Blog Archives

10 Tips For Making A Computer Run Faster

10 Tips For Making A Computer Run Faster

Computer Tips #3: Close Unnecessary Programs

Right now my computer says there are 198 programs running—but that’s a lie. Computers can only run one program at the same time for each computer processor in your computer. My computer only has one processor, so it can only run one program.

Computers hide this secret by switching between running programs thousands of times faster than humans can perceive. They switch between programs so fast that computer processor times are measured in nanoseconds.

But keeping up this illusion of running multiple programs at the same time requires extra computer processing speed—speed you can easily add to your most important programs just by closing down your least important programs. If you need a speed boost, start by closing any applications you’re not using; then close any programs in your task bar that you’re not using.

Closing unnecessary programs can easily double the speed of an overloaded computer.

Hope you enjoyed this tip please come back every day to see what new tips we have for you and as always if you need a computer repaired please come visit us at or call us toll-free at 1-866-458-9779.


10 Tips For Making A Computer Run Faster

10 Tips For Making A Computer Run Faster

Computer Tips #2: Plug In Laptops

All laptops built in the last 10 years make their batteries last longer by slowing down the computer processor when you don’t seem to be using all of it. Although this works great to prolong battery life, it means that your laptop runs slower when it runs off battery.

To switch your laptop back into normal mode, all you have to do is plug in your laptop and the computer processor will run at full power, giving you 100% of the speed you expected when you bought the laptop.

Hope you enjoyed this tip please come back every day to see what new tips we have for you and as always if you need a computer repaired please come visit us at or call us toll-free at 1-866-458-9779.

10 Tips For Making A Computer Run Faster

10 Tips For Making A Computer Run Faster

We all get annoyed when our computers are slow but unfortunately most people put up with this state as they do not know what makes a computer run faster. The steps to speed up your computer are very easy to follow.

Whether you need a temporary boost in speed or something long-term, here are 10 tips for making a computer run faster, from easy tips like plugging in your laptop to difficult tips like over-clocking your computer processor.

Computer Tips #1: Turn Off Anti-Virus (Leave On Firewall)

When you need a quick speed boost to play a game or finish an assignment, try turning off your anti-virus software. As long as you don’t open any infected files you should be safe and the speed increase can be significant.

However, make sure that you don’t turn off your firewall when you disable your anti-virus. Firewalls use very little computer processing power but protect you against threats coming from the Internet.

Make sure you turn your anti-virus back on when you don’t need the extra speed anymore.

Hope you enjoyed this tip please come back every day to see what new tips we have for you and as always if you need a computer repaired please come visit us at or call us toll-free at 1-866-458-9779.

PCRS Computers Computer Buying Tips

PCRS Computers Computer Buying Tips


Buying a Mac or PC Computer

Should You Buy a Mac or a PC?

Deciding whether to buy a Mac or a PC should be based on two main points: your budget and whether the computer is primarily for business or pleasure. Both types of computers are excellent for specific tasks, although if you are planning to go to work and bring your computer with you, you may need to consider what types of computers your coworkers will have to make it easier to swap files or compare notes. Here a few basic tips on how to choose the right computer for you.


There’s no debate—Macs are far more expensive than PCs. If money is a big issue for you, you’ll want to buy a PC. However, Macs aren’t overpriced. Unlike PCs, each computer is designed for maximum efficiency in both processing speed and ease of use. While PCs frequently crash and are vulnerable to spyware and viruses, Macs resist most viral attacks and operate at a consistently high standard with virtually no technical issues. If you can afford it, a Mac is an excellent investment which will work for you for years.


While Macs have always been the preferred computer of graphic designers and other creative individuals, for most corporate office work, PCs have long been favored over Macs. For this reason, PCs still dominate in most business settings.

Up until a few years ago, the major software designed for business suites, like the Microsoft Suite, was designed chiefly for PCs. However, the popularity of other Apple products such as the iPod and iPad has started to change the way Macs are perceived in the larger corporate world. Most business software now has versions available for both Macs and PCs. Because of their heftier price tag, Macs still have a long way to go in making a dent in the corporate world, although in terms of functionality they perform just as well as a PC.

Graphically, Macs have richer displays and a Linux based operating system that makes them ideal for manipulating complex information such as layered graphical displays. Photoshop was initially designed for the Mac. If you are buying a computer for use in a professionally creative setting, your coworkers will likely also be using Macs.


Computer programmers are evenly split on whether Macs or PCs make better programming tools. The truth is, it comes down to a matter of personal preference. Macs developed a comprehensive suite of developer tools with their OS 10 which, if used properly, can help you get to the moon. PCs have always been oriented toward programming; in fact, the DOS/Windows interface was developed mainly as a way to stay competitive with the user friendly Mac interface. However, many programmers have complained that Macs are slower than PCs when it comes down to executing large amounts of freshly programmed code.

Personal Use

If you enjoy playing video games in your spare time, buying a PC is probably the best choice. This is partly because PCs are easier to hook up to auxiliary equipment like television sets or other devices. Although USB ports are evenly distributed between Macs and PC, the higher data transfer portals of a Mac do not always adapt easily to most conventional televisions, making it difficult to quickly relay information between the two devices, whereas the higher data transfer portals of a PC are usually very adaptable to auxiliary devices.

If, on the other hand, you prefer to design or develop creative projects in your personal time, Macs are a much better choice. Because Apple has invested so much time in making the user interface incredibly easy to use, spending time creating music or drawing or editing movies becomes less about the computer and more about the activity; you forget you are using a computer, and can instead focus on the act of creation. PCs have a more rigid approach; it’s hard to forget that you’re on a computer.

Cloud Computing and the Future of Virtualization

Of course, with the tech community excited about the potential of cloud computing, computer memory is going to become less of an issue, with flexibility, mobility, and processing speed becoming increasingly important when making purchasing decisions. Mac’s suite of mobile devices are far better adapted to shifting between different geographical areas while also offering enough functionality to make them viable business tools. However, for now you should buy the computer that best suits your needs, and plan on the inevitable: no matter what you buy now, in a few years it will be completely outdated anyway!

Computer of the Week 12/10/2012


PCRS Computers420 Winchester RdGeneva, IN 46740260-220-9527



Andrew Patch #201 N/A N/A N/A Due on Receipt
Quantity Description Price
1 HP DC7700 Desktop PC – Intel Pentium D 925 3.0GHz, 4GB DDR2, 1TB HDD, DVDRW, Windows 7 Home Premium 32-bit (Off Lease)


1 Setup $25.00
1 Shipping $12.00

We Treat You Right For Less.

Thank you for your business.

Subtotal $318.99
Sales Tax $19.74
Total $338.31

Computer Deal Of the Day

Dell Latitude E6400 Notebook

PC- Intel Core 2 Duo 2.2Ghz processor

4GB Memory

160GB Harddrive


14.1″ Display


Windows 7 Professional

Off Lease


Call 260-220-9527 to order or contact us on our website at

PCRS Computers Remote Tune Up

PCRS Computers can do a PC tune up remotely for only $50 all you need is and internet connection.  Is your computer slow does it take forever to start up. then let us fix it most computer user just deal with the computer till it dies but if you let us tune it up for you it will save your computer and make your internet faster. so please give me a call today 260-220-9527 please do not wait check us out to day no matter where your computer is we can help.

Get your computer Tuned up for only $50 with our Remote Repair Program.

Remote Repair program

PCRS Computers proudly offers remote support for computer repair. Qualifying service calls allow you to choose online help from experienced technicians. Remote support is fast, easy, and resolves many issues. Most problems are solved within hours not days.

Remote Support can

  • Resolve driver issues
  • Install software
  • Setup data backup services
  • Virus and Spyware removal
  • Disk cleanup
  • General tune-up
  • Troubleshooting hardware and software problems

Remote Support Requires

  • High speed internet connection (DSL, Cable, FiOS, etc.)
  • Your computer must start
  • You must be able to reach the internet from your computer
  • Technicians can remotely service systems running Windows.
    Contact our service representatives now to see if you qualify for remote support. A tech can be working on your system remotely within 30 minutes.

Remote Support is not for every problem

  • The following issues require an on-site visit
  • Internet failure
  • Hardware failure
  • System that won’t boot

Callus today to get started are simple PC tune up is only $50 so please do not wait prices will increase after the new year. Call 260-220-9527 to get started our services are remote so it does not matter where you live.

What are the types of spyware

Spyware is any software that obtains information from a PC without the user’s knowledge. There are many different types of spyware operating on the Internet but you can generally group them into two categories: Domestic Spyware and Commercial Spyware.

Domestic Spyware is software that is usually purchased and installed by computer owners to monitor the Internet behavior on their computer networks. Employers use this software to monitor employee online activities; some family members use domestic spyware to monitor other family members (such as reviewing the content of children’s chat room sessions).

A third party can also install domestic spyware without the knowledge of the computer owner. Law enforcement officials have used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets.

Commercial Spyware (also known as adware) is software that companies use to track your Internet browsing activities. Companies that track your online habits often sell this information to marketers who then hit you with targeted advertising—ads that match your browsing interests and would most likely appeal to you.

Advertisers are delighted when they acquire such valuable marketing information so easily; in the past marketers had to bribe you to learn your preferences through contests, registration surveys and the like. Those methods of gaining your personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse. Gaining your preferences by stealth using software spies is far easier and offers a much more complete picture for the marketing industry; as a result, spyware is everywhere. For more information on how and when spyware attaches itself to your computer, read

How Did Spyware End Up on My Computer?

At the very least, spyware is a nuisance—slowing down your computer, filling your hard drive with useless gunk and marking you as a target for enterprising advertisers. Beyond intruding on your privacy, spyware can be used as a tool to perpetuate crimes, such as identify fraud. Below is a list detailing different types of spyware and the purposes for each.
Internet URL loggers & screen recorders

URL loggers track websites and pages visited online; screen recorders can take a small grayscale snapshot image of your screen every time it changes and can store or transmit these without notifying you. These methods are common to Domestic spyware.
Chat loggers & email recorders

Email recorders and chat loggers are similar, making a text copy of all incoming and outgoing email and chat sessions. Domestic spyware frequently utilizes these methods.
Keyloggers & password recorders Keyloggers & password recorders

When you bank online with this software on your hard drive someone is looking over your shoulder. Password recorders do just that—track typed passwords. Keylogger software records all of your keystrokes, not just passwords.
Web bugs

Web bugs are also known as advertiser spyware or adware. When you have adware on your computer you receive targeted, popup ads after you perform some action, such as typing something into a search engine. This advertising can even appear on your screen even when you are not online. If you are pummeled with new advertising screens constantly, you most likely have web bug spyware installed on your computer.
Browser hijacking

Browser hijackers place Internet shortcuts on your Favorites Folder without prompting you. This shortcut will lead many accidental viewers to their website so that they may artificially inflate their website\’s traffic stats; this enables them to receive higher advertising revenues at the expense of your time. You may be able to get rid of these false favorites by changing your Internet options, but occasionally the only way to get rid of these annoying shortcuts is to go into your registry and delete them. However, some spyware installs a safety net for itself that resets the spyware on your registry each time you reboot. Your only option to kill this aggressive type of spyware is to reformat your hard drive or to utilize excellent anti-spyware software.
Modem hijacking

If you use a telephone modem for your Internet connection, an unscrupulous person may be able to install an online dialer on your computer to establish a new Internet connection that uses pricy 900-type long-distance phone numbers—quite a shock when you get your next telephone bill. These dialer spyware programs often piggy-back on spam and porn emails; simply opening the email can inadvertently initiate the dialer installation. The hard-to-track villain banks on the fact that you’ll pay your phone bill in full before you take time to figure out what happened.
PC hijacking

Some borrow your computer system for their own use—spyware users can hijack your connection to send their spam through your ISP. This means that a parasitical spammer can send thousands of spam emails through your computer connection and your ISP address. High-volume, high speed Internet access lines are targeted by users of this spyware. Often victims don’t realize that their good name has been muddied until their ISP cuts them off due to spam complaints.
Trojans & viruses

Like the wooden Trojan horse that the Greeks used to enter Troy, this spyware masquerades as a something harmless yet can compromise your computer—your data may be copied, distributed or destroyed. A virus is similar but has the additional power to replicate itself, causing damage to multiple computers. Both of these vicious pieces of software fall under the definition of spyware because the user is unaware of and would not condone their true purpose.

The Many Faces of Malware

The Many Faces of Malware

According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each.

1. Viruses. The malware that’s on the news so much, even your grandmother knows what it is. You probably already have heard plenty about why this kind of software is bad for you, so there’s no need to belabor the point.

2. Worms. Slight variation on viruses. The difference between viruses and worms is that viruses hide inside the files of real computer programs (for instance, the macros in Word or the VBScript in many other Microsoft applications), while worms do not infect a file or program, but rather stand on their own.

3. Wabbits. Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it’s not hard to see why: they don’t do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.

4. Trojans. Arguably the most dangerous kind of malware, at least from a social standpoint. While Trojans rarely destroy computers or even files, that’s only because they have bigger targets: your financial information, your computer’s system resources, and sometimes even massive denial-of-service attack launched by having thousands of computers all try to connect to a web server at the same time.

5. Spyware. In another instance of creative software naming, spyware is software that spies on you, often tracking your internet activities in order to serve you advertising. (Yes, it’s possible to be both adware and spyware at the same time.)
6. Backdoors. Backdoors are much the same as Trojans or worms, except that they do something different: they open a “backdoor” onto a computer, providing a network connection for hackers or other malware to enter or for viruses or sp@m to be sent out through.

7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit.

8. Rootkit. The malware most likely to have a human touch, rootkits are installed by crackers (bad hackers) on other people’s computers. The rootkit is designed to camouflage itself in a system’s core processes so as to go undetected. It is the hardest of all malware to detect and therefore to remöve; many experts recommend completely wiping your hard drive and reinstalling everything fresh.

9. Keyloggers. No prïze for guessing what this software does: yes, it logs your keystrokes, i.e., what you type. Typically, the malware kind of keyloggers (as opposed to keyloggers deliberately installed by their owners to use in diagnosing computer problems) are out to log sensitive information such as passwords and financial details.

10. Dialers. Dialers dial telephone numbers via your computer’s modem. Like keyloggers, they’re only malware if you don’t want them. Dialers either dial expensive premium-rate telephone numbers, often located in small countries far from the host computer; or, they dial a hacker’s machine to transmit stolen data.

11. URL injectors. This software “injects” a given URL in place of certain URLs when you try to visit them in your browser. Usually, the injected URL is an affïliate link to the target URL. An affïliate link is a special link used to track the traffïc an affïliate (advertiser) has sent to the original website, so that the original website can pay commissions on any salës from that traffïc.

12. Adware. The least dangerous and most lucrative malware (lucrative for its distributors, that is). Adware displays ads on your computer. The Wikipedia entry on malware does not give adware its own category even though adware is commonly called malware. As Wikipedia notes, adware is often a subset of spyware. The implication is that if the user chooses to allow adware on his or her machine, it’s not really malware, which is the defense that most adware companies take. In reality, however, the choice to install adware is usually a lëgal farce involving placing a mention of the adware somewhere in the installation materials, and often only in the licensing agreement, which hardly anyone reads.

Are you ready to take on this dirty dozen? Don’t go it alone. Make sure you have at least one each of antivirus and antispyware.

%d bloggers like this: