Computer Tune-Up, Virus Removal, or One Year Computer Monitoring Program from SKM Computer Repair (Up to 73% Off)

Cedar Rapids / Iowa City

Value Discount You Save
$69.95 73% $50.95
Give as a Gift
Limited quantity available
1 bought

In a Nutshell

Expert techs remove viruses from hard drives, tune-up systems for peak performance, and offer 24-hr monitoring to extend computer life

The Fine Print

Promotional value expires 180 days after purchase. Amount paid never expires. Limit 1 per person, may buy 1 additional as gift. Valid only for option purchased. All goods or services must be used by the same person. Pick-up and delivery valid within 30 miles of 52318. Reservation for device pickup required; reservations made before noon may qualify for same-day pickup. Merchant is solely responsible to purchasers for the care and quality of the advertised goods and services.

Choose From Three Options

  • $19 for one computer tune-up ($69.95 value)
  • $49 for virus removal ($129.95 value)
  • $59 for a one-year computer monitoring program ($119 value)

Computer tune-up includes hard drive and firewall tests, adjustment of performance settings, removal of “junkware,” junk files, adjustment of virtual memory size for best performance, optimization of startup programs for faster boot times, installation of essential Windows updates, and hard drive defragment.

The one-year residential computer monitoring program includes:

  • Fully managed antivirus software with unlimited virus removals
  • Windows patch management (install updates, basic troubleshooting for failed updates)
  • Daily mini-cleanup of temp files
  • Windows service monitoring (for attempts to restart a service if it is shut down)
  • Crypto prevent of the worst viruses out there now (checked daily for updates)
  • Hard drive space monitoring with trending (to prevent hard drives from getting too full)
  • Basic hardware monitoring (to anticipate failures)
  • Optional DNS settings to block unwanted or inappropriate website access

Computer Viruses: A High-Tech Flu

This deal can help protect your computer from viruses. Learn exactly what you’re warding off with Groupon’s look at the most common types.

The first computer virus was created not to access confidential information, corrupt data, or spam email contacts—all common motives for creating viruses today—but simply to see if it could be done. In 1971, programmers working on internet forebear ARPANET (Advanced Research Projects Agency Network) created a bug they named Creeper in order to test whether a piece of code could replicate itself. (It could, and produced the taunt “I’m the Creeper. Catch me if you can!” on the screens of infected computers.) Self-replication is the goal of all viruses, which spread through contact with another infected being via email, flash drives, or software downloads. To learn how three of the most common types spread, read on.

Boot Virus: This type of virus targets the hard drive’s master boot record, which loads the operating system at startup. When the operating system loads into the computer’s memory, the virus loads with it. Once it’s in the memory, the virus can do whatever it was programmed to do, often overwriting the master boot record with a new set of instructions. This type of virus is most commonly spread through an infected floppy disc or flash drive.

File Infection Virus: Also known as program viruses, these attach themselves to executable files—those with extensions like .exe, .com, or .sys—and then load into the computer’s memory or other programs when the file is run. This type of virus is most commonly spread when infected files are shared over email or on a flash drive.

Macro Virus: Macro viruses can hide inside documents or spreadsheets that use macros—custom actions that can be programmed into the document or spreadsheet using a macro programming language—such as Microsoft Excel or Word. The virus is written in the same programming language and infects a computer whenever an infected file is opened. This type of virus is most commonly spread when infected documents or spreadsheets are shared over email or on a flash drive. Microsoft applications now notify the user before automatically opening files that use macros—so unless you know and trust the source of a file, you should heed their warning.


High-tech products and accessories, from smartphones to laptop cases
15% Bonus Savings
Get an extra 15% off local restaurants, spas, salons, and more to use within 48 hours of your Goods order! See details
By purchasing this deal you'll unlock points which can be spent on discounts and rewards. Every 5,000 points can be redeemed for $5 Off your next purchase.
{}