Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Laptop and Smartphone Thieves, Beware!

PREY is a free open-source program that’s a great way to track lost or stolen laptops and smartphones. PREY is quite brilliant. PREY anti-theft software lets owners play private investigator for free. The software helps users keep track of their phones or laptops and can help users find their devices if they are ever stolen.

The software, described as silent but deadly by its creators, works by remaining dormant on its host device until it is activated by a signal. Disgruntled victims of thefts can activate PREY on a lost laptop by logging into the connected PREY account online. Those who want to track their lost smartphones can do so by sending a text message to the phone to activate its resident PREY. The standard activation message is “GO PREY,” though this can be customized.

According to PREY’s website, once the software is activated, it allows users to gather information about their lost or stolen devices’ location, hardware and network status. Users can also trigger specific actions on the device. Outlook or Thunderbird data on a missing laptop can be remotely hidden. Users who use PREY to track a stolen laptop, for example, can remotely activate the missing device’s webcam and use it to take pictures of the culprit. A user can also see how his or her stolen device is being used, and look at the screen. Ideally, a PREY user would get a glance of the thief logging into a facebook page or email account to get his or her information.

PREY is designed to automatically connect to the Internet to allow its host device to be tracked. When no Internet network service is available, the software tries to connect to the nearest Wi-Fi hotspot. PREY takes advantage of its smartphone’s GPS to send information about the device’s location. In laptops, the software uses the nearest Wi-Fi hotspot to triangulate and narrow in on its location according to preyproject.com.

As a free, open-source software, PREY is quite remarkable. For one thing, it works everywhere! There are no geographical limitations on where it can work. Right now though, PREY is only compatible with Android phones and does not work with iPads or iPhones. However, its developers say they’re working on these compatibility issues.

PREY is not a foolproof method of catching thieves and restoring stolen devices, though. The developers recommend contacting the police as the final step in the recovery process.

Finally, users who are concerned about privacy can rest assured because PREY is not a malware, and it does not behave like one. PREY’s website explains that unless the software is activated, it remains dormant with no activity. The developer states that PREY does not collect any private information about its users, nor does it store the information that passes through its servers, so the software doesn’t pose a threat to its users’ Internet security. Now, if only the facebook people would learn to be this nice.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Buying Music Can Save Money

It can be tempting to “share” songs via software like Kazaa or LimeWire rather than buying them. Such practices are not only illegal most of the time, but pose a serious threat to your Internet security. Downloading files using P2P (Peer-to-Peer) sharing software is one of the worst Internet security practices that users can employ. By downloading music or other files using such software, you could be inviting a conglomeration of malware to infest your computer. Even a small breach of your Internet security can cause you to spend lots of money on virus removal and, in some cases, identity theft problems.

Though LimeWire is no longer available for download due to legal reasons, users with older versions of the software on their machines can still use it, and can therefore still endanger their Internet security. Even when users don’t use LimeWire to share files, their Internet security is susceptible because the program automatically runs in the background, allowing strangers access to a user’s files!

When you opt to participate in P2P sharing, you can’t normally control what files you share. This lack of control can lead to your participating in copyright infringement, having your device infected with malware, and consequently requiring virus removal.

Perhaps the worst part of getting viruses from P2P sharing software is that we willingly invite them in. It’s like volunteering to spend time and money on virus removal. Sometimes, Internet security problems are hard to identify, but when threats are this obvious, there’s no excuse to fall for them.

If you’re looking for free music, YouTube is a great alternative. Watching music videos on YouTube poses far fewer threats to your Internet security, as viruses cannot usually target media files. Internet security problems that occur while on YouTube might be related to bugs in Adobe Flash player, but these are rare. Besides, Flash is constantly updated to eliminate bugs and ensure Internet security.

On the other hand, if you’re feeling overtly philanthropic and want to support the music industry by more than just illegally downloading songs, then consider buying the music! Amazon and Apple both sell music by the song, as do dozens of other sites. The great news is, music services like these are legal and don’t come with the added expense of virus removal.

Given the time and effort needed for virus removal, it is always better to make sure you have strong Internet security and to avoid using software like Limewire and Kazaa. After all, paying for a song or three is a lot cheaper than paying for virus removal.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Sorry DVDs, Streaming is the Future

Netflix is undergoing some major changes. Along with losing over one million customers, the company is hiking prices and setting a plan in motion that will soon kill off its DVD mailing services. The millions of customers who joined Netflix for the DVD service and the millions who still primarily rely on mailed DVDs for their entertainment intake may have to start adjusting their home network services soon. The push towards online streaming will bring with it new tech support issues. It will also force many customers to upgrade their home networks to meet the demands of online streaming.

The harbinger of phasing out the DVD mailing service came early this year when Netflix announced that customers would no longer have the “Add to DVD Queue” option from streaming devices. Netflix cited a vague tech support related issue to justify the change. Still, customers didn’t buy the tech support reasoning. It was clear that Netflix was trying to start limiting customer interaction with DVD selection.

Then, last summer, the company announced a price hike that outraged subscribers and everyone else alike! Again, Netflix cited tech support issues and a desire to focus on its online streaming services as justification. Many customers were then forced to choose only one of the two services to avoid paying more.

For many, the choice continues to be difficult because online streaming can take a toll on home networks. Many home network services set limits on the amount of data usage, becoming slower when such limits are reached. Alternatively, some home networks simply do not offer enough connection speed to stream movies at high quality. Sometimes users have the option of upgrading their home networks by paying more or changing their home network service provider, but who wants to have to pay more just to accommodate Netflix? Yet according to SplatF.com, Netflix realizes that these are short-term tech support issues that will disappear with time. Home networks are on their way to becoming incredibly powerful, and when that happens, speed related tech support will become obsolete—for a few years at least.

Netflix’s DVD service requires less tech support than the streaming one. Perhaps the most common tech support problem that comes up with the DVD service is a scratched disc, and the solution to that is imply getting a different disc. However, given the long-term advantages of only providing a streaming service, it looks like Netflix is willing to deal with some temporary transitional tech support issues.

Netflix keeps citing tech support issues and practicality behind its (now defunct) plan to split its streaming and DVD mailing services, limiting customer access to DVD queues to the computer interface, and its price hikes, but customers aren’t buying it. It seems that the days when the public bent over backwards to accommodate capitalist growth are dying out. People realize that Netflix changes have nothing or little to do with tech support, and plenty to do with profit, and many of them are taking their business elsewhere.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


There’s a New Tablet in Town

The computer tablet market is about to be shaken-up. Amazon’s Kindle Fire is almost here, and the tablet is already causing a stir. Analysts and bloggers agree that the advent of the Kindle Fire will usher in an era of real tablet competition. Several of the Kindle Fire’s features suggest that it is going to give apple’s iPad a run for its money. On the other hand, despite its great price of $199 (which International Business Times believes is a net loss for Amazon), the tablet has a few tech support and Internet security issues that are worth considering.

First of all, the Kindle Fire has several intriguing qualities like stereo speakers and 169 pixels per inch resolution, but these relatively high-tech features may require extra tech support down the road.

The Kindle’s Silk web browser is another interesting feature of the tablet, but according to ZDNet, the software has serious Internet security problems. The browser will make surfing the Internet super fast, but at a cost to Internet security and user privacy. To increase the browsing speed, the Silk browser depends on the Amazon Elastic Compute Cloud (EC2) to act as a Web proxy. As web browsing becomes delocalized with data passing through a third party (the Amazon cloud), Internet security threats are bound to increase. Users who use this feature may witness an increase in their need for tech support.

The good news is that users can enhance the tablet’s Internet security by turning off the Silk’s cloud-enhanced mode. Using the Silk in offline mode prevents data from passing through Amazon’s cloud, improving Internet security but also slowing down the browsing experience.

The Kindle’s traditional function as an e-book reader has been significantly revamped with this new model. Users will be able to use this tablet to watch rich color movies and television shows, listen to music, read magazines, browse the web, play games, and of course, read books. There are a few advantages to using the Kindle Fire to do all this rather than, say, an iPad. For example, Amazon’s tablet is almost a third of the price of an iPad2. Also, the Kindle Fire offers paid access to millions of books, millions of songs, and over 100,000 television shows and films.

According to PCWorld, Android-based apps and their related tech support for Amazon’s Kindle are limited. Since the Kindle Fire runs on a system similar to Google’s Android, future changes to the OS may create significant tech support issues for the Kindle Fire.

If Amazon’s tech support for the Kindle is anything like its customer care, then you can plan on finding quality tech support to help deal with the Internet security and other problems that require tech support. Still, the longer you wait before buying the product, the more you can count on tried and tested tech support and maybe even better Internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Is your Password Guessable?

Using the same password for most or all online activities may be convenient, but it is a dangerous Internet security practice that we should all avoid. Sure, recycling passwords makes remembering them easier, but it also makes it easier for cybercriminals to steal that information. Even when you’re using a trusted network service like your home network, having weak or recurring passwords is an unnecessary threat to your Internet security.

Along with monitoring how you use public network services and keeping your anti-virus updated, consider using a different and difficult password for each of your accounts. Varying your passwords is an easy way to increase the level of your Internet security. When cybercriminals learn one of your passwords, they may try to use it to gain access to your other accounts. Using significantly different passwords can drastically limit the damage to your overall Internet security.

To check the strength of a password (or even just for fun), consider searching for a list of the worst passwords and making sure yours isn’t on it! One online list includes the 500 worst passwords of all time, and among these are: 123456, password, eric, gandalf, rainbow, barney, and butter!

Even when passwords are not as ridiculous as these (barney?), Microsoft’s Safety and Security Center suggests changing them periodically. When coming up with passwords, keep in mind that you may have to enter them while using public network services where Internet security is not very high. The Security Skeptic also offers some easy ways to create better passwords to improve your Internet security.

To test a password’s Internet security level use an online service, and keep these tips in mind:

  • Avoid common words
  • Don’t use personal information such as a telephone number, address or birthday
  • Use at least eight characters, the more the merrier
  • Combine upper and lowercase characters
  • Include numbers and symbols (%4#3*1)
  • Start with a sentence and change it around (Somewhere over the rainbow/ SomeWhereOverDaR@inbow22)

If you’re worried about forgetting a password, write it down! Storing your passwords on paper isn’t necessarily a threat to your Internet security. Cybercriminals will try to target your information through your online network, not your desk. Still, keep your password in a safe place.

Prevent cybercriminals from infiltrating your Internet security, personal accounts, and network services by changing your passwords often and making them difficult. If a password is too difficult for you to remember, then it’ll certainly be difficult for a hacker or virus to figure out.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for Free Wi-Fi

Watch out for Free Wi-Fi

Many people find it hard to go even a few hours without an Internet connection. Shops, restaurants and a variety of other venues are adapting to this need by providing free Wi-Fi. Whether you’re at your favorite coffee shop, shopping at the grocery store, or waiting in an airport lounge, you’ll probably find that you have access to a free Wi-Fi network. If you decide to use it though, you should be aware of the dangers of using a network service without proper Internet security.

It may be tempting to quickly connect to a public network service and log into a social networking site such as facebook or check your bank account, but unless you can trust the network service provider’s Internet security, you should only do casual surfing. If you find yourself using a questionable network, avoid logging into websites and services that require you to type a username and password. Faulty Internet security leaves room for cyber thieves or hackers to infiltrate your network service and steal your private information without your knowledge.

Good Internet security practices can spare you potentially disastrous outcomes like identity theft. So when choosing a public network, always make sure you select a secure connection. If you’re at a Starbucks, for example, ask an employee to verify the name of the network service before connecting. Avoid using unsecured network services because they are easily prone to Internet security breaches.

Keeping your anti-virus software up to date and your computer’s firewall turned on are just two of the basic principles of achieving Internet security and using public networks safely. Besides, having anti-virus software does not guarantee your device’s safety; it’s merely a basic component of Internet security.

Another common Internet security problem occurs when cyber thieves record keystrokes, giving them access to your usernames and passwords. Changing your passwords periodically can help counter this kind of threat, especially if you use a public network regularly.

Even with these precautions, the strength of your Internet security can be hard to gauge, and networks that appear safe can still place your device at risk.  If you do suspect that a virus or malware has breached your Internet security, get professional help immediately.  Some viruses can seriously damage your device if they’re not caught quickly. In fact, because the average user cannot detect malware, it is essential to have a computer or network services specialist look at your system from time to time.

Always try to balance the advantages of using public network services and the potential threats to your Internet security that accompany them. What appears to be a free Wi-Fi service could end up costing you a lot in virus removal costs and privacy breaches.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Mobile Devices: Be SMART!

Everywhere you look these days there are people doing all sorts of cool things with their smartphones.  In fact, the one thing you see them doing least is actually talking on them.  They are availing themselves of the crazy number and types of apps available to them right there in the palm of their hand.  How many of those users do you suppose are worried about who has access to their personal information?  Not just the information they are exchanging with a friend at that moment, but ALL of the information their smartphone (aka Mobile Computer Device) to which their network service is connecting them?

Of course most business users are well aware of the risks associated with using mobile devices and have acted appropriately with their network services to assure that they are adequately protected.  The everyday user may not even know enough to worry about this.  Everyone who uses a smartphone requires a connection to a network service.  There are a number of ways that providers accomplish this connection to a network service, not all of which represent secure computer service.  Then there are all those apps users download, some of which are extremely cool.  Are those apps from a secure network service?  Is any information you share while using those apps protected by secure computer services?

As we all know, providers of apps and services often do not have the consumers’ best interests at heart, in fact, many prefer that we not use secure computer services.  The truth is that a virus or thief has victimized pretty much anyone who has been using a computer in any form for any length of time.  A network service who intends to stay in business over the long run will probably be a secure computer service, but a look into their records and comments from users is still a good idea.  Still, the user should not become so paranoid about suspicious providers and network services that they stop using their smartphones entirely.

Awareness is the key here.  If you are in doubt about the integrity of a particular app, do not download it until you can check it out through a reputable network service.  If you are not sure what kind of personal information your provider is sharing with whom, contact them directly and ask.  It is best to use secure computer service, especially as the use of mobile devices increases at such a rapid pace.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Analytics and BIG Marketing

So just what is “analytics” in the world of computing today?  According to the impeccable Wikipedia, “analytics is the process of obtaining an optimal or realistic decision based on existing data.  Business managers may choose to make decisions based on past experiences or rules of thumb, or there might be other qualitative aspects to decision making; but unless there are data involved in the process, it would not be considered analytics.”  Therefore, business people are using computer support to gather vital information.

Most savvy members of the business end of Internet use, marketing, and Internet security are already busily using analytics to keep their competitive edges, just one of the many reasons that intellectual property and Internet security are such hot issues.  Here is an interesting twist though.  What if a behemoth of online marketing began allowing lesser competitors to use its giant market to market their goods?  What if this behemoth even provided lots of computer support and increased Internet security for them?  How could this be good for the behemoth’s bottom line?  Analytics is the answer.

If a giant online marketer can collaborate with a lot of lesser marketers, the giant marketer can then watch these marketers much more closely without violating any Internet security protocol.  This watching is possible since sales and demographic data of the smaller marketer will be a part of the giant’s business now.  This collaboration will essentially remove any issues of Internet security and spying.  The giant is cutting out the middleman – the computer support analytics guy who used to have to chase all over cyberspace getting this same information, sometimes even violating Internet security.

At the same time, the giant is improving its upfront profile by providing access to and computer support for all of these products and services without the consumer ever having to leave the giant’s site.  In addition, at least in the short run the smaller vendors are getting a potential boost in sales based on their greater visibility, not to mention a greater sense of Internet security for their customers and for themselves.  Unfortunately, it is difficult to see this as a mutually beneficial relationship for the long run.  In the business of Internet marketing and competition, the object seems to be to always to come out on top.

That is not to say that these larger operators are merely victimizing their smaller competitors.  For right now, it seems as if both are benefitting in good ways, sharing computer support and Internet security.

Just for the sake of argument though, before a smaller competitor signs a contract with one of the “big guys,” it would be good for them to consider exactly what sort of access to information they are giving the bigger entity in exchange for their greater visibility.  How much computer support and Internet security are they gaining or losing for the sake of some perhaps temporary increased sales?

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Balanced Social Networking?

What’s with all the ranting and raving in the social networking scene?  Facebook, Delicious, Pinboard, Diigo, Digg?   Why can my friends not contact me directly?  Who is deciding what is “appropriate” content?  Well, of course you have to be a digital social networker to care, and you have to be pretty involved in the social networking scene to really care.  Still, the cries are in the air from users all over the social networking world.  FOUL!  You are messing with OUR sites.  But what seems to be at stake here is not the social networking sites themselves, rather the Internet security issues surrounding them.

It does seem as if the administrators of the social networking sites have become more and more controlling, and this annoys their users who essentially have no say in the changes other than to complain after the fact.  Turns out though, that many of the changes say, Facebook, has made over time and most recently, have to do with Internet security and protecting their users from exploitation and inundation by spammers.  Social networking is a wonderful thing, and we want to feel free to express ourselves and communicate openly, but unless some basic Internet security is in place, social networking will become a huge mess of exploiters and spammers.

Internet security is always an important issue, and it is, frankly, a real problem when it comes to social networking.  Meantime, here we have these FREE, wonderful sources of keeping in touch with friends and families.  It seems as if the hassle of a few well-intentioned changes is tolerable given the alternative: little or no social networking and less Internet security.

As for the competition AMONG the social networking sites?  That seems like healthy competition.  And as for the Internet security concerns coming to light through the social networking sites, again, that’s healthy stuff.  We need to know what to protect ourselves from.

Rock on, social networking!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Unfriendly Clouds

Cloud computing is a major source of excitement in the world of cyberspace these days.  Microsoft’s “to the cloud” commercials may or may not depict any sort of potential reality, but they have certainly planted the idea firmly in the American consciousness.  Does the cloud mean an end to computer support needs and data recovery issues?  Some can see a digital paradise of hidden hardware and ease of access.  Is this the reality of the situation?  The answer lies somewhere in a combination of factors.

Many see the cloud as an opportunity to reduce overhead, material costs and make computer support and data recovery easier with the reduction of the physical clutter of personal computer networks.  The simplicity of data backup with the cloud also allows businesses to feel protected against hardware failures and problems during data recovery.  While all of these improvements are possible by moving data processes to the cloud, potential pitfalls do exist.  If removing local infrastructure for cloud services is your chosen course, be sure to consult a computer support expert and learn about potential problems before they happen.

Data transported to the cloud is essentially out of your control.  Uploading and removing information is possible, but someone else owns the data centers housing the information.  Computer support issues are still possible as servers may be configured incorrectly.  Hackers targeting the center storing your data may steal or corrupt files.  The hardware storing data still exists; it just exists elsewhere.  Problems related to hardware still arise, causing unforeseen failures, data recovery disasters, and the potential loss of essential information.  Data recovery may or may not be possible depending on the problem.

Internet security is a major issue for many businesses as they contemplate a move to the cloud.  Outside ownership means that computer support may be out of your control once a cloud service is chosen.  You are casting your lot with the service provider’s computer support personnel.  The importance of the information stored in the cloud dictates the level of risk.  The more essential your data recovery needs are, the more concerned you should be.  Depending on the nature of the data stored, theft or loss could lead to legal repercussions.  Consulting trusted computer support experts about the positives, risks, and options before reaching a decision is more than a good idea.

In a computerized world, the risk of hardware failure and the need for data recovery by skilled computer support will never completely disappear.  Machines fail no matter where they are.  Human beings make errors and cybercriminals are not stopping their activities.  If moving processes and data to the cloud is the right option for you or your business, be sure you are prepared.  Preparing for the unknown with the help of local computer support can help make problems, such as data recovery, less of a worry for you and your clients.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending