Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

SceneTap the Bar Scene Before you Head Out

Many new apps are signaling the actual arrival of a technological era previously restricted to the realms of sci-fi films and stories. Face-to-face calling was a thing of the future in films like “Back to the Future,” and asking a phone where to get coffee was a feat only accomplishable by Sam Beckett in “Quantum Leap.” Today, though, technologies that Hollywood used to portray as products of the very distant future have already arrived. One such technology is facial recognition.

Thanks to cloud computing, many devices—especially smartphones—can now run advanced software or applications that used to only run on very powerful hardware. Powerful tech support no longer needs to come from the device itself, as it can come from the cloud. Facial recognition, for, instance, used to require both complex machinery and sophisticated software. Today, all that apps need to perform facial recognition is a connection to a network service and access to a camera.

Among the more creative uses of facial recognition technology is a smartphone app called SceneTap. The app, which is still in its early experimental stage, works to give its users information about local bars. SceneTap works by identifying the gender and age of people going into participating bars by using cameras installed at these locations. The app then gives users access to information like how crowded a bar is, the ratio of males to females, and the average age of the people there.

Many people will surely find this app to be the coolest thing since sliced bread, and maybe they’re right; once more bars opt to participate by installing cameras to identify incoming crowds, people will be able to avoid the hassle of going to a bar and finding it too empty or too crowded. Users can also chat with each other to get advice before heading out to the bar scene.

Users can search for a bar that is “Chill,” “Social,” “Hoppin,” or “Crazy.” They can also search by gender and age ratio, as well as look for special deals, certain events, and check out a bar’s sports affiliations.

Of course because SceneTap performs facial recognition on everyone going into a bar, many people are concerned about privacy issues. The app’s creators maintain that all the app does is identify age and gender (and generate statistical data based on them). Still, as the app communicates data over wireless connections, hackers can potentially steal information as it passes between cameras, servers, and smartphones.

Right now, the app works in Chicago, with over 50 bars already signed on. The app has been featured in or highly reviewed by several news organizations including Forbes, The Wall Street Journal, The New York Times, MSNBC, CNN, the L.A. Times, and Reuters. If you live in Chicago, give it a try. If not, looks like you’ll have to wait, for now.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Facebook has Spam, too

Facebook users log into the social network over one billion times a day. Hackers and imposters trying to access other users’ accounts make up 600,000 of those log-ins according to The Telegraph. With over 800 million users, it’s not surprising that the website gets so many daily hacking attempts. Hackers try to take over other users’ accounts to post images, send out spam or phishing links, spread malware through Facebook content, and access users’ private information.

Just recently, Facebook suffered from an extensive flood of porn and violent images that appeared across the website. CNN reports that Facebook had a security team work to identify the source of the spam and remove it.

As Facebook becomes increasingly aware of the Internet security issues it faces, the website is taking significant steps to inform users about such threats, as well as add new defense mechanisms to its already sturdy arsenal.

Facebook has issued a detailed infographic full of interesting little facts about the numerous steps involved in protecting users’ security. The first step towards accessing an account is, naturally, logging in. The graphic points out that users can enable an HTTPS connection for all Facebook related activity by adjusting their account settings. In case of a forgotten password, the website asks a user to identify tagged friends, a task which a hacker would not be able to do. Other initial security checkpoints include keeping track of a user’s location and log-in device to detect anomalies or sudden changes.

The social network giant is also introducing some brand new features to strengthen password security and resolve threats that emerge when users are locked out of their accounts. The “Trusted Friends” feature allows you to confirm your identity with the help of trusted friends. If you can’t log in, several pre-selected friends receive a code that they pass on to you. You then use the code to create a new password.

Still, despite the occasional spam that slips through Facebook ’s many security precautions, last week’s being the most graphic example of this, the website claims that less than half a percent of users experience spam, a remarkably low number compared to email spam, for example.

If you’re really interested in the details of Facebook security, check out the infographic. For now, there’s no full-proof method for ensuring Facebook security, unfortunately. Be vigilant in your online interactions, post and respond carefully, be selective in what links you click on, and change all your passwords every few weeks if possible.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Finally, Free Music, for Real

People are listening to more music than ever before, and free Internet radio is all the rage these days. Millions of people rely on Internet radio like Pandora and Jango to provide their daily dosage of tunes. Internet radio continues to garner more popularity as it offers listeners free music, as well as the chance to more-or-less customize their music preferences. It’s a great way to discover new favorites while remaining in your musical comfort zone. But what happens when you don’t want to just tune into what’s playing and want to listen to a specific song? In case you are wondering, no, the answer is not to illegally download the music, a practice that poses an immense threat to your Internet security, among other inherent reasons not to. Well, one option is to buy songs and use Google Music or iTunes to organize your library, but what if you don’t own that much music and you don’t want to pay every time you want to listen to Adele in the background? The answer is Spotify, an Internet music streaming service that lets users pick the exact tracks they want to listen to!

The first question that comes to mind is price. The good news is that Spotify offers a free version. Naturally, subscribers to the free plan experience occasional radio ads and other limitations like a lower sound quality and no offline mode. According to Wikipedia, after an initial grace period, the free version supports only 10 hours of music streaming per month, which is not that much for many people. Still, most Spotify users, around 7.5 million, currently use the free version, and given the service’s popularity, these numbers are certainly going to increase!

Upgrading to an unlimited account has the advantage of better music quality, fewer ads, and ability to listen in an offline mode. Spotify also boasts smartphone apps iOS and Android. So, similar to Google Music’s online storage feature, Spotify can act as a cloud music library. Regardless of which version you use, Spotify offers more than 15 million songs, having reached agreements with the big four music labels.

The service is quickly expanding to many European countries, and despite only having been active in the United States for a few months, it’s gaining immense popularity. Spotify recently announced in a blog post that is has reached 2.5 million paying users. Another recent major development has been the collaboration of Spotify and Facebook. To register for the service, you must use a Facebook  account—there’s no way around it. Once you sign up, you can share playlists and songs with friends, see what tracks others are listening to and follow your friends’ recommendations.

There are plenty of ways to listen to music. Spotify is just one of them, sure, but it’s also drastically different. Finally, we have a service that actually lets us listen to the music we want, share it, and instantly stream it for free.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Let’s Hope You’re Not On The PwnedList

If you’re ever in the mood to find out if your email account’s user name or password have been compromised by a hacker—and if you’re brave enough to want to know the truth—consider giving PwnedList.com a try. The website offers a tool that allows people to check if some of their online data has been compromised.

The website began as an experiment to see how many compromised email accounts could be harvested programmatically, according to the tool’s creators. In less than two hours, approximately 30,000 accounts (usernames and passwords) were collected, showing just how vulnerable some people’s Internet security was.

PwnedList does not hack into people’s accounts to collect their data! It extracts usernames and emails from account dumps and stores the usernames and passwords in an encrypted form to prevent them from being re-hacked.

“The purpose of this project is to hopefully to raise security awareness, encourage users to be more proactive about handling their personal security in cyberspace and at the same time help people monitor their accounts for potential compromises,” says the PwnedList website.

One way to understand how PwnedList works is by thinking of it as a volunteer who searches the Internet, both manually and using complex programs, for information dumps. When PwnedList finds dumps of usernames and passwords, it encrypts them then adds them to its database. At the time this article was written, PwnedList bragged 4981012 discovered usernames and emails.

As cool as PwnedList is, it’s important to remember that it’s by no means an alternative to safe Internet security practices. The easiest of these is changing your passwords regularly and making them long and difficult. PwnedList is merely a way to casually check if any of your accounts’ information has been collected by a hacker somewhere.

The limitation of the tool, though, is that it references your information against the data it has collected over time. In other words, your information may very well have been hacked or compromised but not collected by PwnedList. If that’s the case, relying on PwnedList as a litmus test can be misleading.

Overall, PwnedList is a cool tool that offers an interesting, albeit limited, service. Give it a try. And don’t get too excited if your results come back positive—that means you’ve been hacked!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Antiviral Programs: Stick With What The Professionals Use!

In the wake of news stories about viruses and identity theft, Internet security remains a very real concern for everyone who goes online today.  Internet security issues have created a big business for programmers in the virus removal industry. But with dozens of computer anti-virus programs available on the market, it is hard to know which provides the best virus removal and the greatest Internet security.  For that, the best response may be overkill.

Researching Internet security issues and virus removal protocols is enough to make the head spin of anyone who is not a trained computer expert.  Astute computer users who just want to check out what the current threats to their computer are become baffled by technical jargon.  Looking at reports from the major Internet security companies like Symantec are likely to leave the average computer user confused.  After reading their report on the Packed.Generic.340, most computer users will not know how serious a threat it represents to their computer or if they need any form of virus removal.

Many companies that specialize in Internet security rely upon more than one antiviral software product to ensure they are adequately protecting their computer or network.  Some of the leading Internet security companies take the time to test the leading products on criteria like malware detection and virus removal.  AV Comparatives recently released their report on their tests of anti-viral software.  Even that, though, may be too much for the common computer user to handle and process.  Their testing methods are rigorous, methodical and designed for the best minds in Internet security and virus removal to understand.

Businesses only survive online when they have adequate Internet security and powerful virus removal.  Thousands of businesses and home computer users use the Rescuecom Internet Security Suite.  Rescuecom has one of the most reputable Internet security and virus removal products on the market.  As a leader in Internet security and virus removal, Rescuecom has a proven track record for business and home computer users.  Even though the Rescuecom Internet Security Suite may have more virus removal options and greater Internet security provisions than the average user is likely to need, you have to ask, “If the professionals are using this much protection, shouldn’t I?”

The answer, of course, is that you should.  With the threats of identity theft, infections that require aggressive virus removal and emerging Internet security concerns, private computer users should not skimp on their anti-viral software: overkill is safer than being under protected.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Let’s Talk Facebook Etiquette

When it comes to giving wedding gifts, dressing for interviews, drinking tea, writing thank-you letters, and an endless array of other social situations where proper etiquette is desirable, Emily Post’s Etiquette might just be the official American canon of Etiquette. The fact that the book’s latest edition includes several new chapters on online activity, social networking, and digital communication etiquette is a sign that etiquette is very much a dynamic standard. More importantly, though, it’s a sign that digital communication—Facebook , for example—has become such a significant and serious part of our lives that it demands inclusion in the canonical discussion of etiquette.

According to Fox News, the latest edition of the book confirms some common sense expectations about handling email correspondence, for example. “Etiquette” says that you should respond to personal emails within two days and to business correspondence within 24 hours. While it’s good to keep that knowledge in the back of our minds, in reality, most of us already respond to emails very quickly. Still, larger business and big companies who take forever to respond might want to skim through Post’s new book for an etiquette tip or two.

When it comes to Facebook, Emily’s advice might seem counterintuitive to many, but in the end, it comes as a relief. According to the book, Facebook users aren’t obligated to respond to every friend request. What a relief. We’ve all gotten undesirable friend requests from family members, coworkers, or, simply, annoying people that we don’t want to let into our cyber social space! Recent changes to Facebook now allow users to delete unwanted requests, instead of just ignoring them or leaving them in, what was colloquially known as, Facebook quarantine.

In fact, the etiquette guidelines not only permit rejecting friend requests, but they also permit unfriending (AKA, defriending). In other words, having contacted an old lost friend or family member once, there’s no rule that says that person must forever have access to your Facebook  profile and social activity. Indeed, regularly unfriending low-contact friends and acquaintances is an easy way to protect your online Internet security—the less people have access to your account, the less you risk your information falling in the wrong hands.

For many of us, this might seem a little odd. After all, one of the biggest reasons we accept annoying friend requests is our fear of being judged or a sense of guilt. We shouldn’t feel guilty at all, though. Requests require approval for a reason—they’re not mandatory. Also, never feel guilty or embarrassed about untagging yourself from a photo or link that you don’t like. The same applies to posting photos. If the photos aren’t of your event, then don’t post them unless you have permission.

For a more detailed analysis of etiquette, in general, and online etiquette—or netiquette as some call it—check out the latest Post edition, all 736 pages of it.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Seven Reasons to Shop from Home this Black Friday

If you’re already planning your post-dinner shopping strategy in preparation for a long night waiting outside stores on Black Friday, perhaps you would like to reconsider. The notorious holiday is often the best time of year to buy electronics, as well as many other items. In case you’re thinking of hitting the stores on Thursday night, or even if you’re just not sure what to do, here are seven reasons you should stay at home, relax, sleep in, and shop online:

1)   False advertising: Unbelievable deals are unbelievable for a reason—they usually come with fine print. Incredibly cheap laptops, for example, are often not worth the wait. The cheap price tag can come back to haunt users with computer repair expenses, and stores like Walmart carry a very limited supply. Expect to find most of the deals you want gone by the time it’s your turn to get into the store!

2)   Similar deals: As more people flock to stores’ websites, stores are flocking to give people what they want. Wal-Mart and Target, among others, are very much aware of the shifts in Black Friday shopping trends and are increasingly offering most of the same deals online.

3)   Hungry crowds: Black Friday shopping can bring out the worst in people, which is why it can get pretty nasty. It’s easy to become overwhelmed with the stress of tending to multiple lists and balancing different schedules to match different store opening hours. Especially in this bad economy, low prices can be a dangerously strong motivation to push and shove. Why deal with the crowds when you can stay in bed?

4)   Localized shopping: Shopping online places dozens of stores and retailers in one location for your convenience: your computer. You don’t have to hop from one mall to another to buy a computer, a bathrobe, and a new tie. In fact, if you shop at Amazon.com, you’ll find a huge variety of items on one site.

5)   Earlier sales: Amazon, Walmart and Target have already begun offering discounted items as part of a weeklong online sale. You don’t even need to wait for Friday (although some deals are still exclusive to Friday). Look on these retailers’ websites for previews of what to expect over the next few days. Remember, though, that even some online supplies are limited.

6)   Peer Pressure: Amidst the in-store shopping frenzy, it’s easy to impulsively buy more than you need. When we see others buying left and right, we tend to think we should be competing and often do the same thing. Besides, the physical proximity of merchandise can lead us to reach for things we do not need just because they’re within sight.

7)   Research: Buying online gives you ample time to research and compare products. After all, a low price isn’t always the only selection criterion. It’s difficult to compare products in a store where they’re flying off the shelf before you can even reach them!

If you are not convinced and still want to shop in stores, then make sure you’re prepared: do your research, know what you need, and stay away from crowds.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For more information, contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The Joy of Being a Technology Lab Rat

With so much new technology bombarding us left and right, it’s hard to decide on the right time to upgrade to a newer model of a product or even try out something new. Many people are aware of the fact that brand new technology often needs quite a bit of initial tweaking to fix production glitches that are missed in the testing phase. It’s often the case that a few days into a new product’s debut, problems start to emerge, as was the case with Apple’s iPhone 4S, where Siri and battery problems began to show.

For many enthusiasts, this is hardly a problem—many enjoy being an indirect contributor to the success of gadgets by testing them out. If you’re so eager to try out a new product that you’re willing to work through any initial limitations, then by all means, go for it. Certainly, if you’re an experienced technology lab rat, you probably know what to expect. You might be such a loyal Apple or Android user that you actively push your new smartphone or tablet to its limits in the attempt to discover its strengths and weaknesses. Still, dropping your device or trying every single app you can get your hands on aren’t exactly the best approaches. Trying out too many apps, especially, can clog-up your device, not to mention pose security threats. Over the last four months, for example, the number of apps with malware in the Android market went up by over 400 percent!

On the other hand, if you’re just getting into the tech market and are thinking of standing in line for the new Windows phones, Nokia Lumia 800, for example, keep in mind that as cool as the latest technology is, it often costs more than just big bucks. You could find yourself waiting anywhere from a few weeks to a few months for software upgrades and security patches, which could limit your new device’s initial functionality.

Another thing to keep in mind is supply and demand. As more manufacturers push their products onto the market, competition will grow. The heightened competition will benefit consumers in more ways than just lowering prices. Companies will face each other in the OS battlefield, each trying to beat the others in quality and elegance.

Manufacturers learn from their mistakes, which is a good thing in the end, but it also means that consumers willing to buy the latest gadgets have to agree to be technology lab rats, for a short while, at least.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Time for Some Facebook House-cleaning

Whether your Facebook account is a few months old or whether it will be celebrating its seventh birthday soon, chances are that you have accumulated quite a bit of data the website’s servers. Unless you regularly weed your pictures, tags, wall posts, comments, and “likes” to remove old—and often embarrassing—data, then all this data is lingering in Facebook cyber space.

Maybe you just don’t like the feeling of having so much Internet activity documented and scattered on dozens, maybe hundreds, of pages, photos and links, or maybe you’re worried about a stalker, regardless, there are plenty of reasons to want to purge your public online activities off Facebook . The problem is, it’s virtually impossible to do it all manually. There’s no way you can remember every post you’ve made or every photo you’ve liked. Even if you did, going through and removing them all would take endless hours. It might also cause you more distress than you need as you see old and embarrassing photos and posts. Fortunately, if you’re looking to clean up your Facebook account before an important job interview, for example, a new Android app called “Exfoliate” can do the job for you. The app can delete old Facebook  posts, comments and “likes,” putting your mind at ease.

Currently, the app only works via an Android phone. Once you install it, you connect it to your Facebook  profile and select what exactly you want deleted. For example, you can specify that all your Facebook  wall posts older than two years be deleted, or you can have the app delete all comments older than 3 months. The latest “Exfoliate” also supports photo deletion.

The apps creators warn that it does use up a lot of the phone’s battery and can clog up the user’s network service. Still, it’s faster to run the app on a Wi-Fi connection. Most people will want to run it over night, as it does take quite a while to go through a few years of old posts.

One thing that the app doesn’t do is remove others’ photo tags of you. That unfortunately, you’ll have to do manually. Recent Facebook  upgrades, though, are making it easier to remove unwanted tags. You can now even ask friends to take down pictures that you appear in if they’re not particularly flattering.

Sadly, another limitation of the app is that despite removing data from public visibility, all your Facebook  activity, your posts, your pictures, your comments, are stored by Facebook ’s servers. The issue has gotten recent media attention as more people start to freak out—rightly so—about how much Facebook  really knows about them.

“Exfoliate” is highly rated on the Android Market app store, and for the amount of work it does, $2.99 is an incredible price. For the opportunity to clean your Facebook activity off yours and your friends’ walls with such ease, it might even be worth buying an Android phone just for the app!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The Catch-22 Of The Cloud

When Harry Potter And The Deathly Hallows, Part 2 dropped on DVD, a big part of the advertising campaign was that the fully-loaded version included an UltraViolet Digital Copy. UltraViolet uses the Cloud platform and with popular movies streaming from it, this is becoming many consumers’ first experience with the Cloud. While the idea of the Cloud may seem like a strong one, it has a number of risks to consumers.

The Cloud, as it pertains to media, is a form of online storage where companies produce material and give access to it to paying customers.  As a form of online storage, users have access to files without downloading or uploading them.  For those who buy the DVD and Blu-Rays that have UltraViolet copies, they access the online storage vault from UltraViolet when they want to watch their movie.  The file then streams from the online storage point in the Cloud to your computer, smartphone or other cloud-connected device.

The Cloud is banking on customers not wanting to use up hard drive space for digital copies of their media.  Companies using the Cloud see online storage as a way to prevent pirating.

Consumers have many reasons to be wary.  Because the online storage of the Cloud requires a connection, Internet security issues are a very real concern for users.  Threats to Internet security through viruses may be easier to control with the Cloud, but they are also easier to disseminate.  As soon as the Cloud-based version of a file is corrupted, every computer using that file may be infected.  To date, Internet security providers have neither illustrated such a problem nor a defense against it.  Users who are unsure of their own Internet security measures are wary of online storage like the Cloud.

The vendors using Cloud-based media are also are arguing that the Cloud-based media will not wear or scratch the way traditional DVDs, CDs and Blu-Ray discs do.  But Cloud-based vendors are neglecting the basic psychology of ownership.  For sure, an online storage vault is a convenient idea, but it leaves consumers without something physical to feel they own.  The Cloud-based online storage concept suffers the same defect as the MiniDisc in the area of the psychology of ownership; consumers pay more for something they do not see and cannot feel, making them feel like they overpaid.

Internet security issues aside, Cloud users have every reason to doubt the long-term viability of the scheme.  Technology changes fast, and paying more money for a service or company that may not exist in a few years makes consumers less likely to try new technologies.  The music store The Wall used to guarantee CDs with their sticker on them for life.  Those who still have CDs from The Wall now have a worthless guarantee.  Between the Internet security issues and the fact that online storage methods like the Cloud have not been tested in the long-term, users have every reason to remain wary of spending the extra money now.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending