Recent Blog Posts:
The Battle Against Spam: Let us take a quick look at the prevalence of spam as explained by Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org): “Researches show unwanted or “junk” e-mail, called spam, represent approximately half of all e-mail messages received. Although it was previously perceived as nothing more than a nuisance, the prevalence of spam has […]
Let us take a quick look at the prevalence of spam as explained by Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org):
“Researches show unwanted or “junk” e-mail, called spam, represent approximately half of all e-mail messages received. Although it was previously perceived as nothing more than a nuisance, the prevalence of spam has reached a point where numerous users have started to express doubt about the efficiency of e-mail transmissions, and increased concerns regarding the circulation and spread of computer viruses through unwanted messages.”
In 2003, President Bush authorized the bill known as “Can Spam,” in December of 2003, which is the very first nationwide standards that focus on bulk unsolicited business e-mail. The Senate, which voted 97 to 0, approved the bill that, bans senders of unsolicited commercial e-mail from making use of false return addresses to camouflage their identification (spoofing) and using dictionaries to produce such mailers. Additionally, it forbids the use of misguiding subject lines and mandates emails to have an opt-out option. The regulations likewise prohibit senders from harvesting addresses off websites. Those who violate these rules will be charged with misdemeanor and could be imprisoned for 1 year.
One major factor that needs to be reviewed concerning this: spam is now originating from various other countries in ever-greater numbers. These e-mails are harder to combat, since they originate from outside our nation’s laws and policies. Due to the fact that the Internet opens boundaries and also thinks globally, these legislations are good but they fail to address the problem.
So, what is your opinion? Here are the five key tips to protect yourself from spam.
Number 1: Do everything you can to prevent your email address from getting overly exposed on the internet.
You should also be know that “spam spiders” exist. They scour the internet for e-mail addresses to spam. You can try searching the term online and you will be surprised at the results that you’ll get. Meanwhile, a website called WebPoison.org has dedicated itself to eliminating internet “spambots” and “spam spiders” by giving out fake HTML websites that produce bogus e-mail addresses.
A few suggestions for you:
- Use form e-mails that can conceal addresses.
- Use addresses like email@example.com instead of your complete address to help combat the growing spam problem.
- There are applications that encrypt your email, like jsGuard, which hides your email address on the website to ensure that it will be hard to read even if spam spiders successfully finds it.
Number 2: Use spam blocking software like www.cloudmark.com or www.mailwasher.net. You can choose from a lot of options including pro versions. Be sure to get the software because it will save you time. Although the application is not foolproof, they really do help. You normally have to do some hand-operated set up to block specific kinds of email. Do not hesitate to ask the help of computer professionals in case you have no idea what to do.
Number 3: Utilize several email address if possible.
There are several free email addresses that you can choose from. In case you need to sign up for a free newsletter, be sure to have a back up email address. You can look at it like giving your phone number to a close friend and your business number to other acquaintances.
Number 4: File attachments on emails from people you’re not familiar with are BAD, BAD, BAD.
One of the most common problems whenever we talk about spam is that they usually come with attachments, which could have viruses. Corporations usually have filters that prevent such emails from reaching you. Always remember that you should never open the attachment if you do not know the email sender. You should also search for services that offer filtering, which are commonly provided by firewall vendors.
Number 5: Email solutions currently have “bulk-mail” baskets. In case the one you are using now does not support this, then you might need to consider finding a new vendor. The idea is simple. People you know can free send you emails. However, those that you do not know will be placed in the bulk email pile where you can “choose” to permit them into your circle. This concept is similar to Spam Blocking but looking into other more effective alternatives is highly recommended.
PcRx Computers is dedicated to protecting your identity on the web. Call us now and we’ll gladly help you set up measures against spam, viruses, and identity theft.
408 Main Street
Conway, SC 29526
Phishing For Your Identity: We have all received those emails that look like they are coming from trusted websites. Emails that direct you to a website that looks familiar to update certain information, even personal data. Beware when these sites are asking you to update secure information such as social security numbers, passwords or even credit card numbers or […]
We have all received those emails that look like they are coming from trusted websites. Emails that direct you to a website that looks familiar to update certain information, even personal data. Beware when these sites are asking you to update secure information such as social security numbers, passwords or even credit card numbers or bank information.
What makes these emails so trusted is that you know the business name as one where you have done business in the past. The logo, colors and look and feel of the site look so familiar. One of the most recent examples is your domain name registrar that says your domain is about to expire. Or your hosting company that says you have run out of hosting space and your website will be taken down if you don’t update your information.
There is a website called WhoIs.com that will give anyone who searches all the details about a domain – where it is registered, who owns it, the address, both email and physical, of the owner and where it is hosted. I was recently introduced to a “scraper” that will create a spreadsheet of all this information for as many websites as you put into the program. Right there at their fingertips is all the information a hacker needs. (More information later on how to protect this.)
You are tempted to click on the link provided because it is so convenient and then when you do it is natural to want to correct false information. Much to your regret you find out later this was a false website that was created with the sole intent to steal your individual or business details. You, my good friend, have actually simply been “phished“.
Phishing (pronounced “fishing”) is specified as the act of sending an e-mail to a recipient falsely declaring to actually be an established, genuine business. The intent of the phisher is to rip-off the recipient into surrendering their personal information, and ultimately steal your identity.
It is not as simple as you think to spot an email phishing for details. At the beginning, the email may look like it is from a legitimate business such as your bank, hosting company or the local freight carrier. The field marked “From” will usually the.com address of the business pointed out in the e-mail. The clickable link even appears to take you to the company’s website, when in reality, it is a phony site constructed to duplicate the legitimate website.
A lot of these people are expert crooks. They have invested a great deal of time in developing e-mails that look genuine. Users have to examine all e-mails asking for personal details thoroughly. While you are scanning your emails keep in mind that the “From” can be changed by the sender to be any email address.
While it might look like it is originating from a.com you do business with, looks can be deceiving. Likewise remember that the phisher will go all out in attempting to make their email look as genuine as possible. They will even copy logo designs or images from the main site to use in their e-mails. Finally, they want you to use clickable link that the recipient can follow to easily update their info.
An excellent way to check the legitimacy of the link is to point at the link with your mouse. The actual website address for the link where you are directed will be displayed on the status bar in the lower left corner of your screen. It is a very quick and easy method to check if you are being directed to a genuine website.
You can protect your domain with WhoIs Guard which is offered from your domain registrar such as GoDaddy. It is about $10 a year and will hide your information from prying eyes.
Finally, follow the golden rule. Never ever, ever, click the links within the text of the e-mail, and always delete the email instantly. As soon as you have deleted the e-mail, empty the trash can in your e-mail accounts also. If you are really worried that you are missing out on a crucial notice relating to one of your accounts, then type the complete URL address of the website into your internet browser. At least then you can be confident that you are, in reality, being directed to the true and genuine website. It is also a good idea to notify the organization about the fraud email.
PcRx Computers is concerned with your safety and your identity, We provide virus scanning programs for your protection. However, there is much you can do to protect your identity. Never give confidential information out over the internet.
408 Main Street
Conway, SC 29526
What is Cloud Computing: As a small business owner you need every advantage you can get. Many business owners are turning to the cloud for this advantage. Cloud computing can help small businesses grow at a faster pace while at the same time saving money. The concept is that you turn to other companies to store your data and […]
As a small business owner you need every advantage you can get. Many business owners are turning to the cloud for this advantage. Cloud computing can help small businesses grow at a faster pace while at the same time saving money.
The concept is that you turn to other companies to store your data and to share software applications over the internet. There are some risks involved, but it can make small companies grow bigger at a faster pace and save money.
Uses of Cloud Computing
Most companies use their own computers to store data. If you have large amounts of data, for example a gaming company, your need for storage will outgrow your available space. Many companies are opting for cloud computing rather than purchase additional on-site storage.
Cloud computing allows companies to store data and only pay for the storage space they use. Think of this like your local storage facility. You want a small storage area, you only pay for a small area, if you need more space, you upgrade to a larger storage container.
Many hospitals are turning to cloud computing for software applications that streamline the admittance process. These programs can be accessed using a mobile device eliminating the need for tablets or laptops. The staff has quick access to patient information right in their pocket.
Revenue from cloud computing is expected to double by the year 2014. There are risks in using this new technology. Amazon suffered a major shutdown due to cloud computing in April of 2011. This raised questions on the reliability and security issues of using cloud computing. You are relying on the internet link to your provider and access your information.
Many people are leery of the security issues with using the internet for data transfer. It will take time for the public to be comfortable that this is a safe way to do business. Think of it like when the refrigerator was first introduced and people feared that their electric bill would be excessive. As people started using refrigerators, word of mouth spread and they become more confident in the device. The same will hold true with cloud computing.
If you have storage needs for your small business computers, give PcRx a call to discuss the best solution for your business.
408 Main Street
Conway, SC 29526
4 Tips to Help Your Computer Survive a Storm: Myrtle Beach Computer Repair experts at PcRx would like to give you some great advice for this time of year when we are experiencing a lot of thunderstorms. Tip #1 If it’s raining out, save often. This sounds so simple but how often do we forget. If you are in a Microsoft Office program such […]
Myrtle Beach Computer Repair experts at PcRx would like to give you some great advice for this time of year when we are experiencing a lot of thunderstorms.
Tip #1 If it’s raining out, save often. This sounds so simple but how often do we forget. If you are in a Microsoft Office program such as Word or Excel, you can use the short cut key <ctrl> + S. It takes about 2 seconds to save a lot of hard work. Note – this short cut works in a lot of programs so give it a try.
Tip #2 If it’s storming out, turn off your computer. I know – you have a lot of work to do and just can’t stop. Believe me you will be glad you did when you don’t blow up your computer.
Tip #3 If it’s thundering out, turn off your computer and unplug it from the wall/electric source. Ok, if you are not going to take this advice, make sure you have a good backup program. Give us a call and we can help you out with this.
Tip #4 To avoid doing 1, 2 and 3, consider getting one of these devices. Not only do they save your computer from a meltdown, but keep your computer running during the storm. Plug your modem into it and you are still surfing away while lighting is going on. It’s pretty cool to see the first time you are running on a battery during a storm. It’s like a having your own Yankee candle – you can just keep on working.
They run about $80, sold at most electronic stores.
Now… a computer should not be plugged into one of these…
They are useless. Sure, they are good for getting more power, but do nothing for you in regards to saving your computer during a storm. And I bet most of you have your computer plugged into one right now.
Myrtle Beach Computers Power 2If you can’t afford the $80 price tag on the big power back up, you can consider a cheaper model sold at most Lowe’s, Target, Walmart type stores. These run about $20.
If you need help with figuring out all of your cords and would like a home visit, please fill out this form and we will get back to you to schedule an appt. If you have had your power destroy your computer and you want your data back, we can help with that, too of course. Or better yet, let’s set up online back up today!
408 Main Street
Conway, SC 29526
Summer Guide to Cyber Safety Part 2: Today we will discuss if you really have to stay connected while on vacation. In our previous article we recommended you stay away from public computers such as those in hotels and Internet Cafés. But sometimes that is easier said than done so here is a short guide to Going Online in Public. First and […]
Today we will discuss if you really have to stay connected while on vacation.
In our previous article we recommended you stay away from public computers such as those in hotels and Internet Cafés. But sometimes that is easier said than done so here is a short guide to Going Online in Public.
First and foremost of all if you have the least amount of concern regarding the computer you are using DO NOT use it to access sensitive sites like banking, brokerage, etc. This is obviously a judgment call and you best use your good judgment here. You just don’t want to use a compromised computer.
If you log onto an information sensitive web site, be sure to logout when you have completed your cycle. Do the following
- Log out
- delete the web history
- close the browser when you are done.
This is important – you don’t want any sensitive data stuck in the cache or in any way accessible.
If you would like to increase your cyber browsing security you can install a portable version of Firefox on a USB drive and load the browser directly from it instead of the computer. This would increase your cyber security.
Backup and Encrypt your data so even the snoopers cannot find their way.
Use only the strongest of passcodes or phrases.
Of course keep your Anti-Virus up to date.
When you return from traveling, it is a good idea to stop by your local computer experts at PCRx and have them do a complete scan of your laptop. This only takes a few minutes and can save you hours of frustration.
408 Main Street
Conway, SC 29526
Summer Guide to Cyber Safety: The summertime is here in full force – tourists, vacations, travel for fun and business. Most of us will hit the road sometime this summer. With all the devices that travel with us to stay connected from laptops to iPads to SmartPhones, we are more than ever at risk to a security breach. Some of […]
The summertime is here in full force – tourists, vacations, travel for fun and business. Most of us will hit the road sometime this summer. With all the devices that travel with us to stay connected from laptops to iPads to SmartPhones, we are more than ever at risk to a security breach. Some of this risk is harmless and others will cause you to need serious computer repair.
Hackers love to take advantage of unaware travelers and we need to stay sharp. Keep in mind that hotels, airports and other WIFI networks are hostile territory and we need to have our defenses up for cyber safety.
Here are a few tips from Myrtle Beach Computer Repair
Common Sense Check – you have all heard the saying “If it looks to be good to be true, it probably isn’t true.” This philosophy holds true in the cyber world as well as in the real world. If your summer vacation to Washington DC offers a personal meeting with the president, chances are it won’t happen. Do your homework on any offer and make sure that the company that stands behind the offer has a good reputation. Look for any hidden charges or requests for information that is not necessary for the transaction. Check with the International Air Transportation Association or the Better Business Bureau to ensure cyber safety.
Unbelievable Coupon Deals – there are reputable social media sites such as Groupon or Living Social that offer great deals. However, many sites have taken on the “look and feel” of a legitimate site and are there to simply scam you, install malware or take your credit care information and run. Be careful where you shop online. If you receive an email with a link to a shopping site that you have not signed up to receive information from – beware! It is probably a scam. Most sites rely on search engines for people to find them.
Credit Cards vs Cash – the best way to pay when you are traveling is with credit cards. This will provide you with protection against fraud and theft. Don’t use debit cards except for getting cash from an ATM. Keep a small amount of cash on hand for tips or the occasional bus or cab ride. Never bring your checkbook – leave it at home.
Avoid Public Internet Access. Avoid the computer at the hotel or airport and internet Cafés. Even novice hackers can steal your logon and passwords. In our next post we will give you some ideas on ways to stay safe if you must use public access. Until then make sure that the public WIFII at your hotel is legitimate. Only logon with a recognized source. For example, the hotel should have their own logon for you to access and not simply take you straight to the internet. As an alternative, you can access the internet on your laptop via your SmartPhone.
Passport security – did you know that the new e-passports come with an RFID chip so not only can customs read your information, so can hackers! This can happen from several feet away.
Give your ears a break – when you are not using your Bluetooth device, turn it off and disconnect it from your phone. Hackers can use your Bluetooth to steal your information or install malware. Always remember that your conversation can be overheard. Never give out personal information in a public area.
Social Media TMI – if you are heading out of town, do NOT post is all over Facebook, MySpace or other social media sites. Make sure that your home address is NOT listed in your profile. This is like giving a personal invitation to have your home invaded. A friend of mine is an artist and she mentioned that she would be at an art festival all day. She had her home address on her profile and had set the permissions so that only friends can see. When she returned at the end of the day, her home had been invaded. When the thief was caught, he said he got the information from Facebook. He had told her he was a friend of a friend and she accepted the friend request. Even if you set permissions on your social media sites, don’t include your address on your profile.
One last tip – before you leave on vacation be sure to connect with your local computer technician and have anti-virus protection installed on your laptop or notebook. This will go a long way toward keeping you protected.
We hope that these tips will keep you safe during your summer vacation. Enjoy the sunshine and disconnect from the cyber world and connect with family.
408 Main Street
Conway, SC 29526
Myrtle Beach Computer Repair PCRx on Antivirus Protection: Why is it important in today’s business world to invest in anti-virus protection? With the rapid changes in technology, it is imperative now more than ever that you protect your computer. Less than honest individuals are using some very clever techniques to steal your information. Just this morning one of our customers reported receiving an […]
Why is it important in today’s business world to invest in anti-virus protection? With the rapid changes in technology, it is imperative now more than ever that you protect your computer. Less than honest individuals are using some very clever techniques to steal your information.
Just this morning one of our customers reported receiving an email from the Electronic Payment Association with an attachment. If you did a search on this organization, you will see that it does exist, however, there is a place on its website that explains that fraudulent are being sent and they would NEVER send an attachment.
Myrtle Beach Computer Repair PCRx recommends that you install software that searches for the threats to your computer and then eliminates them from being a problem. With so many antivirus programs available, how do you know which one to install? Unfortunately, there is no definitive right or wrong answer. Many people have asked us about the free programs that are offered and programs for which you pay an annual subscription.
Before we answer that question, let’s take a look at viruses in general. Unlike a human virus, a computer virus can be detected and eliminated prior to actually causing problems. A computer virus seeks to enter your hard drive and wreak havoc on your files. They slow down your computer by using up your hard drive space not leaving space for online programs, such as your browser, to work. They are looking to steal personal information such as financial data. What you are left with is a big mess that is a real problem to unravel.
In many instances, antivirus software will come pre-installed on your computer. If this is the case, then it is probably a free trial version of the software or a paid subscription that was ordered when you ordered your computer. The goal of this software is to detect a virus within items on your hard drive and remove them based on either your specifications or the person that setup your hardware.
In the case of a paid subscription, you will receive a message when it is close to time to renew. This will usually be in the form of a pop-up message warning you that your account is about to expire which will leave your system unprotected.
When that message appears, you have the choice of renewing the subscription or opting for one of the free versions available. Either way you will want to do your homework before making a decision.
So what do you need to look for? An antivirus program needs to alert you when a virus is trying to hack your system. Spyware falls into the antivirus category and should let you know if you’re in danger prior to downloading a file or if you have downloaded a file that is infected.
Free programs usually provide these services but at a minimal level. Often you can get by with a free program and they will offer you additional features for a fee. Depending on your usage and the security level of what you store on your computer you may need the extra features. Myrtle Beach Computer Repair PCRx technicians can help you decide what is best for you and your situation.
If you are careful where you go on the internet and never open unsolicited attachments, a free antivirus program will probably work. Being aware of where you are going on the internet and following good procedures for downloading and opening attachments eliminates much of the risk.
Take our advice:
If you are using a paid subscription and are still within the 30-day trial period that most programs provide, do some comparison shopping between free and paid versions. If the free software gives you have you need, you are in good shape.
Remember it only takes a minute to give us a call at 843-488-4100 and run by us what you are currently using or plan to use for our advice.
408 Main Street
Conway, SC 29526
A Few Common Computer Errors: If you have worked on a computer for any length of time, you know that computer errors can crop up just when you are on a deadline and can shut down your entire system. Computer errors can even corrupt your data to the point where it can’t be recovered. Unfortunately, computer errors cannot be avoided […]
If you have worked on a computer for any length of time, you know that computer errors can crop up just when you are on a deadline and can shut down your entire system. Computer errors can even corrupt your data to the point where it can’t be recovered. Unfortunately, computer errors cannot be avoided 100% of the time, but they can be prevented to a certain extent. Knowledge is power and knowing what causes a computer error can go a long way toward preventing a computer crash.
The Cause Of Computer Errors
How you use your computer has very little to do with the cause of a computer error. Often there is a conflict between the commands that are running at any given time. A computer operates from a series of commands being performed in a specific way. Most of the time things run smoothly. But there are times when a command from one program will conflict with a command from another program. We all like to multi-task and there are some programs that will conflict with other programs reaching for the same resources – then a collision occurs.
Let’s take a look at an example. All software comes with a specific list of requirements that must be met in order to run within a specific operating system. Always verify that you meet the minimum requirements before you load the software on your computer. (Sort of like reading the directions first, which some of us don’t like to do.) Many programs will not run on older operating systems such as Windows XP or Vista. The program may appear to load just fine, and then when you try to use the software, a problem raises its ugly head and you have a computer crash.
Another cause of computer errors is insufficient memory. When you install new software the instructions will inform you of minimum memory requirements. In today’s world, most computers come loaded with plenty of memory, but it doesn’t hurt to check when you are adding new software. The same holds true for disk space. A program may run fine for several months and then as your computer fills up, a problem is triggered when the program tries to access the space on your hard drive and cannot find what it needs.
There are many programs that share common files and an error will happen when these files are not kept up to date. For example, let’s say you are running a program and it is humming right along. Then you load another program that shares a file with the first program and that file is not current. When the second program tries to run, you will have a problem when the second program attempts to access the out-of-date files. A solution is to download any updates to the program that are usually located on the program’s website. Also, uninstalling a program can cause problems with other programs. If you get a message that a file is shared when you are uninstalling, do not delete the file.
Another common cause of computer errors is drivers that are out of date or an incorrect version. Again, keeping your computer current with all drivers, patches and downloads can help avoid errors. Microsoft provides assistance on their website for updating their programs and drivers. You have probably gotten a message when you reboot your computer that certain programs need to be updated; take the time to update them at that time and avoid the temptation to hit the “remind me later” button.
We have only scratched the surface of the possible computer errors that can happen, but we tried to cover the most common problems. Then next time you get an error, don’t panic! Give PcRx a call and we can help you fix the problem and recover any lost data.
408 Main Street
Computer Maintenance Tips: If your PC is slow, you should do something about it. Your computer is an important part of your life, and you should keep the machine in a good condition to avoid unnecessary computer repair. This will allow you to get the most out of your machine. We will let you know more about what […]
If your PC is slow, you should do something about it. Your computer is an important part of your life, and you should keep the machine in a good condition to avoid unnecessary computer repair. This will allow you to get the most out of your machine. We will let you know more about what you can do for your computer maintenance.
Cleaning up the Dust
Your PC will become very easy to overheat if you let dust build up inside your machine. This will be dangerous for the health of your computer, and you should avoid this at all cost. Making sure that your PC is free from dust is always a good idea. A hair dryer and a brush can do the trick when it comes to cleaning your PC effectively. Deleting junk files is also a good idea. You can use either Ccleaner or Disk Cleanup so you can achieve this goal in no time. This will give you tons of space on your hard drive, which will make your computer even more powerful over time.
You should also cleanup any file that you find in the Windows registry. Deleting malware and virus will be a great idea too. A full scanning of your computer is important, and you should do this on a regular basis. You should do this to keep your important data protected and your PC running smoothly. An anti-malware software will allow you to do this right away. Call PcRx Computers today for their recommendation on the best virus protection program for your situation. You should also delete any unused big file. Saving big files in your computer such as movies is not good for the performance of a PC.
You can also defrag your hard drive, as this will make your PC run faster over time. Your hard disk will be cleaner and you will reap the rewards right away. Uninstalling unused software is always a good idea. Remember also that a data backup will allow you can avoid a lot of headaches in the future. Keeping your copy of Windows update along with the latest patches is always a good idea. You can run the latest update for your Windows so you can get the latest service patches. You should also keep both your antivirus and anti spyware software updated. Your applications should be patched too.
You should also create a restore point for your system as soon as possible. You should do this before you can install any kind of software. This will prevent many applications from playing havoc on the PC over time. This tactic will allow you to allow you to restore your computer to the point where it was working well. This will allow you to undo any kind of change to the system without harming your personal files. Since this functionality has been built into Windows, there is no reason for you not to use it at all. You should also check your hard drive for any errors. Your best solution for a good backup is to have PcRx Computers install a backup program for you. Then you will have peace of mind knowing that your data is always secure.
Now that you have more information on how to make your computer run faster, you should take bold action and make things happen. This will allow you to become more productive and have more fun over time. Remember that you PC is one of your most important assets in your home or office.
Now is a great time to bring your computer to PcRx Computers for a complete diagnostic, cleanup and to install the most up-to-date anti-virus and malware protection. Call us today or stop by our showroom on Main Street in Conway. Where it is preventive computer maintenance for your Mac or PC we are here for you.
408 Main Street
Conway, SC 29526
Choosing the Best Computer: Your computer just quit – now what do you do? Do you buy a new computer or fix the old one? One rule of thumb is that if your old computer is more than five years old, you are probably better off buying a new one. Many computers that are five to nine years old […]
Your computer just quit – now what do you do? Do you buy a new computer or fix the old one? One rule of thumb is that if your old computer is more than five years old, you are probably better off buying a new one. Many computers that are five to nine years old have components that are failing (called planned obsolescence.) You need to do your homework before purchasing a new computer.
Questions to ask before purchasing a new computer
What is your budget for a new system? Computers prices have come down in recent years and you can purchase a computer between $200 and $2,000 depending on what you need.
Take a look at what type of computer will best suit your needs. Do you need a laptop, desktop or tablet? Each type of computer will be different in their portability, size and functionality. Here is a brief recap of the different types of computers:
A desktop will be the least portable of the three, however, it can handle heavier workloads. You can add multiply displays for multitasking and even use a desktop computer for your entertainment center for movies and games.
Laptops will come in various sizes depending on your needs. The larger laptops come with a 17 inch display making them easy to read and use but harder to transport. In order to conserve the batter life, a laptop typically does not have the capabilities of a desktop system.
Of the three types, a tablet is the most portable. You can do a lot of computing on a tablet but the screen is smaller and you need to get accustomed to typing on the tablet itself (unless you add an external keyboard.) Several of our small business clients use tablets in the field for gathering information that is then sent back to the office computer.
Then there is the question of operating systems – do you want a Mac or PC? Macs have been known to be more reliable and less virus prone that a personal computer. This is changing somewhat as more and more hackers are finding their way into Macs. The downside is that a Mac is typically more expensive than your average personal computer. You will also pay more for the repair of a Mac than the repair of a personal computer. Windows 7 is much more reliable that past operating systems for the personal computer. With proper virus protection and backup, you should be just fine with a personal computer.
The last question to ask is what type or manufacturer do you prefer. You can purchase a name brand or go with a custom built computer. If you are a business owner, you will want to take a good look at the custom alternative. You will get exactly what you need with the necessary computing power. Many of the name brand computers come with addons that are not only not needed, but they slow down your system. A custom build computer will normally use generic parts which makes is less expensive in time and money to repair.
Once you have made your initial decision on the type and brand of computer, you may want to use the internet to do your research on the various components of a computer. Then take your specifications to your local computer store to make your final decision and purchase. You will want to have a relationship with a local computer dealer that you can call when you have questions or need additional help.
If you are doing comparison shopping between computer stores make sure that you are comparing apples to apples (no pun intended.) Does each computer have the same amount of memory? The same hard drive space? The same peripherals? The same operating system?
If you are like most users, you know very little about the inner workings of a computer. All you know is what you need a computer to do. You don’t understand “geek speak.” Look for a computer dealer that can talk to you on your level. Don’t hesitate to ask questions when they are recommending something you are not sure that you need. Ask for a written quote and make sure that you understand exactly what you are getting for your money.
Keep in mind that you don’t need to purchase the most expensive computer. However, beware of cheap computers at non-computer stores. Here is an example of what I mean. A customer came in and asked for a price to build a computer. When everything they ask for was added to the computer, the total price came to $2,500. A similar computer (but with lower performance) was offered at Costco for $1,000. The customer when with the Costco brand. Within a year, they ended up having to purchase another computer because they did not get the processing speed they needed. Did this person actually save in the end?
There are no quick answers as to what is the best computer to buy. Take your list of requirements and check with your local computer specialists to see what best fits your needs.
PcRx Computers is a full service computer store. We would be happy to answer your questions and what type of computer would be best for your specific needs.
408 Main Street
Conway, SC 29526