Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

What If You Threw A Party And No One Came? Myspace Is Dead.

Right about now, Justin Timberlake must feel like he has egg on his face.  In June of 2011, Justin Timberlake and Specific Media bought Myspace.com and began to retune the website to place more of an emphasis on music.  Myspace now features popular and up and coming musical artists and if you did not know that, it is no surprise: Myspace.com has fallen to the 88th Top Site in the U.S., below The Drudge Report and CBS Sports.

Even in its heyday, Myspace was not exactly a haven of Internet security.  More than suffering from spreading viruses, Myspace users found the Internet security threat of stalkers.  As the first online social network for many users, Myspace users quickly found that the key component to Internet security is simply not putting deeply personal information about yourself on your page.  As well, the lax Internet security measures on Myspace allowed adult predators to gain access to children eighteen and younger.

In addition to basic Internet security concerns embodied by Myspace publishing users’ birthdays and birthplaces, which allowed some crafty criminals to divine portions of users’ social security numbers, Myspace users have found there is simply no good reason to go back to Myspace.  Unlike other social network sites that provide archives for online storage, Myspace encouraged users to link to external sites.  As a result, Myspace quickly turned into a portal to other, cooler sites, as opposed to one where users built an online storage depot of their own, cool works.

It is clear that Justin Timberlake is trying to change that now.  But intensifying the Internet security to Myspace and rebranding the site as an online storage option for the music and music videos of musical artists has not turned around Myspace’s slide in popularity.  The artists who are using Myspace as an online storage venue often repost their music and videos to other sites, leaving little unique content to draw users back.

More than Internet security concerns and the desire to combine social networking with online storage, a hook that photo sharing social networks have found effective, much of the demise of Myspace simply comes from the fact that it is not cool anymore.  Social networking is following the same long term ebb and flow of every trend and it is clear that Myspace is in the unenviable flow wherein the network is not cool to mainstream users.  Counterculture users are not yet using Myspace, even ironically.

Justin Timberlake is just a victim of bad timing, buying into a network that has already jumped the shark.  More than fear of Internet security threats or the desire to start up an online storage folder on a network that they have already left, users are stating that they are happy to get their music on other sites and no amount of rebranding Myspace will make them come back.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


How Connected Are We?

The great contribution of social networking platforms like Facebook and Twitter is connectivity, social connectivity, that is. Although Internet users everywhere used a variety of network services to connect, social networking sites would have us believe that we simply were not fulfilling our social potential. Many of its 800 million view Facebook  as a fundamental social networking tool. According to HighTalk, a third of all people with access to a network service are on Facebook. In many ways, teens and young users are growing up believing that Facebook is the ultimate social network service, but is Facebook actually helping us become more socially connected?

When it comes to connecting with old, lost friends and relatives, social network services are a simple and fast resource. In a matter of minutes, you can look through a friend’s friend list, locate a common friend, search his or her friend list, and voila, high school sweetheart found. In fact, for many people, websites that offer social network services are a great way to combine business and pleasure.

Clearly, Facebook  and other social networking sites offer us some form of connectivity—they allow us to be in each others’ lives much more prominently (often excessively). The real issue, though, is the kind of connectivity that Facebook enables, not its strength. In other words, do social network services actually enhance our social interactions and connections or do they merely create a delusional, alternate world in which we all roam with complete disregard for our privacy and Internet security, taking pride in the fact that we have 500 + friends?

Even in real life social settings, almost everyone is constantly checking Facebook via smartphones and other devices. If the purpose of social network services is to enhance our social connections, why do we still log-in when we are in perfectly healthy social settings?

Still, if you are convinced of the unparalleled rewards of social network services, consider the threats that these network services pose to users’ Internet security. Using social network services comes at a cost to Internet security. A previous blog discusses how vulnerable users’ Internet security can become when social network services are granted permission to share users’ data. Some people might try to defend social network services like Facebook  by claiming that users have the option to limit apps, hence protect their Internet security. However, the choice to block all third party apps is similar to the choice not to use a cell phone! Sure, no one is forcing you to allow Facebook apps access to your information, but without such apps, Facebook becomes boring and limited.

On the surface, sure, Facebook is making us more connected, but in reality, it is isolating us, increasing our addiction to life on the web, and constantly threatening our Internet security. Perhaps it’s not that great after all…

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The Trouble with Tablets

As cool as tablets are, they still have to overcome plenty of tech support issues before they join the realm of standard computing devices. The biggest tech support issue facing tablets is functionality. Tablets operate largely like fancy smartphones. Even Apple’s iPad is closer to an iPhone than to a laptop. Additionally, tablets need a lot more tech support to tackle problems relating to connectivity, storage and usability.

Tablets are gaining a lot of popularity among business travelers and people who need light, portable computing devices, but such users often discover that connecting their tablets to printers is complicated and messy because tablets significantly lack printing tech support. To connect a tablet to a printer, it is often necessary to use a third party app, as tablet makers haven’t provided sufficient tech support yet.

Another tablet limitation is web browsing. Tech support for tablet web browsers is also limited, often forcing users to use multiple browsers to access different websites. One exception to this may by Amazon’s Kindle Fire, which is due for release next week. The Kindle Fire comes with its own web browser, SILK, which was designed exclusively for the device. SILK does not operate on any tablet or device other than the Kindle Fire. Because it was created for the Kindle, rather than made to work with it, Amazon says that browsing using SILK will be a super fast and a very smooth experience.

Tablet computer repairs are another major limitation of the devices. Computer repair work for tablets is usually tricky because of the devices’ delicate and compact nature. Taking risks with cheap or self-help computer repair work can be very risky. It’s always better to seek out professional tablet computer repairs that have a history of excellent computer repair work than to trust amateurs. It’s easy for the inexperienced person attempting to provide tablet computer repair to damage the device by merely trying to take it apart.

Software computer repairs aren’t as risky, but that’s no excuse to take them for granted. Again, always seek out professionals as your first option. Don’t wait for an inexperienced provider to try—and fail—at fixing your tablet. Bad computer repairs can cost you to lose valuable data.

Because tablets are still in their Alpha phase, we can expect that they will continue to need plenty of tech support. And who knows, perhaps enough time and advanced tech support will actually succeed in making tablets a standard computing device, a title still monopolized by computers and laptops.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Internet Security for Santa

Using your network service to do your holiday shopping has many advantages.  There are no lines or crowds.  If you want to see another store’s price for a product, that information is a click away.  Even better, you don’t have to worry about parking at the mall – shopping has become as easy as turning on your computer and starting the network service. Shoppers who used their network service to buy gifts accounted for more than thirty billion dollars in sales last year.  Taking some quick and easy precautions will ensure that you can participate in this exciting new marketplace without compromising your Internet security.

Read more »


Too Young to be on Facebook?

A study appearing this week in First Monday highlights a serious threat to users’ Internet security—underage users, that is. Millions of kids under the age of 13 are on Facebook, according to the study. One of the most significant findings is that parents willingly help their children join Facebook, despite the dangers this practice poses to children’s privacy and Internet security.

According to a CNN article on the study, 95 percent of parents of 10-year olds know that their children are on Facebook. In fact, they helped their children create the account. Though this is not necessarily a surprising finding, it should certainly be an upsetting one. Parents are essentially desensitizing their children to the need to have strong Internet security while online. By helping kids join at such an early age, parents are telling their kids that it’s ok to share pictures and other personal information, that being vigilant about Internet security isn’t necessary.

Perhaps one cause of this growing disregard for Internet security is the fact that people take Internet security for granted. Users assume that there is no imminent threat to their children’s—or their—Internet security because they’re using a secure home network service or because they have firewalls and other kinds of protection set up that. However, the main Internet security threat is not one that comes from network services. The most imminent Internet security threat facing younger users is the loss of privacy.

Last year, Consumer Reports found that 7.5 million children under 13 were Facebook members. Such a figure may not seem too significant relative to Facebook’s 800 million users, but in reality it is very alarming. There are almost as many underage kids on Facebook as there are people in the greater Boston area. Shouldn’t kids be playing outside or reading Harry Potter instead of slowly becoming naturalized to ignoring Internet security, living in a cyber world that cannot substitute for healthy, real social interactions?

The trouble is, as network services become abundant everywhere, it’s hard to prevent children from wanting to join Facebook or going online 5 hours a day. In fact, as the study shows, parents tend to allow their children to join Facebook precisely because it has become a standard communication tool across network services. The rising complexity of network services makes it hard to separate online media and stick with one form of communication only. Email, chat, Facebook, and calendars are increasingly becoming one large network service, which makes it hard to limit online activity to only email, for instance.

For parents, there’s no easy solution to the problem. Balancing the need for strong Internet security and protecting kids’ privacy with the need to be involved in an increasingly interconnected online world is just one of the many perks of parenting.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Is your computer really secure?

Most people have some form of virus removal software on their computer.  Despite that fact, a significant proportion of those users will have to deal with an Internet security issue at some point in their computing career.  This is because the threat environment online is dynamic; it evolves constantly, trying to outfox the Internet security providers and get to your data.  How can you be sure that your virus removal software is providing the most comprehensive protection?  Here are some questions you should ask in shopping for virus removal software:

1)  Is the virus removal software you’re considering from an established, reputable provider?  It’s important that you be able to trust your virus removal software.  Most brands will have reviews posted online, which can help you decide if that particular program will fit your needs.  Conversely, choosing a virus removal program without investigation carries many risks, not least among them the risk of having your Internet security compromised by a bogus “diagnostic scan.”

2)  What happens when the software detects a threat?  It is important to make a distinction between virus detection software and virus removal software.  Virus detection software will find a threat and then notify the user, leaving them to deal with the threat by themselves.  Virus removal software will detect the threat, isolate it, and then remove it from the computer, usually with little or no input from the user.

3)  How often does the software update its threat registry?  As mentioned above, the ways in which hackers test your Internet security are constantly changing.  It is important, therefore, to make sure that your virus removal software updates its threat registry regularly and often.  These updates will allow your virus removal software to detect and cope with the newest Internet security threats as they appear.

4)  Exactly what features does your virus removal software offer?  Before committing to a particular program, take a look at what it can offer you.  While it is true that some Internet security companies offer only bare-bones virus removal packages, others include things like personal firewalls for added security, or spam filters for your email accounts.  Just as with any other purchase, the goal when shopping for Internet security programs is to get the most value for your dollar.

5)  Does the software company stand by their product?  Let’s be clear: no matter how comprehensive your virus removal software is, no matter how careful you are with your permissions, there is still a chance that you will eventually have to deal with a breach of your Internet security.  Another important question when shopping for virus removal software is: what happens then?  Does the Internet security company have support personnel standing by, or is it up to the user to fix the problem?

These are just some of the important questions you should ask yourself when shopping for Internet security software.  Answering these questions before you buy will ensure that you get the best possible protection for your computer.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Are We Ready for Talking Phones?

Apple’s iPhone 4S has found its voice with Siri, the new digital assistant that comes integrated into the phone’s OS. The feature allows users to interact with their iPhones as if they were talking to a personal assistant, albeit one who has limited functionality. Siri lets users control functions using their voice; users can send messages, check and make changes to their calendars and even search for nearby restaurants.

Siri is different from other voice-operated systems or features because, according to Apple, it not only understands what people say, but also what they mean. It understands the contexts of requests and can keep track of the conversation. For example, when a user says “reply,” Siri automatically understands which message the user is referring to based on context.  Apple calls Siri proactive, meaning that it will keep asking its user questions until it actually understands what he or she wants to know.

The voice control functionality works extremely well with text messages. Users can ask Siri to read incoming texts and to respond by typing what they dictate. Likewise, Siri is programmed to work smoothly with the iPhone’s calendar application. Siri can check for appointments, make new ones, and remind its users when tasks or meetings are scheduled. This feature, coupled with Siri’s understanding of colloquialisms, makes it easy to say things like, “Make sure I remember to pay my credit card bill after work.”

Siri also keeps track of its user’s geographic location, so to get directions, users don’t need to load a map and enter the final destination; instead a user only needs to say, “Where’s the nearest gas station?” If Siri isn’t quite sure what’s being asked, it may ask its user more questions for clarification.

The voice recognition technology works fairly well when it comes to recognizing mumbles and whispers, according to Mark Milian who reviews the feature for CNN.

Siri currently works with several of the iPhone’s integrated apps like music player, calendar, text messaging, and Yelp; but it has some limitations. Siri can’t work with outside apps and will not be able to do so until third party apps can be tied to it. The feature can’t access the iPhone’s camera, nor can it take email or memo diction.

Siri talks to users in a female voice (except in France and the U.K. where it has a male voice) and doesn’t have a heavy computer-software accent, so it seems rather friendly. Thanks to the ongoing advances in anthropomorphic voice technology, Siri adapts its tone to suit its sentence’s intended meaning, and doesn’t sound completely like a robot reading strung together words.

Overall, Siri isn’t perfect yet; it has quite a few limitations and will require strong tech support to improve. Besides, many people may not feel comfortable talking to their phones in public. Still, Siri’s future is promising; it can only get better as it gets tied to third-party apps and as its voice recognition and tonality become more advanced.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Laptop and Smartphone Thieves, Beware!

PREY is a free open-source program that’s a great way to track lost or stolen laptops and smartphones. PREY is quite brilliant. PREY anti-theft software lets owners play private investigator for free. The software helps users keep track of their phones or laptops and can help users find their devices if they are ever stolen.

The software, described as silent but deadly by its creators, works by remaining dormant on its host device until it is activated by a signal. Disgruntled victims of thefts can activate PREY on a lost laptop by logging into the connected PREY account online. Those who want to track their lost smartphones can do so by sending a text message to the phone to activate its resident PREY. The standard activation message is “GO PREY,” though this can be customized.

According to PREY’s website, once the software is activated, it allows users to gather information about their lost or stolen devices’ location, hardware and network status. Users can also trigger specific actions on the device. Outlook or Thunderbird data on a missing laptop can be remotely hidden. Users who use PREY to track a stolen laptop, for example, can remotely activate the missing device’s webcam and use it to take pictures of the culprit. A user can also see how his or her stolen device is being used, and look at the screen. Ideally, a PREY user would get a glance of the thief logging into a facebook page or email account to get his or her information.

PREY is designed to automatically connect to the Internet to allow its host device to be tracked. When no Internet network service is available, the software tries to connect to the nearest Wi-Fi hotspot. PREY takes advantage of its smartphone’s GPS to send information about the device’s location. In laptops, the software uses the nearest Wi-Fi hotspot to triangulate and narrow in on its location according to preyproject.com.

As a free, open-source software, PREY is quite remarkable. For one thing, it works everywhere! There are no geographical limitations on where it can work. Right now though, PREY is only compatible with Android phones and does not work with iPads or iPhones. However, its developers say they’re working on these compatibility issues.

PREY is not a foolproof method of catching thieves and restoring stolen devices, though. The developers recommend contacting the police as the final step in the recovery process.

Finally, users who are concerned about privacy can rest assured because PREY is not a malware, and it does not behave like one. PREY’s website explains that unless the software is activated, it remains dormant with no activity. The developer states that PREY does not collect any private information about its users, nor does it store the information that passes through its servers, so the software doesn’t pose a threat to its users’ Internet security. Now, if only the facebook people would learn to be this nice.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Spare the Trip, Spoil the Computer

Simple computer problems that appear harmless can actually end up becoming serious issues that require costly or professional computer repairs. A louder than usual fan, an overheated base, random screen glitches, and strange internal noises are all easy to ignore at first, but these may be signs that your machine is on its way to requiring expert computer repair. Small changes in the way a computer acts can be the result of hardware failure or a software problem.

Viruses are one of the most common software-related problems that require computer support. In the past, computer repair service providers needed to be physically located in front of a computer to perform necessary computer repairs. Today, though, a good deal of personalized computer support occurs remotely! That means for people who can’t part with their machines for too long, computer repair experts can provide computer support by tapping into your computer from almost any location. By connecting to a computer via the Internet, computer repair experts can provide safe and secure computer support for a device as if it were in front of them.

Choosing remote computer support is a convenient option for several reasons. First, since you don’t have to physically take your machine to a computer repair shop, remote computer repair can take care of problems like virus removal and provide other kinds of computer support much faster. Remote computer support can also start fixing the problem as soon as you discover it, possibly minimizing the resulting harm. Instead of allowing a virus time to progressively wipeout your hard drive, for instance, remote computer support can nip it in the bud.

Remote computer repair is not only a solution to virus related problems. Hardware related problems can sometimes also be fixed with the remote assistance of a computer repair expert. Fan related problems are especially easy to handle over the phone or the Internet.

Alternatively, some computer support problems require the personal attention of a specialist. Laptop hardware computer repairs are often more difficult and are best handled directly by a professional. Even then, though, you can find computer support providers that come to your home or office to fix the problem in a short amount of time.

In the end, pay attention to small warning signs that can indicate more serious problems. Catching viruses or hardware problems early on, and getting the right kind of computer support can help prolong your machine’s lifespan. It’s also an easy way to reduce computer repair costs. If you’re delaying that trip to get your computer repaired because of a busy schedule, wait no longer; remote computer support is your best option.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Mobile Devices: Be SMART!

Everywhere you look these days there are people doing all sorts of cool things with their smartphones.  In fact, the one thing you see them doing least is actually talking on them.  They are availing themselves of the crazy number and types of apps available to them right there in the palm of their hand.  How many of those users do you suppose are worried about who has access to their personal information?  Not just the information they are exchanging with a friend at that moment, but ALL of the information their smartphone (aka Mobile Computer Device) to which their network service is connecting them?

Of course most business users are well aware of the risks associated with using mobile devices and have acted appropriately with their network services to assure that they are adequately protected.  The everyday user may not even know enough to worry about this.  Everyone who uses a smartphone requires a connection to a network service.  There are a number of ways that providers accomplish this connection to a network service, not all of which represent secure computer service.  Then there are all those apps users download, some of which are extremely cool.  Are those apps from a secure network service?  Is any information you share while using those apps protected by secure computer services?

As we all know, providers of apps and services often do not have the consumers’ best interests at heart, in fact, many prefer that we not use secure computer services.  The truth is that a virus or thief has victimized pretty much anyone who has been using a computer in any form for any length of time.  A network service who intends to stay in business over the long run will probably be a secure computer service, but a look into their records and comments from users is still a good idea.  Still, the user should not become so paranoid about suspicious providers and network services that they stop using their smartphones entirely.

Awareness is the key here.  If you are in doubt about the integrity of a particular app, do not download it until you can check it out through a reputable network service.  If you are not sure what kind of personal information your provider is sharing with whom, contact them directly and ask.  It is best to use secure computer service, especially as the use of mobile devices increases at such a rapid pace.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


391-400 of 1857
© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending