Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

iPhone 4S Power is Lacking

Apple’s iPhone computer support personnel gave a press release on November 2, 2011 about customer complaints concerning their iPhone 4S.  Specifically, customers complained that the battery of the iPhone 4S was draining too quickly. Apple’s iPhone computer support staff said in the statement that the problems are the result of bugs in the iOS5 operating system.  This could mean trouble for Apple’s holiday sales, since other phone network service providers are standing by to pick up any slack.

The iPhone 4S hit shelves last month, and shortly after that, complaints began to come in to iPhone computer support hotlines.  Some customers reported that the iPhone 4S was drawing power even while in stand-by mode, and would go from a full charge to empty in as little as four hours.  Others stated that using the phone network service for as little as ten to fifteen minutes resulted in a ten percent loss in battery life.

The statement released by Apple’s iPhone computer support staff acknowledged the problem while avoiding any mention of a specific cause.  What the statement made clear is that the problems with the phone network service stem from a software issue, and that iPhone computer support personnel expect to release an update in a few weeks.

Here are a few things you can do to extend your battery life until iPhone computer support publishes the fix:

1) Turn down the brightness of your screen.   Less light emitted means less power drawn, which leads to a longer-lived battery.

2) Turn your wireless connections off when you’re not using them.  Many phone network services have features such as Bluetooth, Wi-Fi, or 3G wireless connections, which run in the background of the phone and increase power drain.  Turning these phone network services off when you don’t need them will help extend the life of your battery.

3) Be aware of the locator feature.  The iPhone 4S phone network service is constantly pinging GPS and cell-towers to find the phone’s location.  This allows the phone network service to do things like give you a local weather update, or find restaurants in your area.  While this feature enables the phone network service to do some neat things, the constant pinging is a real drain on your battery.  Some users concerned with their battery life have taken to turning this feature off unless they need it for something specific.

Though following each of these steps will result in slightly increased battery life, they are not a solution to the problem.  For a real solution, we’ll just have to wait until iPhone computer support releases their update in a few weeks.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Too Young to be on Facebook?

A study appearing this week in First Monday highlights a serious threat to users’ Internet security—underage users, that is. Millions of kids under the age of 13 are on Facebook, according to the study. One of the most significant findings is that parents willingly help their children join Facebook, despite the dangers this practice poses to children’s privacy and Internet security.

According to a CNN article on the study, 95 percent of parents of 10-year olds know that their children are on Facebook. In fact, they helped their children create the account. Though this is not necessarily a surprising finding, it should certainly be an upsetting one. Parents are essentially desensitizing their children to the need to have strong Internet security while online. By helping kids join at such an early age, parents are telling their kids that it’s ok to share pictures and other personal information, that being vigilant about Internet security isn’t necessary.

Perhaps one cause of this growing disregard for Internet security is the fact that people take Internet security for granted. Users assume that there is no imminent threat to their children’s—or their—Internet security because they’re using a secure home network service or because they have firewalls and other kinds of protection set up that. However, the main Internet security threat is not one that comes from network services. The most imminent Internet security threat facing younger users is the loss of privacy.

Last year, Consumer Reports found that 7.5 million children under 13 were Facebook members. Such a figure may not seem too significant relative to Facebook’s 800 million users, but in reality it is very alarming. There are almost as many underage kids on Facebook as there are people in the greater Boston area. Shouldn’t kids be playing outside or reading Harry Potter instead of slowly becoming naturalized to ignoring Internet security, living in a cyber world that cannot substitute for healthy, real social interactions?

The trouble is, as network services become abundant everywhere, it’s hard to prevent children from wanting to join Facebook or going online 5 hours a day. In fact, as the study shows, parents tend to allow their children to join Facebook precisely because it has become a standard communication tool across network services. The rising complexity of network services makes it hard to separate online media and stick with one form of communication only. Email, chat, Facebook, and calendars are increasingly becoming one large network service, which makes it hard to limit online activity to only email, for instance.

For parents, there’s no easy solution to the problem. Balancing the need for strong Internet security and protecting kids’ privacy with the need to be involved in an increasingly interconnected online world is just one of the many perks of parenting.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Smartphone Virus Removal is Still Budding

The way the smartphone market is heading, those things that once allowed us to make phone calls and send text messages (what where they called again?) will quickly be forgotten. In their place (oh, that’s right, phones) the standard communication device will be the smartphone. Smartphones are becoming more like computers and less like phones. Apple’s iPhone and Google’s Android, the two systems currently dominating the market, already work like mini computers. Given this slow but inevitable shift in the functionality of phones, it is important to remember that they are becoming more susceptible to Internet security issues and may encounter problems that require virus removal.

As browsing capabilities on smartphones become more sophisticated, users are able to access more websites, many of which pose a risk to a smartphone’s Internet security. Downloading email attachments, for example, carries Internet security risks. Internet security is also threatened by using unsafe networks. The biggest threat to Internet security, though, is mobile apps. According to an article in The Telegraph, malicious software attacks on smartphones are on the rise.

Cyber criminals are rushing to write new virus software that can breach smartphones’ Internet security and record private and sensitive user data such as bank account information or login passwords. Such increasing threats require users to employ the necessary measures to ensure their phones’ Internet security.

Unfortunately, sometimes even the best Internet security precautions fail, causing smartphones to require virus removal efforts. Virus removal for smartphones is relatively new territory, which is why users shouldn’t gamble with their devices and risk losing valuable data and money because of amateurish virus removal. Smartphone users should seek out professionals in virus removal, like Rescuecom who have a long history of providing Internet security services, as well as virus removal services for a variety of computers and computer-based devices.

The transformation of the phone into the smartphone marks an exciting and important time in the development of technology. It signals the marriage of complex technology and basic tools. But while we drool over the potential that these devices bring with them, we should remember that as computers, they require more advanced tech support to stay healthy. They also require us to pay more attention to Internet security and to get the right kind of virus removal if that ever becomes necessary.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Know When to Call the Pros.

If you’re reading this, chances are good that you’re sitting at a computer.  Unless you happen to be a computer repair specialist, chances are also good that your idea of how that computer works is a bit vague.  So what will you do if your computer malfunctions?  Will you call a computer repair specialist?  Could you deal with the problem with help from a computer support hotline?  Or would you attempt your computer repair at home? With those questions in mind, let’s take a look at some common computer repair problems and what the average user can do about them.

Read more »


Is your computer really secure?

Most people have some form of virus removal software on their computer.  Despite that fact, a significant proportion of those users will have to deal with an Internet security issue at some point in their computing career.  This is because the threat environment online is dynamic; it evolves constantly, trying to outfox the Internet security providers and get to your data.  How can you be sure that your virus removal software is providing the most comprehensive protection?  Here are some questions you should ask in shopping for virus removal software:

1)  Is the virus removal software you’re considering from an established, reputable provider?  It’s important that you be able to trust your virus removal software.  Most brands will have reviews posted online, which can help you decide if that particular program will fit your needs.  Conversely, choosing a virus removal program without investigation carries many risks, not least among them the risk of having your Internet security compromised by a bogus “diagnostic scan.”

2)  What happens when the software detects a threat?  It is important to make a distinction between virus detection software and virus removal software.  Virus detection software will find a threat and then notify the user, leaving them to deal with the threat by themselves.  Virus removal software will detect the threat, isolate it, and then remove it from the computer, usually with little or no input from the user.

3)  How often does the software update its threat registry?  As mentioned above, the ways in which hackers test your Internet security are constantly changing.  It is important, therefore, to make sure that your virus removal software updates its threat registry regularly and often.  These updates will allow your virus removal software to detect and cope with the newest Internet security threats as they appear.

4)  Exactly what features does your virus removal software offer?  Before committing to a particular program, take a look at what it can offer you.  While it is true that some Internet security companies offer only bare-bones virus removal packages, others include things like personal firewalls for added security, or spam filters for your email accounts.  Just as with any other purchase, the goal when shopping for Internet security programs is to get the most value for your dollar.

5)  Does the software company stand by their product?  Let’s be clear: no matter how comprehensive your virus removal software is, no matter how careful you are with your permissions, there is still a chance that you will eventually have to deal with a breach of your Internet security.  Another important question when shopping for virus removal software is: what happens then?  Does the Internet security company have support personnel standing by, or is it up to the user to fix the problem?

These are just some of the important questions you should ask yourself when shopping for Internet security software.  Answering these questions before you buy will ensure that you get the best possible protection for your computer.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for the Phishing Bait

Sometimes, ensuring strong Internet security depends on more than just a secure home or office network service or even a strong anti-virus program. Sometimes, strong Internet security depends on human vigilance, not just firewalls and virus software. This is because phishing, which is one of the most common threats to casual users’ Internet security, can occur even in the most secure network service. Though some Internet security programs or email features can prevent phishing, for example, it still poses a stealthy threat, since it relies on human naiveté.

Phishing is the attempt to breach Internet security and steal your passwords, usernames, and other information by tricking you into giving them up in some form or another. According to Wikipedia, the term “phishing” relates to the idea of falling for bait, the way fish do. So hackers and cybercriminals trying to compromise your privacy via your network service are metaphorically fishing along the river of network services for your information.

Phony or fraudulent emails that try to lure users into giving out their passwords are a common phishing technique. Phishing emails can look like they’re from a bank, a business, or even a government agency. Some emails present users with a phony story and ask them to respond with information that can be used to target their private online accounts.

Phishing emails are getting increasingly sophisticated, which makes them an even bigger threat to Internet security. Because some emails still reach our inboxes, it is important to look for the warning signs. These include poorly written emails with obvious typos or nonsensical information. Also, vague emails that don’t include any specific information about their recipient are usually scams. For example, an email from a financial institution that start with “Dear Customer” instead or your name is clearly trying to breach your Internet security.

Cybercriminals also try to trick users to log into a webpage that looks like an authentic page that actually records the submitted data and exploits it. Even when using a trusted network service, you could be susceptible to this form of phishing. If your Facebook or email login page looks subtly different, be cautious before you enter your username and password as it might be an Internet security scam.

Stay on the lookout for small details that predict phishing scams and threats to your network service like typos, vagueness, unprofessional appearance and tone, sloppy design, and nonsensical requests. But remember that threats to your Internet security aren’t always obvious—many are sophisticated. Change your password often as a regular means of protecting your network service and Internet security. Most importantly, remember that phishing doesn’t force you to give out your information; it tricks you, so don’t fall for the bait.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Ignorance is not Bliss When it Comes to Viruses

Computer viruses and virus removal can cost you more than just time and money; they can cost you valuable data or even a physical hard drive. The problem is that we’re often careless when it comes to getting the right kind of protection against computer viruses. In fact, even after we suspect that some kind of malware has infected our device, we often put off virus removal either because we think it’s not necessary or because we think it’s too much work. Well, both approaches are wrong.

If your device is infected with malware, letting the virus just sit there should never be an option. You should start virus removal immediately. The longer you wait before getting virus removal, the longer your private data is subjected to risks. Additionally, with many viruses, delaying getting virus removal allows them time to brew, so to speak. Think of computer diseases the same way you think of human diseases.

First, this means that prevention is the best cure. So protect your device with the right kind of anti-virus software to avoid the need for virus removal in the first place. Secondly, if your machine does get a virus or malware, don’t wait and be aggressive with your removal efforts. Seek out a virus removal specialist to avoid the risks of amateurish virus removal efforts. This is especially important if you’re worried about the data on your machine. Data recovery can be complicated and expensive, and it can be made worse by poor virus removal techniques.

A crude way of handling virus removal is erasing the entire hard drive and reinstalling Windows. Though his amateurish method of virus removal is relatively easy, it usually means that your data will be lost and that you’ll need a professional data recovery service. One way of avoiding this hassle is backing up your data regularly using a secure service like that offered by Rescuecom.

Getting professional virus removal can make data recovery efforts much easier as professionals can target the threats to your computer while protecting your data. Instead of having to pay for virus removal and data recovery, be cautious, and protect your device to avoid viruses. When you do get them, get them off as soon as possible.

Remember, viruses are not only a threat to your privacy and security; they are also a threat to your valuable data, since they can erase or damage it. In some cases, viruses can damage a hard drive so badly that extensive and complicated data recovery is the only solution left. In fact, sometimes even the most advanced data recovery efforts fail.

Given the risks to your data and to your wallet, the best way to avoid needing extensive data recovery efforts and complicated virus removal services, it is best to stay protected and vigilant. Don’t let viruses destroy your device just because you can’t see any imminent harm. This is one case where ignorance is certainly not bliss.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Looks like Spam’s Here to Stay

Approximately 300 billion spam messages go out everyday according to a recent Cisco Annual Security report. Over the course of a year, spam emails make up 90 percent of the world’s emails. Given such absurdly large figures, it is essential to maintain strong Internet security practices and to use secure network services.

Spam continues to thrive because it is an easy and cheap marketing tool for advertisers and other parties using it. Even when the vast majority of spam emails are ignored, the small percentage that actually reaches people can help improve the sender’s sales. Not all spam is advertising, though. A great deal of spam is laden with viruses and malware that can compromise a user’s Internet security and network services. In fact, most spam originates from network services infected with spam malware. So strong Internet security is essential to prevent machines from becoming spam hosts.

According to the Spamhaus Project, approximately 100 spam gangs taking advantage of the globalization of network services produce the vast majority of spam targeting the North America and Europe. The computers and network services that generate the highest spam emails are in Brazil, according to Cisco. Approximately 7.7 trillion spam emails originate in Brazil every year. The U.S. is a close second with 6.6 trillion.

Users can try to limit the amount of spam that they get by employing good Internet security practices, but even then, getting some spam is inevitable. The best Internet security measure to fight against spam is to be selective in giving out your email address. Just as you don’t go around telling random strangers where you live, you should protect your email address the same way. If you had to give out your address to a list of criminals every time you wanted a service, wouldn’t you say no? So why do we so readily give out our email addresses to facebook apps and other services?

It’s hard to say whether spam will actually disappear anytime in the foreseeable future. Spammers are already indifferent to laws governing Internet security, so it is unlikely that they will suddenly become concerned about their actions’ legality. Network service providers try to reduce spam, but their attempts are usually futile because of the dangerously simplistic nature of spam. Internet security services that are readily available in email, for example, have limitations. Even advanced ones like Gmail’s spam filter let spam through sometimes. On the other hand, spam filters often perceive harmless or real emails as spam, which can prevent authentic mail from getting through.

Spam is not only annoying, but it can pose a threat to your Internet security and harm your network services in the attempt to produce more spam. Improving Internet security against spam requires action on your part. No one is completely immune to getting spam, but safeguarding your email address is the clear-cut first step towards getting less of it!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Are We Ready for Talking Phones?

Apple’s iPhone 4S has found its voice with Siri, the new digital assistant that comes integrated into the phone’s OS. The feature allows users to interact with their iPhones as if they were talking to a personal assistant, albeit one who has limited functionality. Siri lets users control functions using their voice; users can send messages, check and make changes to their calendars and even search for nearby restaurants.

Siri is different from other voice-operated systems or features because, according to Apple, it not only understands what people say, but also what they mean. It understands the contexts of requests and can keep track of the conversation. For example, when a user says “reply,” Siri automatically understands which message the user is referring to based on context.  Apple calls Siri proactive, meaning that it will keep asking its user questions until it actually understands what he or she wants to know.

The voice control functionality works extremely well with text messages. Users can ask Siri to read incoming texts and to respond by typing what they dictate. Likewise, Siri is programmed to work smoothly with the iPhone’s calendar application. Siri can check for appointments, make new ones, and remind its users when tasks or meetings are scheduled. This feature, coupled with Siri’s understanding of colloquialisms, makes it easy to say things like, “Make sure I remember to pay my credit card bill after work.”

Siri also keeps track of its user’s geographic location, so to get directions, users don’t need to load a map and enter the final destination; instead a user only needs to say, “Where’s the nearest gas station?” If Siri isn’t quite sure what’s being asked, it may ask its user more questions for clarification.

The voice recognition technology works fairly well when it comes to recognizing mumbles and whispers, according to Mark Milian who reviews the feature for CNN.

Siri currently works with several of the iPhone’s integrated apps like music player, calendar, text messaging, and Yelp; but it has some limitations. Siri can’t work with outside apps and will not be able to do so until third party apps can be tied to it. The feature can’t access the iPhone’s camera, nor can it take email or memo diction.

Siri talks to users in a female voice (except in France and the U.K. where it has a male voice) and doesn’t have a heavy computer-software accent, so it seems rather friendly. Thanks to the ongoing advances in anthropomorphic voice technology, Siri adapts its tone to suit its sentence’s intended meaning, and doesn’t sound completely like a robot reading strung together words.

Overall, Siri isn’t perfect yet; it has quite a few limitations and will require strong tech support to improve. Besides, many people may not feel comfortable talking to their phones in public. Still, Siri’s future is promising; it can only get better as it gets tied to third-party apps and as its voice recognition and tonality become more advanced.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Desktops are not Obsolete Just yet

Today, laptops have become the standard for computing in many areas such as college, the business world, and journalism. They have also risen to become powerful competitors in the home. Looking at this trend, one might wonder if desktops are on their way out. But if you’re thinking of buying a new computer, don’t rule out desktops just yet.

Laptops have important advantages over desktops, such as portability and compactness, but other than that, desktops have the upper hand. Gamers, especially, take note. Even if you plan on buying a gaming laptop, you should know that you can get better features and more accessible tech support for the same price in a desktop.

If you are going to be investing a lot of money on gaming peripherals, you probably don’t want to spend too much on computer repair services. Computer repairs for laptops are more expensive than it is for desktops because laptops often have to be shipped out to their manufacturer for computer repairs. This is because laptop computer repairs are often more intricate in nature. Tech support for laptops is generally more expensive, as they are more difficult to take apart and require more time and effort to fix. Often computer repairs require new parts, and such parts are almost always going to cost more for laptops.

When it comes to graphic design and media layout, desktops can offer much more powerful tech support for programs in the Adobe creative suite, for example. Laptops also have the limitation of screen size, often forcing users who want a larger viewing area to connect to external monitors.

The same goes for video and audio editing; laptops simply can’t provide the advanced tech support that desktops can due to space limitations. After all, the powerful video and sound cards needed for high performance machines are simply too big to fit in the increasingly slim laptop design. Laptops can’t always provide the right kind of tech support needed to run programs like Nero or Sony Vegas.

Laptops usually bring with them pricy initial costs, as well as tech support. Upgrading desktops can be done fairly easily, at times even by an skilled owner, but the tech support required to upgrade laptops is costly and offers limited options (such as RAM upgrade).

If you think portability is necessarily good, think again. Many laptop problems that require computer repairs result from the devices being moved around. Overheating is a regular computer repair issue that results from placing laptops on uneven surfaces. Because of the proximity of parts in laptops, physical damage to one part can affect the others easily, causing several parts to require computer repairs. So leaving a desktop in place is actually not all that bad.

Desktops remain the device of choice for gamers, designers, and audio-visual editors. They’re also much cheaper to maintain, as desktop computer repairs aren’t as costly. Finally, tech support is more readily available for desktops. So don’t rule them out just yet.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


701-710 of 1857
© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending