Delivering Bespoke IT Solutions

<<< Show Posts >>>

RAID Array Data Recovery

RAID-DataRecovery

Binary Surgery® team has great experience with data recovery after RAID array controller failure.

Please find below the detail list and availability.

Interface Type

Interface ATAYes
Interface SATAYes
Interface SCSIYes
Interface SASYes

File System

ntfs i ntfs5Yes
raiserFSYes
ext2, ext3, ext4Yes
ufsYes
btrfsYes
zfsYes
xfsYes
jfsYes
hpfsYes
hfs i hfs+Yes

RAID Types

RAID 0, 1, 2, 3, 4, 5, 6, 1+0, 0+1Yes
Hardware RAIDYes
Software RAIDYes

BS-banner

Our Customers & Partners

Loyalty Scheme

Please find below our loyalty scheme discounts and feel free to pick one:

 

Discount_3

Discount_5

Discount_7

Discount_EvenBetter

Discount_Students

 

Liquid Damage Repair

Liquid-Damage-Repair

Liquid Damage is a damage to eletric circutry in eletric or electronic device cause by liquid. The most common types of liquids are soda, water, coffee, tea, wine, milk, juice and fizzy drinks.

This is quite common type of damage as people tend to use their eletronic devices like mobile phones and laptops while they drink.

To be precise most of the time the cause of liquid damage is water in those liquid which conducts eletricity therefore is causing short circut in the circutry of the motheboard, CPU or RAM.

Liquid damage is straight forward – damaged device doesn’t work, or works the way is unusable.

Usually liquid damage repair is costly, as it is time consuming and many times involves circutry repair, chip replacement not to mention component replacement in worst case scenario.

To not allow this to happen we introduced the NEW service: Spillage Neutralisation.

This service is dedicated to those customers whose devices after initial spillage seem to be working fine.

Why should you bother?

That’s good question. The answer is in chemical composition of the drinks mentioned above. The drinks apart of water contain the enormous ammount of chemicals like sugar, acid, lime) and those chemicals tend to cause a chemical reaction with the components of the circutry inside of electronic devices.

Electronic components like motherboards, chips, CPUs and RAM once damaged by acid or sugar usually needs replacement. The recovery ratio of those components is quite poor.

So, instead servicing broken and damaged devices it is better the prevent it to happen.

Happy Days!

 

iPod Headphones Socket Repairs

iPod-Jack-Repair-FI

In the present, the demand for iPod headphones socket repairs is constantly growing.

This represents a huge issue, therefore have we, at L.K.Computers come with a long term solution that could solve this issue.

Our highly qualified employees are able to reverse-engineer the headphone jack socket and repair the ‘right hand side channel’ (R).

Additionally, we are able to repair the ‘left hand side channel’ (L) as well.
To show you, our appreciation and best quality guarantee, we offer a

Lifetime Warranty

repair on iPod headphone socket for an amazing price.

That means, that whenever your iPod breaks down, we are here to help you and offer you our proffesional service.

iPod-Headphones-Socket-Repair-Banner

Spillage Neutralisation

Spillage-Neutralisation

Accidents may happen.

No one knows when or where. All we know is that they may happen.

Spillage is a typical situation which can occur for example while drinking coffee, tea or fizzy drinks. This situation can be helped by wiping the spilled liquid of the device. Afterwards the device seems to work normally.

This is correct – it seems! However, it is not.

Did you ever wonder why liquid damage voids the warranty on electronical devices? Nowadays, not only Apple, but also other manufacturers use Liquid Contact Indicators inside devices to be sure they are not dealing with liquid damage or spillage under “warranty”.

Thanks to WikiHow here you can find what you can do to neutralise the spillage at home.

You can follow the procedure from top to the bottom and yet you might not be able to prevent the damage.

Even though the laptop has been wiped and dried up, the water was still inside.

Spillage Neutralisation is a process, done by highly quilified employees. The time is crucial.

After the device is compromised by a liquid inside, chemicals such as acids, sugars or even limescale start to interact chemically with the components inside the device.

Spillage Neutralisation done on time helps to prevent permanent loss of the device, stored data like photos, music or any other important notes and apps settings.

As Spillage Neutralisation is a time consuming process, the starting price is £20 and it is still cheaper than Liquid Damage Repair.

Please do not hesitate to pop in to find out more or just use Contact Us form.

Buzzbox – Professional Phone Systems

bb-FI

 

bb_logo

L.K. Computers Ltd is an authorised reseller and services partner of Buzzbox.

For Business

 

The Only Office Phone System with Unlimited Channels

FROM £29 PER MONTH

buzzbox is the only fully featured office phone system (PBX) for the small to medium sized organisation with a fixed monthly price.

  • UNLIMITED USERS*
  • UNLIMITED INBOUND CALLERS
  • CALL RECORDING
  • LISTEN & WHISPER ON CALLS
  • 2000 CALL MINUTES PER MONTH*
  • UP TO 20 DIRECT DIAL NUMBERS
  • FIXED MONTHLY FEE

 

Untouchable Prices

 

UK Landlines for 1p a minute

UK Mobiles for 5p a minute.

SINGLE USER £5 PER MONTH

 

buzzbox call rates are some of the lowest in the industry, for local and overseas callers. Check out some of our most popular destinations:

  • UK LANDLINE : 1p
  • UK MOBILE : 5p
  • US LANDLINE : 1p
  • INDIA : 1.5p
  • EU LANDLINE : From 0.6p
  • CHINA : 0.8p
  • SOUTH AFRICA : 1.6p

 

BuzzBox-Banner

BCMS – Business Computers Monitoring System

LKBCMS

Now only £8.99 / pcm per computer.

Now available for

Windows, OSX and Linux systems

We offer monitoring of:

 Devices:

  1. Servers,
  2. Computers,
  3. routers,
  4. printers,
  5. switches and otherSNMP compliant hardware

 

screens

What we monitor

  1. Temperatures of the internal components,
  2. CPU load and work characteristics,
  3. Status of the hard drives,
  4. Network throughput and performance

memory_usage

What it gives us:

  1. Faults notification,
  2. General health of the network environment,
  3. Highly detailed picture of all devices on the network and their performance
  4. All details of inventory available on the network

 

What are advantages of using our monitoring:

  1. Easy prediction
  2. Better decision making,
  3. Less disasters if at all
  4. Less downtime
  5. Less chance of expensive data recovery (required after disaster)
  6. Cheaper costs of maintenance (maintaining is cheaper than recovering after disaster),
  7. Our services are competitive and affordable even for small businesses (As we can run ourmonitoringon existing IT infrastructure)

    dashboard

DATA Shredder – Secure Data Shredding Service

Data-Shredder

DATA Shredder – Secure Data Shredding Service

Unlike Secure Data Erasure which makes the media (hard drive) unusable once and for all, our Data Shredder service allows you make sure the old data has been removed securely yet the hard drive may be still in good working condition.

Our software complies with:
  1. British HMG IS5 (Baseline)
  2. Russian GOST P50739-95
  3. British HMG IS5 (Enhanced)
  4. US Army AR380-19
  5. US Department of Defense DoD 5220.22-M (E)
  6. US Air Force 5020
  7. US Department of Defense DoD 5220.22-M(ECE)
  8. Canadian RCMP TSSIT OPS-II
  9. German VSITR
  10. Schneier’s Algorithm
  11. Gutmann
  12. RCMP TSST OPS-II

BS-banner

IT Equipment Rental

IT-Gear-Rental

IT Equipment RentalRental – Computers and mobile devices

We hire:

  1. Servers – Windows and Linux,
  2. Workstations – Windows, OSX and Linux,
  3. Dekstops – Windows, OSX and Linux,
  4. Laptops – Windows, OSX and Linux,
  5. Tablets – Android and iOS,
  6. Smartphones -Android, iOS, WP,
  7. Mobile devices,
  8. Projectors and AV eqipment,
  9. Network equipment,
  10. Office equipment,