Some Helpful DIY Computer Support Tips


Whether you’re dealing with your dad’s decade-old computer or your own custom-built gaming rig, troubleshooting PC problems is a part of everyday life. Before you make that $50 support call, though, try your hand at homebrew tech support. We spoke to some of the best support reps in the business about the most common problems they fix—and how you can do it yourself.

Try this first

I know it sounds like a no-brainer, but before you do anything else, restart your computer. Technical support says that most of his customers solve their problems with this simple step. “This long-standing maxim can work wonders,”

While you’re at it, make sure that your operating system is fully updated by running Windows Update. Neglecting updates could deprive you of important bug and performance fixes.

If you’re having problems with a peripheral, try switching it on and off. If that doesn’t work, try disconnecting and reconnecting the device. As a last resort, download the latest drivers and perform a full reinstall.

My computer is too slow

The first step to fixing a slow computer is to verify that your machine is the actual source of the problem. Videos that seem to buffer forever, and websites that take ages to load, may not be your computer’s fault.  claims that many people mistakenly identify a slow system as the problem when “it’s actually not the computer, [but] their broadband connection.” See “Downloads are taking forever” below for instructions on how to use to diagnose a slow connection.

If the problem is your PC, check whether you have plenty of free space on the hard drive holding your operating system. Windows needs room to create files while your system is running. If your hard drive is maxed out, performance suffers. Now is the perfect time to clear some space.

Microsoft’s System Configuration tool is your next-best bet for tackling slow performance. Many applications launch automatically when your machine boots up, which can stretch out boot time—especially on older, slower PCs. Make a habit of trimming the startup items. Open the tool by pressing Windows-R, typing msconfig, and pressing the Enter key.

Checking the Startup Item and Manufacturer columns is the best way to figure out which potential performance-killers you can safely disable. Avoid messing with any of the services and programs that have Microsoft Corporation listed as the manufacturer. Items such as AdobeAAMUpdater, Google Update, Pando Media Booster, Spotify, and Steam Client Bootstrapper are all fair game. Regardless, err on the side of caution: If you’re not sure what the program or service does, don’t disable it.

Once you’ve made all your changes, click OK and restart the computer. It should boot up quicker and feel noticeably faster.

Downloads are taking forever is your best friend when you’re having connectivity problems. Run a speed test to see what your download and upload speeds are—ideally they should be at least 50 percent of your Internet service provider’s advertised speeds, with a ping under 100 milliseconds.

If the speeds seem solid, make sure that you aren’t inadvertently downloading or uploading anything. Many torrent downloading programs run in the background and minimize into the system tray instead of the taskbar.

Check your network hardware. Updates for network cards aren’t all that common, but if your card’s manufacturer offers a newer driver, download it. Resetting your router and modem can help with connection problems, too. Most routers and modems have reset buttons, but pulling the power cable for a second or two can do the same thing. Don’t cut the power for much longer, or the hardware may reset itself to factory defaults.

Still having problems? Call your ISP, which can tell you whether the problem is on your end. As a last-ditch measure, the ISP could reset the master connection to your home. Or call outsourced IT support.

My machine keeps restarting

Hardware problems are hard to diagnose and solve. First, confirm that you aren’t just getting the latest wave of Windows updates, which can automatically restart your computer during installation. Then work on updating all of your critical system drivers. Your graphics card, motherboard, and network card drivers are crucial.

“Sometimes it can be viruses, sometimes it can be adware, sometimes it can be overheating, and sometimes it can be something as simple as making sure your video card is updated,”

Is your computer making weird noises? If you’re lucky all you’ll need to do is give the machine a thorough cleaning. Modern computers have safeguards that shut down the system if a component is overheating, which can be the cause of frequent restarts when you’re running resource-intensive programs or video games.

Pop-up ads are appearing on my desktop

If you’re not running your Web browser and are still getting pop-up ads on your desktop, you’ve most likely installed adware—a program that displays unwanted ads. Although benevolent adware exists, most of the time adware is up to no good. Getting rid of it isn’t easy. “There’s a ton of little system-utility tools out there that promise to clean up everything, with names like PC Speed-up, PC Speed Pro, PC Speedifier,” Geek Squad’s Meister says. “A lot of times those programs are not going to do much. Some programs will work, others are snake oil.”

Running a full scan with credible antivirus software is your first step. If that program doesn’t find and remove the adware, turn to Malwarebytes Anti-Malware Free, a great utility for removing all types of malware. Just make sure to disable your standard antivirus software before running it.

  • “Multiple antivirus programs working at the same time will often result in problems,”  “You only want one active, real-time antivirus scanner installed, but it doesn’t hurt to run an additional ‘on demand’ virus or malware scanner.”
  • Searching online for the name of the advertised product can sometimes yield solutions from fellow victims. If all else fails, there’s always the nuclear option: a complete system reinstall. It might take a long time, but it’s the only surefire way to remove adware or spyware. Remember to back up all your personal files.

Manage Your Evolving Tech Needs

it person

Step by step instructions to build up your SMB’s multi-layered methodology

It’s basic to have a proactive way to deal with IT Management and Cyber Security today. On the off chance that regardless you depend on receptive measures, you are leaving an “open” secondary passage that is defenseless, and one day just might be past the point where it is possible to close.

With regards to IT benefits, you realize that the main steady is change. That implies the administrations you offer today should change for tomorrow. Anyway, what are the greatest issues seemingly within easy reach? “Security best the rundown, trailed by SDN, IoT, and edge processing,” says Steve Zurier, refering to an ongoing study by Enterprise Management Associates (EMA) in TechTarget.

In this four-section arrangement on The New Cyber Needs, we take a gander at every one of these advancing administration needs, and what you ought to do to get ready.

SMB Security for Tomorrow

Some portion of the reason that security remains so near to the highest priority on the rundown is that it’s an issue that is continually developing. “As time passes, the risk scene turns out to be increasingly hazardous,” Zurier says. He portrays new undertaking security arrangements that go past a firewall to include different layers of insurance. In PC Magazine, Juan Martinez and Oliver Rist reverberation the requirement for a multi-layer arrangement, saying that immediate hacks have turned out to be increasingly advanced however robotized assaults have turned out to be considerably more predominant:

A lot of the present malware just slithers the web searching for open vulnerabilities, so on the off chance that you’ve left gaps in your advanced fence, eventually those robo-trouble makers will discover them. The best guard against this sort of auto-flood is a layered way to deal with business security…

“SMBs need to quit supposing they’re the objective,” said Liviu Arsene, Senior E-Threat Analyst at Bitdefender. “More than anything, SMBs should be worried about their customers. The SMBs probably won’t be the finish of where the assailants will go.”

Martinez and Rist proceed to plot fundamental layers that each Small-to-Midsize Business (SMB) ought to consider to secure itself against the present direct hacks and auto-assaults:

Web Application Firewall (WAF): Firewalls are as yet the foundation of your security, giving you a device to oversee online interface and web application traffic, naturally hindering the realized assault focuses and designs while ensuring inheritance programming or other known shortcomings.

Spam Training and Anti-Spam Software:

The best SMB way to deal with battling spam may be client instruction—yet that doesn’t mean it’s a minor issue, or that it just undermines uneducated clients. There are a huge number of effective Business Email Compromise (BEC) assaults every year, including one that made the Wired Magazine rundown of the greatest assaults in 2018: “the assault utilized painstakingly made spearphishing messages to deceive teachers and other college offshoots … of the 100,000 records programmers focused on, they had the option to pick up accreditations for around 8,000.”

Stay up with the latest:

Web programs and working frameworks are normal focuses for programmers, and their ordinary programming updates prepare for the most recent dangers. Make certain to introduce these updates—consequently, as long as the updates won’t make incongruencies or issues with different frameworks. Medium size organizations should seriously mull over a fix the executives framework to help dispense refreshes by client, gadget, or application.

Endpoint Protection Software:

Traditional antivirus items screen singular gadgets and applications. In any case, endpoint assurance programming resembles the hero partner to those auto-assault bots. Endpoint assurance always creeps your system’s firewall, internet browsers, working frameworks, and different applications to guarantee that everything is cutting-edge and ensured. It alarms you when it discovers vulnerabilities—or even unravels them naturally.

Cutting edge Firewalls (NGF):

Your WAF shields your online interfaces and applications from approaching dangers, yet a NGF screens both approaching and active traffic for suspicious action. A NGF can help you spot abnormal application or transfer speed use by an individual or gathering. Some NGF arrangements are on-reason and some are cloud-based—since the majority of your traffic moves through this firewall, test a NGF to ensure it won’t cause execution issues.

Reinforcement and Recovery: You need a Plan B. You need a business reinforcement arrangement that can ensure your data can be recuperated—for some organizations, that data is as the substance of their ledgers. Ensure it’s safe. It’s a smart thought to run a different day by day, week after week, and month to month reinforcement, each putting away data in various areas. There are many cloud-based arrangements that make this simple for a SMB. You should consider a Disaster Recovery arrangement too, on the off chance that you keep running on-premise frameworks that would set aside a great deal of effort to reload and reestablish.

Cell phone Management (MDM):

MDM instruments let you find and clear a PC, tablet, or cell phone if it’s lost or stolen. Numerous likewise give you alternatives to arrange a portion of the settings and records on these gadgets—notwithstanding isolating this data from individual data on the gadget.

Personality Management:

If your clients have numerous passwords for various work frameworks, you may need a character the board framework that offers them a programmed single hint on (SSO) and gives additional entrance security. These instruments additionally let you set up least secret phrase principles and design multifaceted verification (MFA) on the off chance that you like.

Taking Security to the Next Level

Martinez and Rist close out their proposals with one more that applies to SMBs which have turned out to be genuine focuses for direct hacks. It’s what they call “the honeypot trap”— it’s “servers or computers stacked with fake data that are intended to draw in the consideration of programmers. They are regularly less secure than different frameworks in your system … this is an extraordinary method to set a mousetrap for gatecrashers.” But, this is a stunt for the experts. You’ll need a specialist to plan and execute this sort of methodology.

The key thing to comprehend is that the security game has changed—and it will continue evolving. Enduring one assault doesn’t mean your barriers are secure. It may really be an indication of additional to come. “While associations are as yet utilizing single-center answers for battle explicit assaults, aggressors are striking over different layers, utilizing their underlying trade off to build up a foothold, from which they can dispatch consequent assaults,” says Business 2 Community’s Linda Misauer at Business 2 Community. “The objective is everyone and everything! Aggressors toss a wide net, seeking after any takers. Associations should be set up on all fronts,” Misauer says.

A One-Source Solution

These security layers may appear to be a tangle of unpredictability and covering arrangements. As your business hopes to extend its IT foundation, you might be worried about whether you can meet the expanding security chance. It tends to challenge construct and keep up in-house security mastery that is set up for consistently evolving dangers.

The requirement for an advancing security stage is one extraordinary motivation to consider outsourcing your IT and its upkeep to a confided in administration supervisory crew. When you outsource all or part of your IT, you have fast access to set up experts who are prepared nonstop. Since programmers don’t take a night off.

Funny Stores from Tech Support

group of IT people

All the more evident, interesting tech support stories from the IT help work area

A great many people have confidence in the insight of humankind, yet in the event that you read our article including 16 of the most amusing help work area tickets as told by IT masters, or these other genuine help work area accidents, your trust in mankind may have wavered a bit.

Shockingly for the IT professionals who need to fix computer issues, there’s apparently no closure to human blunder when utilizing tech.But luckily for everybody perusing this post, a considerable lot of these accounts are unadulterated satire gold.

It would be ideal if you appreciate these totally evident amusing help work area stories from the Community… and be happy you aren’t the one working them!

I had a client come up to me and inquire as to why their computer would not turn on. I head toward the work area and notice a pool of water so I quickly unplug the computer and lift it up. Water came spilling out of the side vents so the client says “gracious ya I spilled water around my work area, could that be the issue?”

Individual entering data on a floppy circle was informed that she needed to make a duplicate toward the finish of consistently to give a reinforcement. Around a half year later, the circle wound up degenerate; so the technician inquired as to whether she had the duplicates. She opened a file organizer cabinet and hauled out a heap of paper; on each sheet was a photocopy of the plate.

I was strolling through an office one day and a client said to me, “Finally! It’s taken you long enough. I squeezed F1 (help catch) more than 2 hours prior!”

I got a call about a screen not working. When experiencing the standard investigating steps, client said there were no lights, he couldn’t discover the power catch, and so on, and so on. At that point I ask, “Is there really a screen on the work area”, and answer was “no.” Someone had moved it.

Some time ago I had a client get an email that our enemy of infection programming speedily isolated.

The client was berserk, “I should have that email!” I stated, “I’m grieved, it has an infection. You’ll need to contact the person who sent it, have him clean his computer of infections, and resend.” He answered, “Wouldn’t you be able to simply mood killer hostile to infection long enough for me to get this email?”

I had a person griping that his computer had been hacked (obviously every time anything bizarre ever turns out badly, it’s been “hacked”) in light of the fact that at whatever point he booted the computer, opened a program, shut a program, whatever, the whole signature melody to Reading Rainbow would play. The computer hadn’t been hacked, he had quite recently left it unattended and somebody dropped by and set each and every Windows sound to play the entire tune. I changed the topic and was finished. Exercise adapted: never leave a computer unattended on the grounds that there are cheats out there!

One of my preferred rehashing solicitations is, “I can’t recall my email secret word. Kindly email me another secret phrase.”

Somebody was griping his PC wasn’t working in any way. Subsequent to experiencing the entire “have you checked links and is it connected and so forth” he made them think he required another power supply or something. At that point I heard somebody out of sight say, “I wonder to what extent the power blackout will be this time.”

Client calls saying mouse “isn’t working.” No issue says me…

I snatched a freshie and headed over. Upon landing, client says, “And there’s that irritating red light sparkling in my eyes as well!” I turned the mouse right-side-up and strolled rapidly out of earshot, expeditiously losing it with giggling!!!

I had a client returned from a multi week excursion who announced that “everything is extraordinary”. She couldn’t generally clarify what was extraordinary however. Her computer had been off the entire time and nothing had changed by any stretch of the imagination. She’s a Mac client at home and I speculated the reason “everything is unique” was on the grounds that she didn’t take a gander at a Windows machine for about fourteen days.

One day a client calls since her computer wouldn’t control on. Alright, so I take the outing upstairs and sure enough no capacity to the CPU or screen. I pursue the power lines to an electrical extension, yet I couldn’t see the power switch. A head of lettuce in a basic food item sack had tumbled from her work area onto the turn and turned it off. Despite everything we giggle about the ‘Passing by Vegetable’ ticket…

“I had a client at my last occupation, who when it came time to reboot her computer would slither under her work area, unplug each and every link, plug in each and every link, and return up and disclose to me she rebooted. Shockingly better when I had her log off and sign on she did likewise.”

Call from client: “my PC is shouting at me.” Found out the computer was blaring on the grounds that the console plate was holding a few catches down.

I got a ticket expressing “client is mentioning to be changed back to Google from Chrome”

Ticket #144: “myspacebarwillnotwork” – Description: “iwouldreallylikesomespacessoicanwork!”

  • It’s a major issue when clients begin confusing a container of WD-40 with canned air… that console was never the equivalent. “It’s sooo slick!?” *facepalm*
  • We trust you making the most of our amusing help work area stories. We realize that life can get harsh in IT despite so much client mistake, yet in any event you’ve built up an incredible comical inclination to manage it.. isn’t that so?
  • On the off chance that you need to manage client issues of any sort can help. Effectively track and dole out tickets (even the silly ones), downplay drive-by client demands, and distinguish your most serious issue clients with the Help Desk… accessible for FREE for both cloud and neighborhood renditions.