We don't just fix technology problems, we SOLVE them.

Our mission is providing certified IT support, network engineering and cloud computing in Berks County, PA and beyond. We serve the residential, commercial and industrial sectors.

Learn more »

Readers Choice 2016 Reading Eagle

Who is PC Ninja?

PC Ninja is an affordable computer service provider for home users and small businesses. Located in Wyomissing, we currently serve the Berks County, PA area.

Learn More ▶

What We Do

We live and breathe computers! We can help you with everything computer-related... setups, repairs, networking, custom computers, and more. Bring your computer to our shop, or let us come to you.

Learn More ▶

Can we help you?

Sure thing! If you have a sick or broken computer, need advice, need parts, are totally lost, need setups and networking, or would like a custom computer... give us a call!

Our guarantee

We trust that you'll be happy with our service. We have a 100% satisfaction guarantee.

Latest News & Articles

Tune-up Software: Not the Answer for Slow Computers

Tune-Up Software Slow Loading Turtle

Are you tired of your sluggish computer? Have you been looking for ways to speed it up? If you think a tune-up software will help, that’s not the best solution. There’s no legitimate tune-up software on the market with proven results of better system performance. However, there are many PUPs available, potentially unwanted programs, which, […]

Windows Expiry Phone Scam: Just Hang Up

Windows Expiry Phone Scam Alert

We’ve written about phone scams in a previous blog, but we wanted to alert to you of a call making its rounds now. The other day at the office we received an automated phone call that said, “Your Windows license is about to expire.” Ironic, isn’t it, that a computer services shop is receiving external […]

Phishing Scams: Don’t Get “Reeled” In!

Phishing Security Alert

Gone phishing? This isn’t a good thing. Phishing is the work of scammers who try to “reel in” private or secure information, such as email address, passwords, contact lists, and credit card details. It begins with an email, which may or may not look suspicious. It could look like it’s from someone in your contact […]