First State Computer Services
Home, Office and Business services!


Virus removal and protection


Virus, Trojan, rootkit, adware and spyware removal at our office   ( $150.00)

Free Pick-up and delivery

When your computer is infected with a virus the first priority is to make sure your data is backed up. Malicious Virus programs have the ability to install files with system rights and possibly altering the registry. They can disable the computer from starting properly or functioning with annoying pop ups and slow the system down.

  • Saving your data and programs is top priority
  • Antivirus software is available for purchase and is not included in price.
  • Turn around time is about 3 days

Shielding your browsing habits


Clear your cache. Your browsing record is a personal privacy liability, particularly if you share a computer or browse at work. To protect your privacy, clear your browser’s temporary Internet files/clear your history after each browsing session.


Reject unnecessary cookies. Some cookies are used to track your browsing history for marketing purposes. Configure your Web browser to prompt you every time a site tries to send a cookie. This allows you to reject cookies from Web sites you wish to browse anonymously. Usually, cookie configuration is located in the “privacy” or “security” section of your browser's Internet options or preferences.


Use anonymizers. Anonymizing software makes your Internet activity untraceable by masking your IP address (a unique number which identifies your specific computer on the Web) and hiding any personal information.


Hide your email address. Anonymous remailers are free computer services that allow you to send messages without revealing your name or email address.


Look for privacy policies. When registering or doing business with a Web site, review its privacy policy to see how it will use your information. Never do business with any site that doesn't have a clearly stated privacy policy.

A few tricks hackers' might use!

Looks like cybercriminals have turned social networking into a minefield of threats where one wrong move may have very serious consequences. Long gone are the days when you could avoid being scammed simply by using antivirus software. The more aware we are the harder bad guys are working on fooling us. And let me tell you, their techniques are getting more and more sophisticated! Have a look at some examples of the latest cyber criminals’ creations and how to avoid them.

  1. Koobface (social networking worm). It gains access to Facebook profile pages and directs you to view a video that then encourages you to update your Flash player. Malicious files such as flash_update.exe and bloivar29.exe are being downloaded and installed which results in a range of visible problems, including modifications to your Facebook profile, with the immediate result being an error message to contact support. There is also the very real potential for your identity and finances to be compromised! Recently documented that Facebook has not been infected as much. But other social networking sites are being targeted.

  2. Picture files carrying malware are "planted" on social networking websites and instant messaging programs. Hackers try to convince you that your friend has sent you a message or IM to view pictures. Legitimate looking URL when clicked on sends you to an illegitimate website hosting malicious files and executables, which have been modified to appear to be genuine picture files (jpg, gif or bmp). When you download and open those "pictures"; the malware unknowingly runs on your computer. It allows hacker to take control over your operating system as well as the information in it and exposes you to identity fraud and financial loss!

  3. UPS Delivery Threat, also known as Zbot. It delivers an illegitimate file when you are visiting a counterfeit UPS delivery site. Zbot has been known to distribute via email phishing and instant messenger.  Upon informing you that you have missed a UPS delivery, the message urges you to view the invoice online, which in fact sends you to the counterfeit website which downloads a malicious program designed to bypass the firewall and then steal banking and personal information.
  5. A Phone Call, from someone claiming your computer is infected or causing their server to slow down and they want you to access a website that actually has a Malicous program that will infect your computer and they will want you to pay for it with your credit card.

So how do we protect ourselves against all this and more?

  1. Be wary of unexpected IM messages and emails urging you to open or run an attachment or download
  2. Run up-to-date Anti-virus and Malware software with behavioral protection. Keep it running in the background at all times.
  3. Ensure you keep virus definitions up to date and maintain your Microsoft updates regularly.
  4. If you are asked to update to a new version of a flash player or any other program go to producers’ website and download the update directly from it.
  5. Organizations usually contact you by phone or mail, so when you get an email call them back instead of clicking on any links or attachments.
  6. Never let your guard down, it’s better to be too cautious then sorry.


First State Computer Services
Call for pickup or drop off
P.O. Box 337
Claymont, DE. 19703
Phone: 302-798-3509