Blog

Computer Hoaxes for the Beginner

Can you say, "hoax?" With the advent of email, one person can send millions of messages. With the help of willing accomplice friends, a single hoax chain letter can multiply into hundreds of millions. There are any number of hoaxes and well-meaning people can...

Data Safety Tips

Emergency! The computer has failed: what now? Impact: Turn everything off for 5 minutes and let things stabilize. Once everything is turned back on, check files and applications for damage. Make sure there's a backup of the important files right away. Be alert for...

On or Off?

Is it better for my computer to leave it on or shut it off when I'm not using it? To my way of thinking, there are four main reasons to be concerned about leaving a computer on all day and night. They are: electricity cost, data security, damage from power spikes, and...

Viruses

What are computer viruses, Trojans and zombies? Sounds like a horror movie, doesn't it? Computer viruses are bits of computer code (1's and 0's) that, just like people viruses, use the host (computer) to multiply and infect other hosts. Trojans are bits of code that...

Data Recovery Services

Saving Data for Decades Burgess Consulting has been serving the data needs of our clients with hard drive data recovery since PC's came on the scene. We have successfully recovered the data from tens of thousands of computers, disk drives, RAIDs, flash drives, and all...

Deleted Files

Deleted Files

What happens when a file is deleted? We explain how a file is created, what is created along with it, and what is left over after deleting a file.

Pin It on Pinterest

Share This