Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

NEWS: Dell’s Streak to Hit the Market — Is It an iPad Challenger?

After release date delays, Dell’s Streak is finally ready to hit the market.

The smartphone-tablet hybrid will be available to customers who pre-ordered on Thursday, with general online availability on Friday.

The Streak is Dell’s first entry into the smartphone/tablet market and is the first contender to directly attempt to compete with Apple’s iPad.  Read more »



Rescuecom Releases Top 5 Tips for Mobile Device Security

Rescuecom Releases 5 Tips for Mobile Device Security

SYRACUSE, N.Y., August 9, 2010 – Mobile devices are extremely popular, but also extremely vulnerable.   Internet security is no longer just a concern at home or the office, and phone data recovery is more than a solution for users.  To help you understand the issues of Internet security and phone data recovery for your mobile devices, RESCUECOM offers these 5 tips.     Read more »



Tips on Making a Budget Wise Technology Purchase

With many of us tightening our belts because of the recession, every purchase needs to be made with our budgets in mind. However, making a budget purchase when it comes to technology can sometimes turn into a budget buster once the high costs of computer repair and computer support are factored in.

Purchasing a budget minded product can be a short term cost savings.  Unfortunately, those cost savings are often offset by additional costs for computer repair and computer support that these devices incur. Read more »



Computer Support Tips: Making the Most of Patches

A key component in keeping your Internet security up to date is the free form of computer support provided by many major software companies – patches.

For example, Microsoft releases Internet security patches, along with non security computer support updates, on the second Tuesday of every month or “Patch Tuesday.”

Tomorrow’s Patch Tuesday will feature 14 bulletins with patches for thirty-four Internet security vulnerabilities in Microsoft’s products including Windows, Office, and Internet Explorer. Read more »



Tech Support Tips: Smartphone Data Recovery can be Costly

Smartphone data recovery can be costly, but it can be avoided by following some simple tech support tips.

Many of us rely on mobile devices such as the iPhone and the BlackBerry.  Yet, despite everything we do with these phones, one thing we don’t always do is take precautions to preserve our data.

So what can you do to avoid needing data recovery for your smartphone? Read more »



Internet Security: Safe Searching with Google

Google is the “King of Search”.  Now, it has another, less flattering title: “King of Malware.”  Google search results have become an Internet security threat.

The Barracuda Labs 2010 Midyear Security Report studied search engine results for ‘trending’ topics, and showed significant flaws in Google’s Internet security.

According to Barracuda, Google searches resulted in far more malware infected links – 69% – than results for Yahoo, Bing, and Twitter combined.  Read more »



Even the Smallest Change Can Lead to Problems

Do you know what every update, installation, and change does to your computer?  Computer repair and computer support issues can be caused by obvious things, like physical damage.  But they can also be the result of even simple changes to your computer.

Being aware of these changes, and their potential for causing trouble, is a key step in avoiding a costly computer repair or computer support problem. Read more »



Computer Support Tips: Lesser Known Computer Parts Explained

Most of us are not as tech savvy as the computer support specialists we entrust with our computer repair problems.  We all know the main parts of a computer such as the CPU, hardware, software, and memory, but we’d probably be at a loss to explain what a BIOS is or how the Windows Registry works.  To help make things a little clearer, RESCUECOM’s computer support specialists offer these simple definitions of complex computer parts. Read more »



Third Party Software Can Be Risky Business

For software, the number of Internet security vulnerabilities is a key component in determining its quality and usability.  Software with multiple vulnerabilities causes constant nightmares for computer users and computer support specialists alike.

Recently, security company Secunia reported that Apple had the most Internet security vulnerabilities of any software company.  This was surprising, given Apple’s historically strong Internet security track record.

However, Secunia’s more important news was that most Internet security vulnerabilities come from third party software. Read more »



Computer Support Tips: Help Us to Help You

Many of us rely on professional computer support and computer repair specialists to keep us up and running.  But how many of us have ever wondered what we might be able to do to help them?

Computer support and computer repair specialists like to help.  They have to – it’s part of the job.  But, just like you, they also like it when things go as smoothly as possible.  While you may not be able to fix complicated computer repair problems, there are some things you can do to make the experience go as smoothly as possible, for both you and the technician. Read more »



© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending