Welcome to UpcomingEvents.com!! We hope to see you at an event SOON!
Search

Select Region

Featured Regions

Philadelphia, PA Baltimore, MD Atlantic City, NJ

Not what you're looking for? See All Cities

Or

Search by Zip

T440x300

$59 for One Hour of Computer Tune-Up and Repair Services at Reign Computers, Inc. ($130 Value

Limit 3 per person, may buy 3 additional as gifts. Appointment required; subject to availability. 24 hr cancellation notice required. May use for in-store or on-location services. For on-location; additional fee will apply if beyond 15 miles of 44070. Must use promotional valid in 1 visit. Microsoft activation key and supply re-installation disks required if fresh install of Windows is requested. May be repurchased every 30 days.

Experienced techs tune up sluggish PCs & Macs, remove pesky viruses, perform backups, restorations & repairs, and solve networking issues

The Deal

  • $59 for one hour of computer tune-up and repair services ($130 value)

This deal is valid for PCs, Macs, desktops, and laptops, and can be used for tune-ups, repairs, virus/spyware removal, home networking, troubleshooting, and data backups.

Computer Viruses: A High-Tech Flu

This deal can help protect your computer from viruses. Learn exactly what you're warding off with Groupon's look at the most common types.

The first computer virus was created not to access confidential information, corrupt data, or spam email contacts—all common motives for creating viruses today—but simply to see if it could be done. In 1971, programmers working on internet forebear ARPANET (Advanced Research Projects Agency Network) created a bug they named Creeper in order to test whether a piece of code could replicate itself. (It could, and produced the taunt "I'm the Creeper. Catch me if you can!" on the screens of infected computers.) Self-replication is the goal of all viruses, which spread through contact with another infected being via email, flash drives, or software downloads. To learn how three of the most common types spread, read on.

Boot Virus: This type of virus targets the hard drive’s master boot record, which loads the operating system at startup. When the operating system loads into the computer’s memory, the virus loads with it. Once it’s in the memory, the virus can do whatever it was programmed to do, often overwriting the master boot record with a new set of instructions. This type of virus is most commonly spread through an infected floppy disc or flash drive.

File Infection Virus: Also known as program viruses, these attach themselves to executable files—those with extensions like .exe, .com, or .sys—and then load into the computer’s memory or other programs when the file is run. This type of virus is most commonly spread when infected files are shared over email or on a flash drive.

Macro Virus: Macro viruses can hide inside documents or spreadsheets that use macros—custom actions that can be programmed into the document or spreadsheet using a macro programming language—such as Microsoft Excel or Word. The virus is written in the same programming language and infects a computer whenever an infected file is opened. This type of virus is most commonly spread when infected documents or spreadsheets are shared over email or on a flash drive. Microsoft applications now notify the user before automatically opening files that use macros—so unless you know and trust the source of a file, you should heed their warning.

Get this Deal
Top