Things to Check     Acer Warranty Repairs     JunkWare     Where are we?    Links     Contact us  
PC Repair & Service

Providing Computer
Service to the Sunshine Coast
Since 1989
     PC Repair & Service    
PC Repairs and Service to all makes and models of Notebooks and Desktop computers. We are an Acer Warranty centre based in Buderim on the Sunshine Coast. Our business hours are from 8am to 5pm Monday to Friday. We offer free quotes on all makes and models of computer equipment.

5445 3615

Notebooks Desktops and Monitors
  18 Clearview Ct Buderim Ph 5445 3615
  Contact us
   Things to check  
   Acer Warranty Repairs  
  • Qualified Computer Service Technicians
  • No obligation Free Quotes
  • Labour guarantee
  • Prompt friendly service.
  • All Makes and Models
  • Acer, Asus, Dell, HP, LG, Toshiba, Compaq & Samsung
  • Desktop and Notebook / Laptop Repairs
  • Notebook and Tablet Screen Replacements
  • Custom Built Systems
  • Virus and Malware Removal
  • No Signal, No Power, Not Booting, Beeping, Blue Screen
  • Open 8AM to 5PM Monday to Friday
  • Pick-Up and Delivery Available
  • ACER Warranty Centre
  • Data Recovery
  • Data Backup
  •   Memory Upgrades
  •   Hard Drive Upgrades
  • We are located in North Buderim at 18 Clearview Ct.
      ACER Warranty Agent Ph 5445 3615

      ACER Warranty Agent Ph 5445 3615 All Makes and Models


       Map - Clearview is off Sutherland.  


    PC Repair & Service
    18 Clearview Ct Buderim Qld
    (07) 5445 3615


      Things to Check     Acer Warranty Repairs     JunkWare    Links     Contact us     PCRS Main page  






    Can we Help?



    Your Email:
    (Not Required but certainly helps:)


    PC Repair & Service
    18 Clearview Ct Buderim Qld
    (07) 5445 3615







      Things to Check     Acer Warranty Repairs     JunkWare    Links     Contact us     PCRS Main page  


    Acer Notebooks, Tablets and Desktops Repaired under Warranty

    • Many people don't like having to send their computer away if there is a problem during the warranty period. For one thing, there is the risk of loss or damage in transit. If you have a warranty fault with your Acer Notebook or Desktop consider requesting a local repair when you phone Acer.

    • NB: If you send it away it is Acer's automatic policy to run the recovery process which deletes all your files and any programs that you've installed.

      We respect your privacy. We make every effort to protect your Personal files and photos. If your hard drive is replaced, we will endeavour to back-up, then restore your Personal Files and Photos - all for NO CHARGE.

    • If you have an On-Site warranty then call us on 07 5445 3615 and we will arrange the warranty service with Acer on your behalf and provide you with prompt on-site warranty service.


    Re-Imaging of Acer Iconia Tablets

    If your tablet is not booting and is NOT covered under Acer's warranty, we can re-image it for you. We can also provide root access to your tablet computer if desired.







      Things to Check     Acer Warranty Repairs     JunkWare    Links     Contact us     PCRS Main page  


    A few simple tips to keep your PC your own

    We see many personal computers both desktops and notebooks that have been severely compromised by "junk" ware. By that we mean a whole collection of malware, adware and viruses as well as some fairly well-meaning software that together with the others virtually grind the operating system to a halt. Also, Windows Automatic updates are now causing fairly severe problems too.

    Boot Viruses

    The most obvious Junkware is the boot virus, first seen in the late 80s. These were often placed into the boot sectors of floppy disks so that if the disk was left in the drive when the PC was switched on, the system would boot from it. In the process instead of loading the normal boot loader program an infected version would be loaded and executed. The virus would then wait in memory for the user to insert another disk which it would then infect. This type of virus is still very much in use today. The fix today is the same as then, don't boot from unknown disks. Never leave the system set to boot from floppy disks, USB devices, CDs and DVDs.

    Autorun Viruses

    A similar kind of junkware or virus exploits the windows "Autorun" feature. This is a far more dangerous exploit because you don't actually have to boot from a disk, just insert it into the drive and Windows runs the "autorun" program which is often included to automatically start a setup program. What Autorun automatically starts is often some kind of virus or junkware. This applies to CDs, DVDs, external HDDs and memory sticks. Some memory sticks are pre-infected with a virus when you buy them - as soon as you un-wrap it and insert it you're infected. Also, many external hard drives install a lot of junkware. The fix for this kind of attack is to disable the Autorun "feature" on ALL drives including external Hard drives and memory sticks then delete the autorun files from the device if possible.

    Scan First!

    An all to common way that PCs become infected is by downloading and running software without first scanning it with some king of anti-virus program. ANY software can be infected. The rule is - Always Scan Unknown Programs Before Running Them no matter whether they were downloaded or came from a disk or a trusted source. Remember - is is not the source that should be doubted but the software.

    Avoid the Free Junk

    Then there is software that comes from very dubious sources. There is a clear distinction between free open-source software like Firefox for instance and free junkware which is never open source. Often people notice that their PC is running a bit sluggishly so they search for solutions and are often offered a "Free-Scan" to fix their "Registry Problems" or "Driver Issues" etc, or to "Download a Free Computer Doctor" or other miracle fix - DON'T DO IT! Sometimes a window pops up advising you that "Your PC Is Infected" and to "Click Here Now to Fix the Problem" - DON'T. These programs often infect the computer and then demand a "Ransom" in the form of your credit card details to fix it. Sometimes they even blatantly lock-up your photos and then demand a ransom.

    Even on the Microsoft website you will find links (sponsored sites) to install various types of malware (free registry scanners, "instantly fix your computer" etc). And it gets worse... Check out this howtogeek article...

    The Trojan Horse

    Any computer junkware can install what is known as a trojan horse program. These you should be very worried about because what they do is to download other malware programs which can do anything at all - send off your personal information like banking details for instance. In the worst case senario they open a portal to let people access your PC remotely without you knowing.

    Too Much of a Good Thing

    When one's computer has accumulated enough of this kind of junk it begins to run sluggishly because they are all competing for resources like CPU time, memory and access to the internet. Even fairly benign programs like the programs installed by your printer manufacturer, ipod or mobile phone contribute because they are always wanting to check for, download and install updates.

    Your Computer is considered to be a valuable resource, "real estate" to be exploited, your privacy to be plundered.


    Never install Toolbars. When you install software, you are often asked if you also want to install a toolbar for your web browser. Many toolbars are active downloaders of junkware and should be avoided unless you specifically need the features offered by them. Toolbars are installed as an extension to the web browser which gives them extra privileges.

    Automatic Updates

    What are updates? If software you use is not working correctly, might have a bug, or if it lacks a feature you need you might want to check if it has any updates that may address the problem. Or you may hear about a security issue. On NO account should you let ANY software automatically check for, download and install updates. The only exceptions being Windows security Updates (which are normally made available on the second Tuesday of the month), and your Anti-Virus software which should be updated every day.

    Often the "Update" introduces new problems, like "Windows Automatic Updates" which sometimes installs "Updated" hardware drivers which are not compatible with your actual hardware. We have seen quite a few machines that blue-screen after a "Microsoft Automatic Update" and have to be completely re-loaded. Depending on your windows version, there may be a way to specify only security updates.

    Also, is is now common policy to let the user do the testing on new updates, so the new update youv'e just installed may actually be damaging your data. It is good policy to allow a few days at least before installing any new update. This gives time for bugs to be found and fixed.

    Quite apart from this is the general drain on resources because they are all competing for resources like CPU time, memory and access to the internet. They often try and frighten the user into allowing automatic updating because of "security" concerns. Often, whenever they connect for their updates they send data back to their makers about your usage. (This is not good for your security.)

    Trust Open-Source

    Avoid using "Microsoft Internet Explorer", instead use a good open-source software like Mozilla Firefox for instance. Internet Explorer uses ActiveX controls which allows any web page to install and run software on your PC. This Is A Definite No-No! The most infected systems that we see are systems where Internet Explorer is used to browse the web. Open Source software is always safer. At any one time thousands of people around the world are looking at its source code. Problems are quickly spotted that otherwise may never be noticed. Also in closed-source software bugs are often "spun" as features and "the user" is at fault for not knowing how to use the software, whereas in open-source bugs are just that - bugs. 

    "Internet Explorer has been subjected to many security vulnerabilities and concerns: Much of the spyware, adware, and computer viruses across the Internet are made possible by exploitable bugs and flaws in the security architecture of Internet Explorer, sometimes requiring nothing more than viewing of a malicious web page in order to install themselves. This is known as a "drive-by install". There are also attempts to trick the user into installing malicious software by misrepresenting the software's true purpose in the description section of an ActiveX security alert."

    From Wiki -
    Compare Browser Security

    Remote Access

    Always uninstall afterwards any remote-access software you are asked to install by your service provider for instance to allow remote access to fix email problems ect. This software can be hacked to allow access by anybody. Once again - always scan the download before installing it.

    Also check your router settings. In some routers UPnP (Universal Plug and Play) is enabled by default. This is makes it easy to setup for remote access etc but it also means that any malware can open a port in your router's firewall without logging into it. So, disable UPnP. Also disable remote access to your router if enabled unless you actually need to access it remotely. Also of course, be sure to change your router's access password from the default.

    Anti-Virus Malware

    The least obvious malware can be your anti-virus program itself. Some of these are just as bad as the junkiest junkware and do all the same things as well as pop up bogus messages about non-existent threats to encourage you to subscribe or renew your subscription.

    Often they will automatically hijack your search engine and your home page (sometimes you will have the option of un-checking these default options) as well as hijack your internet browser settings in order to perform browser redirects and display ads from unknown publishers - the kind of behaviour you expect from malware!

    Some are very well known and used to be long-trusted names. Some anti-virus programs are becoming very aggressive and treating the users themselves as threats. These systems run painfully slow and the user may loose access to devices like DVD drives, network and USB ports.

    Many pop up advertising messages urging you to upgrade to a different version. At least one of the most popular Free programs pop up messages telling the user that an "update" is available, the user thinking of update definitions clicks OK and the free version is then "upgraded" to a free-trial version that soon expires and the user is then encouraged to "renew" their "subscription". The pop-ups at this stage become particularly aggressive. Even if the user elects to subscribe the pop-ups dont stop because there is always something more to "upgrade" to.

    Is it any wonder that these programs are so poor at detecting malware when many are just basically malware themselves. Dishonest and misleading messages are a hallmark of malware and a sign that they certainly don't have your best interests at heart.

    Contact us   for recommendations regarding anti-virus products.


    Downloaders and Stubs

    When downloading programs it is always a good idea to avoid "downloaders" or "stubs" - always look for a direct download link.
    Downloaders and stubs are programs that you are given to download instead of the object you want. The idea is that these programs that you then run on your PC download the wanted program for you.

    Any program you run on your PC has the potential to install and download more than you asked for. Many of the big players provide stubs because it allows them to better manage their server resources. They often also provide a direct link to the download but these can be hard to find.

    As a simple guide - if the program downloads in only a few seconds you most probably have a downloader - not the actual download. When you run it it will attempt to go on-line and download more files - the nature of which you have no control over. After it has downloaded these files it installs them then deletes the downloaded files.

    Another advantage of directly downloading is that you can then save the downloaded package in case you have to re-install or install it on another computer or share it with your friends (if permitted).

    Un-install software you don't use

    Un-install software you don't use. If you download and install something but it's not what you expected then un-install it immediately. Often programs set themselves to start when the computer boots so they can go online and download upgrades etc.

    Trust the Cloud?

    The cloud can certainly be very convenient but so can a USB stick.
    * Your files will not be accessible if your internet connection is down.
    * Files can become corrupted (or even deleted) if you have a poor connection (poor signal strength etc).
    * Access is VERY SLOW unless you have at least 100Mb/s internet connection both ways (preferably 1Gb/s). It may take hours to read or write movie files for instance. If your connection is interrupted for some reason, you may have to start over. Many internet plans offer 100Mbs download speed with only 1 or 2Mbs upload. This means that it will take 50 to 100 times longer to save a file than it takes to read. It only takes seconds with a USB 3.0 memory stick.
    * If the server storing your files is hacked, all your files and information can become public.
    * It can be illegal to store Certain files on overseas servers (Check your local regulations pertaining to certain legal documents).

    The cloud concept has been around for a long time. It used to be called "Web Folders" and nothing has changed except people are being encouraged now to place more and more of their personal data online where is is readily available to those with global access.





      Things to Check     Acer Warranty Repairs     JunkWare     Contact us    Links     PCRS Main page  






    Things to Check

    A few things to check beforehand.


    No Power

    The monitor appears completely dead, ie, no power lights are on and the computer is on. Check the power cable.

    Check that the power lead that plugs into the monitor is firmly fitted.

    Monitor Power Plug
    Computer IEC Power Connectors

    If the monitor gets its power from the computer then check that the power leads at the back of the computer are firm.


    No Display

    The power light may be on or Amber only or flashing or both. Or the monitor may appear dead but it may just be sleeping because is it not getting a signal from the computer.

    Check the video cable where it plugs into the computer

    VGA Plug
    Monitor VGA Connector

    Also check the video cable where it plugs into the back of the monitor (if applicable).


    If the monitor is on but there is no display and the computer seems to have booted up OK (judging by the sounds and winking lights etc), the computer may still possibly be at fault. If possible connect another monitor or bring the monitor to us and we will test it on the spot free of charge.





      Things to Check     Acer Warranty Repairs     JunkWare    Links     Contact us     PCRS Main page  

















    Acer Support
      Acer Warranty Repairs  
    Odds and Ends
      Things to Check  
      Contact us  
      PCRS Main page  





      Things to Check     Acer Warranty Repairs     JunkWare    Links     Contact us     PCRS Main page  


      18 Clearview Ct Buderim Ph 5445 3615  



      Open Monday to Friday 8am-5pm

      Contact us  


      2016 All Rights Reserved | D.Dorling


    Web Design by D&D

      This website does not employ tracking cookies.

    Last Modified May 24, 2018.