Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Three Tips for a Smooth System Recovery Experience

No computer is infallible. Hardware failure or virus damage can happen to even the best-kept computers. Physical damage to a laptop, for example, can damage the hard drive, causing stored data to be lost, while viruses can erase important documents, photos, and videos. As is often the case with computers and the process of system recovery, prevention is the best cure. When prevention doesn’t work, it’s important to handle data recovery correctly to avoid further damage and minimize costs. Here’s what you should keep in mind even before you need a system recovery:

1)      Backup: There’s really no way to stress this point enough; back up your data regularly and consistently. Nothing makes data recovery easier (or cheaper) than having a backup copy of your information. Use an online service or website to store copies of all your valuable data. Such services are readily available, but pick carefully, as some services like those offered by Rescuecom are more secure than others. Alternatively, you could buy an external hard drive and copy your data onto it. External hard drives are becoming increasingly less expensive and come in a variety of storage capacities. If you do lose your data, you will be grateful that data recovery involves simply copying your files back onto a new or repaired device.

Make sure you understand the differences and limitations of functions like system restore that come with your computer. System restore doesn’t really help with system recovery or with data recovery because it only stores files related to a system’s settings and parameters. If you delete a photo album (and empty the recycling bin), restoring a system to a previous week’s settings will not help with data recovery. Remember, there’s no alternative to backup, and system restore does not provide complete system recovery.

2)      Don’t store files on the same drive as your OS: Have a tech expert partition your hard drive into two (or more) partitions and store your photos, videos, documents, and other important files on a separate partition than the one that holds your system information. In case you need to erase all your system data and reinstall your OS, you won’t have to affect your personal data, making your system recovery easy, perhaps even avoiding the need for data recovery in the first place.

3)      Get professional help: When disaster does strike, stop using your machine, and seek out a professional data recovery service. Especially when your data is invaluable, don’t take your chances with a free online application. Instead, take your machine to a professional. In fact, services like Rescuecom’s can offer remote data recovery aid, which means that you can get professional system recovery without even leaving your home.

No matter how you approach system recovery in general, and data recovery in particular, remember that both can be made easier and cheaper if you have the right kind of backup. So keep your files safe to avoid the awful feeling of knowing that entire photo albums, work documents and other important data have been erased, possibly forever.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Sorry DVDs, Streaming is the Future

Netflix is undergoing some major changes. Along with losing over one million customers, the company is hiking prices and setting a plan in motion that will soon kill off its DVD mailing services. The millions of customers who joined Netflix for the DVD service and the millions who still primarily rely on mailed DVDs for their entertainment intake may have to start adjusting their home network services soon. The push towards online streaming will bring with it new tech support issues. It will also force many customers to upgrade their home networks to meet the demands of online streaming.

The harbinger of phasing out the DVD mailing service came early this year when Netflix announced that customers would no longer have the “Add to DVD Queue” option from streaming devices. Netflix cited a vague tech support related issue to justify the change. Still, customers didn’t buy the tech support reasoning. It was clear that Netflix was trying to start limiting customer interaction with DVD selection.

Then, last summer, the company announced a price hike that outraged subscribers and everyone else alike! Again, Netflix cited tech support issues and a desire to focus on its online streaming services as justification. Many customers were then forced to choose only one of the two services to avoid paying more.

For many, the choice continues to be difficult because online streaming can take a toll on home networks. Many home network services set limits on the amount of data usage, becoming slower when such limits are reached. Alternatively, some home networks simply do not offer enough connection speed to stream movies at high quality. Sometimes users have the option of upgrading their home networks by paying more or changing their home network service provider, but who wants to have to pay more just to accommodate Netflix? Yet according to SplatF.com, Netflix realizes that these are short-term tech support issues that will disappear with time. Home networks are on their way to becoming incredibly powerful, and when that happens, speed related tech support will become obsolete—for a few years at least.

Netflix’s DVD service requires less tech support than the streaming one. Perhaps the most common tech support problem that comes up with the DVD service is a scratched disc, and the solution to that is imply getting a different disc. However, given the long-term advantages of only providing a streaming service, it looks like Netflix is willing to deal with some temporary transitional tech support issues.

Netflix keeps citing tech support issues and practicality behind its (now defunct) plan to split its streaming and DVD mailing services, limiting customer access to DVD queues to the computer interface, and its price hikes, but customers aren’t buying it. It seems that the days when the public bent over backwards to accommodate capitalist growth are dying out. People realize that Netflix changes have nothing or little to do with tech support, and plenty to do with profit, and many of them are taking their business elsewhere.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Is your Password Guessable?

Using the same password for most or all online activities may be convenient, but it is a dangerous Internet security practice that we should all avoid. Sure, recycling passwords makes remembering them easier, but it also makes it easier for cybercriminals to steal that information. Even when you’re using a trusted network service like your home network, having weak or recurring passwords is an unnecessary threat to your Internet security.

Along with monitoring how you use public network services and keeping your anti-virus updated, consider using a different and difficult password for each of your accounts. Varying your passwords is an easy way to increase the level of your Internet security. When cybercriminals learn one of your passwords, they may try to use it to gain access to your other accounts. Using significantly different passwords can drastically limit the damage to your overall Internet security.

To check the strength of a password (or even just for fun), consider searching for a list of the worst passwords and making sure yours isn’t on it! One online list includes the 500 worst passwords of all time, and among these are: 123456, password, eric, gandalf, rainbow, barney, and butter!

Even when passwords are not as ridiculous as these (barney?), Microsoft’s Safety and Security Center suggests changing them periodically. When coming up with passwords, keep in mind that you may have to enter them while using public network services where Internet security is not very high. The Security Skeptic also offers some easy ways to create better passwords to improve your Internet security.

To test a password’s Internet security level use an online service, and keep these tips in mind:

  • Avoid common words
  • Don’t use personal information such as a telephone number, address or birthday
  • Use at least eight characters, the more the merrier
  • Combine upper and lowercase characters
  • Include numbers and symbols (%4#3*1)
  • Start with a sentence and change it around (Somewhere over the rainbow/ SomeWhereOverDaR@inbow22)

If you’re worried about forgetting a password, write it down! Storing your passwords on paper isn’t necessarily a threat to your Internet security. Cybercriminals will try to target your information through your online network, not your desk. Still, keep your password in a safe place.

Prevent cybercriminals from infiltrating your Internet security, personal accounts, and network services by changing your passwords often and making them difficult. If a password is too difficult for you to remember, then it’ll certainly be difficult for a hacker or virus to figure out.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Keep it Cool, Clean and Gentle

Many websites offer computer support tips for taking care of laptops to help avoid needing laptop repairs. Along with the detailed, technical computer support practices that can greatly benefit your devices, there are a few easy tricks that can help you put off that trip to the laptop repair shop. So if you have a hard time making too many small changes to the way you use your device, here are three short and sweet habits that you might find helpful.

3 easy computer support tips:

  • Keep it cool: Overheating can be annoying to users and harmful to laptops. The most common cause of overheating is poor air circulation. This usually happens when dust and other particles accumulate on and around a laptop’s fan and plug its air vents. A good computer support practice is to clean out the vents regularly. Use specialized compressed air or consult a laptop repair specialist periodically.

 

Placing your device on your lap or a cushion as you lounge on the couch is a sure way to reduce air flow and overheat your laptop. Doing it once or twice won’t hurt; however, if you make a regular habit of it, don’t be surprised if you need professional laptop repairs.

  • Keep it clean: keyboards love to accumulate dirt and dust. With time, dirt under the keys can cause them to stop working properly, a problem that will eventually require laptop repair work. An easy way to prevent the accumulation of dirt is to keep food away from your device.

 

Many websites suggest using compressed air as a regular means of computer support, but this technique can be risky as it may push the dust further under the buttons. So when cleaning does become necessary, use a small vacuum attachment to get dirt out from in between the buttons.

  • Keep it gentle: Carry your laptop using its base and not its screen. According to Wikihow, pressure to the screen can cause long-lasting damage. It can also break or offset the hinges, which can require the attention of a laptop repair specialist.

 

Protect your device’s cords by loosely wrapping them around your fingers then securing them with a Velcro strip or rubber band. Never wrap a cord around its adapter because that can damage the cord’s tip and will only add to your laptop repair bill.

Remember, prevention is the best cure. Regular computer support can delay the need for laptop repairs. Perhaps the best kind of computer support is taking your laptop to a professional computer and laptop repair professional for regular maintenance and cleaning.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for Free Wi-Fi

Watch out for Free Wi-Fi

Many people find it hard to go even a few hours without an Internet connection. Shops, restaurants and a variety of other venues are adapting to this need by providing free Wi-Fi. Whether you’re at your favorite coffee shop, shopping at the grocery store, or waiting in an airport lounge, you’ll probably find that you have access to a free Wi-Fi network. If you decide to use it though, you should be aware of the dangers of using a network service without proper Internet security.

It may be tempting to quickly connect to a public network service and log into a social networking site such as facebook or check your bank account, but unless you can trust the network service provider’s Internet security, you should only do casual surfing. If you find yourself using a questionable network, avoid logging into websites and services that require you to type a username and password. Faulty Internet security leaves room for cyber thieves or hackers to infiltrate your network service and steal your private information without your knowledge.

Good Internet security practices can spare you potentially disastrous outcomes like identity theft. So when choosing a public network, always make sure you select a secure connection. If you’re at a Starbucks, for example, ask an employee to verify the name of the network service before connecting. Avoid using unsecured network services because they are easily prone to Internet security breaches.

Keeping your anti-virus software up to date and your computer’s firewall turned on are just two of the basic principles of achieving Internet security and using public networks safely. Besides, having anti-virus software does not guarantee your device’s safety; it’s merely a basic component of Internet security.

Another common Internet security problem occurs when cyber thieves record keystrokes, giving them access to your usernames and passwords. Changing your passwords periodically can help counter this kind of threat, especially if you use a public network regularly.

Even with these precautions, the strength of your Internet security can be hard to gauge, and networks that appear safe can still place your device at risk.  If you do suspect that a virus or malware has breached your Internet security, get professional help immediately.  Some viruses can seriously damage your device if they’re not caught quickly. In fact, because the average user cannot detect malware, it is essential to have a computer or network services specialist look at your system from time to time.

Always try to balance the advantages of using public network services and the potential threats to your Internet security that accompany them. What appears to be a free Wi-Fi service could end up costing you a lot in virus removal costs and privacy breaches.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Illegal Download Site Targeted by Hackers

Threats to Internet security continue appearing in the form of cybercriminals seeking profits from the ignorance of users.  Downloading files from the web, though we do it all the time, involves the risk of infecting your computer with a virus.  A clever hacker may exploit even excellent Internet security.  This necessitates virus removal to clean your system.  Average users suffer through Internet security problems regularly.  Over the past year, the Internet security systems of a number of high profile targets, including American defense contractors, Sony, Google, and many others, fell victim to cyber attacks.  A very recent example is that cybercriminals compromised the internet security of the file-sharing giant BitTorrent.

Widely known as one of the world’s largest illegal file-sharing sites, BitTorrent also hosts a large number of legal downloads.  This time BitTorrent was the victim of illegal activity.  Hackers broke through the site’s Internet security, injecting a type of malicious software known as “scareware” into the download software that powers file transfers.  Virus removal of scareware is potentially difficult, depending on the user’s level of expertise.  The internet security implications of such an intrusion are that they can render the files of a familiar website vulnerable to a hacker’s program access to information which unsuspecting users consider safe.  This requires immediate virus removal action.

The intrusion reportedly occurred at 4:20 am Pacific Standard Time on September 13, 2011 as BitTorrent and uTorrent.com services became compromised.  The company reported this intrusion itself later that day on the company’s blog.  The false download files were only in place for two hours before BitTorrent employees took servers offline and corrected their Internet security flaws.  Virus removal is necessary for anyone who accidently downloaded the fake files.  The scareware installed on users’ systems is a fake anti-virus program called Security Shield.  Infected systems see a notification pop up informing users that their computer is infected with a virus.  It offers virus removal if the program is paid for by credit card.

Users suffering from this malicious software should attempt to utilize their virus removal programs to restore Internet security.  If you are unable to remove the program, consider contacting your proven reliable computer support company.  Their knowledge and expertise could save a lot of time and headaches.  Downloading anything from the web tests your Internet security.  Always keep anti-virus and virus removal software up to date to protect your system from harmful software.  The thieves and bandits are out there, and we have to be careful.  However, we can handle a virus intrusion in a timely manner with experts trained  in quick restoration of internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Share Life Not Secrets

People like to enjoy life and talk about it, but no one wants everyone knowing every detail. Social networks provide the chance for people to share lives with friends all over the world, and with people who are complete strangers. Online social network users do not have to give up privacy to the entire internet.

Read more »


Don’t Suffer from the Crash: Store Data Online

Don’t Suffer from the Crash: Store Data Online

Crashing computers and multiple devices create difficulties in getting documents on demand. Entire papers can be lost, or the wanted photograph is on another device.  Online data storage offers a solution to the issue. Customers can arrange for a digital file cabinet for data files and avoid lengthy processes to recover or carry wanted items.

More customers use storage websites as more people grow more mobile. The number of available websites to store information also increases with the demand. Some options include: Carbonite.com, Dropbox, and MobileMe. Remember for expert and personal computer support, RESCUECOM offers a Remote Backup solution to protect all files against human or system errors through the device’s Internet connection. RESCUECOM’s trained technicians install the Remote Backup and will help retrieve lost information24 hours a day.

Read more »


Five Simple Steps to Secure Online Shopping

More shoppers buy items online everyday, with entire websites devoted to buying and selling. With the threats of identity theft and viruses, some shoppers still hesitate about making purchases over the internet.

Rescuecom offers five things you can go to protect yourself on and off the computer

  1. Keep the browser and anti-virus software updated. Anti-virus software will keep information stored on personal computers safe from online exposure. When entering purchase information, like credit card numbers, a pause in the processing can endanger the information. The order might be lost, and someone else might get a look at the card number.  An updated browser ensures smooth processing of information on websites, and reduces the risk of private information getting exposed.
  2. Know who you are dealing with. Stick to well-known stores or online marketplaces like Amazon.com. Legitimate businesses will help resolve an error or false charge and can refund the full amount sometimes. Business and marketplace websites also sometimes employ protective software to ensure customer privacy.
  3. Never give out passwords. Private information needs to remain private. The less information available online, the less shoppers need worry about security. Create usernames and passwords with numbers and symbols to make guessing harder.
  4. Use one card for transactions. Use only one credit card for online transactions. Shopping records are easier to follow and confirm on one card. Credit cards have to comply with Fair Credit Billing Act, so after reporting the theft of a card or a card number, the owner is only responsible for a small amount of the purchases. Each credit card company has the amount listed in the contract. More than one credit card used online not only increases the chance of stealing the numbers, card owners are also responsible for different amounts on each card. Using a check or bank card gives access to the entire account.
  5. Record it. Keep detailed records of online spending by choosing to print the receipt copies. Check card bills every month and be sure that all transactions appear on both the bill and the receipts. Report any items that do not match the receipts to the credit card company and the online store immediately.

Shoppers can easily protect personal computers, identities, and personal bank accounts. Rescuecom’s five steps let customer shop online securely.

Next Windows Almost Ready

Personal technology goes far beyond just a home computer. So, Microsoft designed an operating system modified to perform on many different personal devices. Windows 8, due to release next year, adapts to each product that runs it.

Rescuecom has five things customers need to know about the upcoming operating system.

The classic design remains.  The classic Windows operations still exits for anyone who needs it. The basic programs like Word and Excel present similarly to Windows 7. Private individuals and businesses that make and store crucial documents in these files can still create and save work the same as before without needing to learn a new format.

New applications appear. The tile interface, a set of mosaic-like boxes showing different applications, lets customers find needed items quickly and choose which tiles appear instantly. The tiles are large enough to reduce mistakes in opening tiles on touch screen products and new information is clearly visible. Tablet and smartphone users can find favorite websites, while computer users shorten searches for files.

Customizable adjustments are possible. Microsoft designed the Windows 8 system to allow individual customization. Users who need certain pieces of information regularly choose which applications appear on the home screen. The constant connection to a favorite news website appears above the file for last summer’s vacation pictures as soon as the device turns on, and either one opens at one touch.

Fewer resources are needed. The Windows 8 operating system’s memory design lets the programs work more efficiently. The ability to multi-task and run several programs at once increases, letting customers do more. Downloads and updates will not cause other programs to run more slowly.

Microsoft is ready for the future. The new focus on compatibility helps the system get ready for future technology. Microsoft’s design includes many facets of smartphones, tablets and netbooks, integrating needs for a variety of devices. Windows 8 adapts to products already, and will adapt to new products. Customers will not need to learn new systems as products appear.

Windows 8 mixes what customers like about the operating system with the needs of new applications and devices. Customers will choose how the system works, instead of the system controlling how the customer works.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


“Save the regret. Separate your e-mail accounts.”

Over the weekend, Epsilon notified millions of customers that the company had experienced a break-in and email addresses were stolen.  One consequence is that now it’s open season for phishing!  Now, instead of using bait to “catch” personal information, a more direct line of attack against your private information exists. 

You can avoid having your sensitive material, including your email address, exposed in this or some similar way.  Josh Kaplan, President of RESCUECOM, strongly recommends that you take immediate action to set up a separate e-mail address for all online transactions – and ONLY use this address for online transactions.  You should be aware that it is not safe to give your personal e-mail address used by your friends and family to any company. 

Even “reputable” companies with whom you may have been doing business for years should not be given your personal email address.  Companies regularly outsource their e-mail communication.  For example, companies such as Marriott, JPMorgan Chase, Walgreens, Capital One, and others contracted with Epsilon to manage their email information and send out e-mail blasts to customers.  Rather than directly overseeing the security of this information base, a third party is involved, thereby increasing the chances of compromised data.

Unfortunately, for many people, such as those affected by the recent data breaches at Epsilon, this warning may come too late.  Be sure that you set up a separate email address for those online business transactions today.  Consider setting up a new personal address as well if your existing address has already been compromised.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


131-140 of 1857
© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending