Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

OpenSecrets Keeps Government Accountable And The U.S. Free!

Free speech and free access to information is absolutely vital in a capitalist democracy.  Any government that allows individuals, organizations and businesses to contribute financially to the political process owes its citizens a transparent process for auditing those contributions.  In the United States, there is no easier system for tracking money in politics than OpenSecrets.

OpenSecrets.org is a website run by the nonpartisan Center For Responsive Politics.  On OpenSecrets, you may investigate the fundraising of every political candidate registered with the Federal Election Commission.  Because the Center For Responsive Politics is not affiliated with the FEC or any political party, it provides unbiased tools that track the flow of money in politics.  Understanding how money flows to a candidate may provide voters with a realistic view of how that candidate will actually act when elected.  Because politicians are beholden to their donors, it is very easy to spot a hypocritical candidate.  OpenSecrets makes that very easy to do.  Because the website features a whole section on influence and lobbying, voters have easy tools to investigate the candidates on their ballot, whether the media does or not.  OpenSecrets shows which Political Action Committees donate money to each candidate, giving voters a more precise picture of the political landscape.

OpenSecrets.org features a very easy to use interface and a powerful search engine.  Users may find quarterly representations of a candidate’s financial standing through prominent tabs.  Clicking on the Politicians & Elections tab easily transports you to a guide for any Federally-recognized election for the current election cycle.  Clicking on a candidate or politician’s name, OpenSecrets.org provides you with the current financial status of their campaign!  The interface is so easy to use; you can be at a political rally and check the candidate’s finances on your smartphone!

Arguably the best tool that OpenSecrets.org provides is a powerful donor lookup tool.  OpenSecrets has archived all the FEC’s donor filing documents and provides you with complete, free, access to them!  By clicking on the Donor Lookup tab, you can find out if any private citizen has donated to any political campaign dating back to 1990 when the disclosure laws went into effect.  The Donor Lookup tool on OpenSecrets.org can give you a better idea of who you are voting for, what issues are important to your friends and just who puts their money where their mouth is when it comes to politics!  Moreover, the results come in fast; the typical search on OpenSecrets takes less than a second to execute.

OpenSecrets is a powerful political tool, especially in a time when the Courts frequently fail to protect access to information that should be public.  OpenSecrets is an online storage depot of information that belongs to the public and we are lucky to have such a sophisticated system watching the flow of money in politics.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Facebook for College Professors: The Ten Commandments

We’ve searched the web for articles, blogs, and lengthy school policies on how professors should use Facebook and created a condensed version of the multitude of those tips. Here are the Rescuecom Ten Commandments of Facebook for College Professors (violate them at your own risk):

1)   Thou shalt never, ever, send a friend request to an undergraduate student still enrolled at your institution. Almost every online resource that provides information of Facebook ethics for academics insists on this point. It’s by far the most important rule, so please abide by it.

2)   Thou shalt accept student friend requests consistently. That is to say, either accept all requests from your students or accept none. Picking and choosing is a blatant display of favoritism, not to mention an easy way to get a zero on the “Instructor is impartial” question on your evaluation. (Nota bene, this doesn’t apply to students who have graduated. Once they’re out, feel free to reject and accept as you please.)

3)   Thou shalt not comment on your students’ photos, especially embarrassing ones. Remember that you need to maintain formality, even when Facebook tries to do away with whatever formality is left.

4)   Thou shalt not poke your students. No one likes pokes. They’re annoying and awkward. Imagine how awkward they are when they come from a professor.

5)   Thou shalt be friendly and encouraging—albeit proper—when students share links with you or write on your wall.

6)   Thou shalt not post anything you wouldn’t share with your students in person. Make sure you adjust your Facebook Internet security settings to limit what students can see.

7)   Thou shalt not use your students’ profiles against them. When a student emails you with an excuse for missing class, don’t snoop around his or her profile to check the claim. That’s just creepy and cumbersome.

8)   Thou shalt maintain an academic and professional tone to your Facebook—be an example to your students.

9)   Thou shalt not post class material, syllabi, grades, or announcements on Facebook. Even if you are Facebook friends with every single one of your students, Facebook is still not a reliable way to make announcements because it lacks formality. Also, do you really want to give your students yet another excuse to be on Facebook.

10)  Thou shalt not use social network services like Facebook in place of email communication. Email correspondence, once again, is infinitely more formal than Facebook correspondence—and you want to keep communication serious and academic. Besides, email can provide you with official records of correspondence if you ever need them. Imagine how odd it would look if you were to use Facebook transcripts in a plagiarism hearing, for instance.

It may be unfair to place so many restrictions on how professors and educators use Facebook, but it’s just another job hazard. Sorry, professors.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Antiviral Programs: Stick With What The Professionals Use!

In the wake of news stories about viruses and identity theft, Internet security remains a very real concern for everyone who goes online today.  Internet security issues have created a big business for programmers in the virus removal industry. But with dozens of computer anti-virus programs available on the market, it is hard to know which provides the best virus removal and the greatest Internet security.  For that, the best response may be overkill.

Researching Internet security issues and virus removal protocols is enough to make the head spin of anyone who is not a trained computer expert.  Astute computer users who just want to check out what the current threats to their computer are become baffled by technical jargon.  Looking at reports from the major Internet security companies like Symantec are likely to leave the average computer user confused.  After reading their report on the Packed.Generic.340, most computer users will not know how serious a threat it represents to their computer or if they need any form of virus removal.

Many companies that specialize in Internet security rely upon more than one antiviral software product to ensure they are adequately protecting their computer or network.  Some of the leading Internet security companies take the time to test the leading products on criteria like malware detection and virus removal.  AV Comparatives recently released their report on their tests of anti-viral software.  Even that, though, may be too much for the common computer user to handle and process.  Their testing methods are rigorous, methodical and designed for the best minds in Internet security and virus removal to understand.

Businesses only survive online when they have adequate Internet security and powerful virus removal.  Thousands of businesses and home computer users use the Rescuecom Internet Security Suite.  Rescuecom has one of the most reputable Internet security and virus removal products on the market.  As a leader in Internet security and virus removal, Rescuecom has a proven track record for business and home computer users.  Even though the Rescuecom Internet Security Suite may have more virus removal options and greater Internet security provisions than the average user is likely to need, you have to ask, “If the professionals are using this much protection, shouldn’t I?”

The answer, of course, is that you should.  With the threats of identity theft, infections that require aggressive virus removal and emerging Internet security concerns, private computer users should not skimp on their anti-viral software: overkill is safer than being under protected.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Performance Design Products Features All Things Muppets

Anyone who went to the movies over the summer or watches their television for more than half an hour on network television knows that the Muppets are returning to the big screen with The Muppets.  While the dozens of trailers and parody posters might be exciting the online communities, no one is bringing the Muppets into real life quite like Performance Design Products.

To help promote The Muppets and show off the stylish nature of the Muppets, Performance Design Products has released more than a dozen Muppet-related products.  Performance Design Products is not without a sense of humor about how they merchandise the Muppets, either: to protect the Apple iPad, Performance Design Products has released a case and sleeve that features the chaotic Animal.  Animal is one of the most popular characters from the Muppets and the bright rendition of the character on the neoprene sleeve is enough to make users go wild with their iPad.  For more sedate Apple iPad users, there is an equally durable Kermit the Frog sleeve and clip case for protection against mundane wear.

Performance Design Products makes it easy to be green with the Kermit The Frog iPod Nano slap band.  The Performance Design Products Kermit The Frog slap band perfectly complements the latest iPod Nano.  The current generation of iPod Nano features a clock face function and Kermit The Frog is preloaded!  Great for children or just those with an unabashed love of the singing green frog, the Kermit The Frog slap band securely accessorizes the iPod Nano.

Performance Design Products’ products from the Muppets are geared exclusively to Apple products, with the bulk of their merchandising being directed at protecting iPod Touch 4 and Apple iPhone 4 and iPhone 3 mobile phones.  Performance Design Products protects iPod Touch 4 with one of six clip cases with matching screen protector.  Fans may choose between Animal in color or black and white, Miss Piggy, Fozzie Bear, Kermit or Beaker, the cantankerous lab assistant.  Beaker clip cases are also available for the iPhone 3 and iPhone 4, while the black and white Animal clip case is only available for the iPhone 3.  Naturally, the diva Miss Piggy has a clip case for the iPhone 4 exclusively.

All of the Performance Design Products protectors are functional as well as stylish and with the durable materials they use, it is hard to imagine one’s Apple product showing any wear when protected by their sleeves and cases.  Certainly, the time is right: regardless of how The Muppets performs in theaters, the Muppets have influenced the generation that uses the latest Apple products.  The new protectors from Performance Design Products ensure that the Muppets will be around to influence the next generation!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The Cullen Crest USB Flash Drive

As Breaking Dawn Part 1 hits theaters, it is hard to deny that for a surprisingly large population around the world, The Twilight Saga is cool. Never before has a science fiction or fantasy book or movie series so effectively marketed merchandise toward young women.  Take, for example, the Twilight Cullen Crest USB Flash Drive.  The Twilight Cullen Crest USB Flash Drive makes flash drives cool for Twi-hards.

Flash drives have, within the last five years, evolved from a secure means of storing data and media files off-site to a portable, status symbol.  Once the pride of geeks trading downloaded or pirated files, flash drives are now a ubiquitous item in American culture, flaunted in virtually every demographic.  Far from simply being a useful tool, soccer moms use them to show off their support for breast cancer research, game-players accessorize them with their favorite video games and Twi-hards of all ages can use them to choose Team Edward or Team Jacob.

Funko, known more for making trendy toys from genre films, produced the Cullen Crest USB Flash Drive to coincide with the release of New Moon, but because the Crest is timeless iconography from the entire Twilight Saga, it continues to remain popular in Twilight fan circles.  Fans of the Twilight Saga will enjoy that the USB flash drive comes pre-loaded with the soundtrack to New Moon.

The statement Twi-hards are making, though, is that they love the romantic vampires of the Twilight Saga and the crest of the Cullen family does that excellently.  The 2 1/2” tall flash drive is black with the distinctive silver-gray griffin embossed into its oval surface.  The only difference between the USB’s crest and the one shown in all of the Twilight films is that a bar below the shamrocks features the title “Twilight” on the protective cap.

Usage of the Cullen Crest USB Flash Drive is simple.  Because it features a USB port, it easily connects to any computer or USB connected device.  The 2 GB of memory the flash drive possesses makes it ideal for storing images and music, in addition to one’s data storage needs.  With the Cullen Crest USB Flash Drive, Funko’s customers have been pleased for years at how the Tymemachine Powered by Funko product makes data recovery both stylish and easy.

Far less risky than picking out jewelry for a Twilight fan – there is a lot of different jewelry for all of the specific characters – the Cullen Crest USB Flash Drive makes for a practical gift for the tech-savvy Twi-hard.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Internet Security for Santa

Using your network service to do your holiday shopping has many advantages.  There are no lines or crowds.  If you want to see another store’s price for a product, that information is a click away.  Even better, you don’t have to worry about parking at the mall – shopping has become as easy as turning on your computer and starting the network service. Shoppers who used their network service to buy gifts accounted for more than thirty billion dollars in sales last year.  Taking some quick and easy precautions will ensure that you can participate in this exciting new marketplace without compromising your Internet security.

Read more »


Too Young to be on Facebook?

A study appearing this week in First Monday highlights a serious threat to users’ Internet security—underage users, that is. Millions of kids under the age of 13 are on Facebook, according to the study. One of the most significant findings is that parents willingly help their children join Facebook, despite the dangers this practice poses to children’s privacy and Internet security.

According to a CNN article on the study, 95 percent of parents of 10-year olds know that their children are on Facebook. In fact, they helped their children create the account. Though this is not necessarily a surprising finding, it should certainly be an upsetting one. Parents are essentially desensitizing their children to the need to have strong Internet security while online. By helping kids join at such an early age, parents are telling their kids that it’s ok to share pictures and other personal information, that being vigilant about Internet security isn’t necessary.

Perhaps one cause of this growing disregard for Internet security is the fact that people take Internet security for granted. Users assume that there is no imminent threat to their children’s—or their—Internet security because they’re using a secure home network service or because they have firewalls and other kinds of protection set up that. However, the main Internet security threat is not one that comes from network services. The most imminent Internet security threat facing younger users is the loss of privacy.

Last year, Consumer Reports found that 7.5 million children under 13 were Facebook members. Such a figure may not seem too significant relative to Facebook’s 800 million users, but in reality it is very alarming. There are almost as many underage kids on Facebook as there are people in the greater Boston area. Shouldn’t kids be playing outside or reading Harry Potter instead of slowly becoming naturalized to ignoring Internet security, living in a cyber world that cannot substitute for healthy, real social interactions?

The trouble is, as network services become abundant everywhere, it’s hard to prevent children from wanting to join Facebook or going online 5 hours a day. In fact, as the study shows, parents tend to allow their children to join Facebook precisely because it has become a standard communication tool across network services. The rising complexity of network services makes it hard to separate online media and stick with one form of communication only. Email, chat, Facebook, and calendars are increasingly becoming one large network service, which makes it hard to limit online activity to only email, for instance.

For parents, there’s no easy solution to the problem. Balancing the need for strong Internet security and protecting kids’ privacy with the need to be involved in an increasingly interconnected online world is just one of the many perks of parenting.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Is your computer really secure?

Most people have some form of virus removal software on their computer.  Despite that fact, a significant proportion of those users will have to deal with an Internet security issue at some point in their computing career.  This is because the threat environment online is dynamic; it evolves constantly, trying to outfox the Internet security providers and get to your data.  How can you be sure that your virus removal software is providing the most comprehensive protection?  Here are some questions you should ask in shopping for virus removal software:

1)  Is the virus removal software you’re considering from an established, reputable provider?  It’s important that you be able to trust your virus removal software.  Most brands will have reviews posted online, which can help you decide if that particular program will fit your needs.  Conversely, choosing a virus removal program without investigation carries many risks, not least among them the risk of having your Internet security compromised by a bogus “diagnostic scan.”

2)  What happens when the software detects a threat?  It is important to make a distinction between virus detection software and virus removal software.  Virus detection software will find a threat and then notify the user, leaving them to deal with the threat by themselves.  Virus removal software will detect the threat, isolate it, and then remove it from the computer, usually with little or no input from the user.

3)  How often does the software update its threat registry?  As mentioned above, the ways in which hackers test your Internet security are constantly changing.  It is important, therefore, to make sure that your virus removal software updates its threat registry regularly and often.  These updates will allow your virus removal software to detect and cope with the newest Internet security threats as they appear.

4)  Exactly what features does your virus removal software offer?  Before committing to a particular program, take a look at what it can offer you.  While it is true that some Internet security companies offer only bare-bones virus removal packages, others include things like personal firewalls for added security, or spam filters for your email accounts.  Just as with any other purchase, the goal when shopping for Internet security programs is to get the most value for your dollar.

5)  Does the software company stand by their product?  Let’s be clear: no matter how comprehensive your virus removal software is, no matter how careful you are with your permissions, there is still a chance that you will eventually have to deal with a breach of your Internet security.  Another important question when shopping for virus removal software is: what happens then?  Does the Internet security company have support personnel standing by, or is it up to the user to fix the problem?

These are just some of the important questions you should ask yourself when shopping for Internet security software.  Answering these questions before you buy will ensure that you get the best possible protection for your computer.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for the Phishing Bait

Sometimes, ensuring strong Internet security depends on more than just a secure home or office network service or even a strong anti-virus program. Sometimes, strong Internet security depends on human vigilance, not just firewalls and virus software. This is because phishing, which is one of the most common threats to casual users’ Internet security, can occur even in the most secure network service. Though some Internet security programs or email features can prevent phishing, for example, it still poses a stealthy threat, since it relies on human naiveté.

Phishing is the attempt to breach Internet security and steal your passwords, usernames, and other information by tricking you into giving them up in some form or another. According to Wikipedia, the term “phishing” relates to the idea of falling for bait, the way fish do. So hackers and cybercriminals trying to compromise your privacy via your network service are metaphorically fishing along the river of network services for your information.

Phony or fraudulent emails that try to lure users into giving out their passwords are a common phishing technique. Phishing emails can look like they’re from a bank, a business, or even a government agency. Some emails present users with a phony story and ask them to respond with information that can be used to target their private online accounts.

Phishing emails are getting increasingly sophisticated, which makes them an even bigger threat to Internet security. Because some emails still reach our inboxes, it is important to look for the warning signs. These include poorly written emails with obvious typos or nonsensical information. Also, vague emails that don’t include any specific information about their recipient are usually scams. For example, an email from a financial institution that start with “Dear Customer” instead or your name is clearly trying to breach your Internet security.

Cybercriminals also try to trick users to log into a webpage that looks like an authentic page that actually records the submitted data and exploits it. Even when using a trusted network service, you could be susceptible to this form of phishing. If your Facebook or email login page looks subtly different, be cautious before you enter your username and password as it might be an Internet security scam.

Stay on the lookout for small details that predict phishing scams and threats to your network service like typos, vagueness, unprofessional appearance and tone, sloppy design, and nonsensical requests. But remember that threats to your Internet security aren’t always obvious—many are sophisticated. Change your password often as a regular means of protecting your network service and Internet security. Most importantly, remember that phishing doesn’t force you to give out your information; it tricks you, so don’t fall for the bait.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Looks like Spam’s Here to Stay

Approximately 300 billion spam messages go out everyday according to a recent Cisco Annual Security report. Over the course of a year, spam emails make up 90 percent of the world’s emails. Given such absurdly large figures, it is essential to maintain strong Internet security practices and to use secure network services.

Spam continues to thrive because it is an easy and cheap marketing tool for advertisers and other parties using it. Even when the vast majority of spam emails are ignored, the small percentage that actually reaches people can help improve the sender’s sales. Not all spam is advertising, though. A great deal of spam is laden with viruses and malware that can compromise a user’s Internet security and network services. In fact, most spam originates from network services infected with spam malware. So strong Internet security is essential to prevent machines from becoming spam hosts.

According to the Spamhaus Project, approximately 100 spam gangs taking advantage of the globalization of network services produce the vast majority of spam targeting the North America and Europe. The computers and network services that generate the highest spam emails are in Brazil, according to Cisco. Approximately 7.7 trillion spam emails originate in Brazil every year. The U.S. is a close second with 6.6 trillion.

Users can try to limit the amount of spam that they get by employing good Internet security practices, but even then, getting some spam is inevitable. The best Internet security measure to fight against spam is to be selective in giving out your email address. Just as you don’t go around telling random strangers where you live, you should protect your email address the same way. If you had to give out your address to a list of criminals every time you wanted a service, wouldn’t you say no? So why do we so readily give out our email addresses to facebook apps and other services?

It’s hard to say whether spam will actually disappear anytime in the foreseeable future. Spammers are already indifferent to laws governing Internet security, so it is unlikely that they will suddenly become concerned about their actions’ legality. Network service providers try to reduce spam, but their attempts are usually futile because of the dangerously simplistic nature of spam. Internet security services that are readily available in email, for example, have limitations. Even advanced ones like Gmail’s spam filter let spam through sometimes. On the other hand, spam filters often perceive harmless or real emails as spam, which can prevent authentic mail from getting through.

Spam is not only annoying, but it can pose a threat to your Internet security and harm your network services in the attempt to produce more spam. Improving Internet security against spam requires action on your part. No one is completely immune to getting spam, but safeguarding your email address is the clear-cut first step towards getting less of it!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending