Services for Individual Users

Individual confused about a computer The individual electronics consumer today is confronted with an array of smart everything that seems to be smarter than the individual using or installing the device. Some of these devices would seem to be rather straight forward in their installation, until you try and do it. And most of the time the instructions that come with the device are of little help.

Many consumers today not only have a television, or more likely a large video monitor which displays the picture (video) portion of the program, but also a home theater amplifier, which delivers the sound (audio) portion of the program. This amplifier must have multiple inputs to allow the user to switch to the device they want to watch, such as cable box, PlayStation, or TiVo. So instead of just plugging the DVD player into a single input, you must now separate the video (picture) from the sound (audio). That is unless your DVD player has an HDMI connector. In that case one cable will handle both the video and audio. Confused yet? And then there is setting the correct output resolution (1080i, 720p, etc.) of the DVD player to match your television in order to produce the best viewing experience. All of this just to unbox and setup your new DVD player.

Wireless home networks present an even more complex set of tasks. It is not as simple as unboxing, plugging in and start using the wireless network, though I have a feeling many people do just that, as I find many wireless networks that are not secured from outsides users. All one needs to do is log onto the home network and then do whatever they wish with your computers and devices connected to the network. If that sounds scary, you are right on the mark.

All wireless routers need to have security setup in order to keep outsiders from logging onto the network. In addition, each computer needs to be setup to use the secured network. As an additional level of security, the wireless router needs to block all computers that are not welcome on the network. This is done by entering a list of the MAC address numbers of your computers and devices that you plan on connecting to the network. Because this critical security step is somewhat complex, it is often skipped when setting up a home network.

Of course there are also considerations to be made for protecting your computers from virus and malware attacks. There is a wide range of anti-virus and security suites from many different companies that do similar jobs of keeping your network and computers safe. It can be more confusing than picking a breakfast cereal from your local grocery store shelves.  The same can be said about picking a method to make sure your valuable photos, videos, and documents are safe in the event of a hard drive failure, or a home burglary or fire.

These are just a few of the types of problems I can help you solve. Some of the answers you may find by looking over my website, checking the FAQs (Frequently Asked Questions), exploring many of the website links I have posted, my website and books suggestions, and of course my blog posts. If the answers still elude you, then get in contact get with me and I will help you solve your setup or computer problems. You can email at: Charles@LeggConsulting.com

Owner Charles Legg

Charles Legg in suite and tie

As owner and operator of C. W. Legg Consulting, LLC, I have over 55 years of electronics and computer technology knowledge which has been gained from working as a broadcast engineer with a major university radio station, providing electro-mechanical engineer services for a major science center in Columbus, Ohio, and as an information technology manager for a major metropolitan  fire department. In addition, I have a diverse background in electricity, electronics, audio/visual equipment, photography, web design, and graphic arts. I have a Bachelor's degree in Information Technology from Franklin University in Columbus, Ohio. Now that you know something about me, how can I help you today? 

- Charles W. Legg, Jr.