Tel: 0415 623 009   | Mail:


Having a secure computer helps guard against hackers and other unwanted guests.

These days as Broadband becomes more accessable to with both technology and costs it means that the unwanted visitors also have these options. Broadband is very fast "always-on"internet. So your computer is available to the world if you are not careful.

The very first item you should have if you are on broadband is a Router or Router/modem both are the same in security, the Router/ Modem replaces your old Broadband modem into 1 item.

There are quite a few little fixes that can be preformed, however you must first know if you require any hardware chages to your computer.

What is the difference between a virus and a worm?

What is a TROJAN and where did the name come from?


What is a SPYWARE?

What is a MALWARE?


What is the difference between a virus and a worm?

A virus is a program that replicates, i.e. it spreads from file to file on your system and from PC to PC. In addition, it may be programmed to erase or damage data.

Worms are generally considered to be a subset of viruses, but with certain key differences. A worm is a computer program that replicates, but does not infect other files. Instead, it installs itself once on a computer and then looks for a way to spread to other computers.

In the case of a virus, the longer it goes undetected, the more infected files there will be on the computer. Worms, however, create a single instance of their code. Moreover, unlike a virus, a worm code is stand-alone. In other words, a worm is a separate file while a virus is a set of code which adds itself to existing files.


What is a TROJAN and where did the name come from?

The term Trojan refers to the wooden horse used by the Greeks to sneak inside the city of Troy and capture it. The classic definition of a Trojan is a program that poses as legitimate software but when launched will do something harmful. Trojans can't spread by themselves, which is what distinguishes them from viruses and worms.

Today, Trojans are typically installed secretly and deliver their malicious payload without your knowledge. Much of today’s crimeware is comprised of different types of Trojans, all of which are purpose-built to carry out a specific malicious function. The most common are Backdoor Trojans (often they include a keylogger), Trojan Spies, password stealing Trojans and Trojan Proxies that convert your computer into a spam distribution machine



In a drive-by download, your computer becomes infected just by visiting a website which contains malicious code. Cybercriminals search the Internet looking for vulnerable web servers that can be hacked. On such servers, cybercriminals can inject their malicious code (often in the form of malicious script) onto the web pages. If your operating system or one of your applications is un-patched, a malicious program is downloaded to your computer automatically when you access the infected web page.


What is SPYWARE?

As the name suggests, this is software that is designed to harvest your data and forward it to a third party without your consent or knowledge. Such programs may monitor key presses ('keyloggers'), collect confidential information (passwords, credit card numbers, PIN numbers, etc.), harvest e-mail addresses or track browsing habits. In addition to all of this, spyware inevitably affects your computer’s performance.


What is MALWARE?

Malware - short for Malicious Software- is an umbrella term that refers to any software program deliberately created to perform an unauthorized and often harmful action. Viruses, backdoors, keyloggers, password stealers and other Trojan horse programs, Word and Excel macro viruses, boot sector viruses, script viruses (batch, windows shell, java, etc.) and Trojans, crimeware, spyware and adware are but a few examples of what is considered malware.

It was once sufficient to call something a 'virus' or 'Trojan horse', but infection methods and vectors evolved and the terms virus and Trojan no longer provided a satisfactory definition for all the types of rogue programs that exist.



Phishing is a very specific type of cybercrime designed to trick you into disclosing personal financial details. Cybercriminals create a fake website that looks just like a bank’s website (or any other web site where online financial transactions are conducted e.g. eBay). They then try to trick you into visiting this site and typing in your confidential data, such as your login, password or PIN. Typically, cybercriminals send out a large numbers of e-mails containing a hyperlink to the fake site.


When you move from one place to another we can help hook all them cables up again to help speed up the process of getting you back up and operational quickly.
Call us today to see if we can help you.


We custom build all our PC's, we can build any number of combinations that you may require.
If you know exactly what you need we can help you with that,Unsure of what your needs or requirements are we can help you make the right decisions.
Call us today to see if we can help you.


Is your computer running slow, have a virus, spyware, deleted a file by mistake, or just not sure what is going on with your computer,

Call us today to see if we can help you.

  • SCS-DC3

    This is a great entry level PC can do all the everyday tasks, upgrade options can help take it to the next level.

  • SCS-QC3

    A step up from the entry level computer giving the user more vesatility with more speed and larger storage space.

  • SCS-6C3

    This is a great system for gaming or graphic design, giving great speeeeeeeeeed :-)
    The PC has a huge 3TB hard drive and also boasts a Blu-Ray Burner and a great 2GB Video Card. The upgrades for this PC an 8 Core CPU!!!!!!!!!!!!!!!!!