Laptops Repair Gulf logo
Title image

Laptops users visit our sister website

Quality assured service backed by 6 month warranty as standard
We offer affordable yearly based service contracts for Small, Medium and Large Private, Public and Government organizations.

Descriptions & Definitions



Laptops Repair guarantees that your laptop computer repair will be 100% effective, first time. We back up every repair with a no-quibble 180 day guarantee. If your computer suffers the same failure again within this warranty period we will collect it, repair it and deliver it back at no cost to yourself.
We guarantee that we will make clear what costs you can expect to incur and when, before you are committed to them. We do not trade in hidden costs or nasty surprises!

Email & Messaging Systems


VoIP (Voice over IP)

( Voice Over IP ) A telephone service that uses the Internet as a global telephone network. Typically offered calling within the country for a fixed fee and a low per-minute charge for international. Broadband Internet access (cable or DSL) is required, and regular house phones plug into an analog telephone adapter (ATA) provided by the company or purchased from a third party.


A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.


Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.

Virus & Worms

A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.
Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.

Data Security

In the computer industry, refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.


Vulnerability refers to a weakness or other opening in a system. Vulnerabilities may result from bug (computer bug is an error, flaw, mistake, failure, or fault in a computer program that prevents it from working correctly or produces an incorrect result. Bugs arise from mistakes and errors, made by people, in either a program's source code or its design. It is said that there are bugs in all useful computer programs, but well-written programs contain relatively few bugs, and these bugs typically do not prevent the program from performing its task.)
A vulnerability can exist either only in theory, or could have a known exploit (exploit is a common term in the computer security community to refer to a piece of software that takes advantage of a bug, glitch or vulnerability, leading to privilege escalation or denial of service on a computer system).

Security Patch

Security patch is fix to a program that eliminates a vulnerability exploited by malicious hackers. See vulnerability and patch (A fix to a program. In the past, a patch used to mean changing actual executable, machine instructions, but today more often than not, it means replacing an executable module in its entirety such as an .EXE or .DLL file. A profusion of patches to an application implies that its logic was poorly designed in the first place. It also implies that the program's internal logic is becoming spaghetti code and more difficult to maintain).

Disaster Planning & Recovery


VPN (Virtual Private Network)

(pronounced as separate letters) Short for virtual private network, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.


(IP SECurity) A security protocol from the IETF that provides authentication and encryption over the Internet. Unlike SSL, which provides services at layer 4 and secures two applications, IPsec works at layer 3 and secures everything in the network. Also unlike SSL, which is typically built into the Web browser, IPsec requires a client installation. IPsec can access both Web and non-Web applications, whereas SSL requires workarounds for non-Web access such as file sharing and backup.
IPsec is supported by IPv6. Since IPsec was designed for the IP protocol, it has wide industry support and is expected to become the standard for virtual private networks (VPNs) on the Internet.


(Layer 2 Tunneling Protocol) A protocol from the IETF that allows a PPP session to travel over multiple links and networks. L2TP is used to allow remote users access to the corporate network. PPP is used to encapsulate IP packets from the user's PC to the ISP, and L2TP extends that session across the Internet. L2TP was derived from Microsoft's Point-to-Point Tunneling Protocol (PPTP) and Cisco's Layer 2 Forwarding (L2F) technology.


(Point-to-Point Tunneling Protocol) A protocol from Microsoft that is used to create a virtual private network (VPN) over the Internet. Remote users can access their corporate networks via any ISP that supports PPTP on its servers.
PPTP encapsulates any type of network protocol (IP, IPX, etc.) and transports it over IP. Thus if IP is the original protocol, IP packets ride as encrypted messages inside PPTP packets running over IP. PPTP is based on the point-to-point protocol (PPP) protocol and the generic routing encapsulation (GRE) protocol. Encryption is performed by Microsoft's Point-to-Point Encryption (MPPE), which is based on RC4.


Fully equiped workshop, supporting
LCD Display, Monitors, Printers, Dekstops, Notebooks & PSU's

Main Computer
Services LLC

P.O. Box 50267
Bur Dubai
United Arab Emirates
Tel: +971-4-3933559
Fax: +971-4-3933558
Contact Us