Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Stars for Sale on Amazon

When browsing products on Amazon and you see a product has a five star rating that means it is a great product, right? Unfortunately, you cannot trust that rating as much as you might have thought. At least one Amazon retailer has been paying people to post rave reviews for its products on the site.

Though this highly misleading practice violates Amazon’s stated policies, VIP Deals paid its customers to give the product good reviews. The company is now suffering the consequences – Amazon took down the product page on which people posted the offending reviews and then removed all other VIP Deals products from the website.

When shopping online, many customers place a high importance on peer reviews because they cannot physically see or handle the item they are purchasing. Good reviews are essential for retailers to sell their product amid the multitude of similar products available online. Therefore, some retailers like VIP Deals are resorting to posting anonymous reviews or selling reviews in order to obtain customers.

Read more »


Making Marketing More Efficient: YOU Unwittingly Help The Data Miners!

If you have had M&M’s lately, you might be contributing to a growing problem without even knowing about it.  M&M’s has a current promotion on many of its wrappers advertising the chance to win free movie tickets.  This is very exciting; in addition to getting some candy, you have the chance to get into a movie for free!  How cool is that?  Your response might be a little different after you pull back the curtain and look at what MARS/M&M’s is actually doing (and they are not the only ones!).

When you go on the Internet to enter the code found on your wrapper of M&M’s, the site requests your birthdate and state.  This is a very odd redundancy as the M&M’s website requires you to provide your birthdate just to access the site (it reconfigures for different age groups, which is admittedly pretty cool).  After you have added your date of birth and state or territory, you may enter your game code.  When you enter your game code, you are compelled to provide your e-mail address before the site will tell you what you have won.

And lo!  The vast majority of winners who win anything from M&M’s.com have to enter their address . . . so M&M’s may mail you your movie coupon.  This may seem like a very exciting process that has you eager to go to the movie, as well as eat more candy (you could win again!).

But what has really happened?  In the space of about one minute, you have provided the MARS/M&M’s Corporation with your name, address, e-mail address and birthdate.  You have given the company everything they need to put you on a mailing list!

Virtually every company with an online presence now gets their data directly from their customers in this fashion.  Why pay for a mailing list from a competitor when you can simply have your customers furnish their contact information under the guise of winning something?  The bottom of the receipts for Taco Bell and Wal-Mart promise the chance of money each month when you call and inform the company about the service you received.  Some users online have reported spikes in e-mails from companies like Wal-Mart following filling out those surveys!

It used to be that businesses kept customers in the dark about how their names ended up on mailing lists.  With the rise of Internet contests and surveys that require you to give your contact information, the process is being redressed poorly.  But kudos to the big companies!  They have realized they do not need data miners; they just need to offer the possibility of getting something more with your seventy-five cent candy!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Digital Music May Or May Not Save The Music Industry.

According to the IFPI Digital Music Report from 2011, the music industry is a 15.8 billion dollar industry.  In 2010, legal digital music downloads generated $4.6 billion.  That number, which represents 29% of the music industry, has a vast number of analysts reaching very different conclusions.  The report, which notes that the music industry suffered a 31% loss between 2004 and 2010, is enough to give audiophiles pause.

Digital music in the form of digital downloads – audio files traditionally found online – have been on the market for over fifteen years.  However, the music industry started more carefully tracking the market share of digital downloads in 2004, following the collapse of Napster.  The influence of digital music in the marketplace has only increased; since 2004 the value of the digital music market increased 1000%!

Even with the convenient access to music that digital music affords its listeners and the lower production cost digital music offers producers, the music industry has seen widespread revenue losses.  Most in the music industry want to attribute the loss of revenue to pirated digital downloads.  Trends of pirating of digital music vary with every country, but some areas with less stringent intellectual property protections contribute more to the loss of revenue from pirating.  In the UK, 76% of music obtained online in 2010 was obtained illegally.  Industry experts estimate that digital music sales would be 131% greater if all piracy ended.

But the industry analysts may be making too many stretches in blaming digital music piracy for the industry’s woes.  The Digital Music Report attributes the 12% drop in global Top 50 concert revenues to pirating.  That connection may be a false one.  There is no evidence to suggest that those who pirate music either were attending concerts before they became music pirates or are less inclined to attend concerts once they begin pirating.  A much more likely factor contributing to lower concert attendance is the global financial crisis which has left many without the disposable income to spend on attending concerts.

Moreover, the report acknowledges that at 30% of their revenues, the music industry invests more heavily than any other entertainment sector in marketing and A&R (artists and repertoire, which is essentially talent scouting and artist development).  The report and analysts are quick to blame music piracy as the overwhelming cause of 31% drop in the value of the music industry since 2004.  Again, this is a simplistic view.  In that same time frame, pop music has all but died, replaced by rap, hip-hop and R&B on most Top 40 stations.  It is just as likely that the A&R sector of the music industry radically misjudged what music customers would pay for as it is that the piracy of digital music has precipitated the loss of revenues.

New services like Google Music continue to bolster the legal propagation of digital music downloads; there is no corresponding A&R avenue to so vigorously promote new, quality artists.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Dear Facebook, Please Stop Telling Me Who To Like.

Facebook has many challenges to it, both technological and commercial.  While Facebook should better monitor the applications it allows to run on its platform, some of the issues with Facebook are internal and systemic.  One of the most significant problems with Facebook is that it has an annoying persistence.  Have you ever noticed how Facebook continues to recommend the same people to you?  Have you ever noticed that the Facebook recommendation for friends just keep coming back?  What is it that Facebook doesn’t get when you click the little “X” next to their recommendation to simply not friend the people they recommend?!

The Facebook system works on the principle that there are very few degrees of separation between people.  As a result, when you add someone as a friend on Facebook, the Facebook program suggests friends of your friend be added as your friend.  From pretty much the moment you friend anyone new, you will begin to see on your sidebar, people that Facebook recommends you add as a friend.  A great way to test this is to add someone you do not know well at all as a Facebook friend.  After you add an acquaintance watch how Facebook suggests all sorts of people you don’t know from your new “friend’s” friend list.

Who cares?  Why is this an issue?  Unlike friend requests that you can deny and they go away, Facebook insists you consider their recommendation.  If you have ever gone to the complete list of people Facebook recommends you “friend” and painstakingly gone through the list to clear the (often) hundreds of people Facebook wants you to friend, you will discover your time was completely wasted.  Go back there now and you will see!  You can go through your entire list, remove everyone that Facebook recommends and the next time you log in, their recommendations will be back.

Facebook: “No means no!”  When you inform Facebook by clicking on the “no” button – indicating you do not want to add their suggestion to your friend list – Facebook ought to listen.  The Facebook program not only wants to connect people, it is persistent in a troubling way.

Facebook needs to simply be programmed to respect our wishes and stop making the same mistake.  Whether you have one of your ex’s friends and do not want the whole barrage of their other associates or have left a real social situation where you only want to retain a relationship with one person from that group through Facebook, there are millions of situations where you might want one person as a friend, but not everyone with whom they are associated.

Forget the Timeline, forget the “dislike” button, all you really need is a Facebook that listens and provides a way to permanently stop suggesting a person once you have indicated you do not want the Facebook-suggested individual as a friend.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Buying Music Can Save Money

It can be tempting to “share” songs via software like Kazaa or LimeWire rather than buying them. Such practices are not only illegal most of the time, but pose a serious threat to your Internet security. Downloading files using P2P (Peer-to-Peer) sharing software is one of the worst Internet security practices that users can employ. By downloading music or other files using such software, you could be inviting a conglomeration of malware to infest your computer. Even a small breach of your Internet security can cause you to spend lots of money on virus removal and, in some cases, identity theft problems.

Though LimeWire is no longer available for download due to legal reasons, users with older versions of the software on their machines can still use it, and can therefore still endanger their Internet security. Even when users don’t use LimeWire to share files, their Internet security is susceptible because the program automatically runs in the background, allowing strangers access to a user’s files!

When you opt to participate in P2P sharing, you can’t normally control what files you share. This lack of control can lead to your participating in copyright infringement, having your device infected with malware, and consequently requiring virus removal.

Perhaps the worst part of getting viruses from P2P sharing software is that we willingly invite them in. It’s like volunteering to spend time and money on virus removal. Sometimes, Internet security problems are hard to identify, but when threats are this obvious, there’s no excuse to fall for them.

If you’re looking for free music, YouTube is a great alternative. Watching music videos on YouTube poses far fewer threats to your Internet security, as viruses cannot usually target media files. Internet security problems that occur while on YouTube might be related to bugs in Adobe Flash player, but these are rare. Besides, Flash is constantly updated to eliminate bugs and ensure Internet security.

On the other hand, if you’re feeling overtly philanthropic and want to support the music industry by more than just illegally downloading songs, then consider buying the music! Amazon and Apple both sell music by the song, as do dozens of other sites. The great news is, music services like these are legal and don’t come with the added expense of virus removal.

Given the time and effort needed for virus removal, it is always better to make sure you have strong Internet security and to avoid using software like Limewire and Kazaa. After all, paying for a song or three is a lot cheaper than paying for virus removal.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Smartphone Users: Beware the Fraud

Fraud is not new to humanity.  Impostors and counterfeiters are as old as the idea of property.  The only new developments occur in the scams we see and the venues where they are attempted.  The birth of the World Wide Web created a digital world loaded with sensitive information where clever con artists could ply their trade.  Today, Internet security is paramount to protecting financial information from theft by nefarious individuals.  Everyone needs to consider seeking computer support to ensure effective Internet security.

Internet security as a way to identify and prevent fraud, started simply.  Over time, increased Internet security and the computer support it requires have become more and more a priority for people doing business on the Internet.  As Internet security becomes more sophisticated, so do the methods used to steal information.  Internet security, cybercrime, and the constant computer support needed to help in this conflict represent a daily battleground.  Personal users, out of concern and genuine fear, need the help of expert computer support, and they need continuous education in effective ways to maintain their own Internet security.  As an example, banks and private companies have begun offering identity protection to consumers worried about the safety of their transactions.

The most current and troubling threat to Internet security is the growing number of mobile web users.  Smartphones and tablets alter the digital landscape once again, and wireless options and expanded coverage are right alongside them.  Knowledgeable computer support is all the more important as threats to the Internet security of mobile users multiply due to the lack of anti-virus software on many devices.

Improving Internet security against mobile fraud continues as a top priority for commercial entities and the computer support personnel they employ.  Simple prevention is still the best solution to reduce the possibility of a cybercrime affecting you, and effective, reliable computer support is the key to peace of mind.  Take the time to install protective software on that smartphone.  Do your shopping while on the go, but wait until you get home to make that purchase.  The Internet security of your home machine is probably far superior to your mobile device.  A little education and proactive computer support can help prevent the huge hassles caused by a breach in your internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


“Here You Have” Illustrates Internet Security Failures

A new Internet security attack spread through email Thursday, though it came in somewhat old packaging.

The attack, dubbed “Here you have” after the subject line of the phishing attack emails, was reminiscent of attacks from 2000 and 2001.  Those attacks, the ILoveYou and Anna Kournikova worms, were the last significant mass email attacks, until now.  The Kournikova worm even used the same “Here you have” subject line. Read more »


Clickjacking Strikes Again

Facebook users may have been victimized by yet another scam.

Internet security firm Sophos has release information on another ‘clickjacking’ scam that hackers recently used to defraud Facebook users out of $5 a week.

While that may not sound like a very big scam, multiply $5 by even a fraction of Facebook’s 500 million users, and the totals add up quickly. Read more »


Facebook ‘dislike button’ really a viral attack

A new scam has begun spreading virally through Facebook, based on the often requested ‘dislike’ button.

Facebook, which allows users to ‘like’ posts, pages, and other content, has yet to create or approve a ‘dislike’ button.

Now a new scam spreading throughout the site tricks users into installing a rogue application which claims to be a dislike button.

Instead, the application uses each user’s account to virally spread itself, much like the “hot” and “funny” video scams which have plagued the social networking site in recent months.

Those attacks were designed to steal information from users, including their login credentials.

Protect yourself from this scam by avoiding any links, even from friends, that claim to provide a dislike button.  If you’ve already been victimized, deactivate the application, delete all posts referencing it from your wall, and eliminate it from your ‘likes’ and ‘interests’ in your profile.

As with the previous scams of this sort, changing your Facebook password is also recommended.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending