SlideShare a Scribd company logo
This is how we roll!



  By Doctor K-Dog
What we do…
 Computer hardware and software repair
    Desktop’s
    Laptop
        Viruses, slow systems, Cracked LCD’s, DC power jacks
    
        Custom builds
    

 Network setups
    Wired and wireless, LAN setups
 Residential security assessments
 Custom built computers
 Emergency services
Who are our customers?
 Residences
    Average 2 + PC’s
    Families and couples
    Individuals/college students


 Where do they live?
   Near and far West end
   Richmond 288/295/I95 loop primary
Looking to target
 Small businesses and Residences
    1-5 workstations
        Share network recourses, IT assets (printers)
    

        Security, backups, remote access
    

        Employee /Child monitoring
    




 Retirees and The 60-75 age bracket
    Tutorials and education 1 to 1’s
    Video chat with extended family
    retirement communities
Don'ts
  Wallpaper or screen saver programs
  Emoticon programs
  Toolbars
    Yahoo, google etc…..

  WeatherBug
  Tons of different instant messaging programs
    Trillian for multiple

  Leave your laptop on the charger all the time
    Use your battery or loose it!

  Limewire!!!
  Don’t let your kids use your computer!
Do’s
  Eliminate unnecessary start programs
    start/all programs/startup (adobe speed launcher)
    Monitor your task manager (xp ~35-50) (vista ~65-80)
  Add/Remove programs
    Get rid of old apps you don’t need
  Run your antivirus/antispyware regularly
  Use your System Restore feature
    Start/programs/accessories/system tools/system restore
  Use your favorites/bookmarks
  Create a junk email account
  Bittorent for P2P
  BACK UP YOUR DATA!!!!
    Carbonite.com
Utilities to help
 If you use Comcast, you get McAfee security suite free!
    Vipre antivirus/antispyware (3+ computers $50)
    Clamwin free antivirus
 Ccleaner
 Microsoft’s LiveMesh
    Online Sync
 Log Me In
    Remote control
 Open Office/Google Docs
 YouMail
    Your voicemail unleashed
Rest assured
 We are not the geek squad!


 We are trained and experienced professionals


 Customer service is our #1 priority
    Golden Rule rules

More Related Content

Similar to the computer doctor of richmond

10+ Tech Tips for Small Business
10+ Tech Tips for Small Business10+ Tech Tips for Small Business
10+ Tech Tips for Small Business
sageserver
 
Desk Maintenance
Desk MaintenanceDesk Maintenance
The Olive Garden
The Olive GardenThe Olive Garden
The Olive Garden
Doriam
 
Business And Technology Slideshow
Business And  Technology  SlideshowBusiness And  Technology  Slideshow
Business And Technology Slideshow
Doriam
 
Becoming a Power User
Becoming a Power UserBecoming a Power User
Becoming a Power User
Michigan Nonprofit Association
 
A Manager's Guide To Telecommuting
A Manager's Guide To TelecommutingA Manager's Guide To Telecommuting
A Manager's Guide To Telecommuting
calevans
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining Slides
Laney Dale
 
YAPC2007 Remote System Monitoring (w. Notes)
YAPC2007 Remote System Monitoring (w. Notes)YAPC2007 Remote System Monitoring (w. Notes)
YAPC2007 Remote System Monitoring (w. Notes)
rgiersig
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For Managers
Daniel Owens
 
Act! Technical Training
Act! Technical TrainingAct! Technical Training
Act! Technical Training
Mike Lazarus
 
Computer Careers At Clc
Computer Careers At ClcComputer Careers At Clc
Computer Careers At Clc
maryb55362
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
jaymemcree
 
Howtochooseane Mailsolution
Howtochooseane MailsolutionHowtochooseane Mailsolution
Howtochooseane Mailsolution
bizet
 
The Yubikey
The YubikeyThe Yubikey
The Yubikey
David Page
 
Inside Picnik: How We Built Picnik (and What We Learned Along the Way)
Inside Picnik: How We Built Picnik (and What We Learned Along the Way)Inside Picnik: How We Built Picnik (and What We Learned Along the Way)
Inside Picnik: How We Built Picnik (and What We Learned Along the Way)
jjhuff
 
Cybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, SecureCybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, Secure
Yokogawa1
 
Tech Presentation 2
Tech Presentation 2Tech Presentation 2
Tech Presentation 2
guest2bdea
 
Troubleshooting and maintenance
Troubleshooting and maintenanceTroubleshooting and maintenance
Troubleshooting and maintenance
Tech Bikram
 
Reliability and clock synchronization
Reliability and clock synchronizationReliability and clock synchronization
Reliability and clock synchronization
Sri Manakula Vinayagar Engineering College
 
BSOD Presentation
BSOD PresentationBSOD Presentation
BSOD Presentation
Anton Balzan
 

Similar to the computer doctor of richmond (20)

10+ Tech Tips for Small Business
10+ Tech Tips for Small Business10+ Tech Tips for Small Business
10+ Tech Tips for Small Business
 
Desk Maintenance
Desk MaintenanceDesk Maintenance
Desk Maintenance
 
The Olive Garden
The Olive GardenThe Olive Garden
The Olive Garden
 
Business And Technology Slideshow
Business And  Technology  SlideshowBusiness And  Technology  Slideshow
Business And Technology Slideshow
 
Becoming a Power User
Becoming a Power UserBecoming a Power User
Becoming a Power User
 
A Manager's Guide To Telecommuting
A Manager's Guide To TelecommutingA Manager's Guide To Telecommuting
A Manager's Guide To Telecommuting
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining Slides
 
YAPC2007 Remote System Monitoring (w. Notes)
YAPC2007 Remote System Monitoring (w. Notes)YAPC2007 Remote System Monitoring (w. Notes)
YAPC2007 Remote System Monitoring (w. Notes)
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For Managers
 
Act! Technical Training
Act! Technical TrainingAct! Technical Training
Act! Technical Training
 
Computer Careers At Clc
Computer Careers At ClcComputer Careers At Clc
Computer Careers At Clc
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Howtochooseane Mailsolution
Howtochooseane MailsolutionHowtochooseane Mailsolution
Howtochooseane Mailsolution
 
The Yubikey
The YubikeyThe Yubikey
The Yubikey
 
Inside Picnik: How We Built Picnik (and What We Learned Along the Way)
Inside Picnik: How We Built Picnik (and What We Learned Along the Way)Inside Picnik: How We Built Picnik (and What We Learned Along the Way)
Inside Picnik: How We Built Picnik (and What We Learned Along the Way)
 
Cybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, SecureCybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, Secure
 
Tech Presentation 2
Tech Presentation 2Tech Presentation 2
Tech Presentation 2
 
Troubleshooting and maintenance
Troubleshooting and maintenanceTroubleshooting and maintenance
Troubleshooting and maintenance
 
Reliability and clock synchronization
Reliability and clock synchronizationReliability and clock synchronization
Reliability and clock synchronization
 
BSOD Presentation
BSOD PresentationBSOD Presentation
BSOD Presentation
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

the computer doctor of richmond

  • 1. This is how we roll! By Doctor K-Dog
  • 2. What we do…  Computer hardware and software repair  Desktop’s  Laptop Viruses, slow systems, Cracked LCD’s, DC power jacks  Custom builds   Network setups  Wired and wireless, LAN setups  Residential security assessments  Custom built computers  Emergency services
  • 3. Who are our customers?  Residences  Average 2 + PC’s  Families and couples  Individuals/college students  Where do they live?  Near and far West end  Richmond 288/295/I95 loop primary
  • 4. Looking to target  Small businesses and Residences  1-5 workstations Share network recourses, IT assets (printers)  Security, backups, remote access  Employee /Child monitoring   Retirees and The 60-75 age bracket  Tutorials and education 1 to 1’s  Video chat with extended family  retirement communities
  • 5. Don'ts  Wallpaper or screen saver programs  Emoticon programs  Toolbars  Yahoo, google etc…..  WeatherBug  Tons of different instant messaging programs  Trillian for multiple  Leave your laptop on the charger all the time  Use your battery or loose it!  Limewire!!!  Don’t let your kids use your computer!
  • 6. Do’s  Eliminate unnecessary start programs  start/all programs/startup (adobe speed launcher)  Monitor your task manager (xp ~35-50) (vista ~65-80)  Add/Remove programs  Get rid of old apps you don’t need  Run your antivirus/antispyware regularly  Use your System Restore feature  Start/programs/accessories/system tools/system restore  Use your favorites/bookmarks  Create a junk email account  Bittorent for P2P  BACK UP YOUR DATA!!!!  Carbonite.com
  • 7. Utilities to help  If you use Comcast, you get McAfee security suite free!  Vipre antivirus/antispyware (3+ computers $50)  Clamwin free antivirus  Ccleaner  Microsoft’s LiveMesh  Online Sync  Log Me In  Remote control  Open Office/Google Docs  YouMail  Your voicemail unleashed
  • 8. Rest assured  We are not the geek squad!  We are trained and experienced professionals  Customer service is our #1 priority  Golden Rule rules