• 01A
  • 02A
  • 03A
  • 04A
  • 05A
  • 06A

Our philosophy

Our philosophy is that we don’t just fix computers. We provide expert advice and guidance throughout the whole process. We are in a service industry and our job is to provide you with superior service. Period.

We assist, guide and advise. If you come to our web site and request help, we will help you. We are successful at what we do.


We have a 100% satisfaction policy. If you ever have any issues with work we've done, call us within 90 days and we'll redo it for free. If you're still not happy, we'll give you your money back. If you ever have any questions or concerns about our work, contact us right away. We know that if you choose us to help you that you will be delighted with the service you receive.


Jan. 7, 2018 MELTDOWN and SPECTRE fixes arrive - but don't solve everything
This week, a pair of vulnerabilities broke basic security for practically all computers. That's not an overstatement. Revelations about Meltdown and Spectre have wreaked digital havoc and left a critical mass of confusion in their wake.
Jan. 4, 2018 Windows Meltdown-Spectre patches: If you haven't got them, blame your antivirus
Microsoft has warned users that its patches for the dangerous Meltdown CPU bug won't reach them if their third-party antivirus hasn't been updated to support this week's Windows security update.
Dec. 21, 2017 The 20 worst passwords of 2017: Did yours make the list?
Despite all of the year's major hacks, people still can't seem to let passwords like 'admin' and '123456' go.
Aug. 8, 2017 Microsoft fixes 'critical' security bugs affecting all versions of Windows
Microsoft patched 46 separate vulnerabilities — the majority of which were the highest "critical" rating.
July 13, 2017 To update or not to update: There is no question
Updating software has become one of the many keys to data security. Jack Wallen explains why the excuses for failing to update must become a thing of the past.
June 27, 2017 Widespread Cyberattack, More Sophisticated Than WannaCry, Hits Major European Companies
A widespread cyberattack apparently targeting Ukraine rippled across Europe on Tuesday and spread to computer systems of banks and major companies in Russia, Britain and elsewhere — mirroring a crippling ransomware assault a month ago.
June 26, 2017 Windows 10 Stops Ransomware Cold? Not So Fast!
Recently, Microsoft claimed that no known ransomware could penetrate the new Win10 Creators Update. Presenting new anti-ransomware protection features added in Win 10 CU, Robert Lefferts, Director of Program Management, Windows Enterprise and Security, said that no Windows 10 customer was affected by the recent WannaCry ransomware outbreak that took place in mid-May and no currently known ransomware strain can infect Windows 10.
ZDNet decided to not listen, but look for themselves. They hired a pro hacker and wanted to see if such a bold claim would hold up.
June 20, 2017 Web Hosting Provider Pays $1 Million to Ransomware Attackers
South Korean web hosting company Nayana agreed to pay $1 million in Bitcoin after a ransomware attack hit 153 Linux servers.
The attack took place June 10 and resulted in over 3,400 business websites the company hosts being encrypted.
May 17, 2017 Recommended download: Cybereason Ransomfree - protection from ransomware
Cybereason detects previously unknown ransomware strains based on predictive behavior-based analytics, protecting your computer from ransomware before it hits. In fact, Cybereason started blocking WannaCry the moment it was discovered, based purely on behavioral detection.
May 15, 2017 Microsoft Windows Defender Security Center
Microsoft Windows Defender Security Center comes with the Windows 10 Creators Update, so no PC goes without protection. But the best free third-party antivirus products are more effective.
May 15, 2017 Illegal access of Bell Canada customer information
On May 15, Bell Canada announced the illegal access of customer information by an anonymous hacker. Bell’s investigation determined that the information contained a total of approximately 1.9 million active email addresses and approximately 1,700 names and active phone numbers.
There is no indication that any financial, password or other sensitive personal information was accessed.
May 14, 2017 Direct link to Microsoft's recently released security updates (KB4012598)
These patches are only applicable to computers still running operating systems which are now unsupported, such as Windows XP, and protect against the Wana Decrypt0r ransomware. On such computers, the newly posted fixes do not install automatically - they must be manually downloaded and installed.
If you need assistance, contact Eric at 416-792-2557.
May 13, 2017 Microsoft Releases Patch for Older Windows Versions to Protect Against Wana Decrypt0r
Following the massive Wana Decrypt0r (aka "WannaCry") ransomware outbreak from yesterday afternoon, Microsoft has released an out-of-bound patch for older operating systems to protect them against Wana Decrypt0r's self-spreading mechanism. The operating systems are Windows XP, Windows 8, and Windows Server 2003. These are old operating systems that Microsoft stopped supporting years before and did not receive a fix for the SMBv1 exploit that the Wana Decrypt0r ransomware used yesterday as a self-spreading mechanism.
May 13, 2017 Finding the kill switch to stop the spread of ransomware
Media reports today have rightly praised the efforts of MalwareTech to tackle the Wannacry cyber attack. The NCSC has been working in collaboration with a number organisations in the cyber security community, including MalwareTech and 2SEC4, to understand and mitigate the current Wannacry ransomware threat. These industry partners have helped by offering us intelligence from the sinkholed Wannacry domain. This sinkholed domain has prevented further infections occurring and has already resulted in preventing over 100,000 potential infections. However, this action will not remediate infections that have already occurred. Currently, the best mitigation available to prevent infection by Wannacry is the guidance presented in the following blog by MalwareTech and the latest ransomware guidance from the NCSC.
May 12, 2017 World's biggest cyberattack sends countries into 'disaster recovery mode'
The biggest cyberattack the world has ever seen is still claiming victims and threatens to create even more havoc on Monday when people return to work.
May 12, 2017 Wana Decrypt0r Ransomware Using NSA Exploit Leaked by Shadow Brokers Is on a Rampage
Ransomware scum are using an SMB exploit leaked by the Shadow Brokers last month to fuel a massive ransomware outbreak that exploded online today, making victims all over the world in huge numbers.
The ransomware's name is WCry, but is also referenced online under various names, such as WannaCry, WanaCrypt0r, WannaCrypt, or Wana Decrypt0r. As everybody keeps calling it "Wana Decrypt0r," this is the name we'll use in this article, but all are the same thing, which is version 2.0 of the lowly and unimpressive WCry ransomware that first appeared in March.


"I no longer spend days feeling frustrated when something won't work. I call Eric and he resolves it.  He has a calm and patient way of thinking through a problem.  He explains his solutions using clear non-technical language.  He is mindful about keeping costs down and he is conscientious about follow through.  
Eric has made a very positive difference to my relationship with my computers!"

- Nancy L.

Client Feedback

  Payment Options  |  Client Feedback  |  Privacy Policy         

  Home  |  About  |  On-Site Services  |  Remote Support Services  |  Contact
  © 2017 by Computer Guy On Call
Facebook   Twitter   LinkedIn