Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

The Chill Pak!

What do wild conspiracy theories and overheating laptop computers have in common?  Dean Haglund worked on both!  Dean Haglund is an actor and artist who portrayed Langley on The X-Files and its unfortunately too-short-lived spin-off The Lone Gunmen.  As Langley on the two shows, Haglund delighted geeks of all ages with the idea that bizarre theories could be reasonably pitched to otherwise professional people and that you can grow up, but you do not have to cut your hair.

Haglund is less commonly known for inventing the Chill Pak.  Almost a decade ago, Dean Haglund invented the Chill Pak and it remains a cool product (pun intended) to this day.  Like many laptop computer users, Dean Haglund spent a great deal of time on his laptop computer.  As a result, he would notice that his laptop computer’s fan would run excessively and that his computer would become physically hot to touch.  After correctly observing that the warmer his laptop computer became, the slower it ran, Haglund set to work solving the problem.

The Chill Pak was Haglund’s solution to laptop computer overheating and it is a surprisingly elegant one.  The Chill Pak is a patented mat for under your computer.  The Chill Pak comes as a mat filled with gel and when you first receive it, you need to place it in your freezer.  After about twelve hours of freezing, the Chill Pak works like an ice pack for your laptop computer.  Placed underneath your laptop computer, the Chill Pak significantly cools down your laptop computer’s internal components.  The result is that your laptop computer’s fan will not engage, so your laptop runs quieter as well as faster.  The Chill Pak operates for four hours at normal room temperature before the gel fully liquefies and needs to be refrozen.

But what about moisture in the air condensing on the Chill Pak as it heat up?  Dean Haglund thought of that!  The Chill Pak is made of a special fabric designed to absorb and wick away moisture.  As a result, the Chill Pak cools down your computer without getting it wet and necessitating laptop computer repairs!

There are a lot of solutions on the market now for cooling down your laptop computer, which was not true when Haglund invented the Chill Pak.  External laptop fans are noisy and use up a USB port on your laptop computer.  Similar crystal/gel mats do not keep laptop computers as cool for nearly as long as the Chill Pak.

Dean Haglund brought one of the first, most effective, laptop computer cooling devices to market with the Chill Pak.  The fact that it is still a relevant, functional product almost a decade since it was first released makes the Chill Pak very cool.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Apple And BMW Are The Only Recognizable Mission Impossible: Ghost Protocol Supporters.

As anyone who has gone to the movies lately knows, product placement within movies has exploded in the last few years.  It is little surprise, then, that the forthcoming blockbuster Mission Impossible: Ghost Protocol utilizes product placement in its advertising.  What is most striking in the trailers for Mission Impossible: Ghost Protocol, however, is how few of the products are actually identifiable.

Both of the major trailers feature a device that looks like an iPod Touch.  However, the Apple logo is not visible and for those who look closely at such things, the controls are different.  Is Apple hoping the iPod Touch is such an instantly recognizable item in the public mind that viewers will not notice when the device on screen is not actually an iPod Touch?  Or is one of Apple’s competitors making one of the least successful product-placement bids of all time?

From the trailers, though, there are two very cool products that are clearly identifiable: the MacBook Air and the BMW i8 Concept car.

In the latest trailer, a thin, Mac laptop may be seen for several seconds.  When Ethan Hunt needs computer support he just calls Simon Pegg as Benji Dunn who delivers it on the MacBook Air.  Those who want to emulate the Impossible Missions team, though, may have to wait; the Apple website does not have the MacBook Air available in black, as it appears in the trailer.

BMW is investing big with its use of the BMW i8.  The vehicle with the distinct doors that rotate up appears prominently in the new trailer, which makes it easy to mistake it for a car commercial when flipping channels.  Mission: Impossible fans will not be able to purchase this hybrid concept car until 2014.  At that time, Mission: Impossible fans with an extra $175,000 (rumored) to spend will be able to drive like Ethan Hunt.  The rest of us will just have to gawk at it in the movie.

Ironically, the most-featured device is a giant touchscreen computer that appears in all of the trailers.  The display with distinctive handles and controls does not feature any brand names or logos and looks like a massive tablet computer.  The device is featured prominently in the advertising campaign for Mission Impossible: Ghost Protocol, but what company is promoting it remains a mystery.

One might expect Ethan Hunt to have tech gear that is custom made for him, but reason takes a back seat to commercialism for some of Mission Impossible: Ghost Protocol.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


ACER H233H Monitor

Recently we recommended looking for an Energy Star compliant computer monitor when replacing your current monitor.  Now, we would like to highlight one of the best Energy Star compliant computer monitors.  The ACER H233H 23” Monitor is all the monitor you will need and it can save you money on electric bills when compared to older monitors as well as many of its contemporary 23” peers.

The ACER H233H 23” Monitor measures 21.7” by 16.1” with a depth of 6.8”, so it has a sizable, but narrow, footprint on your desk.  Fortunately, the wide, thin desktop monitor has a little heft to it; at 10.8 pounds, it remains stable on the desktop.  The ACER H233H 23” Monitor has a stylish black frame that looks very modern.

The ACER H233H is a widescreen 23” monitor that supports 16.7 million colors with a maximum resolution of 1920 x 1080.  At that resolution for that color depth, colors stay vibrant and distinct and the extremes – black and white – feature increased contrast for the optimal video experience.  Best of all, the ACER H233H 23” Monitor connects to HDMI and DVI-D sources as well as traditional VGA computer outputs.  With so many options, the ACER H233H 23” Monitor may replace your television as your monitor for your Playstation 3 or other HD gaming console.

The ACER H233H 23” Monitor includes all of the cables needed to connect the monitor to a PC, which is a rarity in today’s market.  The connectors included include the audio hook-up so the ACER H233H 23” Monitor may project your computer’s audio right from the built-in speakers.  The speakers on the ACER H233H 23” Monitor are 1.5 Watt stereo speakers which deliver a powerful wave of sound if you are sitting an average distance away.  The ACER H233H 23” Monitor may discourage you from leaning close with its booming sound system.

Power consumption is exceptionally important these days, especially with electricity prices constantly going up.  The ACER H233H 23” Monitor is Energy Star compliant and when in use, it draws an average of 38.6 Watts.  The 38.6 Watt rating is dramatically less than the 55 Watts the Asus VH236H, which is also a 23” widescreen monitor.

At an average online price of $220, the ACER H233H 23” Monitor is an affordable Energy Star compliant monitor that is made with the legendary ACER durability.  Especially for those replacing an older monitor, those who have not seen just how chic and powerful the new flat screen, widescreen monitors can be, the ACER H233H Monitor delivers more than the average user will need.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Energy Star Compliant Monitors: What Does The Star Mean To You?

When you are in the market for a new computer monitor, you should consider one that is Energy Star compliant.

The Energy Star rating is a certification defined by the United States Environmental Protection Agency and the Department Of Energy, not computer support services, computer repair shops or computer manufacturers.  As it becomes more chic to be environment-conscious, computer manufacturers are chasing the Energy Star rating, just as consumers look for the rating when purchasing a new monitor.

What does the Energy Star rating on computer displays actually mean, though?  At this point, most computer monitors are plug-and-play, so there is no additional computer support required to install or run an Energy Star compliant monitor.  In order to get the Energy Star certification, a display must only use one Watt while off and two Watts while in a sleep mode.  The power consumption guide for Energy Star certification varies with the size of the monitor display, but in order to get the certification, a monitor must use about 20% less power than the non-compliant monitors.

What many consumers are unaware of when they purchase an Energy Star compliant monitor is that some require the computer to be set to make use of the energy-saving benefits of the display.  You may avoid a call for computer support simply by checking that the display’s Energy Star benefits are activated.  With a properly configured monitor, the display will conform to Energy Star qualifications with no need for ongoing computer support or maintenance.

The need for computer repair or monitor repair is much less likely when consumers purchase and properly use an Energy Star certified monitor.  By running the display with the Energy Star configuration active, the monitor runs cooler and last longer, especially when the monitor is turned off.

In addition to lowering computer repair bills and avoiding computer support calls for monitor-related problems, using an Energy Star compliant monitor properly lowers the electric bill.  Consumers who use multiple computers with Energy Star compliant monitors will likely see a noticeable drop in electric bills, as 20% off one of the larger power draws adds up!

Shopping for monitors with the Energy Star certification benefits the environment, saves you money on monitor power usage, prevents embarrassing computer support calls and costly computer repair bills, making it a smart investment for all computer users.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Iomega eGo Mac Edition

Protecting files and having adequate data recovery resources available is essential today.  This is one reason why Iomega’s eGo Mac Edition portable hard drive is a vital tool for Mac users.  The Iomega eGo Mac Edition portable hard drive features the sleek look Mac users have come to expect from Apple computer products.  Iomega’s vital hard drive will not clash with the style Apple pioneered.

More than flash, what the Iomega eGo Mac Edition portable hard drive has is function.  The Iomega eGo Mac Edition portable hard drive connects to a Mac computer through the USB 2.0 port or the Mac FireWire 800 ports.  The Iomega eGo Mac Edition portable hard drive makes great use of the FireWire 800 ports as they allow the hard drive to back-up data almost twice as fast as through the USB port.  Using the Mac computer’s FireWire 800 technology, the Iomega eGo Mac Edition portable hard drive backs up a Mac’s hard drive at a rate of 800 Mbits per second.  The USB is not slouching at 480 Mbits per second.  Either way, a 500 GB hard drive may be copied to the Iomega eGo Mac Edition portable hard drive in less than five hours.

Because this eGo is for Mac computers, the Iomega eGo Mac Edition portable hard drive instantly interacts with a Mac through the Time Machine program.  Iomega generously includes all of the needed cables, which makes the Iomega eGo Mac Edition portable hard drive useable right out of the box.

With portability being an essential function of the Iomega eGo Mac Edition portable hard drive, it is worth noting that the portable hard drive is barely over half a pound and only 5.3” long by 3.53” wide by .76” deep, so it travels as easily as a mobile phone does!  The Iomega eGo Mac Edition portable hard drive protects the data it is storing through the Iomega Drop Guard Case.  So long as one does not drop the Iomega eGo Mac Edition portable hard drive from a height greater than seven feet, this portable hard drive keeps data secure enough to leave the user feeling fully confident.

The benefits of the Iomega eGo Mac Edition portable hard drive cannot be understated.  Data may be stored off-site for secure data storage, preventing the need for other tools unless actual computer repair is required. With the security and durability of the Iomega eGo Mac Edition portable hard drive, Mac users have found their essential Mac accessory.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Make Your Computer Fast Again!

One of the most common problems computer repair companies encounter is with customers who have slow running computers.  A slow running computer can require computer support, but the need for computer repair may be prevented through some simple general maintenance.  General maintenance is limited to actions on the computer that a novice with a limited understanding of how computers work may accomplish without harming the computer.

Slow running computers are computers that lag during functions that had once been mundane.  These are not problems that require computer repair, just vigilance in general maintenance.  Most computer users are unaware that the tools needed to solve slow running computer issues are on their computer already.  Computers run slow because they lose space on the hard drive due to information and programs, some of which run independent of the user, like malware and viruses.

But not all slow running computers require significant computer repair or computer support.  Instead, users may easily eliminate many of the problem files through tools available on their desktop.  The easiest way to stop a slow running computer from developing problems that require computer repair or additional computer support from professionals is to run a Disk Cleanup.  In the Windows Accessories tools, there is a Disk Cleanup option.  By cleaning out temporary Internet files, the recycle bin and Downloaded Program Files, even a computer that has only been in use for three days may free up 2 GB of space!

Many computer repair experts recommend removing unwanted applications as well.  Without additional computer support, you may simply remove unwanted or unused programs through the “Add Or Remove Programs” function on the Start menu of Windows computers.  This is an easy process, but computer repair professionals will recommend that you do a full back up before making changes to programs, just in case you accidentally remove a program that you actually need.  After you remove programs you no longer use and find your system working faster, you may want to make a backup of the cleaner version of your hard drive.

The other general maintenance procedure that requires no additional computer support or aid from a computer repair service would be running a Defrag of your registry. After backing up the registry, use the Advanced Registry Optimizer to eliminate files, programs and applications that your computer no longer uses and should not look for.

Finally, you may prevent a call to a computer repair service simply by installing and regularly using an antivirus program.  With several antivirus programs on the market, there are many options that novices may load without requiring additional computer support from professionals.  Eliminating viruses, spyware and malware is a great way to get a slow running computer back up to speed.

If you are a novice, you need not become an expert in computer repair to keep your computer running fast.  Without additional computer support, you have the tools to protect your computer!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The Key To Surviving Hard Drive Crashes: Back It Up!

To prevent the inevitable computer repair that a hard drive failure demands, it is essential to develop a regular, orderly method of backing up your hard drive data.  There are many services that offer data recovery once a hard drive or data storage device fails, but prevention is the best method for keeping data safe and secure.

Hard drives, like cars, light bulbs and textbooks, are designed to fail and be replaced.  The industry of data recovery, data storage, and computer repair exists because of the planned obsolescence of the hard drive and other components.  Despite leaps forward in recent years in devices for data recovery and storage, the magnetic medium of the hard drive remains the standard in computers.  With data recovery a problem for most computer operators and computer repair coming most often as a sudden, unbudgeted expense, prevention is the best way to survive the loss of your data from hard drive failure.

Read more »


Mobile Devices: Be SMART!

Everywhere you look these days there are people doing all sorts of cool things with their smartphones.  In fact, the one thing you see them doing least is actually talking on them.  They are availing themselves of the crazy number and types of apps available to them right there in the palm of their hand.  How many of those users do you suppose are worried about who has access to their personal information?  Not just the information they are exchanging with a friend at that moment, but ALL of the information their smartphone (aka Mobile Computer Device) to which their network service is connecting them?

Of course most business users are well aware of the risks associated with using mobile devices and have acted appropriately with their network services to assure that they are adequately protected.  The everyday user may not even know enough to worry about this.  Everyone who uses a smartphone requires a connection to a network service.  There are a number of ways that providers accomplish this connection to a network service, not all of which represent secure computer service.  Then there are all those apps users download, some of which are extremely cool.  Are those apps from a secure network service?  Is any information you share while using those apps protected by secure computer services?

As we all know, providers of apps and services often do not have the consumers’ best interests at heart, in fact, many prefer that we not use secure computer services.  The truth is that a virus or thief has victimized pretty much anyone who has been using a computer in any form for any length of time.  A network service who intends to stay in business over the long run will probably be a secure computer service, but a look into their records and comments from users is still a good idea.  Still, the user should not become so paranoid about suspicious providers and network services that they stop using their smartphones entirely.

Awareness is the key here.  If you are in doubt about the integrity of a particular app, do not download it until you can check it out through a reputable network service.  If you are not sure what kind of personal information your provider is sharing with whom, contact them directly and ask.  It is best to use secure computer service, especially as the use of mobile devices increases at such a rapid pace.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Illegal Download Site Targeted by Hackers

Threats to Internet security continue appearing in the form of cybercriminals seeking profits from the ignorance of users.  Downloading files from the web, though we do it all the time, involves the risk of infecting your computer with a virus.  A clever hacker may exploit even excellent Internet security.  This necessitates virus removal to clean your system.  Average users suffer through Internet security problems regularly.  Over the past year, the Internet security systems of a number of high profile targets, including American defense contractors, Sony, Google, and many others, fell victim to cyber attacks.  A very recent example is that cybercriminals compromised the internet security of the file-sharing giant BitTorrent.

Widely known as one of the world’s largest illegal file-sharing sites, BitTorrent also hosts a large number of legal downloads.  This time BitTorrent was the victim of illegal activity.  Hackers broke through the site’s Internet security, injecting a type of malicious software known as “scareware” into the download software that powers file transfers.  Virus removal of scareware is potentially difficult, depending on the user’s level of expertise.  The internet security implications of such an intrusion are that they can render the files of a familiar website vulnerable to a hacker’s program access to information which unsuspecting users consider safe.  This requires immediate virus removal action.

The intrusion reportedly occurred at 4:20 am Pacific Standard Time on September 13, 2011 as BitTorrent and uTorrent.com services became compromised.  The company reported this intrusion itself later that day on the company’s blog.  The false download files were only in place for two hours before BitTorrent employees took servers offline and corrected their Internet security flaws.  Virus removal is necessary for anyone who accidently downloaded the fake files.  The scareware installed on users’ systems is a fake anti-virus program called Security Shield.  Infected systems see a notification pop up informing users that their computer is infected with a virus.  It offers virus removal if the program is paid for by credit card.

Users suffering from this malicious software should attempt to utilize their virus removal programs to restore Internet security.  If you are unable to remove the program, consider contacting your proven reliable computer support company.  Their knowledge and expertise could save a lot of time and headaches.  Downloading anything from the web tests your Internet security.  Always keep anti-virus and virus removal software up to date to protect your system from harmful software.  The thieves and bandits are out there, and we have to be careful.  However, we can handle a virus intrusion in a timely manner with experts trained  in quick restoration of internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Unfriendly Clouds

Cloud computing is a major source of excitement in the world of cyberspace these days.  Microsoft’s “to the cloud” commercials may or may not depict any sort of potential reality, but they have certainly planted the idea firmly in the American consciousness.  Does the cloud mean an end to computer support needs and data recovery issues?  Some can see a digital paradise of hidden hardware and ease of access.  Is this the reality of the situation?  The answer lies somewhere in a combination of factors.

Many see the cloud as an opportunity to reduce overhead, material costs and make computer support and data recovery easier with the reduction of the physical clutter of personal computer networks.  The simplicity of data backup with the cloud also allows businesses to feel protected against hardware failures and problems during data recovery.  While all of these improvements are possible by moving data processes to the cloud, potential pitfalls do exist.  If removing local infrastructure for cloud services is your chosen course, be sure to consult a computer support expert and learn about potential problems before they happen.

Data transported to the cloud is essentially out of your control.  Uploading and removing information is possible, but someone else owns the data centers housing the information.  Computer support issues are still possible as servers may be configured incorrectly.  Hackers targeting the center storing your data may steal or corrupt files.  The hardware storing data still exists; it just exists elsewhere.  Problems related to hardware still arise, causing unforeseen failures, data recovery disasters, and the potential loss of essential information.  Data recovery may or may not be possible depending on the problem.

Internet security is a major issue for many businesses as they contemplate a move to the cloud.  Outside ownership means that computer support may be out of your control once a cloud service is chosen.  You are casting your lot with the service provider’s computer support personnel.  The importance of the information stored in the cloud dictates the level of risk.  The more essential your data recovery needs are, the more concerned you should be.  Depending on the nature of the data stored, theft or loss could lead to legal repercussions.  Consulting trusted computer support experts about the positives, risks, and options before reaching a decision is more than a good idea.

In a computerized world, the risk of hardware failure and the need for data recovery by skilled computer support will never completely disappear.  Machines fail no matter where they are.  Human beings make errors and cybercriminals are not stopping their activities.  If moving processes and data to the cloud is the right option for you or your business, be sure you are prepared.  Preparing for the unknown with the help of local computer support can help make problems, such as data recovery, less of a worry for you and your clients.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending