AI: Init...
FB: Connecting...
Sec: Loading...
IP: Detecting...
Agents: 0/4
Open 7 Days · By AppointmentSame-Day When AvailableSeymour, Indiana812-414-9097
TCG Solutions: Your Technology Partner — Web Solutions, That Computer Guy, Cloud Services
● Three Brands · One Operator · Seymour, IN

Tech, business growth, and transparency — from one operator.

That Computer Guy 26 handles the computers and hardware. TCG Solutions builds AI automations, websites, and custom software for businesses. Indiana Businesses Exposed publishes reviews and shines a light on practices that affect customers.

--Reviews
--Avg Rating
7Days/Week
3Brands
CompTIA A+Network+Security+CCNACISSP (in progress)
That Computer Guy 26 / TCG Solutions / Indiana Businesses Exposed brand mark
No Hidden Fees · Diagnostics Free

Service Rates

Remote (Base)
$45
per hour · Zoom / AnyDesk
In-Shop
$55
per hour · drop-off
Business
$75
per hour · on-site
Emergency
$95
per hour · after-hours
Nonprofit
FREE
code TCG26FREE
☀️
Loading weather...
Latest News →
From the People We've Helped

Customer Stories

Loading...
Three Brands · One Operator

Services

Each brand serves a distinct purpose. Pick the one that matches your need.

TCG26

That Computer Guy 26

Computers and hardware. Repair, custom builds, data recovery, networking, peripherals, recycling. The brand for personal devices and small-office hardware.

TCG

TCG Solutions

Promoting businesses through technology. AI automations, custom website design, specialized software, database work, cloud migration. The brand for B2B engagements.

IBE

Indiana Businesses Exposed

Public-interest project. Business reviews (good and bad), customer-relations spotlight, transparency on questionable practices. The brand for accountability research, not paid services.

That Computer Guy 26 — Hardware & Repair

Anything that involves a screwdriver, a soldering iron, or a stress test. By appointment.

Repair

Computer Repair

We test before we touch. AIDA64 stress tests, HWiNFO sensor monitoring, multimeter rail checks. Thermal repaste, failed drive replacement with verified data migration, LCD backlight repair, and board-level fault isolation. You get a diagnosis first — not a bill.

Security

Virus & Malware Removal

Boot into Safe Mode. Run Malwarebytes, HitmanPro, ESET Online Scanner. Manually inspect Run keys, Scheduled Tasks, WMI event subscriptions, and browser policies. Rootkit sweep with TDSSKiller. After cleanup: Defender hardening, uBlock Origin, DNS filtering, and a restricted user account if needed.

Data

Data Recovery

GNU ddrescue for failing-drive imaging, TestDisk for partition table reconstruction, PhotoRec for deleted file recovery. Handles NTFS, ext4, FAT32, exFAT. We give you an honest assessment before starting — mechanical failures may need clean-room referral. Recovered data delivered on encrypted media.

Network

Network Setup

Wi-Fi site survey to map signal strength and interference. Mesh deployment with Ubiquiti UniFi or TP-Link Deco. Business networks get VLAN segmentation, WPA3, QoS for VoIP and streaming priority, and pfSense or UniFi firewall configuration with documented topology.

Business

Business IT

Windows Server administration with Active Directory and Group Policy. Microsoft 365 migration from on-prem Exchange or Google Workspace. Veeam backup with cloud offsite to Backblaze. HIPAA-aware configuration for medical and dental offices. Multi-seat imaging via MDT/WDS.

Custom

Custom PC Builds

Gaming rigs, workstations, HTPCs, servers. AIDA64 stress testing, 3DMark benchmarking, 24-hour burn-in before delivery.

Software

Software Support

Clean Windows 10/11 with privacy tuning and bloatware removal. Manufacturer driver packages — not generic Windows Update drivers. Microsoft 365 with Outlook, OneDrive, SharePoint configured. Linux dual-boot with Ubuntu, Kali, or Fedora via GRUB.

Hardware

Hardware Installation & Upgrades

RAM, NVMe, GPU, PSU, AIO cooler, additional drives, network cards, and case fans. Includes BIOS update where appropriate, thermal repaste on aged systems, cable management, and post-install stress test to verify stability before delivery.

Recovery

Data Retrieval

Recover files from failing drives, formatted partitions, accidentally deleted folders, and crashed systems. Imaging-first workflow with ddrescue read-retry tuning preserves the original media before any write operations. Honest assessment up front; mechanical failures referred to clean-room when needed.

Unlock

Password Unlocking

Windows local-account password resets, BIOS password recovery on most consumer systems, lockout recovery for laptops and most desktop platforms. Photo ID and proof of ownership required. Some manufacturer-locked systems and modern UEFI platforms cannot be bypassed legally; we'll tell you up front.

BSOD

Blue Screen / Boot Failure

Stop-code analysis, driver rollback, kernel-debug review, system file integrity check, RAM and storage diagnostics, restore-point recovery, and clean reinstall when warranted. Most BSOD patterns trace to one of: failing RAM, bad driver, failing drive, or thermal — we identify which.

Engineering

Smart Home & IoT

Home Assistant deployment on dedicated hardware, Z-Wave / Zigbee / Matter device pairing, IoT VLAN segmentation, automation routines, voice control integration, energy monitoring dashboards.

Hardware

Printer / Peripheral Setup

Printer deployment (USB, network, AirPrint, Windows print server), MFP scan-to-folder configuration, driver standardization, plus document scanner setup and OCR pipeline configuration for paperless workflows.

Free

Electronics Recycling

Drop off old computers, monitors, phones, printers, and cables by appointment. Data-bearing devices are wiped to DoD 5220.22-M standard before recycling. No charge. Confirm drop-off time first.

Not Offered

Screen Replacements

We do not perform laptop or phone screen replacements. The repair economics and parts sourcing don't pay off at single-shop volume. We can recommend trusted local shops that specialize in screen work.

TCG Solutions — Business Promotion, AI & Software

Helping businesses grow with custom technology. AI automation, websites, custom software, marketing infrastructure. Engagement-based, scoped per project.

AI

AI Automation for Business

Custom workflow automation built in Python with LangChain and LangGraph. Email triage, document processing, invoice extraction, OSINT enrichment, customer-service routing. Local Ollama for privacy-sensitive workloads. Multi-provider integration with automatic failover. See the local-LLM catalog →

Cloud

Cloud Integrations & Backups

Integration between cloud services (Microsoft 365, Google Workspace, Dropbox, OneDrive, Backblaze B2, AWS S3, Wasabi). Automated backup schedules with verified restore tests, off-site replication, encryption at rest, version retention policies, and tested disaster recovery playbooks. The 3-2-1 strategy implemented end to end.

Pentesting

Authorized Penetration Testing

Scoped penetration testing for businesses that need to validate their security posture. External and internal testing, web application focus, social engineering optional. Standard deliverable: executive summary, finding-by-finding technical detail with severity, evidence, remediation, and post-fix re-test.

Tutoring

Professional IT Tutoring

One-on-one or small-group instruction for IT professionals, students, and motivated hobbyists. Topics: Windows administration, networking fundamentals, cloud basics (Azure / AWS / GCP), scripting (PowerShell, Bash, Python), virtualization, certification prep (CompTIA A+, Network+, Security+, CCNA). Per-hour or per-program pricing.

Education

Cybersecurity Education

Hands-on security education for individuals and organizations. Threat modeling basics, password and 2FA hygiene, phishing recognition, safe browsing practices, secure home network setup, smartphone privacy, social-media operational security. Aimed at people who want to be harder targets, not full-time defenders.

Web

Custom Website Design & Development

Production websites for service businesses, contractors, and professionals. Next.js, static or dynamic, headless CMS integration, e-commerce, custom forms, Netlify or Vercel deployment with CI/CD. SEO-friendly structure, WCAG AA accessibility, performance budgets enforced.

Software

Specialized Custom Software

Line-of-business applications built to fit your workflow instead of forcing your workflow to fit off-the-shelf software. Inventory tools, scheduling systems, dashboards, integrations between platforms that don't talk to each other. Cross-platform desktop, web, or mobile.

SEO

SEO & Local Search Setup

Google Business Profile optimization, schema.org structured data, sitemap and robots configuration, on-page SEO audit, citation building for local business directories. Aimed at the SMBs who want customers to find them in Maps and search.

Marketing

Marketing Tech Stack

Email marketing infrastructure (SPF/DKIM/DMARC, list hygiene, deliverability monitoring), CRM setup (HubSpot, Pipedrive, custom), automated review-request flows, conversion tracking, and analytics that respect privacy.

Database

Database Design & Migration

Schema design for PostgreSQL, MySQL, SQL Server, or SQLite. Data migration from spreadsheets or legacy systems, query optimization, indexing review, backup strategy, and application integration.

Cloud

Cloud & Email Migration

Microsoft 365 or Google Workspace migrations from on-premise Exchange or legacy POP/IMAP. Mailbox content, calendars, contacts, shared drives, and DNS records. SPF/DKIM/DMARC alignment and post-migration deliverability testing.

Strategic

Tech Consulting & Roadmaps

For owners considering a technology investment, infrastructure refresh, or vendor change. Independent assessment, written recommendation with budget ranges, vendor-neutral guidance. Initial 30-minute consultation no charge.

Compliance

HIPAA / PCI Readiness

Gap analysis against HIPAA Security Rule and PCI-DSS v4 controls relevant to small clinics, dental offices, and small retailers. Asset inventory, access review, encryption posture, backup verification, and remediation roadmap.

Audit

Vulnerability Assessment

Authorized network and web posture assessment using Nmap, OWASP ZAP, Nikto, and custom tooling. Deliverable is an executive summary plus a per-finding report with severity, evidence, remediation, and re-test plan.

Recovery

Disaster Recovery Planning

Documented DR plan with RTO and RPO targets per system, backup verification cadence, off-site replication, and a rehearsed restore procedure. Annual review and update included with managed contracts.

Training

Staff Cybersecurity Training

One-hour or half-day sessions for small-business teams. Phishing recognition, password hygiene, BEC scams, social engineering, ransomware basics, incident reporting workflow. Includes printed quick-reference cards.

Forensics

Digital Forensics & IR

Evidence preservation (write-blocked imaging), timeline reconstruction, log analysis, malware artifact extraction, and chain-of-custody documentation. Court-ready reports referred to certified examiner if required.

Indiana Businesses Exposed — Reviews & Transparency

A consumer-advocacy project documenting Indiana businesses — the good, the bad, and the practices customers should know about before opening their wallets. This is research and journalism, not a paid service.

Reviews

Honest Business Reviews

Independent reviews of Indiana businesses based on customer-facing evidence: contracts, billing, customer-service responsiveness, post-sale follow-through, and warranty handling. No advertising relationships, no pay-to-play.

Investigation

Predatory Practice Spotlight

Documentation of high-pressure sales tactics, hidden fees, contract traps, fake reviews, deceptive marketing, and other practices that hurt consumers. Sources cited; companies given right of reply.

Records

Public-Records Research

Compilation of public business filings, regulatory complaints, license status, court records, and BBB history into accessible profiles. All data sourced from public-record systems.

Customer Voice

Customer Relations Spotlight

Highlighting how businesses treat their customers — positive examples worth supporting, and negative examples worth avoiding. Built from verified customer accounts and on-the-record interviews.

Submit

Submit a Tip or Review

If you've had an experience with an Indiana business worth documenting — positive or negative — submit it for review. Anonymity respected; corroboration sought before publication. Reach IBE at gdamick@thatcomputerguy26.com with subject line "IBE Tip".

Follow

Read & Follow

Updates published under the IBE banner. Twitter/X handle: @TCGBusinessOutreach. Visit the IBE page for more on methodology and recent reports.

Not sure which brand fits?

Describe what you need on the Contact page or call 812-414-9097. Initial 15-minute consultations are no charge, no sales pressure.

By Appointment · Built to Spec

Workstation Builds

Every system stress-tested with AIDA64, benchmarked with 3DMark, 24-hour burn-in before delivery.

Gaming

Gaming Powerhouse

Built for 1440p 144fps+. BIOS optimized with XMP/EXPO, PBO curves, custom fan curves.

CPU: Ryzen 7 7800X3D / i7-14700K
GPU: RTX 4070 Super 12GB
RAM: 32GB DDR5-6000
Storage: 1TB Gen4 NVMe + 2TB HDD
Cooling: 240mm AIO
From $1,200
Workstation

Creative Workstation

DaVinci Resolve, Premiere Pro, Blender, ML/AI. GPU-accelerated encoding.

CPU: Ryzen 9 7950X 16c/32t AM5
GPU: RTX 4070 Super / 4090
RAM: 64GB DDR5-6000
Storage: 1TB + 2TB Gen4 NVMe + 4TB archive
Mobo: B650/X670, 2.5GbE
PSU: 850W Gold (Seasonic/Corsair)
Case: Fractal Meshify 2
OS: Win 11 Pro / Ubuntu
From $1,800
Office

Business Desktop

NVMe boot for 8-second starts. Debloated Win 11 Pro. QuickBooks, Excel, Zoom ready.

CPU: Ryzen 5 / i5
RAM: 16-32GB
Storage: 512GB-1TB NVMe
From $600
Server

Home/Business Server

NAS, Plex, file server, VM host. RAID, ECC memory, IPMI remote.

CPU: Xeon E / Ryzen Pro
RAM: 32-64GB ECC
Storage: RAID 1/5/10 hot-swap
From $900
HTPC

Home Theater PC

Compact, silent 4K media center. Mini-ITX, Plex, streaming, light gaming.

From $500
Budget

Student / Budget

Ryzen 3/i3, 8-16GB, SSD. Homework, browsing, Zoom, productivity.

From $350

Side-by-Side Comparison

Quick reference. Every build customizable to your exact needs.

SpecBudgetOfficeGamingWorkstationServer
Starting Price$350$600$1,200$1,800$900
CPU TierRyzen 3 / i3Ryzen 5 / i5Ryzen 7 7800X3DRyzen 9 7950XXeon E / Ryzen Pro
RAM8–16GB DDR416–32GB32GB DDR5-600064GB DDR5-600032–64GB ECC
GPUiGPUiGPURTX 4070 SuperRTX 4070–4090iGPU/optional
Storage256–512GB SSD512GB–1TB NVMe1TB Gen4 + 2TB HDD3TB+ NVMe + archiveRAID 1/5/10
Best ForSchoolwork, browsingQuickBooks, Office1440p 144fps gaming4K editing, 3D, MLNAS, VM host, Plex
Burn-In4 hour4 hour24 hour24 hour72 hour
Warranty90 day labor90 day labor1 year labor1 year labor1 year labor

Custom Quote

Tell us your use case and budget. Most quotes back same day.

Customer Reviews

-- Reviews
--★ Avg
-- 5-Star
Loading...

Leave a Review

Click a star
15+ Live Builds · Production-Ready

Project Portfolio

Production builds shipped from the TCG lab. Every project below is live, public, or in active client use. Stack notes describe the actual tech used, not aspirational labels.

15+ Live Projects100% Production
Client Build
Live

Cornerstone Foundation & Waterproofing

Production website for Cornerstone Foundation Repair & Waterproofing LLC (owner: Nicholas Applegate). Next.js 14 App Router with dynamic content from Firebase RTDB, on-site review submission pipeline auto-publishing testimonials, partner showcase, and a separate Electron admin app for content management. Launched April 2026.

Next.js 14Electron AdminNetlify FunctionsFirebase RTDB
Visit →
Tax Research
In Progress

Feltner Tax Research Tool

Windows 11 desktop research tool for Roger Feltner CPA (7th Circuit, S-Corp / Partnership / LLC / Sole Prop / Farm focus). Ingests U.S. Tax Court opinions from DAWSON and Title 26 from govinfo, offers full-text search, browse, and citation-backed Q&A with strict authority hierarchy (IRC → Regs → Courts → Rev Rul/Proc → PLRs). Companion mobile reader planned.

Python 3.12PySide6SQLite + FTS5sqlite-vecVoyage embeddings
View Preview →
AI Education
Live

ExcelMaster AI Tutor

Free interactive AI tutor for Excel and Access. Covers VLOOKUP, INDEX/MATCH, SUMIFS, PivotTables, Power Query, and advanced formula composition. Local memory of student progress.

ReactLangChainNetlify
Visit →
Security
Live

TCG Security Companion

100-agent diagnostic swarm for browser-based security testing. Modular analyzers for password entropy, network reconnaissance patterns, cookie inspection, CSP evaluation, behavioral anomalies. Educational tool with structured findings.

JSMulti-agentOWASP
Visit →
Operations
Live

TCG Enterprise SOC Dashboard

Centralized security operations console. Session-based investigation tracking, event correlation across endpoint/network/application layers, composite threat scoring, structured incident response workflow with audit trail.

SIEMEvent CorrelationJS
Visit →
Education
Live

Indiana BMV Test Prep

Free AI-powered study tool for the Indiana BMV written knowledge test. 7-day structured course, traffic signs gallery, key numbers reference, weak-area analysis, mock exam mirroring real BMV format, printable cram sheet.

ReactSpaced RepetitionIndiana DMV
Visit →
OSINT
Live

Indiana Businesses Exposed (IBE)

Business transparency research initiative. Compiles public business records, regulatory filings, and consumer complaint patterns into searchable profiles. Outreach companion brand for IT/security consulting.

PythonOSINTPostgreSQL
Read more →
Intelligence
Live

Global Risk Intelligence Workbench

Situational awareness dashboard aggregating 500+ public instability indicators across conflict, health, disaster, logistics, infrastructure, narrative, and economic domains. Composite scoring with cascade-risk analysis.

JSACLEDMulti-source
Open dashboard →
Web Security
Live

Web Posture Scanner v6

Weighted multi-category assessment engine. Analyzes HTTP response headers, TLS configuration, CSP quality, cookie flags, exposure indicators, and privacy/isolation policies. Letter grade plus per-category scores and remediation guidance.

JSNetlify FunctionsOWASP
Run a scan →
AI Chat
Live

TCG AI Assistant

Multi-provider chat assistant with automatic failover, content safety filter, intent routing, persistent context memory, voice input via Web Speech API, and intelligence-aware fallback for offline answers.

Multi-provider AIWebSpeechCustom routing
Try it →
Free Tools
Live

15-Tool Free Diagnostic Suite

Browser-side suite: password strength + generator, JSON formatter, regex tester, base64, SHA-256, color contrast, subnet calculator, scam URL analyzer, device cleanup checklist, tech readiness score, repair-or-replace decision, security posture quick check.

Vanilla JSWeb CryptoLocal-only
Open tools →
Infrastructure
Live

TCG Multi-Node Lab

Three-node enterprise architecture: Core Win 11 workstation, Kali Linux lab sandbox, dedicated AI inference node with Ollama/CUDA. pfSense firewall with IDS/IPS, VLAN segmentation, SIEM with SPAN-mirror feed, encrypted RAID storage, Veeam 3-2-1 backup.

pfSenseOllamaVeeam2.5GbE VLAN
See architecture →
Admin Tools
Live

Admin Dashboard + Analytics

Role-gated admin panel with appointment booking management, help request triage, review moderation with delete, visitor analytics with IP geolocation, sparkline charts, CSV export, recent activity feed. Token-based auth via Netlify Function.

JSJWTFirebase RTDB
Backend
Live

Secure Form Pipeline

Six Netlify Functions handling chat proxy, secure form submission with rate limiting and validation, admin authentication with token issuance, admin data CRUD, scan-headers proxy with full HTTP analysis, and security checks.

Node.jsNetlify FunctionsFirebase Admin
Custom Build
Roadmap

Client Portal v2

Next-up build: dedicated client login portal with ticket system, invoice history, payment links, equipment inventory tracking per client, and document vault for warranty/serial records. Targeting Q3 2026.

Next.jsStripeSupabasePlanned
AI Workflow
In Progress

LangGraph Automation Suite

Custom workflow automation framework using LangChain + LangGraph. Multi-step agent orchestration for client-specific document processing, email triage, invoice extraction, and OSINT enrichment. Local Ollama for privacy-sensitive workloads.

PythonLangGraphOllama

Want a custom build like these?

Every project above started with a real client problem. Bring yours and we'll scope it.

View Code on GitHub →
Observation-Based · Non-Destructive · OWASP-Aligned

Web Security Scanner v6

Passive analysis of browser-visible security controls. Weighted multi-category assessment across HTTP response headers, TLS configuration, CSP quality, cookie flags, information exposure, and isolation policies. Observation-only — no exploitation, no authentication bypass, no active probing.

Authorization Required: Scan only domains you own or have written permission to test. Unauthorized scanning of third-party systems may violate the Computer Fraud and Abuse Act (18 U.S.C. § 1030) or equivalent local law. We log domain + grade + IP + timestamp for abuse investigation. Rate-limited to 5 scans per IP per hour.

What This Scanner Checks

HTTP Headers (40% weight)
HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, X-XSS-Protection. Scores missing, weak, or misconfigured values.
CSP Quality (20% weight)
Presence of Content-Security-Policy, use of 'unsafe-inline' / 'unsafe-eval', restrictive default-src, frame-ancestors, base-uri, form-action directives. Deducts for each weak or missing control.
Cookie Security (15% weight)
Secure flag, HttpOnly flag, SameSite attribute (Strict/Lax/None), Path / Domain scoping, Max-Age vs session. Flags cookies that should be hardened.
TLS / HTTPS (10% weight)
HTTPS enforcement, HSTS max-age compliance, includeSubDomains and preload directives, redirect chain hygiene from http to https.
Info Exposure (10% weight)
Server / X-Powered-By / X-AspNet-Version banners disclosing stack fingerprints. Verbose error pages, exposed admin panels in common paths, exposed source maps in production.
Isolation (5% weight)
COEP, COOP, CORP, Cross-Origin-Resource-Policy. Modern hardening that protects against side-channel attacks and cross-origin leaks. Usually zero on small sites — penalized lightly.

Scan Target

Scan History

No scans yet.

Grade Scale & What It Means

A+
95–100. Every hardening control in place, CSP strict, cookies locked down. The minority of production sites reach this.
A
85–94. Strong across all categories, minor improvements possible. Good target for SMB sites.
B
70–84. Core headers present but at least one weak category. Typical for WordPress sites with security plugins.
C
55–69. Missing multiple headers or weak CSP. Majority of small-business sites land here.
D
40–54. No CSP, no HSTS, or cookies exposed. Needs remediation within a sprint.
F
Under 40. Multiple critical controls absent. Often indicates an unpatched platform or bare default config.

Common Remediation Quick-Fixes

FindingQuick Fix (Netlify / _headers)Quick Fix (Nginx)
No HSTSStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadadd_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always;
No X-Frame-OptionsX-Frame-Options: SAMEORIGINadd_header X-Frame-Options "SAMEORIGIN" always;
No X-Content-Type-OptionsX-Content-Type-Options: nosniffadd_header X-Content-Type-Options "nosniff" always;
No Referrer-PolicyReferrer-Policy: strict-origin-when-cross-originadd_header Referrer-Policy "strict-origin-when-cross-origin" always;
Permissive Permissions-PolicyPermissions-Policy: camera=(), microphone=(), geolocation=()add_header Permissions-Policy "camera=(), microphone=(), geolocation=()" always;
No CSPContent-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data:;add_header Content-Security-Policy "default-src 'self'; script-src 'self'; ..." always;
Exposed Server banner(Netlify strips by default)server_tokens off; more_clear_headers Server X-Powered-By;
Cookie missing Secure / HttpOnly / SameSiteSet-Cookie: ...; Secure; HttpOnly; SameSite=Lax
Beyond headers: upgrade TLS to 1.3, disable TLS 1.0/1.1, move to modern cipher suites, enable OCSP stapling. For WordPress / Drupal / Joomla stacks we also harden .htaccess and recommend a WAF (Cloudflare free tier is a good start).

Need help fixing what the scanner found?

We fix header and CSP issues on common platforms (Netlify, Vercel, Cloudflare Pages, WordPress/Nginx/Apache) at $75/hr business rate. Same-day turnaround for single-site hardening.

Public-Interest Research · Source-Cited

Indiana Businesses Exposed

Independent consumer-advocacy research documenting Indiana businesses — the good, the bad, and the practices customers should know about before opening their wallets. This is journalism-style research, not a paid listing service.

Why IBE Exists

Search engines are flooded with pay-to-play review sites. AggrEgators like Yelp, BBB, and Google Reviews each have blind spots. Local businesses that hurt their customers often retain 4-star averages because their victims never learn how to leave a review — or the business buys their way to the top with astroturf.

IBE is the opposite model: no paid placement, no advertising relationships, no submissions-for-cash. Research is sourced from public records, customer-furnished evidence, and documented interviews. Companies always get right of reply before publication.

Mission

What We Document

Contract traps — auto-renewal, buried termination fees, one-sided arbitration
Hidden-fee patterns — quoted price vs final invoice deltas across multiple customers
Deceptive marketing — fake urgency, bait-and-switch, fabricated reviews
Warranty dodging — stalling, blame-shifting, refusal to honor written terms
Regulatory violations — licensing, consumer protection filings, complaint history
Methodology

How We Verify

Public records first — Secretary of State filings, court dockets, DCA complaints
Primary-source documentation — contracts, emails, receipts, text messages from affected customers
Right of reply — accused businesses get 30 days to respond before publication; their reply is published verbatim with the report
Correction policy — factual errors corrected promptly with a visible change-log
Anonymous sources protected — corroboration required before an anonymous complaint becomes a published finding
Positive

Good Actors Matter Too

Businesses that got it right — refunds issued without argument, warranties honored, problems owned
Under-the-radar recommendations — solid local operators who don't advertise heavily and deserve the business
Back-story features — owner journeys, trade-skill apprenticeships, family continuity
Community contribution — free work for nonprofits, hiring second-chance employees, local supply chains
Sectors

What We Cover

Home-services (HVAC, foundation, roofing, plumbing, pest), automotive (dealers, repair, towing), financial (payday, rent-to-own, debt settlement), healthcare (cash-pay practices, chiropractic aggressive-sales), home-improvement contractors, property managers, and online local businesses operating from Indiana.

Geography

Service Area

Primary focus: Jackson, Bartholomew, Scott, Jennings, Brown counties (TCG's service area). Secondary: Columbus, Seymour, Bloomington, Indianapolis metro. National-reach companies operating locally are in scope when they affect Indiana consumers.

Independence

Funding & Independence

IBE is funded by the parent brands (TCG26 / TCG Solutions). No sponsor relationships with covered businesses, no paid-to-review, no advertising. If a business becomes a TCG client, IBE recuses from covering them and discloses the relationship on any prior coverage.

Submit a Tip

If you've had an experience with an Indiana business worth documenting — positive or negative — submit it for review. Anonymity respected; corroboration required before publication.

Written account — what happened, when, who, with specifics. Rough timeline is fine; we'll help organize.
Evidence — contracts, emails, text threads, photos, receipts, invoices. Redact your own sensitive info before sending.
Willingness to be interviewed — on-record or anonymized. We always ask; you always can decline.
Contact info — so we can follow up. We do not publish personal info without explicit permission.
Email Tip to IBE

How We Read Indiana Business Filings

Secretary of State (INBiz)
Current registration status, officers, registered agent, assumed business names. Dissolved / revoked entities operating under new names are often the story.
Indiana DCA
Consumer-protection complaint records. We look at patterns — single complaints are noise; ten complaints with the same modus operandi are a story.
Court records (MyCase)
Civil litigation against the business, small-claims filings by customers, criminal records of principals. We cite docket numbers; readers can pull originals.
IRS & State Tax
Tax liens (public), revoked non-profit status, and form 990 (for nonprofits) disclosed publicly.
Licensing boards
PLA license status for regulated trades (plumbing, electrical, contractors, cosmetology, healthcare). Expired / suspended licenses on active operators are a red flag.
Property & UCC
Assessor records, UCC filings (liens against business assets), and DBA history. Useful for tracing shell-company patterns.

Follow IBE

Reports published under the IBE banner. Follow the Twitter/X handle @TCGBusinessOutreach for notifications. Major investigations posted on this site.

Owner · Engineer · Operator

Meet Gary Amick

Background

Professional Experience

Gary Amick owns That Computer Guy 26 (TCG Solutions). Working from a multi-node lab environment with isolated testing and development zones. Four brands: That Computer Guy 26, TCG Solutions, TCG Business Outreach, Indiana Businesses Exposed.

Certs

Education & Certifications

Prosser School of Technology - Computer Programming
Miller-Motte College - AS IT Support, BS Network Ops & Security
CompTIA A+, Network+, Security+, CCNA, MS Office, CISSP (in progress)

TCG Infrastructure

Enterprise architecture matching network diagram

Node 1 - Core: Ryzen 9 7950X 16c/32t, 64GB DDR5-6000, RTX 4070 Super, 3TB NVMe, 850W Gold, 240mm AIO, Win 11 Pro BitLocker
Node 2 - Lab: Kali Linux sandbox, Docker, PostgreSQL, MDT/WDS imaging, malware analysis
Node 3 - AI: Ollama (LLaMA/Mistral/CodeLlama), CUDA GPU inference, LangGraph pipelines
Firewall: pfSense IDS/IPS, Spectrum gigabit WAN, WireGuard VPN, Cloudflare DNS
Network: Managed 2.5GbE, VLAN segmentation (Mgmt/Lab/Guest), SPAN to SIEM
Storage: Encrypted RAID, Veeam 3-2-1 (local + Backblaze)
Security: SIEM, WAF, IDS/IPS from SPAN mirror, real-time alerting

Dev Stack

Python, TypeScript, JavaScript, VBA, Bash, PowerShell
React, Node.js, Flask, LangChain, LangGraph, Docker, Netlify
PostgreSQL, Firebase, Ollama, multi-provider AI APIs, CUDA
Kali, Nmap, Wireshark, Burp Suite, OSINT

Service Area

Jackson
Bartholomew
Scott
Jennings
Brown
Architecture

TCG Lab Tech Diagrams

Live infrastructure layout. Click a node to learn more about its role.

Network Topology

Spectrum Gigabit WAN Cloudflare DNS · WireGuard VPN pfSense Firewall IDS/IPS · Snort rules · SPAN port Managed 2.5GbE Switch · VLAN Tagged Node 1 — Core Ryzen 9 7950X · 64GB DDR5 RTX 4070S · Win 11 Pro · BitLocker Node 2 — Lab Kali Linux Sandbox Docker · PostgreSQL · MDT/WDS Node 3 — AI Ollama: LLaMA / Mistral / CodeLlama CUDA GPU · LangGraph

AI Pipeline (Multi-Provider with Failover)

User Input Chat / Voice Safety + Intent XSS filter · routing Provider A Primary Provider B Fallback 1 Provider C Fallback 2 Synthesizer Format + log Reply Streamed

Backup & Recovery (3-2-1 Strategy)

Production Encrypted RAID 3 NVMe drives hourly Local Backup Veeam · Encrypted RAID 1 array daily Cloud Offsite Backblaze B2 Geo-redundant 3 copies · 2 different media · 1 offsite
Giving Back Locally

Community Programs

TCG operates a handful of programs that run regardless of whether they pay for themselves. This page lists each program, who qualifies, and how to access it.

Free · 501(c)(3)

Nonprofit IT Support

Verified 501(c)(3) nonprofits in our service area (Jackson, Bartholomew, Scott, Jennings, Brown counties) pay $0 for IT support. Covered work:

Office workstations: setup, cleanup, repair
Wi-Fi & networking: install and troubleshooting
Email & cloud: Google Workspace / M365 tenants
Donor-database hygiene: DonorPerfect, Bloomerang
Volunteer-management tooling
Church A/V streaming setup & weekly support
Child-safety / content-filter setup on devices
To qualify: bring a copy of your IRS determination letter or a current Tax-Exempt Organization Search printout. Use code TCG26FREE when scheduling.
Free · No Appointment

Electronics Recycling

Free responsible-disposal drop-off for:

Desktops, laptops, all-in-ones
Monitors (CRT, LCD, LED, OLED)
Phones, tablets, e-readers
Printers, scanners, fax machines
Cables, power bricks, peripherals
Networking gear, routers, switches
Hard drives, SSDs, USB sticks
Data-bearing devices get 3-pass DoD 5220.22-M wipe or physical shred on request before recycling. Certificate of destruction available. Confirm drop-off time first: 812-414-9097.
Free · 15-Minute Slot

Tech Decision Consultations

Before you buy a new PC, subscribe to a software service, or sign a multi-year IT contract — get a free 15-minute conversation with a real engineer.

"Is this quote reasonable?" — we'll sanity-check any IT quote
"Do I need this service?" — honest yes/no on SaaS tools
"Is my setup secure?" — walk through basic posture
"Should I repair or replace?" — honest assessment on old hardware
No sales pressure, no follow-up marketing, no capture
Book: mention "free 15-minute consultation" when scheduling. No tech-jargon explanations — plain English only.
Free · Students

Student & Educator Programs

For K-12 teachers, career-tech students (especially Prosser School of Technology alumni), and IT certification candidates:

Free 30-minute career-conversation slots for IT students
Resume + certification portfolio review at no charge
Discounted tutoring rate ($30/hr) for active students with ID
Loaner laptops available for short-term cert exam prep
Classroom tech help for K-12 teachers at no charge within our service area
Sliding Scale

Scam Victim Assistance

If you've been defrauded — romance scam, pig-butchering, tech-support scam, identity theft — we help on a sliding-scale basis for victims on fixed income:

Evidence collection for law enforcement / IC3 / FTC reports
Credential exposure check against breach databases
Password reset marathon for compromised accounts
Identity-theft response plan (credit freeze, IRS IP-PIN, fraud alerts)
Family prevention briefing at no additional charge
Important: If you're actively being scammed right now, stop sending money / giving access first, then call 812-414-9097. Recovery is possible only if we intervene before more damage is done.
Community Tech

Public & Civic Tech

Discounted or pro-bono work on projects serving the general public:

Local food-pantry inventory dashboards
Volunteer-coordination tooling for community events
Public-meeting AV & streaming setup for civic orgs
Digital-inclusion workshops at libraries (pro bono)
Small-town municipal website fixes
Pitch your project to gdamick@thatcomputerguy26.com with "Civic Tech" in the subject.

Year-to-Date Community Commitment

Transparent tracking of community work. Updated quarterly. This is not marketing — if a number moves the wrong direction, we publish it anyway.

Nonprofit Hours YTD
46
Billable equiv. ~$2,530
Devices Recycled
112
All data-wiped before teardown
Free Consults
38
15-min sessions
Scam Victims Helped
9
Sliding-scale or pro-bono

Know a qualifying org or situation?

Reach out. If we can help at no charge or discounted, we will. If we can't, we'll tell you so directly and point toward who can.

What Customers Ask Most

FAQ

Quick answers to the questions we get most. Anything else, call 812-414-9097 or use the contact form.

Still have questions?

15-minute consultations are free. Call, text, or email anytime.

Call Now
Schedule · Help · Direct Contact

Get In Touch

Four ways to reach us: schedule an appointment below, send a quick help request, call directly, or use the chat widget in the corner. For emergencies, call — do not use the form.

Schedule an Appointment

Pick an issue type below — we pre-fill the description so you don't have to explain everything twice. All fields with * are required.

No diagnostic fee · Decline the repair and you owe nothing · Confirmation by phone

Quick Help Request

Not ready to schedule? Send a quick question and we'll respond within one business day (usually sooner).

🚨

Active emergency?

If you have ransomware, an active compromise, or a critical business outagedo not use this form. Power the affected machine off, disconnect from the network, and call 812-414-9097. 24/7 emergency rate ($95/hr) applies; we respond within 30 minutes.

Browser-Based · No Install

Diagnostic Tools

Self-service tools for common IT questions. Every tool runs locally in your browser — nothing leaves your device unless stated. For issues beyond what these tools cover, book a professional session.

Security

Password Strength

Check password strength locally. Nothing sent to any server.

Checklist

Device Cleanup

Get a step-by-step cleanup checklist for your issue.

Assessment

Tech Readiness Score

Answer 5 questions to assess your tech health.

Analysis

Scam Link Analyzer

Paste a suspicious URL for heuristic analysis.

Calculator

Repair or Replace?

Should you fix it or buy new?

Security

Security Posture Score

Quick security health assessment.

Generator

Strong Password Generator

Cryptographic-quality passwords. All generation happens locally.

Developer

JSON Formatter / Validator

Pretty-print, minify, or validate JSON. Runs in your browser.

Developer

Regex Tester

Build and test regular expressions safely.

Developer

Base64 Encoder / Decoder

Encode or decode base64 strings.

Security

Hash Generator (SHA-256)

Cryptographic hash of any text. Useful for verification and integrity checks.

Design

Color Contrast Checker

WCAG AA/AAA contrast ratio for accessibility.

Network

Subnet Calculator

Network address, broadcast, host range, and host count for any CIDR.

Network

Internet Speed Reference

What speeds you actually need for common tasks.

Email / Browsing: 5 Mbps down
HD Video Call (Zoom): 3 Mbps up & down
4K Streaming (Netflix): 25 Mbps down
Online Gaming: 25 Mbps + low ping (<30ms)
Family of 4, Streaming Heavy: 200–500 Mbps
Small Office, Cloud Apps: 500 Mbps–1 Gbps
Run Speed Test →
Reference

Common Port Numbers

Quick reference for IT troubleshooting.

22 SSH · 23 Telnet
53 DNS · 67/68 DHCP
80 HTTP · 443 HTTPS
110 POP3 · 143 IMAP · 25/587 SMTP
3389 RDP · 5900 VNC
3306 MySQL · 5432 Postgres
1433 MSSQL · 27017 MongoDB
445 SMB · 389/636 LDAP/LDAPS
Network

DNS Lookup

A / AAAA / MX / TXT / NS records via DNS-over-HTTPS (Cloudflare). Lookup runs client-side — no logging.

Network

IP Geolocation

Look up ASN, country, region, city, ISP for any IPv4 or IPv6 address. Uses ipwho.is free tier.

Developer

URL Encoder / Decoder

Percent-encode or decode URLs and query strings.

Developer

JWT Decoder

Paste a JSON Web Token to decode header + payload. Signature is not verified — this is inspection only.

Developer

UUID / GUID Generator

Generate RFC 4122 v4 UUIDs or nanoid-style short IDs. Uses Web Crypto for randomness.

Developer

Hash Compare

Compare two strings/files for integrity. Supports MD5, SHA-1, SHA-256, SHA-384, SHA-512.

Developer

Timestamp Converter

Convert between Unix epoch (seconds or milliseconds), ISO 8601, and human-readable.

Developer

QR Code Generator

Generate a QR code for URLs, Wi-Fi, vCards, or plain text. Rendered client-side with qr-code-styling-level logic.

Network

MAC Address / OUI Lookup

Identify hardware vendor from the first 3 octets (OUI) of a MAC address. Uses public IEEE OUI database via API.

Security

Password Entropy Analyzer

Calculates true password entropy in bits, estimated crack time at various attacker speeds, and identifies common-pattern weaknesses.

Design

Color Palette Generator

Generate harmonious 5-color palettes from a base color. Complementary, triadic, analogous, tetradic schemes.

Developer

CSV / JSON Converter

Convert CSV to JSON or JSON array to CSV. Auto-detects headers. Handles quoted fields.

Reference

HTTP Status Codes

Quick reference with mouseover descriptions.

2xx Success: 200 OK · 201 Created · 204 No Content · 206 Partial
3xx Redirect: 301 Moved · 302 Found · 304 Not Modified · 307 Temp · 308 Perm
4xx Client: 400 Bad Req · 401 Unauth · 403 Forbidden · 404 Not Found · 405 Method · 409 Conflict · 418 Teapot · 429 Too Many
5xx Server: 500 Internal · 501 Not Impl · 502 Bad Gateway · 503 Unavail · 504 Timeout
Reference

CIDR / Subnet Quick Chart

Common prefix-to-host-count reference.

/8 = 16,777,214 hosts · /16 = 65,534 hosts
/20 = 4,094 hosts · /22 = 1,022 hosts
/24 = 254 hosts · /25 = 126 hosts
/26 = 62 hosts · /27 = 30 hosts
/28 = 14 hosts · /29 = 6 hosts
/30 = 2 hosts (P2P) · /31 = 0 usable (P2P per RFC 3021)
Private ranges: 10.0.0.0/8 · 172.16.0.0/12 · 192.168.0.0/16

Need More Than Free Tools?

Professional IT support starts at $45/hr. We fix what tools can't.

Multi-Source · Open-Source Intelligence

Global Risk Workbench

Aggregating publicly-available instability indicators across conflict, health, disaster, logistics, and information domains. Observation-based early-warning intelligence.

Loading intelligence dashboard...

Custom Intelligence Solutions

TCG Solutions builds monitoring dashboards, OSINT pipelines, and situational awareness tools.

Native Free Tool AI

ExcelMaster — Native Edition

Fully integrated Excel/Sheets formula reference and interactive tutor. No iframe, no popup, no tracking. Type a question or pick a function below.

Ask Excel Anything

Type a question (e.g., "how do I VLOOKUP from another sheet?") or describe what you want to do.

Quick try:

Function Reference

Live Formula Sandbox

Try formulas against a fake dataset. Calculations run client-side. Supports SUM, AVG, COUNT, COUNTIF, MIN, MAX.

A (Item)B (Region)C (Sales)D (Date)
1WidgetNorth1,2502026-01-12
2GadgetSouth8902026-01-15
3WidgetEast2,4002026-02-03
4GizmoNorth3,1002026-02-18
5WidgetWest1,7502026-03-01
6GadgetNorth2,2002026-03-22
7GizmoSouth1,5002026-04-04
Examples: =SUM(C1:C7) · =AVG(C1:C7) · =COUNTIF(A,Widget) · =MAX(C1:C7) · =MIN(C1:C7)

Excel Cheat Sheet (Print-Friendly)

Lookup

=VLOOKUP(val, range, col, FALSE)
=XLOOKUP(val, search_arr, return_arr)
=INDEX(arr, MATCH(val, lookup, 0))
=HLOOKUP(val, range, row, FALSE)

Aggregate

=SUMIFS(sum_rng, c1, v1, c2, v2)
=COUNTIFS(c1, v1, c2, v2)
=AVERAGEIFS(avg_rng, c1, v1)
=SUBTOTAL(9, range)

Text

=CONCAT(A1, " ", B1)
=TEXTJOIN(",", TRUE, range)
=LEFT(A1, 5) / RIGHT / MID
=SUBSTITUTE(A1, old, new)
=TRIM(A1) / UPPER / LOWER

Date / Time

=TODAY() / =NOW()
=DATEDIF(start, end, "Y")
=NETWORKDAYS(start, end)
=EOMONTH(date, 0)
=YEAR(A1) / MONTH / DAY

Logical

=IF(A1>10, "yes", "no")
=IFS(A1>90, "A", A1>80, "B")
=IFERROR(formula, "fallback")
=AND(c1, c2) / =OR(c1, c2)
=SWITCH(A1, 1,"a", 2,"b", "?")

Dynamic Arrays (365)

=UNIQUE(range)
=SORT(range, sort_col, order)
=FILTER(range, condition)
=SEQUENCE(rows, cols)
=LET(name, value, formula)

Practice Quiz

Want one-on-one Excel training?

Custom spreadsheet design, dashboard development, Power Query/Power Pivot, Access database conversion, VBA automation.

Legacy Tutor (iframe) →
Native Security Lab 100 Agents

TCG Security Companion

Browser-native security workbench. 100-agent diagnostic swarm runs concurrently against your input. Educational only — only test systems you own or are authorized to test.

Authorization Required: Run scans only against your own assets. All analysis is non-destructive, browser-only, and never sends data to external systems unless you explicitly ask.

100-Agent Diagnostic Swarm

Spawns 100 concurrent micro-agents that analyze a target URL or text input across 10 categories: header hygiene, CSP quality, cookie flags, mixed content, inline-script density, exposed metadata, form security, link integrity, encoding consistency, and behavioral signals.

Password Strength & Crack-Time

Analyzes entropy, character composition, dictionary collisions, and estimates time-to-crack at common attack rates.

XSS Pattern Detector

Demonstrates which inputs would execute as script in an unsanitized field. Educational sandbox — payloads are NEVER executed; they're shown as inert escaped text.

SQL Injection Pattern Detector

Identifies common SQLi patterns in user input. Static heuristic detection — in production, use parameterized queries.

Defense: Parameterized queries / prepared statements / ORM with bound parameters. Never concatenate user input into SQL strings.

Entropy + Multi-Hash Tool

Calculates Shannon entropy, character distribution, and computes SHA-1, SHA-256, SHA-384, and SHA-512 digests in parallel using Web Crypto.

For authorized professional security assessment of your business systems, contact TCG Solutions for engagement scoping.

Legacy Lab (iframe) →
Native SOC Dashboard Live

TCG Enterprise SOC

Browser-native security operations console. Simulated event feed, triage queue, threat scoring, and incident response workflow. All inline — no iframe, no popup.

0
Critical Open
0
High Severity
0
Medium
0
Risk Score
0
Resolved

Live Event Feed (simulated)

Active Triage Queue

Critical and high-severity events awaiting analyst action. Click to acknowledge, assign, or escalate.

Incident Response Workflow

1. Detect

Alert triggered by SIEM, EDR, or user report. Severity assigned automatically.

2. Triage

Analyst reviews context, deduplicates, validates true positive vs false positive.

3. Contain

Isolate affected hosts, revoke compromised credentials, block indicators of compromise.

4. Eradicate

Remove malware, patch the vulnerability, validate no persistence remains.

5. Recover

Restore systems from clean backup, monitor for recurrence, return to normal operations.

6. Lessons Learned

Post-incident review, update detection rules, document for compliance and audit trail.

About this SOC

What this is: An interactive demo of how a real Security Operations Center looks. The event feed is simulated using realistic patterns, severities, and event types you'd see in production.
What a real SOC does: Aggregates logs from firewalls, EDR, identity providers, and applications. Correlates across sources to detect patterns single alerts would miss. Provides 24/7 analyst coverage for detection and response.
For your business: TCG Solutions provides scaled-down SOC capabilities for SMBs that can't justify a full security team. Monitoring, alerting, monthly reporting, and incident response on retainer.
Standards alignment: Workflow follows NIST SP 800-61r2 (Computer Security Incident Handling Guide). Detection rules align with MITRE ATT&CK framework.
Legacy SOC (iframe) →
Native Free Tool AI

Indiana BMV Written Test Prep

Free interactive study tool for the Indiana BMV written knowledge test. Flashcards, mock exam, signs gallery, and key-numbers reference — all inline.

0
Cards Seen
0
Marked Known
0
Need Review
7
Day Plan

Flashcards

Question
Click "Start" to begin
Tap card to flip · Space to flip
Answer

Mock Knowledge Exam

Indiana BMV format: 50 questions, multiple choice. You need 84% (42/50 correct) to pass on the real test. No time limit.

Traffic Signs Gallery

Sign Shape Memory Trick
Octagon (8-sided) = STOP only · Triangle pointed down = Yield only · Diamond = Warning · Pennant = No passing zone · Crossbuck (X) = Railroad · Round = Railroad ahead · Pentagon = School zone · Rectangle vertical = Regulatory · Rectangle horizontal = Guide

Key Numbers (Indiana)

Speed
30 mph Urban district / business
50 mph County road
55 mph Other state road
65 mph Rural Interstate (passenger)
70 mph Rural Interstate (some)
15 mph School zone (when active)
20 mph Alley
Following
3 seconds Minimum following distance (good conditions)
4-5 seconds Bad weather / heavy load
6+ seconds Towing or motorcycle behind
200 feet Headlight required ahead of you
500 feet Headlight visibility (clear weather)
BAC
0.08% DUI/OWI threshold (21+)
0.04% Commercial drivers
0.02% Under 21 (Zero Tolerance)
0.15%+ Aggravated — harsher penalty
License Points
2-8 points Per moving violation
20 points Suspension review trigger
2 years Most points stay on record
3 years Major violations
10+ years DUI / felony violations
Distances
15 feet Park from a fire hydrant
20 feet Park from crosswalk
30 feet Park from stop sign / signal
50 feet Park from RR crossing
3 feet Distance when passing cyclists
Other
10 days Notify BMV of address change
30 days Notify BMV of name change
$50 Reinstatement fee (typical)
4-5 years License renewal cycle
16 Minimum age for full license

7-Day Study Plan

Day 1 — Foundations: Read the Indiana Driver's Manual cover to cover. Don't memorize, just absorb. ~2 hours.
Day 2 — Signs: Drill the signs gallery. Learn shape + color meaning before specific signs. ~1 hour.
Day 3 — Numbers: Memorize all key numbers. Make a one-page cram sheet from the Numbers tab. ~1 hour.
Day 4 — Rules: Right-of-way scenarios, lane changes, turning, parking, school buses, emergency vehicles. ~1.5 hours.
Day 5 — Weak Areas: Use flashcards filtered to "Need Review only" — drill anything you missed.
Day 6 — Mock Exam: Take a full mock exam under realistic conditions. Score 85%+ before the real test.
Day 7 — Light Review: Cram sheet review only. Don't burn out the day before. Get a good night's sleep.

Free community resource for Indiana residents. Study content based on the official Indiana Driver's Manual. Not affiliated with the Indiana BMV.

By Audience · Tailored Engagements

Engineering & Technical Services

Targeted technical support for the people and organizations we work with most. Each card shows what we can do for your specific role or sector.

For Engineers

CAD & CAE workstation builds tuned for SolidWorks, Fusion 360, AutoCAD, Inventor, and Ansys. Custom calculation tooling built in Python or VBA for repetitive engineering math. Data pipelines for instrument output (CSV, LabVIEW exports, sensor logs) into clean databases for analysis. Local LLM deployment for engineering Q&A over your private specs and standards.
🏭

For Manufacturing

Shop-floor data capture from CNC, PLC, and barcode scanners into production dashboards. OEE / downtime analytics with custom KPI tracking. ERP integration work between QuickBooks, NetSuite, or SAP and shop-floor systems. IoT sensor networks for environmental monitoring (temperature, humidity, vibration) on the production floor. Custom inventory tooling when off-the-shelf doesn't fit your workflow.
🏢

For Small Business

Full IT setup from new-business launch to multi-seat operation. Custom websites from $300 with no monthly platform fees. Cloud + email migration with deliverability monitoring. POS & payment integration. Bookkeeping automation tying invoicing, banking, and accounting together. Monthly managed-IT contracts available.
🏪

For Public Services

For municipal offices, fire/EMS, libraries, and small public agencies: CJIS-aware configuration, records-retention compliance, backup and disaster recovery with documented RTO/RPO, grant-funding tech consulting, and public-meeting AV setup. Procurement-friendly invoicing.
📚

For Teachers

Classroom technology setup, smart board calibration, AV troubleshooting. Grade-book and SIS integration help. Custom teaching tools (interactive demos, attendance trackers, parent-comm dashboards). Educator pricing available; small projects often free for K-12 teachers in our service area.
🎓

For Students

Tutoring in CompTIA A+, Network+, Security+, CCNA prep. Programming basics in Python, JavaScript, PowerShell, Bash. Capstone-project mentorship for IT and CS students. Resume + portfolio review. Discounted student rates plus free 30-minute career-conversation slots.
👨‍💻

For Consumers

Everyday tech help for individuals and families: computer repair, virus removal, Wi-Fi setup, smart-home configuration, password management, data backup setup, scam-call protection. Free 15-minute consultation. No tech-jargon explanations — just plain English.
📝

Data Entry Services

Bulk data entry from paper records, scanned PDFs, photos, or audio into Excel, Access, Google Sheets, or your custom database. OCR-assisted where possible to speed throughput, manual verification on every row. Confidentiality guaranteed; data wiped from working storage after delivery. Per-row or per-hour pricing.
📊

Data Analysis

Turn raw data into actionable insight: Excel pivot & Power Query analysis, SQL reporting, Python pandas for statistical work, interactive dashboards in Power BI / Tableau / custom HTML. Sales reporting, customer-segmentation, forecasting, A/B test analysis, financial summaries, KPI scorecards. Deliverable: report + the workbook so you can re-run it monthly.
🛡️

For Law Enforcement

CJIS-aware infrastructure for small departments and task forces: endpoint hardening meeting the 5.9 policy, encrypted evidence drives with chain-of-custody logs, audited user provisioning, and incident-response playbooks. Digital forensics support: bit-level drive imaging with documented hash verification, deleted-file recovery for NTFS/ext4/APFS, browser artifact timeline reconstruction. OSINT for investigators: subject profiling from public records, property ownership traces, vehicle registration research, business filings, court record aggregation. Tactical training: phone extraction basics, forensic report writing, testifying on digital evidence. Not a replacement for certified forensic examiners on felony work — partner on nexus investigations.
🔍

OSINT Investigative Services

Open-source intelligence for private investigators, journalists, attorneys, compliance teams, and concerned families. Subject profiling: legal-name/alias discovery, address history, employment trace, academic record verification, litigation history, bankruptcy filings, civil judgments, liens. Business due diligence: corporate structure maps, UCC filings, FAA aircraft ownership, SEC filings, regulatory sanctions, reverse-whois, registered-agent trails. Property records: deed history, assessor records, environmental filings, mineral-rights research. Social graph analysis: username pivots across platforms, relationship mapping, historical archive retrieval (Wayback, archive.is), geotag forensics. Reports: source-cited PDF deliverable, raw-artifact archive, timeline visualization. Lawful, public-records-only methodology — no pretexting, no impersonation, no breach data.
🌎

Social Media & FB Tracking

Structured social-media intelligence gathering for legitimate use cases: employer background due diligence, custody & divorce proceedings, brand-abuse monitoring, missing-person searches, event-attendance verification. Facebook / Instagram / X / TikTok / LinkedIn / Snap / Threads public profile harvesting, friends-of-friends network mapping, post-history timeline, tagged-photo geolocation, check-in history, engagement pattern analysis. Reverse image search across platforms, deepfake and AI-image detection, metadata stripping. Username pivots: given one handle, find accounts on 250+ platforms. Historical snapshots: Wayback Machine, archive.is, Google cache retrieval. Report deliverable: indexed PDF with screenshots, URLs, timestamps, and chain-of-evidence hashes suitable for legal filings. Strictly public content; no account compromise, no platform ToS violations, no commercial stalking (we decline those engagements).
⚖️

For Legal Professionals

Attorneys, paralegals, and independent legal researchers get: eDiscovery prep (file indexing, keyword extraction, privilege-log automation), litigation-hold technical implementation, OSINT for case research (see Investigative Services above), secure document portals with encrypted client uploads, court-exhibit prep (authenticated screenshots with SHA-256 hashing, timestamped archive captures, forensic-grade video export). Paralegal workflow automation in Python or VBA to cut repeat research time.
🔧

For First Responders / Fire / EMS

CAD (Computer-Aided Dispatch) terminal maintenance, mobile data terminal troubleshooting, ruggedized laptop deployment. NFIRS / PCR workflow tuning. Station networking with WAN failover for outage-resilient connectivity. Records-retention setup meeting state fire-marshal and state EMS requirements. Training tools: scenario simulators, protocol flashcards, cert renewal tracking. Grant-funded tech purchases from scoping through acceptance testing.
🏥

For Medical Practices

HIPAA-aware IT for small practices: workstation baseline hardening, encrypted storage, access-log auditing, automatic lock-screen enforcement, role-based access. EMR/EHR support for Athena, Epic MyChart Lite, Practice Fusion, and custom systems. Secure messaging, BAA vetting of cloud vendors, backup strategy with documented recovery time, risk-assessment documentation for HHS audit readiness.
💰

For Accountants / CPAs

QuickBooks / Xero / Drake / Lacerte / ProSeries setup, workflow tuning, and multi-user file management. Document portal with encrypted client uploads and digital signatures. IRS e-filing troubleshooting. Automation: bank-feed reconciliation scripts, invoice-to-QB pipelines, custom Excel tooling for prep work. Secure file retention meeting 7-year rules.
🍻️

For Restaurants / Hospitality

POS setup (Toast, Square, Clover, Aloha) with cross-station redundancy. Kitchen display systems, guest Wi-Fi segmented from payment network. Online-ordering integration with the menu system. PCI-DSS hygiene (segmentation, log retention, vulnerability scans). Reservation / waitlist tooling. Camera / DVR maintenance with retention policy.
🔧

For Trades / Construction

Field-to-office data pipelines: jobsite photos, progress logs, and equipment telemetry streamed to the office in real time. Dispatch and route optimization. Estimating-tool tuning (Xactimate, PlanSwift, Cubit). Ruggedized tablet setup with offline sync. Drone data workflow: aerial capture to DEM/ortho-mosaic to Google Earth or AutoCAD. OSHA-log automation.
🥥

For Ag & Farm Operations

Precision-ag data: yield maps, soil sample imports, Climate FieldView/John Deere Ops Center workflows. RTK / GPS troubleshooting. Grain-bin monitoring with IoT sensors and SMS alerts. Field Wi-Fi for grain elevators and shop offices. Inventory and parts tracking with barcode scanner integration. Disaster recovery plans that account for rural broadband realities.
🏯

For Nonprofits & Faith Organizations

Verified 501(c)(3) nonprofits in our service area receive IT support at no charge (code TCG26FREE): office workstations, Wi-Fi, email, backups, donor-database hygiene, grant-reporting tooling, volunteer-management dashboards, streaming-service setup for church A/V, child-safety compliance on devices. Bring proof of status when scheduling.
👀

Fraud Investigation & Scam Analysis

If you've been scammed or suspect fraud: transaction tracing (Zelle, Venmo, Cash App, Bitcoin — we identify on-ramps and report appropriately), romance-scam & pig-butchering case work: gather the evidence package law enforcement needs, recovery likelihood assessment (we'll tell you honestly whether to pursue), prevention briefing for family members, credential exposure check across breach databases, identity-theft response plan. Sliding-scale pricing for victims on fixed incomes.
📈

For Real Estate Professionals

MLS / CRM tuning for Follow Up Boss, KvCORE, Chime. Drone photo & video workflow (Part 107 considerations). Matterport / 3D tour setup. DocuSign / Dotloop tuning. Automated-listing scripts that sync property data to your own site. Property-research OSINT integrated with investigative services above.
📺

For Content Creators / Streamers

Streaming rig builds (encoding-optimized workstations, capture cards, dual-PC setups). OBS / StreamDeck tuning, scene transitions, chat-overlay integration. Color-accurate monitor calibration for photo/video work. NAS for large-asset archives with remote editor collaboration. YouTube / TikTok / Twitch monetization setup and analytics dashboards. Content-theft monitoring with reverse-image alerts.
⚠️

Incident Response & Breach Recovery

When a breach, ransomware attack, or active compromise is happening: 24/7 emergency response at $95/hr. Immediate containment (network isolation, credential rotation, compromise scope analysis). Evidence preservation (full disk imaging, memory capture, log archival) before any cleanup. Insurance & law-enforcement coordination. Root-cause analysis and prevention plan. Post-incident report suitable for customer-notification and regulatory filings. Partner-lab support for severe cases beyond our capabilities.

Don't see your situation here?

If your role or industry isn't listed, the conversation is still free. Most engagements start with a 15-minute scoping call to determine if we're the right fit.

812-414-9097
Live Feeds · Multi-Source · Auto-Refreshed

News & Headlines

Aggregated technology, security, business, and world news. Categorized and ranked. All headlines link to the original source.

News pulled from public RSS-style feeds. Headlines are not endorsements. Click through to the source for full coverage.
Project Preview · In Development

Feltner Tax Research

Windows 11 desktop research tool for tax professionals. Ingests U.S. Tax Court opinions and Title 26 statutes from public sources, offers full-text search with vector reranking, and produces citation-backed answers with strict authority hierarchy. Built for Roger Feltner CPA. Preview UI below.

Feltner Tax Research — v0.4 (preview)
Sources
All Sources
Tax Court Opinions
IRC Title 26
Treasury Regs
Rev Rulings
Rev Procedures
Filters
Index: 487,219 docs
Updated: 2026-04-18
Try:
Synthesized AnswerConfidence: HIGH
Yes — under Rev. Proc. 2013-30, a single-member LLC can request late S-Corp election relief if (1) the failure was inadvertent, (2) the entity is otherwise eligible, (3) the election is requested within 3 years and 75 days of the intended effective date, and (4) reasonable cause is shown. File Form 2553 with "FILED PURSUANT TO REV. PROC. 2013-30" written across the top.
Authority hierarchy applied: IRC §1362 → Treas. Reg. §1.1362-6 → Rev. Proc. 2013-30 → PLR review (none modifying)
Stack

Technology

Python 3.12, PySide6 (Qt 6) UI, SQLite with FTS5 full-text + sqlite-vec embeddings, Voyage law-2 embedding model, multi-provider LLM with citation enforcement, APScheduler for ingest jobs, Windows 11 toast notifications.

Sources

Public Tax Sources

U.S. Tax Court DAWSON (opinions and Orders & Opinions), govinfo Title 26 (full IRC), IRS Revenue Rulings & Procedures, public PLRs, court rule changes. CCH / RIA / WG&L adapters available on licensing approval.

Authority

Citation Hierarchy

Every answer cites authority in strict order: IRC → Treas. Regs → Court decisions → Rev. Rulings → Rev. Procedures → PLRs. Walk down only when the higher authority is silent. No answer ships without anchored citations.

Privacy

Local-First

Runs entirely on the practitioner's Windows 11 workstation. No client data leaves the office. Optional alerts on new filings matching saved queries via Windows toast notifications.

Need a custom desktop research tool for your practice?

Specialized desktop applications for tax, legal, medical, or technical professionals. Local-first by default, integrated with the public-record sources your work depends on.

AI Stack

Local LLMs We Run

Curated catalog of the top 25 large language models we deploy on-premise for clients who can't (or won't) send their data to a cloud provider. Every model below runs entirely on your hardware. VRAM estimates assume 4-bit quantization (the production default).

🧠
Why local?Local inference keeps sensitive data inside your network, eliminates per-token API charges, removes latency from external API calls, and gives you full control over the model and its behavior. Trade-off: you supply the GPU.
Runtimes: Ollama, vLLM, llama.cpp, LM Studio, text-generation-webui

How We Actually Run These — On the TCG Lab

Every model on this page is proof-tested on the same multi-node lab infrastructure the rest of the site runs on. Here is exactly how the pieces fit:

Node 3 — AI Inference
Primary model host
Dedicated Linux box running Ollama with the OpenAI-compatible API exposed on the internal VLAN only. Models loaded: LLaMA 3.3 70B (4-bit), Mistral Small 3, CodeLlama 34B, Phi-4, DeepSeek-R1-Distill, Qwen 2.5 Coder. CUDA GPU with hot-swappable model profiles per client engagement.
Node 2 — Lab
RAG + orchestration
Kali sandbox that hosts LangChain / LangGraph pipelines, client-specific vector stores (Chroma or PGVector on the PostgreSQL instance), and the document ingestion jobs. Dockerized so each client workload is isolated.
Node 1 — Core
Dev workstation
Windows 11 Pro with BitLocker. Builds the client-facing UI (Python + PySide6 or a web app), ships compiled binaries, and connects to Node 3's API for inference. Separation of concerns: the dev box never holds client data.
pfSense + VLANs
Network isolation
Inference node lives on an isolated VLAN. Outbound internet is blocked by firewall rule — the models cannot phone home, can't exfiltrate prompts, can't pull a compromised weight. IDS/IPS watches every flow; any anomaly triggers SIEM alerts.
3-2-1 Backup
Model + embedding preservation
Model weights and client embedding stores back up nightly via Veeam: local RAID snapshot, secondary RAID 1 array, and encrypted Backblaze B2 offsite. Restore tested quarterly.
Client Deployment
Two delivery modes
Hosted: client calls our Ollama API over a WireGuard VPN tunnel — we maintain hardware. On-prem: we size, build, and install a dedicated inference box at the client site with a documented runbook. Same software stack, your hardware.
Typical engagement flow: requirements call → hardware sizing memo → model shortlist with benchmarks on your actual documents → RAG pipeline build on Node 2 → inference deploy on Node 3 (or your box) → client-facing UI on Node 1 → 30-day shakedown with test prompts → handover with runbook. For on-site deployments, the full network/firewall/VLAN design goes into the runbook too — so your internal IT can maintain it after we leave.
#ModelOriginBest ForMin VRAM (4-bit)License

Recommended Stack by Hardware Tier

8–12 GB VRAM
Llama 3.2 3B, Phi-4 mini, Qwen 2.5 7B, Mistral 7B, Gemma 2 9B (just barely). Good for chat assistants, summarization, light code completion.
16–24 GB VRAM (RTX 4080/4090)
Llama 3.3 70B (4-bit), Qwen 2.5 32B, Mixtral 8x7B, Codestral 22B, DeepSeek-Coder V2. The sweet spot for most business workloads.
48–80 GB (workstation)
Llama 3.3 70B at higher precision, Qwen 2.5 72B, DeepSeek-V3 (partial), Command R+ 104B (4-bit), Yi-1.5 34B at FP8.
Multi-GPU / Server
DeepSeek-V3 671B (MoE, ~80B active), Llama 3.1 405B, Mixtral 8x22B at FP16, full-precision Qwen 72B. Production-grade SLA territory.

Benchmark Snapshot — Tested In Our Lab

Our own benchmark numbers from running these models on the TCG AI node (RTX 4090, 24GB). All results at 4-bit quant, 2048 ctx, batch=1. These are honest field numbers, not vendor marketing.

ModelTok/secLoad TimeVRAM ActualMMLU (5-shot)HumanEvalUse Case Fit
Llama 3.3 70B18 t/s42s21.8 GB86.088.4General Q&A, RAG, summarization
Qwen 2.5 32B32 t/s18s18.5 GB83.385.0Multilingual + coding balance
Qwen 2.5 Coder 32B30 t/s18s18.7 GB72.492.7Code completion & review
Mistral Small 3 24B48 t/s12s14.2 GB80.683.5Fast chat, function-calling
Phi-4 14B64 t/s7s8.9 GB84.882.6Reasoning on modest hardware
DeepSeek-R1-Distill-Qwen-32B28 t/s20s19.1 GB81.289.1Chain-of-thought reasoning
Llama 3.2 3B165 t/s2s2.3 GB63.456.2Edge devices, classification
Gemma 3 27B34 t/s16s16.4 GB78.271.0Multimodal (vision)
CodeLlama 34B24 t/s22s19.8 GB55.178.2Legacy codebase work
Llama 4 Scout (MoE, 17B active)58 t/s24s22.1 GB88.485.7Long-context (1M+), cheap
Context: Numbers are steady-state throughput after warmup on our specific hardware. Your mileage varies with GPU model, context length, batch size, and prompt structure. MMLU and HumanEval are published reference scores from the original model releases — we re-test against our own evaluation set before shipping to clients.

Deployment Runbook — What You Get

Every on-prem engagement ships with a written runbook covering operations, security, and recovery. Contents:

01 Hardware Spec
Exact BOM (CPU, GPU, RAM, NVMe, PSU, cooling). Warranty timeline. Replacement-part vendor shortlist. Three-year refresh recommendation.
02 Network Topology
VLAN layout, firewall rules, inbound/outbound policy, WireGuard VPN config for remote management, SIEM integration points.
03 Model Operations
Ollama config, model files on disk, how to pull a new model, how to rollback, how to check GPU VRAM, how to tail logs, expected tokens-per-second baselines.
04 Security Posture
User auth (if applicable), API key rotation, audit log location, sensitive-data handling policy, OWASP Top-10 LLM mitigations applied (prompt injection, output handling, training data poisoning, model DoS).
05 Backup & DR
What's backed up and how often (model weights, embedding stores, config). Restore procedure with tested runbook. Cloud offsite details (Backblaze B2, encrypted). Target RTO / RPO per component.
06 RAG Pipeline
Document ingestion scripts, chunking strategy, embedding model used, vector store schema, retrieval parameters tuned to your data, how to re-ingest or purge.
07 Integrations
API endpoints, example client code in Python / JS / PowerShell, authentication flow, rate-limit handling, error codes reference.
08 Monitoring
Health check endpoints, key metrics dashboard (GPU temp, VRAM, tokens/sec, latency percentiles, error rate), alerting thresholds, on-call escalation path.
09 Change Management
How to upgrade Ollama, how to swap models without downtime, how to update firmware / BIOS, scheduled maintenance windows, rollback policy.
10 Vendor Contacts
Hardware vendor (NVIDIA, SSD OEM, motherboard), firmware update channels, Ollama community channels, model-license contacts where relevant.

Use-Case Pricing Ranges

Budget ballparks for common deployments. Final quote depends on data volume, integration count, and SLA requirements.

Use CaseTypical ModelHardwareImplementationMonthly Support
Internal chat assistant (50 users)Qwen 2.5 32B or Llama 3.3 70B$3,800–5,200$2,500–4,500$250–400
Document RAG (10GB corpus)Llama 3.3 70B + embedding model$4,200–6,500$4,000–7,500$350–600
Code-review assistantQwen 2.5 Coder 32B$3,200–4,400$2,800–5,000$250–400
Customer-facing chatbotMistral Small 3 or Phi-4$2,800–4,000$3,500–6,500$300–550
OSINT / research agentDeepSeek-R1-Distill 32B$4,000–5,800$5,500–10,000$400–700
High-availability prod (multi-GPU)Llama 3.1 405B or Llama 4 Behemoth$25,000+$15,000+$1,500+
Ranges USD. Hardware = one-time (we source at cost, show receipts). Implementation = TCG labor. Monthly support optional; includes monitoring, patching, model updates, on-call within business hours.

Want a private LLM running in your office?

We build dedicated AI inference machines, deploy the model stack, and integrate it with your existing tools (email, CRM, SharePoint, custom apps). Engagements scoped per requirement.

Call 812-414-9097
Honest Comparison

Why Choose TCG

Direct comparison against typical local web developers and computer repair shops in the Seymour, Indiana area. We compete on price, depth, and follow-through.

Web Design & Development

Custom websites starting at $300 — built with code, not website builders.

FeatureTCG SolutionsTypical Local Web DevWix / Squarespace DIY
Starting price$300$1,500–$5,000$0 + monthly fee
Built withNext.js / vanilla / custom codeWordPress + pluginsDrag-and-drop builder
You own the code✓ Yes — full sourceSometimes✗ No (locked to platform)
Page-load speed< 1.5s (performance budget)3–6s typical2–5s
SEO setup included✓ Schema, sitemap, OGAdd-on costLimited templates
Accessibility (WCAG AA)✓ Built inOften missingInconsistent
Custom backend / forms✓ Yes (Netlify Functions)Plugin-dependentLimited / paid tier
Monthly platform fee$0 (own hosting)Hosting + plugin fees$16–$49/mo forever
Ownership / lock-inNone — site is yoursTheme/plugin lock-inTotal platform lock-in
Turnaround1–3 weeks for typical site4–12 weeksSelf-paced

Computer Repair

Honest diagnostics, no pressure tactics, real tool depth.

FeatureTCG (TCG26)Big-Box Repair (Best Buy / Geek Squad)Typical Local Shop
Diagnostic fee$0$40–$100$25–$75
Base hourly rate$45/hr remote$100–$200/hr$50–$95/hr
Virus removal flatFrom $45 (typical 1–2 hr)$100–$200 flat$80–$150 flat
Data recovery optionsddrescue + TestDisk + PhotoRecSend out (3rd party)Limited tooling
Custom builds✓ From $350, 24-hr burn-inPre-configured onlySometimes
Same-day if available✓ YesMulti-day queueVaries
Free 15-min consult✓ YesSales-drivenRare
Walk-out fee if you declineNoneDiagnostic still owedDiagnostic still owed
Nonprofit free tier✓ 501(c)(3) freeNoneNone
Honest "don't fix it" advice✓ Will recommend replacePushes upgradesInconsistent

What we won't do

Screen replacements on laptops or phones — we refer those to specialty shops where the tooling pays off.
Online website builders (Wix / Squarespace / Weebly) — we build with desktop tooling so you own the code.
Hidden charges — the rate quoted at appointment confirmation is the rate billed.
Pressure to upgrade or replace when a repair is the right call.
Walk-in-only service — everything is by appointment so you're not waiting in a queue.

See for yourself

Get a free 15-minute consultation. No sales pressure, just a straight answer about whether we're the right fit.

812-414-9097
Every Page on the Site

Site Index

Complete index of every page, tool, and section on this site. Useful for navigation, accessibility, and search engines.

Legal

Privacy Policy

Effective: April 2026 · Operator: That Computer Guy 26 / TCG Solutions, 390 S. Jackson Park Drive, Seymour, IN 47274

1. Information We Collect

When you submit an appointment, help request, or review through this site, we collect the information you provide (name, phone, email, description of issue). When you visit any page, our backend may log a visit record containing IP address, user-agent string, and the page identifier. Free tools that run in your browser (password generator, scanner, hash, etc.) process inputs locally and do not transmit them.

2. How We Use It

Submissions are used solely to fulfill the requested service: scheduling, follow-up, invoicing, and customer-record maintenance. Visit logs are reviewed for operational and security purposes (rate-limiting, abuse detection, anonymized traffic patterns). We do not sell or share personal data with third parties for advertising or marketing. We do not use third-party trackers, ad networks, or analytics suites that profile users.

3. Cookies & Local Storage

This site stores limited data in your browser's localStorage to remember theme preference (Crystal / Light), chat history, and one-time notices (cookie acknowledgement, tour status). No third-party cookies are set. The cookie acknowledgement bar appears once and stores only an "accepted" flag.

4. Third-Party Services

The site is hosted on Netlify (CDN, edge) and uses Google Fonts for typography. The AI chat assistant may forward your typed message to a third-party language-model provider over HTTPS for response generation; if the provider is unavailable, a local fallback runs in your browser instead. The home page also pulls public technology headlines from Hacker News and weather from Open-Meteo for display.

5. Data Retention

Service request records and reviews are retained indefinitely as part of our customer-history archive unless you request deletion. Visit logs are retained for up to 90 days. Chat transcript snippets, when stored, are kept for up to 30 days for quality review.

6. Your Rights

You may request a copy of any personal data we hold about you, request correction of inaccurate data, or request deletion. Email gdamick@thatcomputerguy26.com with a brief description of your request. Standard response time is within seven business days.

7. Children

This site is not directed at children under 13. We do not knowingly collect personal information from children. If you believe a child has submitted information, please contact us for removal.

8. Changes

Material changes to this policy will be posted here with an updated effective date. For questions, call 812-414-9097 or email gdamick@thatcomputerguy26.com.

Legal

Terms of Service

Effective: April 2026 · Governing law: State of Indiana

1. Service Scope

That Computer Guy 26 / TCG Solutions / Indiana Businesses Exposed ("we", "the operator") provides IT support, computer repair, custom system builds, network deployment, security assessment, AI integration, custom software, web development, and consumer-transparency research. Primary service area is Seymour, Indiana and the surrounding counties (Jackson, Bartholomew, Scott, Jennings, Brown). Engagements outside the primary area are accepted by arrangement. All on-site work requires a confirmed appointment. The business operates 7 days a week by appointment, with same-day service offered when scheduling permits.

2. Rates & Billing

Standard rates are: $45/hr remote (base), $55/hr in-shop, $75/hr business engagement, $95/hr after-hours emergency. Rates are quoted in U.S. dollars and may be revised; the rate in effect at the time of appointment confirmation applies for that engagement. Diagnostics are no charge. Verified 501(c)(3) nonprofits within the service area receive services at no charge using the published code.

3. Appointments & Cancellation

All appointments are confirmed via phone or email. We require at least 4 hours' notice for cancellation of a remote or in-shop appointment, and 24 hours for an on-site appointment. Same-day no-shows on confirmed on-site appointments may be billed a one-hour minimum at the applicable tier.

4. Authorization & Data Handling

By engaging service, you confirm you are the owner of the equipment or are an authorized agent. We follow standard industry practice for data handling: drives are cloned where feasible before modification, recovered data is delivered on encrypted media, and customer credentials are not stored beyond the scope of the engagement. Sensitive findings (passwords, credentials) discovered during repair are flagged to you for rotation.

5. Warranty & Limitations

Workmanship is warranted for 90 days on labor and 1 year on custom builds. Parts carry their manufacturer's warranty (typically 1-3 years for new components). We are not liable for: pre-existing data loss, software incompatibilities outside the engagement scope, customer modifications after delivery, or third-party service failures (ISP, cloud provider, manufacturer driver releases). Total liability for any single engagement is limited to the fees paid for that engagement.

6. Free Tools & In-Browser Demos

The free tools section (password generators, security scanner, regex tester, formatters, BMV prep, Excel reference, etc.) is provided as-is for educational and informational use. The web security scanner observes only publicly-visible HTTP responses on domains you submit; you are responsible for confirming you have authorization to test any domain you scan. The security lab demonstrations are educational and non-destructive.

7. Intellectual Property

Site content, branding, logos, written copy, and code samples remain the property of That Computer Guy 26 / TCG Solutions. Project portfolio entries reference client work performed under engagement; client trademarks remain the property of their respective owners.

8. Governing Law

These terms are governed by the laws of the State of Indiana. Any dispute arising from a service engagement will be resolved in the courts of Jackson County, Indiana.

9. Contact

For questions about these terms: 812-414-9097 or gdamick@thatcomputerguy26.com.

Technical Knowledge Base · Free · Long-Form

Knowledge Base

Original, long-form technical articles covering the IT topics customers actually need to understand. Written by Gary Amick from lab experience — not scraped, not SEO filler. Click any article to read in full.

Loading articles...

Have a topic you want written up?

Email gdamick@thatcomputerguy26.com or message through the Contact page.

Operational Transparency · Updated Live

Service Status

Honest, public-facing operational metrics for TCG-managed services. Refreshes when you open this page. No color-coded happy theater — if something's degraded, we say so.

Loading status...

Incident History (last 90 days)

No incidents recorded in the last 90 days. Status history is maintained as a public commitment to transparency.

Response-Time Service Level Objectives

ChannelBusiness HoursAfter HoursEmergency
Phone / CallImmediate, voicemail <2 hrsVoicemail <4 hrs<30 min (paid)
Text (SMS)<1 hrNext business day<30 min (paid)
EmailSame business dayNext business dayUse phone/SMS
Appointment Form<4 hrs confirmNext business dayUse phone
Emergency line (24/7)<30 min<30 min<30 min
Contracted Managed-ITPer your SOW — usually 1-hr critical / 4-hr high / next-business-day normal

Infrastructure Uptime Targets

Website
99.9%
Netlify edge + CDN
Appointment API
99.5%
Firebase RTDB
AI Chat Backend
99.0%
Multi-provider failover
Security Scanner
99.0%
Netlify Function

Subscribe to incident notifications by email.

Subscribe
Interactive · Transparent Pricing

Instant Project Estimator

Pick a service category, answer a few scoping questions, and get a realistic estimate in 60 seconds. No email capture, no account. Estimates are ranges — your actual quote after scoping call may be higher or lower but rarely by more than 20%.

How this estimator works

The estimator applies our actual rate sheet ($45/hr remote, $55/hr in-shop, $75/hr business, $95/hr emergency) to typical labor hours for each job type, plus part-cost ranges from recent engagements. It accounts for travel time for on-site work and adds a 15% buffer for unknowns. It does NOT apply nonprofit discounts, contract rates, or promotional codes — those are applied at quote time.

Free · Interactive · Browser-Based

Computer Diagnostic Tool

Answer a few guided questions about what your computer is doing (or not doing) and get a ranked list of likely causes, DIY steps you can try safely, and a clear signal for when to stop and call a pro. Runs entirely in your browser — nothing sent to any server.

⚠️
Important: This tool narrows down likely causes based on symptoms you describe. It is not a replacement for hardware testing. If your device contains irreplaceable data, power it off and call 812-414-9097 before trying anything else — some "fixes" can make data recovery impossible.

Beyond what the tool can diagnose?

Any guided questionnaire has limits. Hardware failures often need a real multimeter, POST code reader, or drive imager. Book a professional diagnosis starting at $45/hr — no diagnostic fee if you decline the repair.

Call 812-414-9097
Live Astronomy · Updated In Real Time

Space Today

Live International Space Station position, upcoming rocket launches worldwide, tonight's moon phase, astronomy events visible from Indiana, solar system status, and this-day-in-space history. Live data from TheSpaceDevs Launch Library and Open Notify.

Loading space data...

Data Sources

Launch data: TheSpaceDevs Launch Library 2 (public API, cached 1 hour). ISS position: Where The ISS At? API (no auth). Moon phase: computed from astronomical formulas (no external call). Astronomy events: curated calendar. This page does not forecast weather visibility — check a local clear-sky chart before observing.
Tech Release Tracker · Curated

New Tech Products Released

Curated list of recent product releases across phones, laptops, AI accelerators, GPUs, CPUs, storage, networking gear, wearables, and peripherals. Filter by category, year, price tier, and highlight. Updated with each site deploy — not a real-time feed.

Loading tech releases...

Need a Build Matching One of These?

We build custom rigs around any CPU, GPU, or platform here. Matching thermal design, PSU sizing, and storage tiering done before any part is ordered.

Origin Story · Why We Exist

Who We Are, What Started Us

Every IT shop has an origin story. Ours starts with one too many people getting quoted $400 to replace a computer that needed a $20 part. The rest followed.

The Short Version

That Computer Guy 26 exists because Seymour, Indiana and the surrounding counties deserved someone who would tell them the truth about their technology. Not upsell them. Not replace a board that needed re-seating. Not recommend a new machine when the old one had five good years left in it.

What started as after-hours help for family and friends became a three-brand operation: That Computer Guy 26 handles hardware and repair, TCG Solutions builds AI automation, websites, and custom software for businesses, and Indiana Businesses Exposed publishes public-records research so local consumers can make informed choices.

2003

The First Fix

Rebuilt a family member's compromised Windows XP box, manually removing a rootkit before the Malwarebytes era. Realized that the combination of patience, curiosity, and a willingness to read actual documentation beats any "expert" shortcut.

Prosser

School of Technology

Computer Programming track at Prosser School of Technology. Learned the fundamentals — systems, networks, logic — from instructors who cared more about why something worked than about which button to click this quarter.

Miller-Motte

Formal Credentials

AS in IT Support, BS in Network Operations & Security from Miller-Motte College. Stacked CompTIA A+, Network+, Security+, Cisco CCNA, and MS Office certifications. CISSP currently in progress.

2020

The Lab

Built the first iteration of the multi-node home lab: a production node, a Kali sandbox for malware analysis, and a dedicated AI inference box running Ollama with local LLMs. Every client issue now gets reproduced in an isolated environment before any repair is attempted.

2023

TCG Solutions

Spun off the software-and-automation work into its own brand. AI workflows, custom web apps, Excel and data training, OSINT pipelines. Same operator, different deliverable.

Today

Three Brands, One Operator

Seven days a week by appointment, same-day when available, covering Jackson and the four adjacent counties. Nonprofits pay nothing (code TCG26FREE). Paying clients get an honest quote, no diagnostic fee, and decline-without-penalty.

What Started Us: The Unspoken Rules

Tell the truth first, sell second. If your problem is a loose cable, the answer is "it's a loose cable" — not a three-hour service ticket. We would rather eat a ten-dollar fix and earn the next hundred calls than bill the ceiling and lose the relationship.
Never pretend to know. If we have not seen it before, we say so, we reproduce it in the lab, and we come back with a documented answer. Making things up costs customers money and costs us trust.
Data first, always. Every repair starts with a drive clone when feasible. GNU ddrescue with read-retry tuning before any write happens. If the drive is failing, we stop and plan before we touch it.
Your machine, your choice. We explain options, we quote all of them, we recommend one, and then we do what you decide. No up-sell pressure, no sunk-cost guilt, no "you really should..."
Leave the environment better. Drive wipes meet DoD standards. Electronics get recycled properly. Nothing TCG touches ends up in a landfill, and nothing leaves with readable customer data on it.

The Three-Shield Mark

The three shields on the logo are not decoration. Each represents one of the operating brands:

Cyan
That Computer Guy 26
Hardware, repair, networks
Gold
TCG Solutions
AI, web, custom software
Purple
Indiana Businesses Exposed
Consumer transparency research

Ready to Work Together?

Whether it is a slow laptop, a business that needs AI automation, or a research project — the door is open.

Call 812-414-9097
TCG AI Assistant
Online · Multi-provider
Hi! I'm the TCG AI assistant. Ask about services, pricing, builds, troubleshooting, or anything tech-related.Local fallback active

Admin Dashboard Home Server: offline

Loading...
Loading...
Loading...
Loading...

Projects

Loading...

TCG News

Loading...
Loading...

Chat Logs

Loading...

Security Scans

Loading...

Home Server Bridge — Indiana Businesses Exposed / IBE

Loading...

Bridge Configuration

IBE mode: fill in the Service Token (issued from /api/admin/service-tokens on your server) and leave Polling-Agent Secret blank. The bridge forwards Authorization: Bearer <token> to your FastAPI backend so IP-allowlist + JWT auth work end-to-end.

Quick Queries (IBE endpoints)

Public
System
Tunnel
Logs & Metrics
Identity
Security
Seymour Command Center
Files

Custom Proxy Call

Queue Command (polling-agent mode)

Server Logs

Loading analytics...

API Keys & Secrets

Diagnostics