top of page
Kopiowanie w dół
  • Can I give you a laptop/server/NAS device to set up?
    In a physical sense, unfortunately not. In a virtual sense - either in the form of remote support or an appointment at the client's headquarters - absolutely 😁 Since we do not have a workshop, stationary service or equipment acceptance point, the very idea of transferring and configuring the equipment from the customer would be problematic for us for practical and organizational reasons - because we would simply not have a place to do such work or where to store the equipment before collection by the client. However, it is more important that such action with the delivery of the subject of the order to us would in most cases be ineffective because: only 1/4 of the cases of configuration orders can be done well based on only brief client guidelines. The remaining 3/4 cases are cases where the configuration work itself takes only a fraction of the time needed to complete the task - and most of this time is spent on the gradual acquisition of information from the client necessary to complete the task. This includes, in particular, e.g. access data to accounts, mailboxes, information on the rights expected by the client for employees, information on the idea of the previous configuration (i.e. who set it up and why? ), detailed guidelines as to the expected behavior of the new configuration, etc. very often, questions to the client related to the implementation of an IT task appear only during the IT work. This happens when, for example, some information about access data is missing, an IT specialist finds some strange configuration from the past, it turns out that for some technical reason it is not possible to perform the task exactly as the client wanted, but in an alternative or slightly different way. very often, the expected configuration cannot be successfully implemented outside the client's computer network. That is, the IT work done on the donated equipment was not the final configuration, but only an example / beginning of the configuration - which would have to be finalized only in the customer's network. So taking the equipment from the client's premises, transporting it, e.g. to the other end of the city - only to perform the beginning of the configuration and only after returning the equipment to the client, perform the final configuration - is pure inefficiency< /u>. we are professional experienced administrators / IT specialists - so we perform many configuration tasks in a relatively short time (minutes / hours), while similar tasks for other contractors may take much longer (hours / days / weeks). So, in our case, the situation of handing over the equipment to an IT specialist so that he tired the topic" within a few days is unlikely. we know from experience that clients often entrust IT specialists with equipment for configuration, specifying only that it has to be done well - because they think it's an unambiguous term and that it will save them time. Meanwhile, as a result, they very often get configurations that were good only for the IT specialist himself - because it was easy to do, there was no need to go into the details of the problem, because it looks expensive or well done (although it does not have to be like that), etc. Then the customer, dissatisfied from one contractor, he looks for another - hoping that the latter will "shoot the problem" better. Unfortunately history repeats itself etc.We dissociate ourselves from such an approach - because we know that a "good" configuration is a configuration tailored to the customer's needs - and it cannot be adapted on the basis of short guidelines from the customer such as "please take the equipment and configure it well because I don't know it"... the very procedure of handing over such equipment to us and then returning it to the customer would be far from professional. Because in our work, the effectiveness depends on the ability to combine different work styles, that's why we divide our daily working time in a fairly flexible way into remote work, performed from the office, and away activities at the clients' premises. What's more - this work pattern changes depending on the needs from day to day - and sometimes from hour to hour. This means that it could not be ruled out that the equipment prepared for the customer would have to wait for collection, for example, for several days - just because we had to change plans and, for example, remove several failures at other customers in the meantime. In the light of the above facts, customers who would like to save their time when commissioning IT configuration, we suggest contacting us. We know how to really save the client's time, money and nerves.
  • Do you have a service center or an equipment collection point? Where should I take my computer for repair?
    No, we solve all problems on site or remotely if technically possible. This is because our on-site IT support is not an addition to our on-site computer service, but is our core business.
  • Why don't you have a service point, workshop or equipment collection point? All the servicemen I know have one.
    First of all, we're not exactly typical computer technicians. Our knowledge does not end with repairing a broken computer as a single device - on the same principle as repairing a washing machine, dishwasher or, for example, a TV set. We have extensive IT skills and experience, going far beyond the scope of a typical computer service. As a two-person team of professional IT specialists, we provide a whole range of services, from small orders to regular IT outsourcing for companies and corporations. We take care of our clients' computer systems and ensure their security. Our system of organization developed over the years allows for such a profile of activity, however, for organizational reasons, it excludes the functioning of such a typical service point. In addition, many IT problems that we solve for clients cannot be solved outside the client's premises and their computer network - especially problems with network connectivity, Internet access or network printer. Such problems are effectively combated only from the level of the client's computer network. Additionally, the functioning of the service point is the cost of the premises and related - when ordering our service, you do not incur such a cost in the price of the service - you pay only for our work.
  • I am looking for an IT specialist who will help me remotely on an ongoing basis and you can also make an appointment with him for service or maintenance work in the afternoons, evenings or weekends
    In this case, we suggest contacting P. Wojciech at the indicated telephone number: +48 504 428 204 The specifics of P. Wojciech's work organization will be perfect for such orders. During typical working hours, you can count on remote support or consultations on current matters, also on an ad hoc basis - without prior appointment. On the other hand, thanks to the flexible working time system at P. Wojciech's, it is possible to obtain outbound assistance also in the afternoon, evening or even on days off (after making an appointment).
  • I need help with the website
    Websites and related orders are a range of services that only partially and to a selected extent are included in our offer. This is because some of our skills, such as server administration or implementation of various IT solutions, also help us a lot in this field of services related to websites such as: repairing websites (e.g. after infections or hacking), make minor corrections to the content of the website - e.g. address or telephone number, updating websites in terms of security (e.g. installing a new version of the WordPress CMS system or its plugins), website cloning, transferring websites between servers or hosting operators, launching simple information pages, based entirely on ready-made and free elements that can be found on the Internet. An example of such a range of activities is our website where we use only free, ready-made elements, such as a skin. In addition, when creating websites is not the main subject of our activity or specialization, each time we analyze a specific order in terms of its feasibility, even if it is generally included in the list of activities presented above. Because we are not graphic designers, we do not have the ability to create a vision of the website, graphic elements (except for basic processing of ready-made materials), we do not have professional graphic software such as the Adobe package - so we do not carry out orders consisting in creating a professional-looking website from scratch or refreshing it on the basis of a new project, new graphics, etc. Also, not being programmers, we do not implement individual modifications to the website or existing modules. We suggest contacting us to specify how much we can help with a given task.
  • I need help with a computer, WiFi printer, router or home network
    Although our offer of IT services is addressed mainly to companies, we invite you to contact us in case of IT problems occurring in the home environment. In our experience, some home IT problems can be solved remotely using TeamViewer. It sometimes happens that well-chosen IT advice can help solve the client's problem. In some individual cases, it is possible to undertake IT activities at the client's home.
  • I need an administrator for my servers or network - someone who will first solve existing problems and then supervise the whole thing on an ongoing basis and react to problems
    In this case, we suggest contacting one of us at one of the following phone numbers: 504 428 204600 469 323 Each of us is an experienced administrator with many years of experience. Thus, the selection of a contractor may be determined by more individual preferences such as work style, typical working hours or other factors such as the location of the contractor's headquarters. Feel free to contact us to determine which of us will be more useful in the implementation of a given task.
  • I'm looking for remote IT support - because I'm from another city, from abroad, I don't have time to wait for the departure date, I need help now, I want to avoid travel costs
    In this case, we suggest contacting Mr. Wojciech Kaczmarek at the following telephone number: 504 428 204 P Wojciech is the person at who devotes more time to providing remote assistance to clients through the TeamViewer program and tasks related to remote management of computer networks or client servers.
  • I am looking for an external IT specialist for our company who will take care of us, will come to us regularly to solve our current IT problems
    Our team offers two complementary travel assistance options. If you need an IT specialist to visit your company in the morning, we suggest contacting Mr. Maciej Urbaniak at the following telephone number: +48 600 469 323 P Maciej is the one of us who is better prepared organizationally when it comes to the implementation of IT assistance in the morning. If you need an IT specialist to visit your company in the middle of the day, in the afternoon (when IT activities will not interfere with your company's work), fight with the problem until the evening or even find time for the weekend, it may be a good idea to make an appointment with P. Wojciech at the telephone number: +48 504 428 204 This proposal results from our internal division of tasks. Mr. Wojciech starts each day in the office, reacting to any problems reported remotely - and only then, after closing all remote requests, he can go to the client away. On the other hand, Mr. Maciej usually starts the day away - so it's easier to enter another travel order in his calendar.
  • Your IT guy is a talker! Instead of fixing my computer, he asks me about some network settings, activities on other computers - and he should focus on the job because it will go faster...
    Our IT specialist knows what he's doing 🙂 Talking with the client and obtaining additional information about the circumstances of the problem, even seemingly not related to the failure, about the activities that the client had taken before the problem appeared or what he tried to do to solve the problem himself - this is the source of our effectiveness and advantage over competition. It is thanks to such information that we are able to better understand the true cause of the problem. Therefore, it is in the client's interest to fully cooperate with our specialist in this regard. Unfortunately, customers often reduce an IT problem to a problem with a single computer, perceived a bit like a failure of an autonomous device such as a washing machine, car, dryer, TV or vacuum cleaner. In such cases, when a stand-alone device fails, it is indeed often possible to entrust the faulty equipment to a professional, have the problem solved and go about your business. However, computer science has its own rules and computers are becoming less and less autonomous in the sense of being completely independent devices. This is due to the fact that they increasingly depend on the Internet, its resources, the operation of the local network, WiFi operation, "cloud" services or some kind of "network artificial intelligence" that manufacturers want to provide them with. Therefore, if our computer does not want to connect to the WiFi network, does not want to open a website, save a file on the server or send an e-mail - it is not necessarily the computer itself that has failed. Very often some network service on which it depends fails - and the problem becomes visible only on this service-dependent computer. There would be nothing unusual about this except for one fact - information about the causes or circumstances of such a problem is usually not stored in the computer itself. The computer does not even necessarily have the technical ability to collect all such data - because, for example, it does not receive information that the WiFi password has been changed, the router has been reset by mistake, some strange device has been plugged into the network that interferes with its operation, or some construction team has not cut the optical fiber with the internet with an excavator. So it is not always possible to do as car mechanics do - they connect the computer to the car and already know everything. Similarly - an IT specialist who sits down to a problematic computer will not learn from it that, for example, 2 hours earlier, the secretary called the operator that there was no internet, the operator ordered to reset the router - and then the entire local network collapsed ... To find out, you need to talk with people. It is people who are the source of this valuable supplementary information that can shed a whole new light on the problem - and thus facilitate its solution. Often more information about the causes of a problem (even unconsciously) is stored in the mind of the user or owner of the computer than the computer itself - especially if the problem is not really in the computer. It is the customer who will sooner recall the fact of resetting the router, the visit of a printer service technician who "mixed something" at the router, etc. So often an IT specialist who is asked to solve a problem with a computer, in practice fixes the configuration of a network or IT environment in which a perfectly functioning computer is running. In order to act effectively, the specialist must collect as much information as possible leading to the source of the problem. Most often, a lot of this information is in the client's head - and the only way to get it out of there is a conversation with an IT specialist 🙂
  • Do you represent a professional business approach to the client?
    That's a good question, especially since a professional business approach can mean different things to different people 😁 All our IT activities are aimed at supporting business in the field of IT and network security. We work with both small companies and larger production plants. Every day we make every effort to ensure that our clients' IT systems operate reliably and stably. We approach orders with full technical commitment, common sense and many years of experience as well as ordinary human honesty. So in this respect we can confidently say that we act professionally for business. However, such a query can also have the other side of the coin. We have noticed that some companies from the IT industry are guided by a strongly business approach in the context of winning an order and a client at any cost and simply maximizing profit. This often happens at the expense of the reliability of information for the client when it comes to the possibility or technical circumstances of the execution of this order. It happens that typical commercial people, not necessarily having technical knowledge, go to meet the client, often promising practically everything the client wants - the so-called golden mountains". Then, however, when the traders have already made a deal , the client is happy that he was promised everything he wanted, that he found the "perfect, desired contractor - technical people on the contractor's side sit on such an order and often grab their heads... Promises given to the client many times by traders have nothing to do with the actual capabilities of the implemented solution. Computer science is governed primarily by the laws of technical possibilities. Not every solution or not every program implemented for the client has been equipped with all the possibilities that the client expects from him. Only in some cases (e.g. expensive ERP systems) the contractor can "add on" some scope of functionality not included in the system by the manufacturer. However, in most cases, the limits of the possibilities of an IT solution implemented at the client's are not determined by the involvement of salespeople or the good will of the contractor - but by the usual technical capabilities of the implemented solution. That is why in our team the client always has direct contact with technical persons who are direct contractors of orders and is informed about the actual technical possibilities of executing his order and about possible alternatives. In our team you will not find a president of the presidency", "marketing director or "customer bragging specialist" 😉< /p>
  • Are you authorized service technicians for my accounting or sales software?
    No, we're not. However, in many cases we can help you with problems with your sales, accounting or HR program. Although we are not authorized technical partners of your software manufacturer, our general IT knowledge, extensive experience and creative problem solving skills will in many cases allow you to solve the problem that concerns the accounting or sales program. This is because sales, accounting, HR or payroll software is usually constructed in a fairly typical way when it comes to IT assumptions. Often it is a client program that connects to a database - on the same or another computer / server. The configuration problems encountered in this area are very often of a general nature, such as a wrong IP address, incorrectly indicated database, firewall blocking the connection, etc. In such cases, general knowledge of computer networks is very useful, which is one of our strongest points. In addition, even if our general knowledge of networks or software does not answer the question, having extensive experience in finding solutions to IT problems, we are often able to find a solution to your specific problem with an accounting or sales program - either by looking in the software documentation , either on the Internet (e.g. on dedicated internet forums) or at the manufacturer's support hotline. However, we want to set a clear limit to where our support capabilities in the field of accounting or sales software extend. Not being authorized service technicians of a given software, we are unable and do not want (due to the inability to take responsibility for such actions) to perform works that require specific service knowledge, such as: modification of program configuration in terms of unusual, specific configurations on the client's side - especially those that require interference in the program's database structures, repairs or patches that require changes to the program's database structures, repairs or corrections that require the use of specialized service software, made available to the technical partners of a given software manufacturer, repairs or fixes that require knowledge of specific manufacturer's internal service procedures, conduct training for the client in the use of a given program. Customers using sales or accounting software very often have to pay, for example, an annual subscription or maintenance fee to receive support from the manufacturer. Unfortunately, it happens that in order to reduce costs, they do not incur such a fee (sometimes it is significant) and only when encountering a specific problem with their software, they try to solve such a problem by looking for ad hoc IT assistance, bypassing the manufacturer's service network. While in general cases, described at the beginning, such help from a general IT specialist has a chance to work, in cases strictly addressed to authorized support, a general IT specialist who is not trained in a given solution may not want to undertake this task. It also happens that clients working in the accounting industry or dealing with financial matters in the company have contact with IT specialists limited to authorized technicians, servicing or implementing accounting or sales software - and sometimes, by the way, helping with general IT issues . Then, after termination or termination of cooperation with such an entity specializing in accounting software support, and then after establishing general IT support, sometimes clients make a kind of mental shortcut, assuming that each IT specialist is automatically an authorized technician or expert in of a given sales or accounting software. Therefore, in order to avoid misunderstandings in this field, we present the above clarification of our scope of support in this matter.
  • Do you repair phones, tablets or laptops?
    We receive inquiries of this kind quite often. We try to answer them in accordance with the facts - we are not a typical stationary service, especially the hardware type. We do not have a properly equipped workshop, spare parts to carry out repairs or any point of acceptance where the customer can bring and then collect the repaired equipment. The scope of our services includes, above all, the scope of repairs of a network nature, computer configuration, mobile or network device, installation / reinstallation of software or removal of viruses or other unwanted software. Our ability to "fix your computer" ends more or less where typical hardware device failures begin. This means that in the case of notifications concerning in particular: a hardware/physically damaged phone, smartphone or tablet (e.g. cracked display, flooding, the device does not turn on), damaged or malfunctioning laptop hardware (damage to the matrix, damage to the power supply / charging system, overheating due to dust, flooding) We ask customers to contact a typical stationary hardware service center that specializes in repairing these types of devices and faults. Based on our own experience, we are able to offer a few proven hardware services, the services of which we used ourselves or recommended to our other customers and they were satisfied. An inquisitive customer could ask: Do you sometimes mislead customers? After all, it is clear from your side that you help in IT and computer matters - so it is understandable that you repair computers ... And here you write that you do not repair ! What is this all about?. We are aware of the fact that the term "repairing computers" has at least several meanings when it comes to what repair activities lie under it. Very often, customers perceive any problem with the computer as a failure - even if it is even the inability to use a specific program or the wrong action by the computer user. The solution to this problem is often called "repair" by customers - although it has nothing to do with the actual repair of the computer (e.g. replacing the hard drive). We are also aware of the fact that customers, without IT knowledge, are often unable to distinguish a problem that is still within the scope of our help (e.g. a problem with computer configuration, malware infection or wrong configuration, e.g. a printer) from a hardware problem that must be resolved by a typical hardware service. Very often, even for us, looking with a professional IT eye, the description of the problem provided by the client does not clearly indicate whether we are dealing with a configuration or hardware problem. It is only after the initial diagnosis that the nature of the problem can usually be determined. Therefore, a bit like a general practitioner, we try to get acquainted with the problem that the client reports to us each time and determine whether it is a problem that corresponds to our scope of services or whether it is a hardware problem that should be professionally solved go to a specialized service with a properly equipped workshop, spare parts and personnel specializing in servicing hardware faults.
  • Why do we prefer to provide some IT services in the form of remote assistance?
    A significant proportion of reported IT issues are related to software or configuration, not hardware issues. Often these are problems that can be solved within a dozen or so minutes. In the realities of Wrocław, it usually takes more time to reach the customer than to solve the problem. Therefore, in order to optimize and increase our availability to clients, we prefer remote assistance, which is often enough to effectively solve the problem or, alternatively, it is used to initially diagnose the problem before visiting the client (which allows us to prepare for solving the problem on site and estimate the work). . Thanks to this approach, we are able to help more customers during the working day, without wasting time on moving around. Benefits of this approach for the client: shorter response time from notification to problem resolution, lower costs, an opportunity to avoid the need to change the organization of the company's work due to IT problems. In the event that the contractor offers a solution to the problem on the road, it may turn out that the IT specialist's visit is possible only in a few hours or a few days. The long waiting time for travel assistance forces a change in the organization of work, so that due to downtime, losses in the company are as low as possible. If we decide on remote assistance, there is a chance to solve the problem very quickly, without having to reorganize work for the time of the "crisis", sense of satisfaction with effective and quick help
  • "Did your hotline consultants take a day off during business hours today? I'm trying to call you but it's either busy or no one is answering..."
    We don't have a real hotline or consultants employed on it 😁 Name telephone numbers given on the website, in social media and on other advertising materials are our personal mobile phone numbers at which you can contact us - direct service providers. We do not have any call center or secretariat that accepts applications and forwards them to us for processing. Therefore, it may occasionally happen that a customer calling one of the personal numbers arrives at the moment when a telephone conversation is being conducted on this number, e.g. to help another customer. It may also happen that a given person simply cannot answer the phone at a given moment because the situation in which he/she is does not allow it (e.g. meeting a client, going to the toilet, etc.). What to do in this situation? First of all, we are open to our customers contacting us in any form. So, if an attempt to contact the selected person by phone was temporarily unsuccessful, you can: wait for a while and after some time call again - perhaps it's a short conversation that will end in a moment. You can spend the waiting time on sorting out all the information that can help us solve the indicated IT problem - we will certainly ask about the details of the problem, circumstances of its occurrence, etc. contact another person from our team - we try to be interchangeable when it comes to helping customers, write us an SMS with a description of the problem and ask us to contact you or send an MMS with a photo of the problem (e.g. error message) - we will definitely call you back and help, contact us using any instant messenger we use (Skype, Google chat, Messenger or WhatsApp), write us an e-mail, at least briefly describing your problem. Please note that we are positive about any contact with the client to provide IT support. However, because there are only two of us, we operate reliably, our prices are reasonable in our opinion, there is a high demand for our services, so it is difficult to completely avoid the situation of busy contact telephone numbers. However, we know from experience that various forms of contact with us result in equally professional and effective effects of our activities.
  • My boss asked me to find a quick solution to an IT problem in the company, but I don't know anything about it. What should I do?
    If your boss has asked you to find a contractor and an offer to solve an IT problem in the company, and you have no idea where to call and what to ask, because you don't know anything about it - we, i.e. two friendly IT specialists - specialists are in a hurry to help!< /p> Even if you don't know much about IT, let us ask you any diagnostic questions, even if they seem like nonsense to you. Perhaps the problem you are dealing with seems trivial, but it is not necessarily so. An outsourced task, seemingly large and expensive, after our verification may turn out to be simple and relatively cheap - or on the contrary - a task that seems simple and quick to implement to the client is actually a complex IT task that requires a lot of work and time . Example: an employee on behalf of the client's company calls an IT specialist at and requests a quote for server implementation, because "boss said to find". When asking for a server quote, he assumes that the question concerns an unambiguous product or service, and the IT specialist is able to give the price right away - preferably from the price list. Then just compare the prices and give your boss the best deal as a job done. Unfortunately, it's not always that simple - "server" is an ambiguous word that has at least several meanings. And here the questions begin, a lot of questions - because the server is a very broad concept. The same word "server", depending on the context, may mean, for example: special and expensive server equipment, adapted to be mounted in a rack in a server room, just a more powerful desktop computer that will run all the time and share some data with employees' computers, a device that does not have "server" in the name but performs such a function in the local network - e.g. NAS or camera recorder, the server version of the Windows operating system, which is installed on such computers acting as servers, some program or functionality (sometimes even free) that is installed on the current hardware. In order to make a reliable valuation of such an order, a large amount of information is needed that will explain the intentions and needs of the client - it will determine what functionality of the server the client is interested in. It can be compared to the situation of buying a car - a customer enters a car dealership and says: "II want to buy a car, the seller says: What model, for how many people, sports or station wagon?< /em>", the customer replies: "I want it to drive and I don't have time for such digressions" 😉 So, if during the conversation it happens that you are a person who does not know the answers to all our questions, we will ask you to provide them to the decision-making person in the company. We will be happy to do this in writing to relieve you.
  • Can I conclude a contract with you regarding ongoing IT support?
    Of course 😁 We are very happy to conclude contracts with clients for ongoing IT support. This is done as follows: determining the client's expectations in the field of IT cooperation - what is to be the subject of this care, response time, method of implementation - on site or/and remotely, budget, specific requirements. preparation of the offer and valuation, and after its acceptance, the contract template is prepared (by the client or by us) signing of the contract and its implementation. The concluded contract is usually a tripartite contract and is concluded between the parties: the client and two one-person companies. It is also possible to conclude a bilateral agreement, where one of us is the main contractor and the other is a subcontractor. If during the performance of the contract it turns out that there are glaring discrepancies between the actual and current expectations of the client and the provisions of the contract, we can propose an annex to the contract or possibly (if the situation so requires) renegotiation of the contract terms. Continuous IT care contracts may be concluded for a definite or indefinite period.
  • Will you overclock my computer because I read on forums that my X graphics card can be overclocked to Y MHz and my Z game will run faster?
    No. We do not overclock equipment, especially above the parameters provided by the manufacturer. This is primarily for safety and warranty reasons - even if a given procedure would be technically successful, it may be, among others, shorten the life of the equipment, cause its unexpected failure, reduce the stability of operation or void the warranty. We also do not deal with amateur computer modifications, such as mounting 5 fans where the manufacturer has provided one, etc. Of course, we will advise you on which stronger component to buy to increase the capabilities of the equipment, and we will also help you install and configure it.
  • Didn't like your service? What to do?
    The easiest way is to ask us 🙂 Although we are constantly doing our best to ensure the highest level of IT services we provide, we are only human and computers can play tricks and behave differently than we expect. However, we are still open to customer suggestions and tips on what we can do better. We approach all comments kindly. So if it turns out that we have not met the customer's requirements, please contact us - we will approach the matter again, draw conclusions and do so that the result of our work is satisfactory.
  • How can I thank you for a solid performance of the service?
    We are glad that our services met your expectations and helped to solve your IT problem. There are several ways to thank us 😁 The simplest is Thank you! in any form. You can also like us on Facebook: or give us a good review on Google Maps: You can also share our page on any social media.
  • Will you be hacking into my computer to help me remotely?
    No 😁 Remote access is provided using publicly available remote access tools. We currently use the paid toolaTeamViewer. This program is one of the world's most popular remote assistance tools and uses RSA private/public key exchange encryption and 256-bit AES session encryption. This technology is based on the same standards as the https/SSL protocols. By today's standards, it is considered completely safe. Remote access to the Customer's computer is obtained with little assistance from the Customer and with his full knowledge. By phone, we ask the customer to perform a few simple activities that do not require IT knowledge and do not exceed the level of difficulty of ordinary computer use. We obtain this access temporarily for the time of solving the problem, and the client observes our activities, may interfere in them or may interrupt the connection at any time. More about TeamViewer security can be found here:
  • Isn't solving an IT problem remotely a scam? After all, a car mechanic won't fix my car by force of will from a distance...
    The key to solving most IT problems is for an IT professional to see the IT problem on a computer screen and make appropriate changes using the mouse and keyboard to solve it. Since nowadays, in the era of fast Internet, there are at least several solutions to be able to remotely watch the screen of another computer or control its mouse and keyboard via the Internet, therefore it becomes possible to provide IT support remotely. Of course, the solutions we use are safe and legal, and the entire process of controlling the client's computer takes place only with the knowledge and consent of the client.
  • What can I do to guarantee your response time? How can I make you available when I need your help?
    If the client needs us to regularly respond to his requests within the time he expects, he should conclude a contract with us for the provision of IT support. In such contracts, we include the expected response time to reports of IT problems, agreed with the client. Of course, even without concluding such an agreement, we try to provide IT services in such a way as to shorten the waiting time for IT assistance and the time of solving the problem as much as possible. In this regard, the remote form of IT support is very effective - the client is often serviced on an ongoing basis, without the need to arrange an appointment or wait for an IT specialist to arrive.
  • Do you come straight to the IT problem? How long do you have to wait?
    In a nutshell: we respond to requests as soon as we can - according to our capabilities and the current load of orders - unless, of course, solving the problem requires a trip to the client. First of all, we make every effort to solve the customer's IT problem as soon as possible - and in this respect, we try to offer customers a remote form of IT support. So it's not necessarily done in the traditional way, i.e. traveling to the customer, regardless of the type of IT problem. We know from experience that not every IT problem has the same specificity, not everyone requires an immediate arrival at the place "in the dark" - without checking the circumstances in which the problem occurred, what it concerns and what it can be caused by. Having extensive experience in solving IT problems, we have at our disposal a wide range of methods of solving IT problems. Therefore, after receiving a report about a problem, we try to get to know the circumstances of the problem, if possible, to know the details of the problem, on what hardware, software and in what configuration it occurs. Only after such a preliminary assessment of the problem do we decide on an effective method of approaching the case and propose the most effective method of proceeding from our point of view. Of course, the client has the final say in this decision, but we make sure that he knows what options for effective action he has at his disposal and what their strengths or benefits will be for the client. Sometimes a reported IT problem can be solved immediately remotely without having to come to the place - using the TeamViewer program or appropriate telephone advice. It also happens that the problem lies, for example, on the side of the Internet operator that the client uses. In such a situation, when it is possible to determine the reason remotely, arriving at the customer's place would only delay solving the problem, which in this case is usually the customer's contact with his Internet operator and reporting the problem.
  • "I have a problem with my computer - it is slow and freezes. How much will it cost to fix it?"
    We often get these types of quick inquiries from customers. However, not in every case we are able to answer them equally quickly, unambiguously and precisely. However, this is not happening because, for example, we want to shoot something, trick the client, etc. 🙂 This approach is dictated by a simple fact - in the world of computer science, the generally described problem symptom does not always translate into an unambiguous, predetermined and predetermined set of activities that will effectively solve the problem. The same symptom (e.g. computer freezing), depending on the situation, can be caused by completely different reasons - sometimes lying only on the software and configuration side, sometimes caused by malware infection - but often also a hardware problem, requiring e.g. e.g. disk. It's easy to guess that in such a situation the client can receive a very "expanded" quote from us quickly, covering the range of amounts from e.g. (in case of hard disk failure, taking into account the cost of a new disk, its replacement and then reinstalling the operating system). It is also easy to guess that a client who, under time pressure, tries to quickly determine how much the service will cost him and which contractor is able to complete his order the fastest and cheapest, may be indifferent to such an offer and look for a "more specific" contractor. That is why we make every effort to avoid misunderstanding and dissatisfaction on the part of the client in this field. Therefore, we always try to: obtain as much information as possible from the client that will allow you to approximate the probable cause of the problem and thus narrow the pricing range a bit, explain to the client the rules used when valuing the order so that the client is aware of what the different prices of the IT service may be and does not suspect a scenario of ripping him off or trying to manipulate the price (which of course is not the case).
  • What determines the amount of the monthly subscription/lump sum for IT care?
    The amount of such a lump sum in the case of constant IT care is determined individually for each client on the basis of many different pieces of information. We take into account e.g. estimated labor intensity, scope of care, statistical number of failures in a month, number of computers in the company, number of company branches, complexity of the IT system, response time expected by the customer, possibility of solving problems also remotely.
  • I need to price an IT service - e.g. at the request of my boss or to verify whether our current IT contractor is pricing the work reliably
    Such inquiries are also met with our reaction and presentation of a general valuation - although they are not necessarily related to the actual order from a given client. Unfortunately, very often customers do not inform us that it is a "reconnaissance inquiry", so instead of throw a price we try to specify the scope of customer's expectations regarding the implementation of a given task - which makes the task difficult for both the customer and us . Therefore, if you need an estimate for an IT service, but you do not intend to use our services, we suggest the following approach: look at our Pricing section - there are general, estimated prices, prices that can help you price an IT service and get to know our cost level, send us an inquiry, clearly indicating that you are looking for a valuation (even a comparative one) and, if possible, describe the scope of work as precisely as possible. We have a rule that we do not automatically price very general queries - e.g. How much does it cost to implement a server - because such a valuation of a very ambiguous task will certainly not correspond to the real effort, if you don't want to write an e-mail, you can call us - and spend 15 - 30 minutes to get an estimated quote for your issue. You can also casually contact us on messenger.
  • I am looking for free help or IT consultation
    Lovers of free services or free promotional offers must unfortunately be disappointed. Because our services, by definition, are provided for business purposes, i.e. profit, and we address them primarily to companies - so it is unlikely that we will provide a normal IT service for free. However, not every form of support from us has to be paid. We know very well how complicated the world of IT can be, how many similar or ambiguous terms exist in it and how sometimes it can make it difficult to obtain IT help - especially for people who do not feel confident in the IT world. Therefore, it happens that we provide some general IT consultations free of charge, e.g. in the form of e-mail or telephone. Of course, these are very general, loose consultations and not the preparation of a specific scenario, solution or analysis. As part of such consultations, we do not directly solve the client's problem, but rather suggest what solution may work. It's more about showing the customer in which direction he should go to get a solution to the problem or choose the right solution. Such consultations are most often provided in the form of e-mail or messenger.
  • Does the price of an IT service depend on the client's financial assessment? Apparently, many specialists do this - richer customers are given higher prices because they can earn money ...
    No, no, and no again! Although on the Price list page we provide only indicative prices of services, and the final ones only after getting acquainted with the client's situation, this is for a completely different reason. Each client has different expectations regarding the provision of care or IT services, has a different IT system, a different type and age of IT equipment, a different specificity of work, a different level of IT knowledge among employees and expects different availability. This actually means a different workload for each client, and thus the service is priced differently. Therefore, there is no uniform price list for all services - because under the same name of the service, the scope of work, depending on the client, may differ in labor intensity even several times.
  • If I contact the person from who is based near me, will the service be cheaper because I will pay less for travel?
    Since the price of an outgoing IT service does not directly include the distance that we have to cover from one of our offices to the client, there is no direct ratio of closer is cheaper. An exception to this rule may be a situation when the ordering party expects the IT service to be performed outside the city of Wrocław - then a typical conversion of the distance in km may already be included in the price. In any case, however, the cost of an outbound service is generally higher than the corresponding remote service. Therefore, we try to strongly promote the remote form of IT services. The access within the city limits of Wrocław is free of charge and not hidden in the price of the service. So everyone in Wroclaw can count on equally favorable prices - regardless of whether they call from the neighborhood or from the other end of the city. This is because the requests are processed in the order in which they are received, so there is a possibility that the access to a given client will be made from a completely different part of the city than the seat of a given service provider, e.g. after the completion of an earlier order for another client in the vicinity.
  • "I am a businessman, I know how to do business, I know what I expect from my contractors - only a specific offer and execution time! Deadline is sacred! Can I get a specific quote and execution time from you in response to a general inquiry?"
    Congratulations on being a businessman 🙂 Of course, we make every effort to prepare an appropriate and clear quote for each client, and to give the deadlines as close to reality as possible. We understand the needs of customers in terms of receiving precise information - after all, other decisions may depend on this information. However, while providing our services in the spirit of honesty, we try not to value in absentia orders for which there are serious doubts as to the unambiguous interpretation of the client's guidelines. There is a real risk of underestimating or overestimating the value of the order - both in terms of price and time of order execution. For example, if the subject of the query is creating a network, "setting up a server" or "optimizing infrastructure" then these will be quite general statements that only on their basis it is possible to present both low-cost valuations (which may be completely underestimated in relation to the actual value of the works) and too short implementation deadlines, and vice versa - overestimated valuations, assuming a large amount of work or investments in equipment - while in practice it turns out that there is no justification for such costs or investments. Placing the reliability of the valuation and execution of works over commercial brilliance, in such cases we will try to specify the scope and subject of the work as well as the client's expectations as much as possible before presenting our offer to the client. Therefore, at the stage of preparing the offer, we have to ask a lot of clarifying questions, and it is in the client's interest to provide us with exhaustive answers as much as possible. Of course, when asking a client, a person potentially not an IT specialist, we ask in a clear human language, not IT 😉
  • "I feel like someone is spying on my computer! How can you help me?"
    In our work, once in a while we come across such inquiries from clients, often individual clients. Customers are afraid that someone (more or less known to them) is tracking their activities using their own computer. Such inquiries do not surprise us - in the media we hear a lot about hackers, phishing, digital espionage, data theft or leakage, encryption viruses. In addition, analyzing the situation from the technical side, in some circumstances (e.g. when infected with Trojans), our computer can actually be used by a third party to track our actions. This applies both to using the computer (e.g. tracking the screen or opening websites and stealing passwords, e.g. to the bank) as well as ourselves through the camera or microphone built into the computer. Therefore, we do not underestimate such inquiries and try to familiarize ourselves with the matter. That's why we have some practical advice. If you are concerned that your computer may be used by a third party to spy on you or your relatives, we suggest: try to assess as much as possible whether we are dealing with a situation where the interference comes from a person completely unknown to us (such as a "hacker in a hoodie" in the media) or whether we suspect a person partially unknown to us known, e.g. a disliked neighbor, don't panic, analyze the situation cold - let's consider whether the person we suspect of acting to our detriment actually has the knowledge and technical capabilities to monitor our actions against our will. Although you can find hundreds of videos on the Internet, showing some solutions for remote control "over something" or eavesdropping / spying on someone - in the vast majority of cases these are information that do not contain a ready-made solution that can be used by everyone. These are usually only inspirations for someone who already knows something about this topic or has tried - and what's more - has at least minimal access to the resource to which he wants to hack. So under typical circumstances we should rather not expect that an unlikable neighbor who may not even know how to set up his home network will suddenly become a hacker and without any preparation get into our network and start following us, spying or eavesdropping - only because he watched some videos on YT. An analogy to this situation is the fact that no one will become a hairdresser just because he watched a few videos on YT that show how to cut hair... take into account the existence of certain technical protections provided by our home router, computer or anti-virus software installed on it. The times when WiFi was without a password and people were simply happy that it exists and works at all, computers with Windows XP did not contain any antivirus solution and were even "wind dust" - long gone 😉 New computers already have Windows 11 or Windows 10 operating systems which, even without additional antivirus software, can defend themselves against some threats thanks to the Windows Defender solution. Almost every person who has a computer has some anti-virus program installed on it (usually free at home) - and the basic task of such software is to protect our computer from attack - whether it's via an infected website that we unconsciously enter, or from the network or through an infected message. If we buy a router or get it from the operator along with the service, we usually get WiFi operating in the highest standard of WPA2 encryption. So even if someone has bad intentions and would like to get into our computer, try to invigilate us or track us using it - they have quite a difficult task ahead of them - because our computer and our network are usually defenseless, as you can see. Very often, on the side of software producers, many people and many thousands of dollars have been put into making our computers safer. Logically - someone wouldn't spend such money for nothing if they didn't create at least some effective protective solutions... include in your analysis the fact that the scenario of surveillance of us through our computer or our network, e.g. by a neighbor or friend, becomes a much more real risk when we have previously created opportunities for this person to access this resource. This is facilitated by, for example, sharing or renting a computer, letting someone into our network by the way or providing a password to it - or even unconsciously allowing someone to join this network. Such a connection to our network may occur imperceptibly, e.g. during a visit, by physically pressing the WPS button on our router and pairing its device (e.g. laptop) with our network. In other words - unless we trusted a given person earlier and did not share our computer or WiFi network with them, the risk that someone is actually watching us in this way decreases quite significantly - although of course you cannot say in absentia that he does not exist. to consider whether someone is fooling us, suggesting a hack to a computer or home network, and trying to substantiate it with some information allegedly obtained about us in this way - while in practice this information was obtained completely analog by e.g. eavesdropping at our door. It cannot be ruled out that someone obtains information about us but uses (obviously illegal) classic eavesdropping - and does not use a computer for this at all. analyze whether the given information about us cannot be obtained in a different way - e.g. from our friends or from other people whom we trust and to whom we could have passed this information completely unconsciously. Or maybe the given information, which is supposed to make it probable that we are being monitored by a computer, we have unknowingly placed on some social networking site or shared it more than we are aware of - and someone is simply trying to use it and subsume it under computer surveillance ". If, however, after analyzing the above circumstances, we come to the conclusion that the case may actually be related to IT and there may have been interference with our computer, our network or other devices - in order to track us, obtain data about us or our activities , undertaken by means of a computer - then we have more precise guidelines for further actions: if possible, try to make sure that you actually have an anti-virus program installed on your computer - and if so - whether it is up to date, then use it to thoroughly scan your computer, until the matter is clarified, try not to log in from a suspicious computer to services that are sensitive to us, such as banks, mail, social networking sites or online stores. There is a real risk that if someone actually took control over our computer, they will be able to steal our access data without major problems - thus money, confidential information and also our identity, If possible, try not to try to get help on this matter through a computer that may be under surveillance. We run the risk that whoever's spying on us will notice that we're looking for a computer scientist - so they can cover their tracks. So let's look for a helpful IT specialist using e.g. a computer at work or a smartphone, let's try not to make phone calls on this matter in the vicinity of a computer suspected of collecting data, let's contact an IT specialist who will be able to analyze the problem comprehensively - that is not only our computer, but above all our network (router, WiFi). It is not difficult to guess that in many cases the form of remote checking (via TeamViewer) will become one of the first choices - because not always in the place where we live, we can get IT help right away (e.g. in a small town or abroad), let's prepare as much information for the IT specialist as possible to put the diagnosis on the right track - especially details and information about e.g. strange computer behavior, suspicious e-mails we have received or e.g. strange chat messages from people we don't know. Let's not assume that everything we are looking for is just saved in our computer (e.g. in some file or journal) and the IT specialist has a simple task of opening a specific file and reading everything we want to know in 15 minutes. Unfortunately, it doesn't work that easily 🙂 Very often, looking for traces of hacking or surveillance resembles the proverbial search for a needle in a haystack - so the more we tell our IT specialist, the greater the chances that he will find something. follow the recommendations of the IT specialist as much as possible, especially when it comes to obtaining additional information or introducing changes suggested by him - such as the WiFi password, in a situation where an IT specialist actually finds any traces of interference with our computer or computer network, especially by a specific person (e.g. a neighbor), do not hesitate to report the matter to the police.
  • What should I do if someone has posted photos or a video of which I am the hero and I did not consent to it?
    If your personal rights, which according to Article 23 of the Civil Code are in particular: freedom, honor, freedom of conscience, name or nickname, image, confidentiality of correspondence, inviolability of the apartment, scientific, artistic, inventive and rationalizing creativity will be violated, you have the right to protect them. For example, when someone publishes your personal data, image or video without your consent, start by contacting that person and asking them to remove this content. However, if you cannot reach an agreement or do not wish to be contacted by the person who posted it, you may request removal of the material in accordance with the privacy guidelines of the relevant online platform.
  • How important is the confidentiality of my data to you? You offer remote assistance or are invited to take care of my computer on site - can I trust you when it comes to the confidentiality of my data?
    In short - customer data is sacred to us. Sometimes more for us than for the client. What exactly do we mean by this: never, ever, do we copy customer data for our own purposes, we avoid it even when the customer asks, for example, to protect his data on our media, e.g. when reinstalling Windows. In such a situation, however, we ask the customer to organize his carrier to be able to secure his data outside our resources, for no reason or "out of curiosity" we do not look at the client's data to which we have access as part of IT work. Each time, e.g. when diagnosing a problem with opening a certain type of file, we ask the client which file we can open so as not to find any important data and not read them during diagnostic work, often during IT work, we ask the client to enter their password to a computer, some service, program or website, because we do not have it ourselves. In such situations, we make every effort not to see this slogan even by accident - during this time we carefully look at what the ceiling in his office looks like. We give the customer comfort when it comes to entering it.
bottom of page