Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Laptop and Smartphone Thieves, Beware!

PREY is a free open-source program that’s a great way to track lost or stolen laptops and smartphones. PREY is quite brilliant. PREY anti-theft software lets owners play private investigator for free. The software helps users keep track of their phones or laptops and can help users find their devices if they are ever stolen.

The software, described as silent but deadly by its creators, works by remaining dormant on its host device until it is activated by a signal. Disgruntled victims of thefts can activate PREY on a lost laptop by logging into the connected PREY account online. Those who want to track their lost smartphones can do so by sending a text message to the phone to activate its resident PREY. The standard activation message is “GO PREY,” though this can be customized.

According to PREY’s website, once the software is activated, it allows users to gather information about their lost or stolen devices’ location, hardware and network status. Users can also trigger specific actions on the device. Outlook or Thunderbird data on a missing laptop can be remotely hidden. Users who use PREY to track a stolen laptop, for example, can remotely activate the missing device’s webcam and use it to take pictures of the culprit. A user can also see how his or her stolen device is being used, and look at the screen. Ideally, a PREY user would get a glance of the thief logging into a facebook page or email account to get his or her information.

PREY is designed to automatically connect to the Internet to allow its host device to be tracked. When no Internet network service is available, the software tries to connect to the nearest Wi-Fi hotspot. PREY takes advantage of its smartphone’s GPS to send information about the device’s location. In laptops, the software uses the nearest Wi-Fi hotspot to triangulate and narrow in on its location according to preyproject.com.

As a free, open-source software, PREY is quite remarkable. For one thing, it works everywhere! There are no geographical limitations on where it can work. Right now though, PREY is only compatible with Android phones and does not work with iPads or iPhones. However, its developers say they’re working on these compatibility issues.

PREY is not a foolproof method of catching thieves and restoring stolen devices, though. The developers recommend contacting the police as the final step in the recovery process.

Finally, users who are concerned about privacy can rest assured because PREY is not a malware, and it does not behave like one. PREY’s website explains that unless the software is activated, it remains dormant with no activity. The developer states that PREY does not collect any private information about its users, nor does it store the information that passes through its servers, so the software doesn’t pose a threat to its users’ Internet security. Now, if only the facebook people would learn to be this nice.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Buying Music Can Save Money

It can be tempting to “share” songs via software like Kazaa or LimeWire rather than buying them. Such practices are not only illegal most of the time, but pose a serious threat to your Internet security. Downloading files using P2P (Peer-to-Peer) sharing software is one of the worst Internet security practices that users can employ. By downloading music or other files using such software, you could be inviting a conglomeration of malware to infest your computer. Even a small breach of your Internet security can cause you to spend lots of money on virus removal and, in some cases, identity theft problems.

Though LimeWire is no longer available for download due to legal reasons, users with older versions of the software on their machines can still use it, and can therefore still endanger their Internet security. Even when users don’t use LimeWire to share files, their Internet security is susceptible because the program automatically runs in the background, allowing strangers access to a user’s files!

When you opt to participate in P2P sharing, you can’t normally control what files you share. This lack of control can lead to your participating in copyright infringement, having your device infected with malware, and consequently requiring virus removal.

Perhaps the worst part of getting viruses from P2P sharing software is that we willingly invite them in. It’s like volunteering to spend time and money on virus removal. Sometimes, Internet security problems are hard to identify, but when threats are this obvious, there’s no excuse to fall for them.

If you’re looking for free music, YouTube is a great alternative. Watching music videos on YouTube poses far fewer threats to your Internet security, as viruses cannot usually target media files. Internet security problems that occur while on YouTube might be related to bugs in Adobe Flash player, but these are rare. Besides, Flash is constantly updated to eliminate bugs and ensure Internet security.

On the other hand, if you’re feeling overtly philanthropic and want to support the music industry by more than just illegally downloading songs, then consider buying the music! Amazon and Apple both sell music by the song, as do dozens of other sites. The great news is, music services like these are legal and don’t come with the added expense of virus removal.

Given the time and effort needed for virus removal, it is always better to make sure you have strong Internet security and to avoid using software like Limewire and Kazaa. After all, paying for a song or three is a lot cheaper than paying for virus removal.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for Free Wi-Fi

Watch out for Free Wi-Fi

Many people find it hard to go even a few hours without an Internet connection. Shops, restaurants and a variety of other venues are adapting to this need by providing free Wi-Fi. Whether you’re at your favorite coffee shop, shopping at the grocery store, or waiting in an airport lounge, you’ll probably find that you have access to a free Wi-Fi network. If you decide to use it though, you should be aware of the dangers of using a network service without proper Internet security.

It may be tempting to quickly connect to a public network service and log into a social networking site such as facebook or check your bank account, but unless you can trust the network service provider’s Internet security, you should only do casual surfing. If you find yourself using a questionable network, avoid logging into websites and services that require you to type a username and password. Faulty Internet security leaves room for cyber thieves or hackers to infiltrate your network service and steal your private information without your knowledge.

Good Internet security practices can spare you potentially disastrous outcomes like identity theft. So when choosing a public network, always make sure you select a secure connection. If you’re at a Starbucks, for example, ask an employee to verify the name of the network service before connecting. Avoid using unsecured network services because they are easily prone to Internet security breaches.

Keeping your anti-virus software up to date and your computer’s firewall turned on are just two of the basic principles of achieving Internet security and using public networks safely. Besides, having anti-virus software does not guarantee your device’s safety; it’s merely a basic component of Internet security.

Another common Internet security problem occurs when cyber thieves record keystrokes, giving them access to your usernames and passwords. Changing your passwords periodically can help counter this kind of threat, especially if you use a public network regularly.

Even with these precautions, the strength of your Internet security can be hard to gauge, and networks that appear safe can still place your device at risk.  If you do suspect that a virus or malware has breached your Internet security, get professional help immediately.  Some viruses can seriously damage your device if they’re not caught quickly. In fact, because the average user cannot detect malware, it is essential to have a computer or network services specialist look at your system from time to time.

Always try to balance the advantages of using public network services and the potential threats to your Internet security that accompany them. What appears to be a free Wi-Fi service could end up costing you a lot in virus removal costs and privacy breaches.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Mobile Devices: Be SMART!

Everywhere you look these days there are people doing all sorts of cool things with their smartphones.  In fact, the one thing you see them doing least is actually talking on them.  They are availing themselves of the crazy number and types of apps available to them right there in the palm of their hand.  How many of those users do you suppose are worried about who has access to their personal information?  Not just the information they are exchanging with a friend at that moment, but ALL of the information their smartphone (aka Mobile Computer Device) to which their network service is connecting them?

Of course most business users are well aware of the risks associated with using mobile devices and have acted appropriately with their network services to assure that they are adequately protected.  The everyday user may not even know enough to worry about this.  Everyone who uses a smartphone requires a connection to a network service.  There are a number of ways that providers accomplish this connection to a network service, not all of which represent secure computer service.  Then there are all those apps users download, some of which are extremely cool.  Are those apps from a secure network service?  Is any information you share while using those apps protected by secure computer services?

As we all know, providers of apps and services often do not have the consumers’ best interests at heart, in fact, many prefer that we not use secure computer services.  The truth is that a virus or thief has victimized pretty much anyone who has been using a computer in any form for any length of time.  A network service who intends to stay in business over the long run will probably be a secure computer service, but a look into their records and comments from users is still a good idea.  Still, the user should not become so paranoid about suspicious providers and network services that they stop using their smartphones entirely.

Awareness is the key here.  If you are in doubt about the integrity of a particular app, do not download it until you can check it out through a reputable network service.  If you are not sure what kind of personal information your provider is sharing with whom, contact them directly and ask.  It is best to use secure computer service, especially as the use of mobile devices increases at such a rapid pace.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Illegal Download Site Targeted by Hackers

Threats to Internet security continue appearing in the form of cybercriminals seeking profits from the ignorance of users.  Downloading files from the web, though we do it all the time, involves the risk of infecting your computer with a virus.  A clever hacker may exploit even excellent Internet security.  This necessitates virus removal to clean your system.  Average users suffer through Internet security problems regularly.  Over the past year, the Internet security systems of a number of high profile targets, including American defense contractors, Sony, Google, and many others, fell victim to cyber attacks.  A very recent example is that cybercriminals compromised the internet security of the file-sharing giant BitTorrent.

Widely known as one of the world’s largest illegal file-sharing sites, BitTorrent also hosts a large number of legal downloads.  This time BitTorrent was the victim of illegal activity.  Hackers broke through the site’s Internet security, injecting a type of malicious software known as “scareware” into the download software that powers file transfers.  Virus removal of scareware is potentially difficult, depending on the user’s level of expertise.  The internet security implications of such an intrusion are that they can render the files of a familiar website vulnerable to a hacker’s program access to information which unsuspecting users consider safe.  This requires immediate virus removal action.

The intrusion reportedly occurred at 4:20 am Pacific Standard Time on September 13, 2011 as BitTorrent and uTorrent.com services became compromised.  The company reported this intrusion itself later that day on the company’s blog.  The false download files were only in place for two hours before BitTorrent employees took servers offline and corrected their Internet security flaws.  Virus removal is necessary for anyone who accidently downloaded the fake files.  The scareware installed on users’ systems is a fake anti-virus program called Security Shield.  Infected systems see a notification pop up informing users that their computer is infected with a virus.  It offers virus removal if the program is paid for by credit card.

Users suffering from this malicious software should attempt to utilize their virus removal programs to restore Internet security.  If you are unable to remove the program, consider contacting your proven reliable computer support company.  Their knowledge and expertise could save a lot of time and headaches.  Downloading anything from the web tests your Internet security.  Always keep anti-virus and virus removal software up to date to protect your system from harmful software.  The thieves and bandits are out there, and we have to be careful.  However, we can handle a virus intrusion in a timely manner with experts trained  in quick restoration of internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Sources of Malicious Software Show Some Change

The growing importance of the Internet to everyday life creates an ever-larger target for cyber criminals.  Internet security against cyber crime is vital for businesses and individuals alike.  Malicious software corrupts systems, destroys data, and allows the theft of identities or banking information.  Hackers looking to make a quick buck by exploiting weak Internet security are nothing new.  A recently released report about malicious software and where it is housed online brings the issue into sharper focus.

Read more »


Malicious Software Finally Hits Your iPad

Hackers continue attempting to exploit the Internet security of the growing population of iPad owners.  Analysts’ estimate over five million iPads and iPad 2s sold in the first quarter of 2011 alone. It is obvious why malicious software programmers seek to take advantage with those sales figures.  Apple’s normally excellent Internet security is occasionally breached, and the iPad, iPhone and iPod Touch are currently vulnerable to the latest malicious software abuse.

Read more »


Even Google Gets Hacked Sometimes

Hackers continue grabbing headlines with high profile attacks against the Internet security of governments and major corporations.  Hacktivists (hacker activists) attempting to make statements attacked various targets this year, again showing the importance of good virus removal and protection in a digital world.  Targets have ranged from PayPal and Visa to FBI associate Infragard, not always with obvious reasons.  Recent hacker arrests in the United States and Europe are attempts to combat the problem.   Google announced on Wednesday, July 20, they were the latest victim as hackers compromised their Internet security.

Read more »


RESCUECOM Releases Q1 2011 Computer Reliability Report

The results are in for RESCUECOM’s first Computer Reliability Report of 2011, Lenovo claims the top spot!

SYRACUSE, N.Y., Jun. 6, 2011 — RESCUECOM’s Computer Reliability Report reveals the top five manufacturers with the best overall computer reliability.

“There have been some interesting changes over the last 3 months. We are in a time of rapid technical change and consumers more than ever need to have up-to-date unbiased guidance.” stated David Milman CEO of RESCUECOM.

The Computer Reliability Report gives an unbiased summary of the most reliable personal computer manufacturers. The top five brands with the best overall reliability in Q1 2011 are:

  1. IBM/Lenovo (254)
  2. Asus (242)
  3. Toshiba (164)
  4. Apple (149)
  5. HP/Compaq (122)

Read more »


Increased Corporate Victimization Highlights Need for Better Internet Security

A recent survey has revealed some troubling data for corporate technology users when it comes to Internet security.

According to the Sixth Annual Enterprise IT Security Survey, conducted by Amplitude Research, 67% of large companies (minimum of 5,000 employees) reported at least one significant security intrusion.

That was over 25% higher than the year before.

Companies cited various potential reasons for the increase, ranging from significant Internet security weaknesses to employee Internet usage.  No matter the reason, one thing is clear:  large corporations are coming under increased attack. Read more »


© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending