Choose From Three Options
- $19 for one computer tune-up ($69.95 value)
- $49 for virus removal ($129.95 value)
- $59 for a one-year computer monitoring program ($119 value)
Computer tune-up includes hard drive and firewall tests, adjustment of performance settings, removal of “junkware,” junk files, adjustment of virtual memory size for best performance, optimization of startup programs for faster boot times, installation of essential Windows updates, and hard drive defragment.
The one-year residential computer monitoring program includes:
- Fully managed antivirus software with unlimited virus removals
- Windows patch management (install updates, basic troubleshooting for failed updates)
- Daily mini-cleanup of temp files
- Windows service monitoring (for attempts to restart a service if it is shut down)
- Crypto prevent of the worst viruses out there now (checked daily for updates)
- Hard drive space monitoring with trending (to prevent hard drives from getting too full)
- Basic hardware monitoring (to anticipate failures)
- Optional DNS settings to block unwanted or inappropriate website access
Computer Viruses: A High-Tech Flu
This deal can help protect your computer from viruses. Learn exactly what you’re warding off with Groupon’s look at the most common types.
The first computer virus was created not to access confidential information, corrupt data, or spam email contacts—all common motives for creating viruses today—but simply to see if it could be done. In 1971, programmers working on internet forebear ARPANET (Advanced Research Projects Agency Network) created a bug they named Creeper in order to test whether a piece of code could replicate itself. (It could, and produced the taunt “I’m the Creeper. Catch me if you can!” on the screens of infected computers.) Self-replication is the goal of all viruses, which spread through contact with another infected being via email, flash drives, or software downloads. To learn how three of the most common types spread, read on.
Boot Virus: This type of virus targets the hard drive’s master boot record, which loads the operating system at startup. When the operating system loads into the computer’s memory, the virus loads with it. Once it’s in the memory, the virus can do whatever it was programmed to do, often overwriting the master boot record with a new set of instructions. This type of virus is most commonly spread through an infected floppy disc or flash drive.
File Infection Virus: Also known as program viruses, these attach themselves to executable files—those with extensions like .exe, .com, or .sys—and then load into the computer’s memory or other programs when the file is run. This type of virus is most commonly spread when infected files are shared over email or on a flash drive.
Macro Virus: Macro viruses can hide inside documents or spreadsheets that use macros—custom actions that can be programmed into the document or spreadsheet using a macro programming language—such as Microsoft Excel or Word. The virus is written in the same programming language and infects a computer whenever an infected file is opened. This type of virus is most commonly spread when infected documents or spreadsheets are shared over email or on a flash drive. Microsoft applications now notify the user before automatically opening files that use macros—so unless you know and trust the source of a file, you should heed their warning.