Laptop Computer Repair Radstock. We are less expensive, quicker and friendlier than our competitors.

Published / by Mr Fixit

Laptop Computer Repair Radstock and Surrounds.

* Laptop computer repair done right, quickly and inexpensively.
* We can come to you – phone us: 07510171710.
* Your new computer designed and built for a fair price.
* Your laptop computer repair completed for a sensible fee (including tablets).
* Upgrades performed swiftly and to a strict budget without compromises.
* Speed up your computer at a reasonable cost to increase your productivity.
* Training given in all aspects of computing including OS management and repair.
* Viruses, Trojans and other Malware removed cheaply and protected against in future.

With over 25 years experience of laptop computer repair and everything else PC related, from building, configuring, installing, networking, upgrading, decommissioning and scrapping them, from MFM and RLL hard drives and BBS to Beta testing ’98, 2000, XP, Vista, Windows 7, 8 and 10, running Linux, Mac OS and LAMP on diverse platforms, Hosting and Designing, through the family computer (security and coffee) problems that we have all suffered, to Notebooks, Laptops, Netbooks, Tablets, Personal Digital Assistants, Consoles and Smartphones – WestCountryComputers can help you with laptop computer repair Radstock, Midsomer-Norton and beyond.

Get in touch with us directly for a friendly and inexpensive solution to your computing problems – especially laptop computer repair. Phone Terry on: 075 1017 1710 With reference to:

Laptop Computer Repair Radstock and surrounding area.

Laptop Computer Repair and Maintenance – We provide small businesses and individuals with responsive, well configured and reliable computers, network and infrastructure. Including software installation, repair and maintenance. We support all versions of Windows including Windows ’98, Windows XP, Windows Vista, Windows 7 and Windows 8 alongside Mac OS X and Linux variants.

Data Recovery – We recover data from damaged USB memory devices, external hard drives, laptop computer and desktop machines.

Laptop and Computer Backup Systems – Backing up and securing data are the most important steps any business can take. We analyse your backup and security situation and formulate a plan tailored to your needs and budget that will give you peace of mind.

Consulting and Assessment – We consult with you and supply you with a detailed report of your hardware, software, current security implementation and network infrastructure. We recommend solutions based on a mix of your budget, needs and business goals.

Laptop computer Security – High speed Internet connections expose everyone to security problems to some degree. Wireless networks’ default settings can present some serious security problems. We analyse your set up and configure your Internet connectivity and network for the maximum security commensurate with your needs.

Virus Protection – Maintaining up-to-date anti-virus, anti-malware and hacker protection is, alongside a robust backup solution, the most important safeguard a business or individual can implement. We will determine your current defences and recommend anything deemed necessary to gain your maximum, ongoing, updated protection.

By the by….. We are not being immodest when claiming we have seen it all. We have worked directly with The DWP, Local Councils, Schools and Universities, Aardman Animations, Mobil, British Gas, Microsoft and Wessex Water amongst others.

We have created, built out, configured and tested to destruction the systems, software and hardware that printed the book, produced the film and manufactured the T-shirt. We concentrate on Computer Repairs Radstock and Midsomer-Norton but travel to cistomers all over the area.

We know Laptop Computer Repair and we live here in the West Country. Perfect.

eMail us by clicking here

We like Google Mail, we never see spam and in fact we recommend it to all our customers as they could change ISP, change their company name or even change countries without changing their email address. Let’s face it, Google are not going anywhere ;-)

We cover a large area for Laptop Computer Repair and our other services, not just Radstock. Here are some of our ‘local call out hotspots’:

We serve: Bath, Bristol, Banes, Somerset, Avon, Bathampton, Batheaston, Bathford, Bathwick, Bishop Sutton, Burnett, Cameley, Camerton, Carlingcott, Charlcombe, Chelwood, Chew Magna, Chew Stoke, Chewton Keynsham, Claverton, Claverton Down, Clutton, Combe Down, Combe Hay, Compton Dando, Compton Martin, Corston, Dunkerton, East Harptree, Englishcombe, Fairfield Park, Farmborough, Farrington Gurney, Freshford, Hallatrow, High Littleton, Hinton Blewett, Hinton Charterhouse, Hunstrete, Inglesbatch, Kelston, Keynsham, Kingsmead, Kingsway, Lambridge, Langridge, Lansdown, Lower Swainswick, Lyncombe Vale, Marksbury, Midford, Midsomer Norton, Monkton Combe, Nempnett Thrubwell, Newbridge, Newton St Loe, North Stoke, Norton Malreward, Odd Down, Oldfield Park, Paulton, Peasedown St John, Priston, Publow, Radstock, St Catherine, Saltford, Shoscombe, South Stoke, Southdown, Stanton Drew, Stanton Prior, Stony Littleton, Stowey, Stowey Sutton, Swainswick, Temple Cloud, Timsbury, Tunley, Twerton, Ubley, Upper Swainswick, Walcot, Warleigh, Wellow, West Harptree, Westmoreland, Weston, Bath, Whitchurch, Whiteway, Widcombe, Woollard and Woolley amongst others. Call us and see what we could do for you, your business and your pocket!

We look forward to working with you.

How to test your website’s security in a few simple steps! (Part 1)

Published / by Mr Fixit
How to test your website’s security in a few simple steps! (Part 1)

TrioTips: Smart Tips for Small Business

Just how secure is your website and online store? In just a few simple steps we show you how to use the website to run a complete security assessment to see where your site stands.

Find out more about us and products at today!

TrioTips – Smart Tips for Small Business
Website Security – Part 1

Hello and welcome to another episode of TrioTips, smart tips for small business. Today we are going to show you how to assess the security of your website using But first we want to give you a very short overview about website security and what it means to you.

Website security is a big topic right now – but talking about it with the IT crowd can get a little frustrating if you don’t understand all the tech talk. However, if you run a website for your business, this is an area that you cannot afford to ignore.

On your website, or other websites you may have visited, you may have seen a term called “SSL” being used. But what is this and what does it mean to you? It’s an acronym that actually means Secure Socket Layer, and it provides a layer of protection to traffic that flows through your website. You can verify that a site has SSL by identifying the green lock icon next to their web address (show example).

SSL should be present in your site to secure traffic and data between your customers and your website. This means, if in the event someone is trying to hack or steal information from your site traffic, they will have a hard time doing so. All because SSL has encrypted or secured your traffic.

Now, what really matters is how well is your website is encrypted. We are going to show you how to check the health of your site’s security with a simple tool.

1. To begin, open your web browser and visit the website

2. Towards the top-right side of the screen is an option labeled “Test Your Server”, go ahead and click this to get started.

3. On the next page you will be given a box to enter your website address into. Once entered, click “Submit”

4. The report will takes several minutes to generate so you will need to wait a moment until this is complete.

5. Once the report is complete you will receive a letter grade for your websites security.

As an example, here are 2 sites that we ran through the process to show the difference in reporting. As you will note, each site is unique with it’s security grade and recommended improvements. (make sure to hide website addresses)

The grading ranges from A to F, with A being the highest rating you can achieve. If your website scored that, then great job! But if your site received a B or lower, then you should contact your webmaster or security vendor and ask them to improve on any of the areas that were noted on the report.

Thanks again for joining us, we hope our tip helped!

Microsoft Drops Windows 7/8.1 Support for AMD Ryzen & Intel Kaby Lake CPU & Lies About It – BUSTED!

Published / by Mr Fixit / 27 Comments on Microsoft Drops Windows 7/8.1 Support for AMD Ryzen & Intel Kaby Lake CPU & Lies About It – BUSTED!
Microsoft Drops Windows 7/8.1 Support for AMD Ryzen & Intel Kaby Lake CPU & Lies About It – BUSTED!

Today Microsoft officially stated that it won’t allow Windows Updates on Windows 7 or Windows 8.1 if you have an AMD Ryzen or Intel Kaby Lake or newer CPU. They claim the dropped support is for stability and reliability but I cut through the crap as an ex-Microsoft employee and tell you why they are really doing it. Comes down to Windows 10 market share and spying, plain and simple.

** UPDATE 4/19/17 **
Looks like I’m proven right by this article that shows a user made patch that allows the updates you wouldn’t get to install on Windows 7 and Windows 8.1 and they work just fine proving that Microsoft is a LIAR!

▼ Do you run AdBlock? If so please consider donating directly to help out ▼
PayPal @

▼ Get my Coffee Mug (Coffee Makes Me Poop) ▼

▼ See how I got animated wallpaper ▼

▼ Links to other popular Windows 10 videos I’ve made ▼
Stop Windows 10 App Installs –
Stop Windows 10 Spying –
Why Microsoft Force Installs Apps –
Microsoft Laid Me Off –

▼ Information Sources ▼,33920.html

▼ Come follow me on social media for behind the scenes stuff 24/7 ▼
Twitter – (*My most active network)
Instagram –
Facebook –
Blog –

▼ Follow me on Twitch to be alerted when I live stream ▼

▼ Discount on GT Omega Racing Office Chair ▼
GT Omega Chairs @
Use code ‘NERDGASM’ at checkout!

▼ Special Thanks ▼
Eric (aka. Hobbs) – Thanks for helping me clean the garage
Chris (aka. Neighbor #1) – Thanks for standing around heckling me
Jeremy (aka. Neighbor #2) – Thanks for not killing me with the machete

▼ Join My [email protected] Team And Let’s Find A Cancer Cure ▼
Barnacules Nerdgasm Team # 231300
Download Client @
** Top 10 contributors shown on Twitter weekly!

▼ Links to all equipment I use to shoot & edit my videos▼
■ 4k Image Stabilized Cameras ■
Sony FDR-AX53 4k Camera –
Sony FDR-AX33 4k Camera –
Sony NP-FV100 Extended Battery –

■ Tripods ■
Manfrotto Professioanl Fluid Video Tripod –
Manfrotto Ballhead (Existing Tripod) –
Joby Gorilla Pod Focus –
Joby Gorilla Pod Standard –
Joby Gorilla Pod Ballhead –

■ Audio Equipment ■
Sennheiser MKE-440 Microphone –
Zoom H6N Audio Recorder –
Zoom H4N Audio Recorder –
Audio-Techica ATR3350 Lavaliere Microphone –

■ Capture Equipment ■
AV.IO 4K Capture Device –

■ Lighting Equipment ■
Large Aputure Light Storm LED Light Panel –
Smaller Aputure LED Light Panel –
ePhotoInc 500 LED Light Panels (Cheaper) –
Compact CFL lighting kit (Budget) –

■ Editing Software ■
Adobe Creative Cloud Software –
Sony Vegas Editing Software –
Sony Vegas 7 (old, but free) –
Davinci Resolve Editing Software –

▼ Want to mail me something? It may show up in a future unboxing video (include note) ▼
ATTN: Jerry Berg
PO Box 279
Duvall, WA 98019 USA

▼ Questions & Answers ▼
Q) That wallpaper is triggering my OCD rage!
A) Okay, a ton of people have commented on the wallpaper so I’ve made a note never to use this particular one again. Thank you!
**Help stop Microsoft Windows 10 Privacy Invasion by signing this petition**

Hello Windows XP

Published / by Mr Fixit / 25 Comments on Hello Windows XP
Hello Windows XP

Revisiting an almost 16 year old operating system from Microsoft that end on April 8th, 2014.

All music used in the video are from Rever-man on Soundcloud, here is the link to his songs:

► Discord:

► Follow me on twitter for updates and stuff!

► Support me on Patreon! →
► Join the Subreddit! →

My Social Media:


► I stream on Twitch! →
► My Vine! →
► My Instagram! →

Year 10000 bug on Windows XP

Published / by Mr Fixit / 20 Comments on Year 10000 bug on Windows XP
Year 10000 bug on Windows XP

One of the several date/time formatting and storage bugs is the Y10K bug. In this video, I’m demonstrating the effects of the Y10K bug in Windows XP.

Wikipedia Article:

Please take a look at my Twitter channel!


E-mail for ideas or feedback:
[email protected]

Stride (Funkhameleon Deep ‘n’ Calm Remix) by Derek Howell is licensed under a Creative Commons License. (CC BY 3.0 –

“HOW TO INSTALL AN INTEL CPU” Dino PC Installing a Processor

Published / by Mr Fixit / 6 Comments on “HOW TO INSTALL AN INTEL CPU” Dino PC Installing a Processor
“HOW TO INSTALL AN INTEL CPU” Dino PC Installing a Processor

In this video we are showing how you install a brand new intel CPU

Our Videos:

Test Rig Specs:
CPU: Intel Core i7 6700K
RAM: 16GB Corsair 2666mhz Vengeance LPX DDR4 (2x8GB)
Graphics card: Asus Turbo GeForce® GTX™ 970 4GB OC
Motherboard: Asus Z170-E
Operating System: Windows 10 Home (64-bit)
Hard Drive: Samsung 256GB 850 PRO SSD
Case: Corsair Carbide Air 540 Black
PSU: 750W Corsair CS Modular
Sound Card: Onboard 7.1 Audio

Kensington Clicksafe laptop lock

Published / by Mr Fixit / 12 Comments on Kensington Clicksafe laptop lock
Kensington Clicksafe laptop lock

Kensington Clicksafe review… If you want to secure your laptop and other valuable presentation equipment the quick to attach ClickSafe may be just what you need. In this review we’ll provide a detailed look at the Kensington ClickSafe security lock.

And if you want to see how this type of device is used, just have a look at my other video on Laptop and presentation equipment security tips…

Information Security Management: Computer Security Lectures 2014/15 S1

Published / by Mr Fixit
Information Security Management: Computer Security Lectures 2014/15 S1

This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at

The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.

Topics covered in this lecture include:
Information security management
Security managers
Security managers need to…
There is no perfect solution suited to everyone
Technical controls can help mitigate certain risks, but do not provide a be-all and end-all solution
Maslow’s hierarchy of needs
Security breaches can cost an organisation either directly financially, or indirectly
According to Symantec, in 2011 the average organisation incurred $470,000 in losses from IT security attacks
Indirect costs
Studies have found correlations between security compromises and decreases in stock prices
Direct costs of a security compromise typically include:
Staff time spent dealing with the incident
This has is an opportunity cost: they could be working on something else
Staff pay: may include overtime
Extra bandwidth/quota network use
Lost sales (typically makes a certain turnover each day – lost if offline)
And so on
Attacks on the physical world via technology
Cost center
Return on investment (ROI)
Business ventures typically need to demonstrate a positive ROI to get approved
Security ROI = Savings / Cost
An information security management system (ISMS) is a set of policies for information security management
Developing an ISMS involves
Defining scope
Creating security policies
Risk assessment and risk management
Selecting security controls
Defined in ISO 27001
Teams: Risk management specialists, Incident response team (IRT), Product security team (development), Security specialists (network, sys admin), Tiger teams (pen testing and vuln. analysis), Physical security teams
Risk management overview
Avoidance: “don’t do that then”
Acceptance: “we can live with that”
Mitigation: “lets try to stop that from being a problem”
Transfer: “someone else can deal with the costs” or “lets get insurance against that”
Organisations need to continually:
Protect, detect, react
Types of controls
Administrative policies and controls
Technical controls
Physical controls
Contingency planning
Incident response (IR) planning: Detect and mitigate events that could compromise information security
Business continuity planning (BCP): Recover and continue operations under adverse conditions (large scope for various events)
Disaster recovery planning: Recover IT after a natural or human disaster
Assessing and measuring security
Management is often more effective if you can measure what you are managing
Accuracy of ROI and risk management calculations
Without accuracy calculations can become meaningless or deceptive
Unfortunately “security” can be particularly hard to measure
Assessing and measuring security
Quantitative measures:
Hard numbers: for example, facts such as the previous number of incidents and their costs
Qualitative measures:
Less clear-cut: for example, the impact on PR
Not measured in terms of numbers
Formal assessment of security systems:
TCSEC (AKA the orange book): USA DoD standard
Common Criteria (CC)
Other less-formal self-tests can help to get a general idea of an organisation’s security stance
Standards for information security
Information security standards published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC)
ISO/IEC 27000-series of standards
ISO/IEC 17799:2005, renamed to ISO/IEC 27001:2005
ISO/IEC 27001:2005
PCI compliance
Other laws and regulations:
UK Data Protection Act 1998
Classification of information
In business: Public, Sensitive, Private, Confidential
Military: Unclassified, Sensitive, Restricted, Confidential, Secret, Top Secret
In some cases the data may be labelled (security classification attached), for technical security controls
Defence in depth
Change management
Certified Information Systems Security Professional (CISSP)
Senior security management positions within organisations