Posted on
August 11th, 2010 by
David
After release date delays, Dell’s Streak is finally ready to hit the market.
The smartphone-tablet hybrid will be available to customers who pre-ordered on Thursday, with general online availability on Friday.
The Streak is Dell’s first entry into the smartphone/tablet market and is the first contender to directly attempt to compete with Apple’s iPad. Read more »
Posted on
August 10th, 2010 by
David
Rescuecom Releases 5 Tips for Mobile Device Security
SYRACUSE, N.Y., August 9, 2010 – Mobile devices are extremely popular, but also extremely vulnerable. Internet security is no longer just a concern at home or the office, and phone data recovery is more than a solution for users. To help you understand the issues of Internet security and phone data recovery for your mobile devices, RESCUECOM offers these 5 tips. Read more »
Posted on
August 10th, 2010 by
David
With many of us tightening our belts because of the recession, every purchase needs to be made with our budgets in mind. However, making a budget purchase when it comes to technology can sometimes turn into a budget buster once the high costs of computer repair and computer support are factored in.
Purchasing a budget minded product can be a short term cost savings. Unfortunately, those cost savings are often offset by additional costs for computer repair and computer support that these devices incur. Read more »
Posted on
August 9th, 2010 by
David
A key component in keeping your Internet security up to date is the free form of computer support provided by many major software companies – patches.
For example, Microsoft releases Internet security patches, along with non security computer support updates, on the second Tuesday of every month or “Patch Tuesday.”
Tomorrow’s Patch Tuesday will feature 14 bulletins with patches for thirty-four Internet security vulnerabilities in Microsoft’s products including Windows, Office, and Internet Explorer. Read more »
Posted on
August 6th, 2010 by
David
Smartphone data recovery can be costly, but it can be avoided by following some simple tech support tips.
Many of us rely on mobile devices such as the iPhone and the BlackBerry. Yet, despite everything we do with these phones, one thing we don’t always do is take precautions to preserve our data.
So what can you do to avoid needing data recovery for your smartphone? Read more »
Posted on
August 4th, 2010 by
David
Google is the “King of Search”. Now, it has another, less flattering title: “King of Malware.” Google search results have become an Internet security threat.
The Barracuda Labs 2010 Midyear Security Report studied search engine results for ‘trending’ topics, and showed significant flaws in Google’s Internet security.
According to Barracuda, Google searches resulted in far more malware infected links – 69% – than results for Yahoo, Bing, and Twitter combined. Read more »
Posted on
July 30th, 2010 by
David
Do you know what every update, installation, and change does to your computer? Computer repair and computer support issues can be caused by obvious things, like physical damage. But they can also be the result of even simple changes to your computer.
Being aware of these changes, and their potential for causing trouble, is a key step in avoiding a costly computer repair or computer support problem. Read more »
Posted on
July 26th, 2010 by
David
Most of us are not as tech savvy as the computer support specialists we entrust with our computer repair problems. We all know the main parts of a computer such as the CPU, hardware, software, and memory, but we’d probably be at a loss to explain what a BIOS is or how the Windows Registry works. To help make things a little clearer, RESCUECOM’s computer support specialists offer these simple definitions of complex computer parts. Read more »
Posted on
July 23rd, 2010 by
David
For software, the number of Internet security vulnerabilities is a key component in determining its quality and usability. Software with multiple vulnerabilities causes constant nightmares for computer users and computer support specialists alike.
Recently, security company Secunia reported that Apple had the most Internet security vulnerabilities of any software company. This was surprising, given Apple’s historically strong Internet security track record.
However, Secunia’s more important news was that most Internet security vulnerabilities come from third party software. Read more »
Posted on
July 22nd, 2010 by
David
Many of us rely on professional computer support and computer repair specialists to keep us up and running. But how many of us have ever wondered what we might be able to do to help them?
Computer support and computer repair specialists like to help. They have to – it’s part of the job. But, just like you, they also like it when things go as smoothly as possible. While you may not be able to fix complicated computer repair problems, there are some things you can do to make the experience go as smoothly as possible, for both you and the technician. Read more »