Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Digital Textbooks Lighten the Load

Many students dread dealing with textbooks, traditionally one of the major expenses of a college education.  Long lines at the book store, and high prices quickly adding up when a class may require five or six titles have been unfortunate experiences for many.  Luckily, digital textbooks are now a viable option.  With the right computer support, acquiring digital textbooks for all your classes is much easier, and cheaper, than buying traditional books these days.

Read more »


Internet Devices Now Exceed Living Beings

The world has come to a startling realization.  A Cisco employee blogged that there are now more devices connected to the Internet than people on the planet to use them.  Technology’s role in our lives continues to grow, necessitating knowledge on topics from computer support to Internet security.  Humanity reached a strange milestone as our devices exceeded our population for the first time.  Internet security and computer support are larger issues than ever in our machine driven world.

Read more »


RESCUECOM Releases Q1 2011 Computer Reliability Report

The results are in for RESCUECOM’s first Computer Reliability Report of 2011, Lenovo claims the top spot!

SYRACUSE, N.Y., Jun. 6, 2011 — RESCUECOM’s Computer Reliability Report reveals the top five manufacturers with the best overall computer reliability.

“There have been some interesting changes over the last 3 months. We are in a time of rapid technical change and consumers more than ever need to have up-to-date unbiased guidance.” stated David Milman CEO of RESCUECOM.

The Computer Reliability Report gives an unbiased summary of the most reliable personal computer manufacturers. The top five brands with the best overall reliability in Q1 2011 are:

  1. IBM/Lenovo (254)
  2. Asus (242)
  3. Toshiba (164)
  4. Apple (149)
  5. HP/Compaq (122)

Read more »


Don’t Suffer from the Crash: Store Data Online

Don’t Suffer from the Crash: Store Data Online

Crashing computers and multiple devices create difficulties in getting documents on demand. Entire papers can be lost, or the wanted photograph is on another device.  Online data storage offers a solution to the issue. Customers can arrange for a digital file cabinet for data files and avoid lengthy processes to recover or carry wanted items.

More customers use storage websites as more people grow more mobile. The number of available websites to store information also increases with the demand. Some options include: Carbonite.com, Dropbox, and MobileMe. Remember for expert and personal computer support, RESCUECOM offers a Remote Backup solution to protect all files against human or system errors through the device’s Internet connection. RESCUECOM’s trained technicians install the Remote Backup and will help retrieve lost information24 hours a day.

Read more »


Five Simple Steps to Secure Online Shopping

More shoppers buy items online everyday, with entire websites devoted to buying and selling. With the threats of identity theft and viruses, some shoppers still hesitate about making purchases over the internet.

Rescuecom offers five things you can go to protect yourself on and off the computer

  1. Keep the browser and anti-virus software updated. Anti-virus software will keep information stored on personal computers safe from online exposure. When entering purchase information, like credit card numbers, a pause in the processing can endanger the information. The order might be lost, and someone else might get a look at the card number.  An updated browser ensures smooth processing of information on websites, and reduces the risk of private information getting exposed.
  2. Know who you are dealing with. Stick to well-known stores or online marketplaces like Amazon.com. Legitimate businesses will help resolve an error or false charge and can refund the full amount sometimes. Business and marketplace websites also sometimes employ protective software to ensure customer privacy.
  3. Never give out passwords. Private information needs to remain private. The less information available online, the less shoppers need worry about security. Create usernames and passwords with numbers and symbols to make guessing harder.
  4. Use one card for transactions. Use only one credit card for online transactions. Shopping records are easier to follow and confirm on one card. Credit cards have to comply with Fair Credit Billing Act, so after reporting the theft of a card or a card number, the owner is only responsible for a small amount of the purchases. Each credit card company has the amount listed in the contract. More than one credit card used online not only increases the chance of stealing the numbers, card owners are also responsible for different amounts on each card. Using a check or bank card gives access to the entire account.
  5. Record it. Keep detailed records of online spending by choosing to print the receipt copies. Check card bills every month and be sure that all transactions appear on both the bill and the receipts. Report any items that do not match the receipts to the credit card company and the online store immediately.

Shoppers can easily protect personal computers, identities, and personal bank accounts. Rescuecom’s five steps let customer shop online securely.

Next Windows Almost Ready

Personal technology goes far beyond just a home computer. So, Microsoft designed an operating system modified to perform on many different personal devices. Windows 8, due to release next year, adapts to each product that runs it.

Rescuecom has five things customers need to know about the upcoming operating system.

The classic design remains.  The classic Windows operations still exits for anyone who needs it. The basic programs like Word and Excel present similarly to Windows 7. Private individuals and businesses that make and store crucial documents in these files can still create and save work the same as before without needing to learn a new format.

New applications appear. The tile interface, a set of mosaic-like boxes showing different applications, lets customers find needed items quickly and choose which tiles appear instantly. The tiles are large enough to reduce mistakes in opening tiles on touch screen products and new information is clearly visible. Tablet and smartphone users can find favorite websites, while computer users shorten searches for files.

Customizable adjustments are possible. Microsoft designed the Windows 8 system to allow individual customization. Users who need certain pieces of information regularly choose which applications appear on the home screen. The constant connection to a favorite news website appears above the file for last summer’s vacation pictures as soon as the device turns on, and either one opens at one touch.

Fewer resources are needed. The Windows 8 operating system’s memory design lets the programs work more efficiently. The ability to multi-task and run several programs at once increases, letting customers do more. Downloads and updates will not cause other programs to run more slowly.

Microsoft is ready for the future. The new focus on compatibility helps the system get ready for future technology. Microsoft’s design includes many facets of smartphones, tablets and netbooks, integrating needs for a variety of devices. Windows 8 adapts to products already, and will adapt to new products. Customers will not need to learn new systems as products appear.

Windows 8 mixes what customers like about the operating system with the needs of new applications and devices. Customers will choose how the system works, instead of the system controlling how the customer works.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Apple Gives Up Adobe Flash War: Both Companies Win!

The digital video making and viewing community came together a little more, recently.  Apple lifted the ban on Adobe Flash Player appearing in iPhone or iPad, ending online compatibility issues.

Last year, Apple refused to work with Flash, the most popular additional program for creating and viewing multi-media websites. The media creation and viewing program’s use restricted costumers to certain devices. Adobe blocked access to Flash from Apple devices. Apple’s continually expanding mobile devices struggled to view images and videos supported by the additional program.

Read more »


“Save the regret. Separate your e-mail accounts.”

Over the weekend, Epsilon notified millions of customers that the company had experienced a break-in and email addresses were stolen.  One consequence is that now it’s open season for phishing!  Now, instead of using bait to “catch” personal information, a more direct line of attack against your private information exists. 

You can avoid having your sensitive material, including your email address, exposed in this or some similar way.  Josh Kaplan, President of RESCUECOM, strongly recommends that you take immediate action to set up a separate e-mail address for all online transactions – and ONLY use this address for online transactions.  You should be aware that it is not safe to give your personal e-mail address used by your friends and family to any company. 

Even “reputable” companies with whom you may have been doing business for years should not be given your personal email address.  Companies regularly outsource their e-mail communication.  For example, companies such as Marriott, JPMorgan Chase, Walgreens, Capital One, and others contracted with Epsilon to manage their email information and send out e-mail blasts to customers.  Rather than directly overseeing the security of this information base, a third party is involved, thereby increasing the chances of compromised data.

Unfortunately, for many people, such as those affected by the recent data breaches at Epsilon, this warning may come too late.  Be sure that you set up a separate email address for those online business transactions today.  Consider setting up a new personal address as well if your existing address has already been compromised.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


What the End of Windows XP Means for You

On October 22, 2010, Microsoft will end pre installed sales of Windows XP.  Rescuecom’s computer repair experts reveal what the end of Windows XP means for you.

After the 22nd, users will not be able to purchase a new computer running XP, and retailers are not allowed to sell the boxed version of the OS any longer.   “This is effectively the end of windows XP as a product,” says Rescuecom CEO David Milman.

However, computers that come with Windows 7 Professional or Ultimate preinstalled will maintain the ability to downgrade to Windows XP professional throughout the Windows 7 lifecycle.   “Microsoft,” says Milman “is targeting its enterprise customers, as many of them requested additional time before making the move to Windows 7.” Read more »


RESCUECOM Warns of Stuxnet Dangers

SYRACUSE, N.Y., October 8, 2010 – Stuxnet, the most sophisticated piece of malware ever, highlights the dangers of malware.  Stuxnet’s method of infection and the likelihood of imitation put everyone’s Internet security at risk. RESCUECOM’s computer support experts explain what you need to know about Stuxnet, Internet security, and protecting yourself.

Most malware targets an individual’s Internet security, but Stuxnet worked on a much larger scale.  Stuxnet targeted industrial computers, intent on compromising their Internet security and taking control of them.  “It’s larger and more sophisticated than most other pieces of malware,” says RESCUECOM CEO David Milman.  Read more »


Be Proactive When it Comes to Computer Repair and Tech Support

Many of us are still passive technology users.  Concepts such as computer repair and tech support aren’t even considerations until an actual crisis arises.

Technology used to be so complicated that only experts would use it on a regular basis.  However, easy to use devices such as smartphones, mp3 players, and tablet computers allow anyone to be a regular tech user.  You no longer need to be a computer repair specialist or work in tech support to be able to operate these sorts of devices.

However, many of us rely on our tech, but never understand it.  Because we don’t understand all the ins and outs of the devices we’re using, we often panic when trouble hits.  That panic can often make a computer repair problem instantly worse.  Read more »


121-130 of 1857
© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending