Blog Archives

How to make a Ruben Sandwich.


Hello and thank you for taking the time to read this blog post from PCRS Computers we do more than just computers.  So i have prepared this recipe for everyone to enjoy. This is one of my favorite recipes a Ruben Sandwich. I don’t like to cook but when i do this is my top choice.

First things first who am I? I am Andrew Patch Owner and Operator of PCRS Computers. We do computer repair and training. I am not a chef or anything i just thought there might be some people who would like my take an how i do a Ruben and maybe will what to learn how to make one.

So let us begin.


INGREDIENTS

Skillet

SAM_0659

Corned Beef (I use half of a 2oz package)

SAM_0661

Provolone Cheese (I use two slices)

SAM_0662

Butter (i use enough to butter my bread)

SAM_0663

Sauerkraut (how ever much you want i use a lot)

SAM_0664

Bread ( I use two slices)

SAM_0665

Thousand Island Dressing (I Use for my sauce it tastes great)

SAM_0681


Step 1 Butter The bread and place one piece in the skillet (do not turn the skillet on yet).

SAM_0667

Step 2 Put on One piece of cheese.

SAM_0668

Step 3 Put on the sauerkraut.

SAM_0669

Step 4 Put on your Corned Beef.

SAM_0671

Step 5 Put on more sauerkraut.

SAM_0672

Step 6 Put on another  piece of cheese.

SAM_0674

Step 7 Put on the other piece of bread.

SAM_0675

Step 8 Turn on the stove (I use med heat)

SAM_0677

Step 9 Flip the sandwich over let the other side cook.

SAM_0684

Step 10 Put it on the Plate

SAM_0694

Step 11 Put on your Thousand Island Dressing.

SAM_0693

Step 12 Enjoy

SAM_0694


Thank You for taking the time to read this and please checkout my Facebook page https://www.facebook.com/pcrscomputers and comment about some of you own recipes I would Like to Hear from you so please talk to us about anything.

Advertisements

10 Tips For Making A Computer Run Faster


10 Tips For Making A Computer Run Faster

Computer Tips #3: Close Unnecessary Programs

Right now my computer says there are 198 programs running—but that’s a lie. Computers can only run one program at the same time for each computer processor in your computer. My computer only has one processor, so it can only run one program.

Computers hide this secret by switching between running programs thousands of times faster than humans can perceive. They switch between programs so fast that computer processor times are measured in nanoseconds.

But keeping up this illusion of running multiple programs at the same time requires extra computer processing speed—speed you can easily add to your most important programs just by closing down your least important programs. If you need a speed boost, start by closing any applications you’re not using; then close any programs in your task bar that you’re not using.

Closing unnecessary programs can easily double the speed of an overloaded computer.

Hope you enjoyed this tip please come back every day to see what new tips we have for you and as always if you need a computer repaired please come visit us at http://www.pcrscomputers.com or call us toll-free at 1-866-458-9779.

10 Tips For Making A Computer Run Faster


10 Tips For Making A Computer Run Faster

Computer Tips #2: Plug In Laptops

All laptops built in the last 10 years make their batteries last longer by slowing down the computer processor when you don’t seem to be using all of it. Although this works great to prolong battery life, it means that your laptop runs slower when it runs off battery.

To switch your laptop back into normal mode, all you have to do is plug in your laptop and the computer processor will run at full power, giving you 100% of the speed you expected when you bought the laptop.

Hope you enjoyed this tip please come back every day to see what new tips we have for you and as always if you need a computer repaired please come visit us at http://www.pcrscomputers.com or call us toll-free at 1-866-458-9779.

10 Tips For Making A Computer Run Faster


10 Tips For Making A Computer Run Faster

We all get annoyed when our computers are slow but unfortunately most people put up with this state as they do not know what makes a computer run faster. The steps to speed up your computer are very easy to follow.

Whether you need a temporary boost in speed or something long-term, here are 10 tips for making a computer run faster, from easy tips like plugging in your laptop to difficult tips like over-clocking your computer processor.

Computer Tips #1: Turn Off Anti-Virus (Leave On Firewall)

When you need a quick speed boost to play a game or finish an assignment, try turning off your anti-virus software. As long as you don’t open any infected files you should be safe and the speed increase can be significant.

However, make sure that you don’t turn off your firewall when you disable your anti-virus. Firewalls use very little computer processing power but protect you against threats coming from the Internet.

Make sure you turn your anti-virus back on when you don’t need the extra speed anymore.

Hope you enjoyed this tip please come back every day to see what new tips we have for you and as always if you need a computer repaired please come visit us at http://www.pcrscomputers.com or call us toll-free at 1-866-458-9779.

Computer of the Week 12/10/2012


Quote

PCRS Computers420 Winchester RdGeneva, IN 46740260-220-9527

Email: a.patch@pcrscomputers.com

Website: www.pcrscomputers.com

Salesperson Quote SHIPPING METHOD SHIPPING TERMS DELIVERY DATE PAYMENT TERMS DUE DATE
Andrew Patch #201 N/A N/A N/A Due on Receipt
Quantity Description Price
1 HP DC7700 Desktop PC – Intel Pentium D 925 3.0GHz, 4GB DDR2, 1TB HDD, DVDRW, Windows 7 Home Premium 32-bit (Off Lease)

$281.99

1 Setup $25.00
1 Shipping $12.00

We Treat You Right For Less.

Thank you for your business.

Subtotal $318.99
Sales Tax $19.74
Total $338.31

Computer of the week


Quote

PCRS Computers420 Winchester Rd

Geneva, IN 46740

260-220-9527

Email: a.patch@pcrscomputers.com

Website: www.pcrscomputers.com

Salesperson Quote sHIPPING mETHOD sHIPPING tERMS dELIVERY dATE pAYMENT tERMS dUE dATE
Andrew Patch #112 N/A N/A N/A Due on Receipt
Quantity Description Price
1 Dell Latitude E6400 Notebook PC – Intel Core 2 Duo 2.2GHz, 4GB DDR2, 160GB HDD, DVDRW, 14.1″ Display, Webcam, Windows 7 Professional (Off-Lease) $359.99
1 Setup $25.00
1 Shipping $10.00

We Treat You Right For Less.

Thank you for your business.

Subtotal $394.99
Sales Tax $25.20
Total $420.19

Get your computer Tuned up for only $50 with our Remote Repair Program.


Remote Repair program

PCRS Computers proudly offers remote support for computer repair. Qualifying service calls allow you to choose online help from experienced technicians. Remote support is fast, easy, and resolves many issues. Most problems are solved within hours not days.

Remote Support can

  • Resolve driver issues
  • Install software
  • Setup data backup services
  • Virus and Spyware removal
  • Disk cleanup
  • General tune-up
  • Troubleshooting hardware and software problems

Remote Support Requires

  • High speed internet connection (DSL, Cable, FiOS, etc.)
  • Your computer must start
  • You must be able to reach the internet from your computer
  • Technicians can remotely service systems running Windows.
    Contact our service representatives now to see if you qualify for remote support. A tech can be working on your system remotely within 30 minutes.

Remote Support is not for every problem

  • The following issues require an on-site visit
  • Internet failure
  • Hardware failure
  • System that won’t boot

Callus today to get started are simple PC tune up is only $50 so please do not wait prices will increase after the new year. Call 260-220-9527 to get started our services are remote so it does not matter where you live.

What are the types of spyware


Spyware is any software that obtains information from a PC without the user’s knowledge. There are many different types of spyware operating on the Internet but you can generally group them into two categories: Domestic Spyware and Commercial Spyware.

Domestic Spyware is software that is usually purchased and installed by computer owners to monitor the Internet behavior on their computer networks. Employers use this software to monitor employee online activities; some family members use domestic spyware to monitor other family members (such as reviewing the content of children’s chat room sessions).

A third party can also install domestic spyware without the knowledge of the computer owner. Law enforcement officials have used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets.

Commercial Spyware (also known as adware) is software that companies use to track your Internet browsing activities. Companies that track your online habits often sell this information to marketers who then hit you with targeted advertising—ads that match your browsing interests and would most likely appeal to you.

Advertisers are delighted when they acquire such valuable marketing information so easily; in the past marketers had to bribe you to learn your preferences through contests, registration surveys and the like. Those methods of gaining your personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse. Gaining your preferences by stealth using software spies is far easier and offers a much more complete picture for the marketing industry; as a result, spyware is everywhere. For more information on how and when spyware attaches itself to your computer, read

How Did Spyware End Up on My Computer?

At the very least, spyware is a nuisance—slowing down your computer, filling your hard drive with useless gunk and marking you as a target for enterprising advertisers. Beyond intruding on your privacy, spyware can be used as a tool to perpetuate crimes, such as identify fraud. Below is a list detailing different types of spyware and the purposes for each.
Internet URL loggers & screen recorders

URL loggers track websites and pages visited online; screen recorders can take a small grayscale snapshot image of your screen every time it changes and can store or transmit these without notifying you. These methods are common to Domestic spyware.
Chat loggers & email recorders

Email recorders and chat loggers are similar, making a text copy of all incoming and outgoing email and chat sessions. Domestic spyware frequently utilizes these methods.
Keyloggers & password recorders Keyloggers & password recorders

When you bank online with this software on your hard drive someone is looking over your shoulder. Password recorders do just that—track typed passwords. Keylogger software records all of your keystrokes, not just passwords.
Web bugs

Web bugs are also known as advertiser spyware or adware. When you have adware on your computer you receive targeted, popup ads after you perform some action, such as typing something into a search engine. This advertising can even appear on your screen even when you are not online. If you are pummeled with new advertising screens constantly, you most likely have web bug spyware installed on your computer.
Browser hijacking

Browser hijackers place Internet shortcuts on your Favorites Folder without prompting you. This shortcut will lead many accidental viewers to their website so that they may artificially inflate their website\’s traffic stats; this enables them to receive higher advertising revenues at the expense of your time. You may be able to get rid of these false favorites by changing your Internet options, but occasionally the only way to get rid of these annoying shortcuts is to go into your registry and delete them. However, some spyware installs a safety net for itself that resets the spyware on your registry each time you reboot. Your only option to kill this aggressive type of spyware is to reformat your hard drive or to utilize excellent anti-spyware software.
Modem hijacking

If you use a telephone modem for your Internet connection, an unscrupulous person may be able to install an online dialer on your computer to establish a new Internet connection that uses pricy 900-type long-distance phone numbers—quite a shock when you get your next telephone bill. These dialer spyware programs often piggy-back on spam and porn emails; simply opening the email can inadvertently initiate the dialer installation. The hard-to-track villain banks on the fact that you’ll pay your phone bill in full before you take time to figure out what happened.
PC hijacking

Some borrow your computer system for their own use—spyware users can hijack your connection to send their spam through your ISP. This means that a parasitical spammer can send thousands of spam emails through your computer connection and your ISP address. High-volume, high speed Internet access lines are targeted by users of this spyware. Often victims don’t realize that their good name has been muddied until their ISP cuts them off due to spam complaints.
Trojans & viruses

Like the wooden Trojan horse that the Greeks used to enter Troy, this spyware masquerades as a something harmless yet can compromise your computer—your data may be copied, distributed or destroyed. A virus is similar but has the additional power to replicate itself, causing damage to multiple computers. Both of these vicious pieces of software fall under the definition of spyware because the user is unaware of and would not condone their true purpose.

Kaspersky Antivirus 2012


Pros
When it comes to malware removal, Kaspersky is the best. The company earned an elusive six of six in the last two AV-Tests for malware removal and product of the year 2011 from AV-Comparatives.

Cons
This particular version of Kaspersky software does not include a safe browser, which is an isolated browser that can open websites in a virtual environment separate from your PC.

The Verdict
: 9.5/10

Kaspersky continues to outperform its competitors. It can deliver nearly 100-percent protection from malware and can completely remove most malware from your PC.

The Many Faces of Malware


The Many Faces of Malware

According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each.

1. Viruses. The malware that’s on the news so much, even your grandmother knows what it is. You probably already have heard plenty about why this kind of software is bad for you, so there’s no need to belabor the point.

2. Worms. Slight variation on viruses. The difference between viruses and worms is that viruses hide inside the files of real computer programs (for instance, the macros in Word or the VBScript in many other Microsoft applications), while worms do not infect a file or program, but rather stand on their own.

3. Wabbits. Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it’s not hard to see why: they don’t do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.

4. Trojans. Arguably the most dangerous kind of malware, at least from a social standpoint. While Trojans rarely destroy computers or even files, that’s only because they have bigger targets: your financial information, your computer’s system resources, and sometimes even massive denial-of-service attack launched by having thousands of computers all try to connect to a web server at the same time.

5. Spyware. In another instance of creative software naming, spyware is software that spies on you, often tracking your internet activities in order to serve you advertising. (Yes, it’s possible to be both adware and spyware at the same time.)
6. Backdoors. Backdoors are much the same as Trojans or worms, except that they do something different: they open a “backdoor” onto a computer, providing a network connection for hackers or other malware to enter or for viruses or sp@m to be sent out through.

7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit.

8. Rootkit. The malware most likely to have a human touch, rootkits are installed by crackers (bad hackers) on other people’s computers. The rootkit is designed to camouflage itself in a system’s core processes so as to go undetected. It is the hardest of all malware to detect and therefore to remöve; many experts recommend completely wiping your hard drive and reinstalling everything fresh.

9. Keyloggers. No prïze for guessing what this software does: yes, it logs your keystrokes, i.e., what you type. Typically, the malware kind of keyloggers (as opposed to keyloggers deliberately installed by their owners to use in diagnosing computer problems) are out to log sensitive information such as passwords and financial details.

10. Dialers. Dialers dial telephone numbers via your computer’s modem. Like keyloggers, they’re only malware if you don’t want them. Dialers either dial expensive premium-rate telephone numbers, often located in small countries far from the host computer; or, they dial a hacker’s machine to transmit stolen data.

11. URL injectors. This software “injects” a given URL in place of certain URLs when you try to visit them in your browser. Usually, the injected URL is an affïliate link to the target URL. An affïliate link is a special link used to track the traffïc an affïliate (advertiser) has sent to the original website, so that the original website can pay commissions on any salës from that traffïc.

12. Adware. The least dangerous and most lucrative malware (lucrative for its distributors, that is). Adware displays ads on your computer. The Wikipedia entry on malware does not give adware its own category even though adware is commonly called malware. As Wikipedia notes, adware is often a subset of spyware. The implication is that if the user chooses to allow adware on his or her machine, it’s not really malware, which is the defense that most adware companies take. In reality, however, the choice to install adware is usually a lëgal farce involving placing a mention of the adware somewhere in the installation materials, and often only in the licensing agreement, which hardly anyone reads.

Are you ready to take on this dirty dozen? Don’t go it alone. Make sure you have at least one each of antivirus and antispyware.

%d bloggers like this: