Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

What You Should Know When Donating/Selling Your Cell Phone!

Like so many industries, the consumer electronics sector has a vibrant secondary market.  Thanks in no small part to Alpha Consumers frequently upgrading and the consumer culture that fosters the mindset that this year’s new products will be obsolete or uncool by next year, the used electronics market has grown in recent years.  Buyers who are more interested in substance than style or who are simply thriftier than their peers can enjoy significant benefits from buying their electronics in gently used condition.  One of the biggest sectors in the electronics secondary market is in cell phones and smartphones.

However, just like when you are considering purchasing a used car, there are some good rules to live by when purchasing a used cell phone or used smartphone.  Both as a buyer and a seller, you should consider the following:

Read more »


What The Hacking Of Symanetec Means To You.

The biggest problem in the tech sector is not supply chain problems, environmental regulations, lack of creativity or even limited battery life.  The biggest problem in the tech sector, like so many industries, is hubris.  Hubris, the pride that leads one to believe that they are invincible, flawless, destined for greatness/market dominance/perfection, is the true scourge of the tech sector.  Why?  Quite simply it is the vainest form of hubris wherein the largest technology companies come to believe that because they have hired the absolute best and brightest tech school graduates, that the pool is empty, no other geniuses exist.  Virtually every major tech company believes that they have the individuals and teams who are the most skilled and most creative.  That belief makes them blind to the creative programming geniuses who work outside the corporate structure.

Symantec was so blinded when hackers cracked into their servers and downloaded the source code for Symantec’s pcAnywhere and Norton Antivirus.

Read more »


Facebook Applications That Use Your Friends’ Photos!

Despite its faults with repeatedly recommending the same hundred people to be your friend, Facebook remains a very cool social network.  Facebook is a social network where you can communicate with friends far and near and even people you just wish were your friends, all at once.  The social network that Mark Zuckerberg founded on the concept of exclusivity is now a universally-recognized facet of United States popular culture.  One of the nice elements of Facebook is that it serves as a platform for applications that do not take Facebook all that seriously.  Two of the coolest such applications are Face-Invaders and the Photo Booth Friends video slot machine.

Face-Invaders is a very simple application for Facebook.  The Face-Invaders game is a recreation of the classic 1980s video game Space Invaders.  The difference, though, is that instead of generic aliens, the creatures descending from the sky are made up of Facebook photos of your Facebook friends!  You use your own Facebook photo in Face-Invaders as the defensive weapon to save the world.

The game is very simple to play, just as Space Invaders was.  As your friends float down from the sky, you shoot them until the rows of friends are all gone.  Moving your avatar is easy, as you simply tilt your tablet computer or smartphone in the direction you want to go. To fire your weapon, you simply tap your portable device’s screen.  Face-Invaders can be a nice cathartic tool when people you are friends with on Facebook have annoyed you in real life!

For a more positive spin on using your Facebook friends’ photos, the DoubleDown Casino application on Facebook has Photo Booth FriendsPhoto Booth Friends is a standard video slot machine on Facebook, except that all of the symbols are profile photos from your Facebook friends.  Photo Booth Friends is a cool application in that you may let the program choose which friends it represents in the game or you may associate specific friends with different winning values.  Suddenly, your loved one may help you win big at the virtual casino!

Photo Booth Friends is otherwise a very typical video slot machine on the DoubleDown Casino platform.  Photo Booth Friends is a twenty-line video slot machine with eleven different symbols, including Bonus Game and Scatter symbols.  The bonus game for Photo Booth Friends is the aptly-named “snapshot bonus” that makes further use out of your friends’ Facebook photos.

Facebook profile photos can be fun or troubling, but with applications like Face-Invaders and Photo Booth Friends, you can see a lot more of your friends while gaming on Facebook!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Dear Facebook, Please Stop Telling Me Who To Like.

Facebook has many challenges to it, both technological and commercial.  While Facebook should better monitor the applications it allows to run on its platform, some of the issues with Facebook are internal and systemic.  One of the most significant problems with Facebook is that it has an annoying persistence.  Have you ever noticed how Facebook continues to recommend the same people to you?  Have you ever noticed that the Facebook recommendation for friends just keep coming back?  What is it that Facebook doesn’t get when you click the little “X” next to their recommendation to simply not friend the people they recommend?!

The Facebook system works on the principle that there are very few degrees of separation between people.  As a result, when you add someone as a friend on Facebook, the Facebook program suggests friends of your friend be added as your friend.  From pretty much the moment you friend anyone new, you will begin to see on your sidebar, people that Facebook recommends you add as a friend.  A great way to test this is to add someone you do not know well at all as a Facebook friend.  After you add an acquaintance watch how Facebook suggests all sorts of people you don’t know from your new “friend’s” friend list.

Who cares?  Why is this an issue?  Unlike friend requests that you can deny and they go away, Facebook insists you consider their recommendation.  If you have ever gone to the complete list of people Facebook recommends you “friend” and painstakingly gone through the list to clear the (often) hundreds of people Facebook wants you to friend, you will discover your time was completely wasted.  Go back there now and you will see!  You can go through your entire list, remove everyone that Facebook recommends and the next time you log in, their recommendations will be back.

Facebook: “No means no!”  When you inform Facebook by clicking on the “no” button – indicating you do not want to add their suggestion to your friend list – Facebook ought to listen.  The Facebook program not only wants to connect people, it is persistent in a troubling way.

Facebook needs to simply be programmed to respect our wishes and stop making the same mistake.  Whether you have one of your ex’s friends and do not want the whole barrage of their other associates or have left a real social situation where you only want to retain a relationship with one person from that group through Facebook, there are millions of situations where you might want one person as a friend, but not everyone with whom they are associated.

Forget the Timeline, forget the “dislike” button, all you really need is a Facebook that listens and provides a way to permanently stop suggesting a person once you have indicated you do not want the Facebook-suggested individual as a friend.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Is your computer really secure?

Most people have some form of virus removal software on their computer.  Despite that fact, a significant proportion of those users will have to deal with an Internet security issue at some point in their computing career.  This is because the threat environment online is dynamic; it evolves constantly, trying to outfox the Internet security providers and get to your data.  How can you be sure that your virus removal software is providing the most comprehensive protection?  Here are some questions you should ask in shopping for virus removal software:

1)  Is the virus removal software you’re considering from an established, reputable provider?  It’s important that you be able to trust your virus removal software.  Most brands will have reviews posted online, which can help you decide if that particular program will fit your needs.  Conversely, choosing a virus removal program without investigation carries many risks, not least among them the risk of having your Internet security compromised by a bogus “diagnostic scan.”

2)  What happens when the software detects a threat?  It is important to make a distinction between virus detection software and virus removal software.  Virus detection software will find a threat and then notify the user, leaving them to deal with the threat by themselves.  Virus removal software will detect the threat, isolate it, and then remove it from the computer, usually with little or no input from the user.

3)  How often does the software update its threat registry?  As mentioned above, the ways in which hackers test your Internet security are constantly changing.  It is important, therefore, to make sure that your virus removal software updates its threat registry regularly and often.  These updates will allow your virus removal software to detect and cope with the newest Internet security threats as they appear.

4)  Exactly what features does your virus removal software offer?  Before committing to a particular program, take a look at what it can offer you.  While it is true that some Internet security companies offer only bare-bones virus removal packages, others include things like personal firewalls for added security, or spam filters for your email accounts.  Just as with any other purchase, the goal when shopping for Internet security programs is to get the most value for your dollar.

5)  Does the software company stand by their product?  Let’s be clear: no matter how comprehensive your virus removal software is, no matter how careful you are with your permissions, there is still a chance that you will eventually have to deal with a breach of your Internet security.  Another important question when shopping for virus removal software is: what happens then?  Does the Internet security company have support personnel standing by, or is it up to the user to fix the problem?

These are just some of the important questions you should ask yourself when shopping for Internet security software.  Answering these questions before you buy will ensure that you get the best possible protection for your computer.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Buying Music Can Save Money

It can be tempting to “share” songs via software like Kazaa or LimeWire rather than buying them. Such practices are not only illegal most of the time, but pose a serious threat to your Internet security. Downloading files using P2P (Peer-to-Peer) sharing software is one of the worst Internet security practices that users can employ. By downloading music or other files using such software, you could be inviting a conglomeration of malware to infest your computer. Even a small breach of your Internet security can cause you to spend lots of money on virus removal and, in some cases, identity theft problems.

Though LimeWire is no longer available for download due to legal reasons, users with older versions of the software on their machines can still use it, and can therefore still endanger their Internet security. Even when users don’t use LimeWire to share files, their Internet security is susceptible because the program automatically runs in the background, allowing strangers access to a user’s files!

When you opt to participate in P2P sharing, you can’t normally control what files you share. This lack of control can lead to your participating in copyright infringement, having your device infected with malware, and consequently requiring virus removal.

Perhaps the worst part of getting viruses from P2P sharing software is that we willingly invite them in. It’s like volunteering to spend time and money on virus removal. Sometimes, Internet security problems are hard to identify, but when threats are this obvious, there’s no excuse to fall for them.

If you’re looking for free music, YouTube is a great alternative. Watching music videos on YouTube poses far fewer threats to your Internet security, as viruses cannot usually target media files. Internet security problems that occur while on YouTube might be related to bugs in Adobe Flash player, but these are rare. Besides, Flash is constantly updated to eliminate bugs and ensure Internet security.

On the other hand, if you’re feeling overtly philanthropic and want to support the music industry by more than just illegally downloading songs, then consider buying the music! Amazon and Apple both sell music by the song, as do dozens of other sites. The great news is, music services like these are legal and don’t come with the added expense of virus removal.

Given the time and effort needed for virus removal, it is always better to make sure you have strong Internet security and to avoid using software like Limewire and Kazaa. After all, paying for a song or three is a lot cheaper than paying for virus removal.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Increased Corporate Victimization Highlights Need for Better Internet Security

A recent survey has revealed some troubling data for corporate technology users when it comes to Internet security.

According to the Sixth Annual Enterprise IT Security Survey, conducted by Amplitude Research, 67% of large companies (minimum of 5,000 employees) reported at least one significant security intrusion.

That was over 25% higher than the year before.

Companies cited various potential reasons for the increase, ranging from significant Internet security weaknesses to employee Internet usage.  No matter the reason, one thing is clear:  large corporations are coming under increased attack. Read more »


Rescuecom Releases 5 Tips to Detect Phishing

Phishing attacks threaten our Internet security and can be hard to detect.  They can lead to identity theft, viruses, or the need for computer repair.  To help protect your Internet security, RESCUECOM’s computer repair experts offer five simple tips for detecting phishing attacks.

•1.) Avoid Action – Phishing attacks work when you take action.  An email that requests information or features clickable links may be an attack against your Internet security.  Legitimate emails include cut and past style links to help you avoid clicking.  If there are only clickable links, the email is likely a phishing scam. Read more »


© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending