PCs and laptops

We sell both PCs and laptops, for home and for small business.

All PCs are custom built to the individual customers requirements, with PCs for basic internet and word processing at one end of the scale, right up to bespoke systems for CAD (Computer Aided Design), Photoshop work, and dedicated gaming machines.

We only use high end components from the more reputable manufacturers, which enables us to give all our PCs a two year, on site, guarantee. Some components within the built have individual guarantees that last even longer – for example, the memory we use carries a lifetime-of-the-PC guarantee. All our PCs include power supplies that conform to the 80 Plus standard, a certification that ensures the power supply meets a higher standard of build and efficiency than the norm. All of this means a PC from us will be more reliable and longer lasting than most off the shelf machines.

We only sell the premium brand laptops such as Lenovo and Asus. As with our PCs, using such manufacturers has proved very successful, as the warranty issues are few and far between. We don’t sell entry level laptops, as such machines, although cheap, tend to disappoint very soon after the users software is all set up. They tend to be running at full capacity all the time to keep up, and in combination with inferior build quality, result in a short lived product. All UK bought laptops come with a one year manufacturer guarantee, but we can upgrade this with guarantee packages to extend this cover two or three years.

All systems now come with an SSD (Solid State Drive) as standard. This new generation of drives has no moving parts and is much faster at dealing with data. Even on a standard office PC, this will mean a boot up time of around 10 seconds, with a 4 second boot an the CAD/Photoshop systems. We can still supply the standard mechanical drives if required, or as an extra where large volumes of data storage is required.

All our systems are quoted for to include all build costs, all software installation, data transfer and email etc transfer from an old system, and ESET antivirus/security. The system is then delivered and set up in your home or business, with any peripherals set up too. Basic training and guidance is then provided at that point. We also include 30 days’ worth of Remote Support access, meaning we can connect to you without the need to call in person, in order to help with any queries or training once the system is with you. We will also dispose of any old computer equipment for you, and arrange total destruction of old hard drives.

After sales is very important, so we are always at the end of the phone for any advice.

Latest News and Updates

Live feed from our Facebook page

We have had quite a few mobile devices come in over the years, especially Apple iPads, where the customer has asked us to break a forgotten password, or format a device they have acquired, but that is linked to a lost or forgotten Apple/Google Android account.
When we explain how difficult it is to do, with emphasis on the encryption side of how passwords work, it is often met with disbelief. I have heard, on more than one occasion “can’t crack a simple password - not much of a tech then are you!” Last year there was a news article that helped and supported us here, where the FBI couldn’t get into a criminals iPhone for evidential reasons, and Apple weren’t able to help either.

Today the FBI have made an even broader announcement, stating that they currently have around 7,000 devices, all the property of suspects, that they are unable to access at this point.
The article - below - supports what we have been saying, in that passwords to such devices are inextricably linked to online accounts, encrypting the device. Repeated incorrect password attempts lock the account, so guessing the password, or using password crack tools, simply results in the device being locked further. Yes, verification methods can be used, ie having other contact details set up in a device account to verify with, should a password be forgotten, but if it is an acquired device, then you probably won’t have those credentials either. You will then have a second level of problems accessing the locked verification account!

If you have password protected a phone, or any device, make a note and keep it in a safe place. You will also have linked an email account, as part of the devices set up. Make sure you have also set up answers to certain security question, and use a relative or friend’s email or phone details as back up recovery. Keep a safe note of them too. Most importantly, test those details in a dry run, to check you can reset a password, should disaster strike.

FBI failed to access 7,000 encrypted mobile devices


View on Facebook