Blog Archives

PCRS Computers Computer Buying Tips


PCRS Computers Computer Buying Tips

 

Buying a Mac or PC Computer

Should You Buy a Mac or a PC?

Deciding whether to buy a Mac or a PC should be based on two main points: your budget and whether the computer is primarily for business or pleasure. Both types of computers are excellent for specific tasks, although if you are planning to go to work and bring your computer with you, you may need to consider what types of computers your coworkers will have to make it easier to swap files or compare notes. Here a few basic tips on how to choose the right computer for you.

Budget

There’s no debate—Macs are far more expensive than PCs. If money is a big issue for you, you’ll want to buy a PC. However, Macs aren’t overpriced. Unlike PCs, each computer is designed for maximum efficiency in both processing speed and ease of use. While PCs frequently crash and are vulnerable to spyware and viruses, Macs resist most viral attacks and operate at a consistently high standard with virtually no technical issues. If you can afford it, a Mac is an excellent investment which will work for you for years.

Business

While Macs have always been the preferred computer of graphic designers and other creative individuals, for most corporate office work, PCs have long been favored over Macs. For this reason, PCs still dominate in most business settings.

Up until a few years ago, the major software designed for business suites, like the Microsoft Suite, was designed chiefly for PCs. However, the popularity of other Apple products such as the iPod and iPad has started to change the way Macs are perceived in the larger corporate world. Most business software now has versions available for both Macs and PCs. Because of their heftier price tag, Macs still have a long way to go in making a dent in the corporate world, although in terms of functionality they perform just as well as a PC.

Graphically, Macs have richer displays and a Linux based operating system that makes them ideal for manipulating complex information such as layered graphical displays. Photoshop was initially designed for the Mac. If you are buying a computer for use in a professionally creative setting, your coworkers will likely also be using Macs.

Programming

Computer programmers are evenly split on whether Macs or PCs make better programming tools. The truth is, it comes down to a matter of personal preference. Macs developed a comprehensive suite of developer tools with their OS 10 which, if used properly, can help you get to the moon. PCs have always been oriented toward programming; in fact, the DOS/Windows interface was developed mainly as a way to stay competitive with the user friendly Mac interface. However, many programmers have complained that Macs are slower than PCs when it comes down to executing large amounts of freshly programmed code.

Personal Use

If you enjoy playing video games in your spare time, buying a PC is probably the best choice. This is partly because PCs are easier to hook up to auxiliary equipment like television sets or other devices. Although USB ports are evenly distributed between Macs and PC, the higher data transfer portals of a Mac do not always adapt easily to most conventional televisions, making it difficult to quickly relay information between the two devices, whereas the higher data transfer portals of a PC are usually very adaptable to auxiliary devices.

If, on the other hand, you prefer to design or develop creative projects in your personal time, Macs are a much better choice. Because Apple has invested so much time in making the user interface incredibly easy to use, spending time creating music or drawing or editing movies becomes less about the computer and more about the activity; you forget you are using a computer, and can instead focus on the act of creation. PCs have a more rigid approach; it’s hard to forget that you’re on a computer.

Cloud Computing and the Future of Virtualization

Of course, with the tech community excited about the potential of cloud computing, computer memory is going to become less of an issue, with flexibility, mobility, and processing speed becoming increasingly important when making purchasing decisions. Mac’s suite of mobile devices are far better adapted to shifting between different geographical areas while also offering enough functionality to make them viable business tools. However, for now you should buy the computer that best suits your needs, and plan on the inevitable: no matter what you buy now, in a few years it will be completely outdated anyway!

Computer of the Week 12/10/2012


Quote

PCRS Computers420 Winchester RdGeneva, IN 46740260-220-9527

Email: a.patch@pcrscomputers.com

Website: www.pcrscomputers.com

Salesperson Quote SHIPPING METHOD SHIPPING TERMS DELIVERY DATE PAYMENT TERMS DUE DATE
Andrew Patch #201 N/A N/A N/A Due on Receipt
Quantity Description Price
1 HP DC7700 Desktop PC – Intel Pentium D 925 3.0GHz, 4GB DDR2, 1TB HDD, DVDRW, Windows 7 Home Premium 32-bit (Off Lease)

$281.99

1 Setup $25.00
1 Shipping $12.00

We Treat You Right For Less.

Thank you for your business.

Subtotal $318.99
Sales Tax $19.74
Total $338.31

Get your computer Tuned up for only $50 with our Remote Repair Program.


Remote Repair program

PCRS Computers proudly offers remote support for computer repair. Qualifying service calls allow you to choose online help from experienced technicians. Remote support is fast, easy, and resolves many issues. Most problems are solved within hours not days.

Remote Support can

  • Resolve driver issues
  • Install software
  • Setup data backup services
  • Virus and Spyware removal
  • Disk cleanup
  • General tune-up
  • Troubleshooting hardware and software problems

Remote Support Requires

  • High speed internet connection (DSL, Cable, FiOS, etc.)
  • Your computer must start
  • You must be able to reach the internet from your computer
  • Technicians can remotely service systems running Windows.
    Contact our service representatives now to see if you qualify for remote support. A tech can be working on your system remotely within 30 minutes.

Remote Support is not for every problem

  • The following issues require an on-site visit
  • Internet failure
  • Hardware failure
  • System that won’t boot

Callus today to get started are simple PC tune up is only $50 so please do not wait prices will increase after the new year. Call 260-220-9527 to get started our services are remote so it does not matter where you live.

The Many Faces of Malware


The Many Faces of Malware

According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each.

1. Viruses. The malware that’s on the news so much, even your grandmother knows what it is. You probably already have heard plenty about why this kind of software is bad for you, so there’s no need to belabor the point.

2. Worms. Slight variation on viruses. The difference between viruses and worms is that viruses hide inside the files of real computer programs (for instance, the macros in Word or the VBScript in many other Microsoft applications), while worms do not infect a file or program, but rather stand on their own.

3. Wabbits. Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it’s not hard to see why: they don’t do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.

4. Trojans. Arguably the most dangerous kind of malware, at least from a social standpoint. While Trojans rarely destroy computers or even files, that’s only because they have bigger targets: your financial information, your computer’s system resources, and sometimes even massive denial-of-service attack launched by having thousands of computers all try to connect to a web server at the same time.

5. Spyware. In another instance of creative software naming, spyware is software that spies on you, often tracking your internet activities in order to serve you advertising. (Yes, it’s possible to be both adware and spyware at the same time.)
6. Backdoors. Backdoors are much the same as Trojans or worms, except that they do something different: they open a “backdoor” onto a computer, providing a network connection for hackers or other malware to enter or for viruses or sp@m to be sent out through.

7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit.

8. Rootkit. The malware most likely to have a human touch, rootkits are installed by crackers (bad hackers) on other people’s computers. The rootkit is designed to camouflage itself in a system’s core processes so as to go undetected. It is the hardest of all malware to detect and therefore to remöve; many experts recommend completely wiping your hard drive and reinstalling everything fresh.

9. Keyloggers. No prïze for guessing what this software does: yes, it logs your keystrokes, i.e., what you type. Typically, the malware kind of keyloggers (as opposed to keyloggers deliberately installed by their owners to use in diagnosing computer problems) are out to log sensitive information such as passwords and financial details.

10. Dialers. Dialers dial telephone numbers via your computer’s modem. Like keyloggers, they’re only malware if you don’t want them. Dialers either dial expensive premium-rate telephone numbers, often located in small countries far from the host computer; or, they dial a hacker’s machine to transmit stolen data.

11. URL injectors. This software “injects” a given URL in place of certain URLs when you try to visit them in your browser. Usually, the injected URL is an affïliate link to the target URL. An affïliate link is a special link used to track the traffïc an affïliate (advertiser) has sent to the original website, so that the original website can pay commissions on any salës from that traffïc.

12. Adware. The least dangerous and most lucrative malware (lucrative for its distributors, that is). Adware displays ads on your computer. The Wikipedia entry on malware does not give adware its own category even though adware is commonly called malware. As Wikipedia notes, adware is often a subset of spyware. The implication is that if the user chooses to allow adware on his or her machine, it’s not really malware, which is the defense that most adware companies take. In reality, however, the choice to install adware is usually a lëgal farce involving placing a mention of the adware somewhere in the installation materials, and often only in the licensing agreement, which hardly anyone reads.

Are you ready to take on this dirty dozen? Don’t go it alone. Make sure you have at least one each of antivirus and antispyware.

What is Spyware?


Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.

While the term spyware suggests software that monitors a user’s computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.

Sometimes, spyware is included along with genuine software, and may come from an official software vendor. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user’s computer.

Routes of infection

Malicious websites attempt to install spyware on readers’ computers.

Spyware does not directly spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers. Instead, spyware installs itself on a system through deception of the user, or through exploitation of software vulnerabilities.

Most spyware is installed without users’ knowledge, or by using deceptive tactics. Spyware may try deceive users by bundling itself with desirable software. Other common tactics are using a Trojan horse. Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware.

The installation of spyware frequently involves Internet Explorer. Its popularity and history of security issues have made it a frequent target. Its deep integration with the Windows environment make it susceptible to attack into the Windows operating system. Internet Explorer also serves as a point of attachment for spyware in the form of Browser Helper Objects, which modify the browser’s behavior to add toolbars or to redirect traffic.

Effects and behaviors

A spyware program is rarely alone on a computer: an affected machine usually has multiple infections. Users frequently notice unwanted behavior and degradation of system performance. A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic. Stability issues, such as applications freezing, failure to boot, and system-wide crashes, are also common. Spyware, which interferes with networking software, commonly causes difficulty connecting to the Internet.

In some infections, the spyware is not even evident. Users assume in those situations that the performance issues relate to faulty hardware, Windows installation problems, or another infection. Some owners of badly infected systems resort to contacting technical support experts, or even buying a new computer because the existing system “has become too slow”. Badly infected systems may require a clean re-installation of all their software in order to return to full functionality.

Moreover, some types of spyware disable software firewalls and anti-virus software, and/or reduce browser security settings, which further open the system to further opportunistic infections. Some spyware disables or even removes competing spyware programs, on the grounds that more spyware-related annoyances make it even more likely that users will take action to remove the programs.

A typical Windows user has administrative privileges, mostly for convenience. Because of this, any program the user runs has unrestricted access to the system. As with other operating systems, Windows users are able to follow the principle of least privilege and use non-administrator accounts. Alternatively, they can also reduce the privileges of specific vulnerable Internet-facing processes such as Internet Explorer.

In Windows Vista, by default, a computer administrator runs everything under limited user privileges. When a program requires administrative privileges, Vista will prompt the user with an allow/deny pop-up (see User Account Control). This improves on the design used by previous versions of Windows.

Remedies and prevention

As the spyware threat has worsened, a number of techniques have emerged to counteract it. These include programs designed to remove or block spyware, as well as various user practices which reduce the chance of getting spyware on a system.

Nonetheless, spyware remains a costly problem. When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the operating system. For instance, some spyware cannot be completely removed by Symantec, Microsoft, PC Tools.

What is malware?


Malware, short for malicious software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.

Malware includes computer viruses, worms, Trojan horses, spyware, adware, and other malicious programs. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Malware is not the same as defective software, which is software that has a legitimate purpose but contains harmful bugs that were not noticed before release. However, some malware is disguised as genuine software, and may come from an official company website. An example of this is software used for harmless purposes that is packed with additional tracking software that gathers marketing statistics.

Malware has caused the rise in use of protective software types such as anti virus, anti-malware, and firewalls. Each of these are commonly used by personal users and corporate networks in order to stop the unauthorized access by other computer users, as well as the automated spread of malicious scripts and software.

Purposes

Malware by categories on March 16, 2011.

Many early infectious programs, including the first Internet Worm, were written as experiments or pranks. Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others.

Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on. Left un-guarded, personal and networked computers can be at considerable risk against these threats. (These are most frequently counter-acted by various types of firewalls, anti virus software, and network hardware).

Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users’ computers for black-market exploitation. Infected “zombie computers” are used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.  Other strictly for-profit category of malware has emerged, called spyware. These programs are designed to monitor users’ web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues to the spyware creator. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be packaged together with user-installed software, such as peer-to-peer application.

ask andrew 9/24/2012


How often should i change my password?

No matter how secure your password is, it is a good idea to make a regular change. PCRS Computers would suggest changing each of you passwords every six months at the most to maintain the highest level of security possible.

Thank you for the question. Please comment and email me at a.patch@pcrscomputers.com any questions you would like ask Andrew to answer. please share this blog with everyone you know i want to hit 1000 views by the end of OCT. and we have only 201 views so far.

Why pay PCRS Computers to maintain your computer?


There are three reasons why people pay PCRS Computers to maintain their computer. Reason one is lack of computer repair knowledge. That is the most common reason why a computer is not maintained, and annoying problems begin to cause you stress every time you use your computer.

If you do not maintain your computer, your computer gets corrupted and slows down becoming a headache instead of an enjoyment.  Our remote service gives you stress-free maintenance.

Reason two for paying  PCRS Computer to maintain your computer is lack of  time .  Most people work a lot just to make ends meet, so they don’t have time to work on their computer.  They just need it to run properly when they use it.  Our remote service gives you time-saving convenience.

Reason three for paying  PCRS Computers to maintain your computer is we do a great job for a reasonable price.  Most companies charge $300 to $500 dollars a year for the same maintenance service we provide for only $170 a year or $15 a month whichever option works best for you.

Our remote service is available anywhere you can connect to a high speed internet provider.  So call us today at 260-220-9527 to get started.  Do not wait.  You can also email us at a.patch@pcrscomputers.com. with any question about this stress-free, convenient and affordable computer repair service.

As always please comment and tell us what you think about this blog post. Have a great day!!!

Ask Andrew 9/22/2012


What makes a good password?

Putting together a strong password, or even a suite of strong passwords for all your sites, is a difficult process, but we know a couple of tricks at PCRS Computers that can help you.

Firstly use numbers, symbols, and capital letters in your passwords. Try not to use passwords that are too personal like birthdays, anniversaries, kids date of births in this day6 and age it is too easy for someone to get a hold of this info so the more detailed it is the better.

I hope this answered your question. Please comment below or email me at a.patch@pcrscomputers.com any more question you would like to see on this blog.

Ask Andrew our first question.


Doug Line asked should you upgrade your old computer or just buy a new one?
The short answer is if it is more than ten years old buy a new one. You should always get you computer checked out before deciding because there are many motherboards out there some can be upgraded but if it is too old you need a new motherboard then it is easier and cheaper in some case to buy a new computer.
Let PCRS Computers check it out for you and we can also build you a custom pc so you can always upgrade later as well as have a new computer that is better right now.

Go to our website http://www.pcrscomputers.com and contact us for a quote on what you should do.

or call our office anytime at 260-220-9527 to get started today.

Thanks for the question and if you comment your questions on this post i will try to answer them one at a time if you include an email address i can answer you personal too.