Back to Top

Tech, Web, Cloud & Cabling Services

Author Archives: Website Admin

6 things you need to know about 802.11ac Wave 2

A new Wi-Fi standard known as 802.11ac Wave 2 was recently certified by the Wi-Fi Alliance. Here are the six details you need to know.

wave 2

The Wi-Fi Alliance, a global nonprofit association of companies that determine the interoperability of Wi-Fi technology, recently certified the 802.11ac Wave 2 standard. The new standard brings a host of updates that could eventually affect the daily connectivity of consumers and businesses alike

Here are six performance changes that we will see with 802.11ac Wave 2.

1. It opens up gigabit Wi-Fi possibilities

With all the hype around products like Google Fiber, AT&T GigaPower, and Verizon Fios, it’s safe to say that gigabit internet is hot right now. However, it’s mostly constrained to a hardline connection. Using the Wave 1 standard, gigabit speeds have been achieved in lab settings, but not commonly in the real world.

The Wave 2 standard could open the door for gigabit Wi-Fi, though. The PHY (physical) rate, which in turn affects the throughput rate of data transfer, is much higher in Wave 2. Wave 1 PHY rate maxes out at 1.3 Gbps, while Wave 2 can be 2.34 Gbps. Even if the throughput was 50% lower than the theoretical PHY rate for Wave 2, in theory it would still be above 1 Gbps.

2. It supports more connected devices

Wave 2 offers offers greater density than Wave 1in that it supports multiuser multiple input, multiple output (MU-MIMO). This means that the spectrum is used more efficiently for multiple connected devices, and devices can more easily get on and off of the network.

Gartner research vice president Tim Zimmerman said it is: “The ability for the access point to communicate simultaneously with multiple mobile devices in a single coverage area.” The access point will be able to talk to up to four, single stream devices at one time going downstream.

The support of MU-MIMO is important for consumer users, as most people tend to have multiple connected devices in their home or on their person, but it’s also good new for businesses. The growing number of mobile devices and IoT-connected devices have created some frustrations for network admins, and the addition of MU-MIMO support could help alleviate some of those headaches.

3. It offers stronger performance

In addition to the stronger PHY rate, it also adds the option for 160 MHz channel width. Previously, in Wave 1, the only options were 20, 40, and 80 MHz. In theory this will make it easier to access and transfer large files.

The Wave 2 standard also adds a fourth spatial stream, up from the three streams offered in Wave 1. According to the Wi-Fi Alliance, “Device speeds are proportional to the number of spatial streams.” So, more streams should mean better overall performance.

4. It brings more bandwidth and flexibility

One of the biggest updates that comes with 802.11ac Wave 2 is that it supports additional 5 GHz channels. If these channels are designated for Wi-Fi use, it could help support more users and devices overall. Most devices (65% according to the Wi-Fi Alliance) now are dual-band, meaning they can operate in both the 2.4 and 5 GHz frequencies.

5. It is certified for interoperability with five devices

With the certification of 802.11ac Wave 2, the Wi-Fi Alliance listed five products that it has certified for interoperability:

  1. Broadcom BCM94709R4366AC
  2. Marvell Avastar 88W8964
  3. MediaTek MT7615 AP Reference Design and MT6632 STA Reference Design
  4. Qualcomm IPQ8065 802.11ac 4-stream Dual-band, Dual-concurrent Router
  5. Quantenna QSR1000 4×4 802.11ac Wave 2 Chipset Family

6. It won’t be widely available immediately

Wi-Fi.org lists 24 products that have compatibility with 802.11ac Wave 2 features. However, not many of them are hardware-related. As with most new technologies, it will take some time for adoption to ramp up and for supporting products to be released. We will likely see more Wave 2-enabled hardware hit the market by the end of the year.

“You’ll see them in the devices in a near time frame, but the roll into the end-user, whether it be in the consumer or whether it be in the enterprise, it’s going to be a little bit slower,” Zimmerman said.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft announced Attack Simulator for Office 365 Threat Intelligence

 

Admins can send simulated phishing and attack emails to find security and training weaknesses.

A few weeks ago, Microsoft released a public preview for Attack Simulator for Office 365 Threat Intelligence. On April 17th Microsoft announced that Attack Simulator is now generally available. Attack Simulator for Office 365 Threat Intelligence is available to all Office 365 E5 or Office 365 Threat Intelligence customers.

With Attack Simulator, customers can launch simulated attacks on their end users, determine how end users behave in the event of an attack, and update policies and ensure that appropriate security tools are in place to protect the organization from threats.  The GA of Attack Simulator adds a new HTML editor so realistic looking HTML emails can be sent in simulations of spear-phishing.  Also, two spear-phishing templates are available for immediate use in the spear phishing simulation.

Attack Simulator includes the three attack scenarios from our public preview.

Display Name Spear Phishing Attack: Phishing is the generic term for socially engineered attacks designed to harvest credentials or personally identifiable information (PII). Spear phishing is a subset of this phishing and is more targeted, often aimed at a specific group, individual, or organization.  These attacks are customized and tend to leverage a sender name that generates trust with the recipient.

Password Spray Attack: To prevent bad actors from constantly guessing the passwords of user accounts, often there are account lockout policies.  For example, an account will lockout after a certain number of bad passwords are guessed for a user.  However, if you were to take a single password and try it against every single account in an organization, it would not trigger any lockouts.  The password spray attack leverages commonly used passwords and targets many accounts in an organization with the hope that one of the account holder uses a common password that allows a hacker to enter the account and take control of it.  From this compromised account, a hacker can launch more attacks by assuming the identity of account holder.

Brute Force Password Attack: This type of attack consists of a hacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.

 

 

This video demonstrates how Attack Simulator can help organizations educate users to become more secure from cyber threats.  With Attack Simulator, admins can train all their end users, and especially those who are attacked most often.  This proactive training is a powerful way to ensure that your organization can prevent the impact from advanced threats.  Over the coming months, more threat simulations will be added to Attack Simulator so organizations can simulate the most prevalent threat types from the modern threat landscape.

Experience the benefits of Attack Simulator for Office 365 Threat Intelligence by beginning an Office 365 E5 trial today.  Also, learn more about how Microsoft leverages threat intelligence and the value of threat intelligence.

How to access the traditional Control Panel lost in the Windows 10 Creators Update

Microsoft is phasing out the traditional Control Panel with the Windows 10 Creators Update, but with a few tweaks you can still access it. Mark Kaelin explains how.

Microsoft has been slowly and methodically rolling out the Windows 10 Creators Update to customers throughout 2017. If you are one of the lucky ones to receive the update already, you have likely noticed more than a few changes to how Windows 10 looks and works. Some of the changes are good, some are a little annoying.

One of the changes Microsoft implemented in the Windows 10 Creators Update that I don’t like is the removal of the traditional Control Panel from the Win+X menu—that’s the menu you see displayed when you right-click the Start button from the Desktop interface (Figure A). Microsoft is migrating the interface for configuring the operating system to the new Settings screen, but some of us, especially IT pros who have been doing this for a long time, prefer the old Control Panel interface.

Figure A

Fortunately, the old Control Panel is still available; it is just lurking in the background. We can bring it back to the forefront with a few clicks, tweaks, and tricks, and this tutorial will show you how they work.

First, what you can’t do

The commands for the Win+X menu are located in this file folder, as shown in Figure B:

C:\Users\USERNAME\AppData\Local|Microsoft\Windows\WinX

Figure B

But you can’t just add a shortcut to the Control Panel executable to one of those Group folders and expect to see it show up in the Win+X menu. The special links within the Win+X menu system are protected with a special hash calculation, which greatly complicates any attempt to edit its contents.

To add the Control Panel back to the Win+X menu you will have to use a link with the hash already included. In general, that means acquiring a link from a version of Windows that is not the Creators Update. It is possible with the help of a third-party app, but it is complicated, convoluted, and not really necessary.

If you want to go through the process, you can check out this website for the details. But before you do, I have some simple solutions that might work better for you.

Now, what you can and should do

For those of us who want to keep things simple, here are a couple of ways to access the traditional Control Panel in Microsoft Windows 10 Creators Update.

1. Search for it

Figure C

If you just want to access the control panel occasionally and not add more icons to your desktop, the simplest way to access the Control Panel is by typing control panel in the Cortana search box. Control Panel should be the first entry in the search results (Figure C). You can left-click the link to start the app or right-click it and add the link to the Start Menu or to your Taskbar for easy future access.

Adding the Control Panel to the Start Menu is handy if you are using a touch screen interface. Adding it to the Taskbar works well if you find yourself accessing configuration settings on a regular basis.

2. Add to Desktop

Figure D

There are two ways to add the Control Panel to your Desktop. The first way is fairly obvious: Right-click an empty area on your Desktop and create a new shortcut that points to the Control Panel executable located here:

C:\Windows\System32

But you can also add the Control Panel icon to your Desktop through the Personalization screen. Right-click the Start button to open the Win+X menu and click the Settings menu item. Click the Personalization icon to open the next screen and drill down to the Themes screen. Scroll down until you see the Desktop Icon Settings item under the Related Settings area and click it. A dialog box will pop open and you can check the Control Panel radio button to add that link to your Desktop (Figure D). Click OK and the icon will be added as a primary system link on your Desktop.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10 Windows 7 commands every administrator should know

The command line is often the best place to resolve Windows 7 desktop problems. These basic commands will help speed your troubleshooting tasks.

PC troubleshooting is becoming less common in larger organizations, but consultants and techs in smaller shops still have to get their hands dirty identifying and fixing desktop problems. Oftentimes, troubleshooting Windows 7 means delving into the command line. Here are 10 fundamental Windows 7 commands you might find helpful.

1: System File Checker

Malicious software will often attempt to replace core system files with modified versions in an effort to take control of the system. The System File Checker can be used to verify the integrity of the Windows system files. If any of the files are found to be missing or corrupt, they will be replaced. You can run the System File Checker by using this command:

sfc /scannow

2: File Signature Verification

One way to verify the integrity of a system is to make sure that all the system files are digitally signed. You can accomplish this with the File Signature Verification tool. This tool is launched from the command line but uses a GUI interface. It will tell you which system files are signed and which aren’t. As a rule, all the system files should be digitally signed, although some hardware vendors don’t sign driver files. The command used to launch the File Signature Verification tool is:

sigverif

3: Driverquery

Incorrect device drivers can lead to any number of system problems. If you want to see which drivers are installed on a Windows 7 system, you can do so by running the driverquery tool. This simple command-line tool provides information about each driver that is being used. The command is:

driverquery

If you need a bit more information, you can append the -v switch. Another option is to append the -si switch, which causes the tool to display signature information for the drivers. Here’s how they look:

driverquery -v
driverquery -si

4: Nslookup

The nslookup tool can help you to verify that DNS name resolution is working correctly. When you run nslookup against a host name, the tool will show you how the name was resolved, as well as which DNS server was used during the lookup. This tool can be extremely helpful when troubleshooting problems related to legacy DNS records that still exist but that are no longer correct.

To use this tool, just enter the nslookup command, followed by the name of the host you want to resolve. For example:

nslookup dc1.contoso.com

5: Ping

Ping is probably the simplest of all diagnostic commands. It’s used to verify basic TCP/IP connectivity to a network host. To use it, simply enter the command, followed by the name or IP address of the host you want to test. For example:

ping 192.168.1.1

Keep in mind that this command will work only if Internet Control Message Protocol (ICMP) traffic is allowed to pass between the two machines. If at any point a firewall is blocking ICMP traffic, the ping will fail.

6: Pathping

Ping does a good job of telling you whether two machines can communicate with one another over TCP/IP, but if a ping does fail, you won’t receive any information regarding the nature of the failure. This is where the pathping utility comes in.

Pathping is designed for environments in which one or more routers exist between hosts. It sends a series of packets to each router that’s in the path to the destination host in an effort to determine whether the router is performing slowly or dropping packets. At its simplest, the syntax for pathping is identical to that of the ping command (although there are some optional switches you can use). The command looks like this:

pathping 192.168.1.1

7: Ipconfig

The ipconfig command is used to view or modify a computer’s IP addresses. For example, if you wanted to view a Windows 7 system’s full IP configuration, you could use the following command:

ipconfig /all

Assuming that the system has acquired its IP address from a DHCP server, you can use the ipconfig command to release and then renew the IP address. Doing so involves using the following commands:

ipconfig /release
ipconfig /renew

Another handy thing you can do with ipconfig is flush the DNS resolver cache. This can be helpful when a system is resolving DNS addresses incorrectly. You can flush the DNS cache by using this command:

ipconfig /flushdns

8: Repair-bde

If a drive that is encrypted with BitLocker has problems, you can sometimes recover the data using a utility called repair-bde. To use this command, you will need a destination drive to which the recovered data can be written, as well as your BitLocker recovery key or recovery password. The basic syntax for this command is:

repair-bde <source> <destination> -rk | rp <source>

You must specify the source drive, the destination drive, and either the rk (recovery key) or the rp (recovery password) switch, along with the path to the recovery key or the recovery password. Here are two examples of how to use this utility:

repair-bde c: d: -rk e:\recovery.bek
repair-bde c: d: -rp 111111-111111-111111-111111-111111-111111

9: Tasklist

The tasklist command is designed to provide information about the tasks that are running on a Windows 7 system. At its most basic, you can enter the following command:

tasklist

The tasklist command has numerous optional switches, but there are a couple I want to mention. One is the -m switch, which causes tasklist to display all the DLL modules associated with a task. The other is the -svc switch, which lists the services that support each task. Here’s how they look:

tasklist -m
tasklist -svc

10: Taskkill

The taskkill command terminates a task, either by name (which is referred to as the image name) or by process ID. The syntax for this command is simple. You must follow the taskkill command with -pid (process ID) or -im (image name) and the name or process ID of the task that you want to terminate. Here are two examples of how this command works:

taskkill -pid 4104
taskkill -im iexplore.exe

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10+ Windows 7 services you may not need

If you evaluate your organization’s need for certain Windows 7 services, you may find that a number of them can be safely disabled.

Every version of Windows has shipped with a core set of system services that must run so that the system can perform basic operations. However, your organization may not necessarily need to have all the services running, and disabling unnecessary services can enhance performance and security. We’ve put together a list of 13 services you can disable on your Windows 7 systems that will probably not negatively affect your business operations at all.

Before you take drastic action, such as disabling a service on every PC in your organization, make sure that the service you’re disabling is not actually in use. This article makes a couple of broad assumptions: that your company doesn’t need to share Windows Media files and doesn’t use Windows 7’s HomeGroup features.

This is not a definitive list of services that can be disabled; these are just some obvious ones. Read carefully and make sure you test changes before deploying them across your organization.

1: IP Helper

Windows description: Provides tunnel connectivity using IPv6 transition technologies (6to4, ISATAP, Port Proxy, and Teredo) and IP-HTTPS. If this service is stopped, the computer will not have the enhanced connectivity benefits that these technologies offer. Why this can be disabled:Many organizations haven’t even started testing IPv6, much less fully deployed it. As indicated in the service description, the IP Helper service is leveraged in IPv4-to-IPv6 transitions.

2: Offline Files

Windows description: The Offline Files service performs maintenance activities on the Offline Files cache, responds to user logon and logoff events, implements the internals of the public API, and dispatches interesting events to those interested in Offline Files activities and changes in cache state. Why this can be disabled: If your organization doesn’t use the Offline Files feature found in both Windows client and server products, this service can be safely disabled. Obviously, if you are synchronizing files across the network, you shouldn’t disable this service.

3: Network Access Protection Agent

Windows description: The Network Access Protection (NAP) agent service collects and manages health information for client computers on a network. Information collected by the NAP agent is used to make sure that the client computer has the required software and settings. If a client computer is not compliant with health policy, it can be provided with restricted network access until its configuration is updated. Depending on the configuration of health policy, client computers might be automatically updated so that users quickly regain full network access without having to manually update their computer. Why this can be disabled: If you’re not doing network-based remediation or if you’re doing remediation with a third-party tool that doesn’t leverage the NAP client, this service can be disabled.

4: Parental Controls

Windows description: This service is a stub for Windows Parental Control functionality that existed in Vista. It is provided for backward compatibility only. Why this can be disabled:Corporate networks rarely used Vista’s Parental Control functionality. Further, this is a legacy service from Windows Vista.

5: Smart Card

Windows description: Manages access to smart cards read by this computer. If this service is stopped, this computer will be unable to read smart cards. If this service is disabled, any services that explicitly depend on it will fail to start. Why this can be disabled: If your organization does not use smart cards for authentication purposes, you can safely disable this service.

6: Smart Card Removal Policy

Windows description: Allows the system to be configured to lock the user desktop upon smart card removal. Why this can be disabled: If your organization does not use smart cards for authentication purposes, you can safely disable this service.

7: Windows Media Center Receiver Service

Windows description: Windows Media Center Service for TV and FM broadcast reception. Why this can be disabled: In most corporate environments, TV and FM broadcast reception on desktop computers is not considered a “business critical” item that needs support, and it’s often not allowed anyway. You can disable this service to save some resources.

8: Windows Media Center Scheduler Service

Windows description: Starts and stops recording of TV programs within Windows Media Center.Why this can be disabled: Likewise, there’s no need to record TV programs in a corporate environment.

9: Windows Media Player Network Sharing Service

Windows description: Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play. Why this can be disabled: On a corporate network, Windows Media Player doesn’t have nearly the place it might have on a home network. Disabling this service will have no impact on business activities.

10: Fax

Windows description: Enables you to send and receive faxes, utilizing fax resources available on this computer or on the network. Why this can be disabled: If your organization is not using a network-based faxing service, disabling this service will have no business impact.

11: HomeGroup Listener

Windows description: Makes local computer changes associated with configuration and maintenance of the homegroup-joined computer. If this service is stopped or disabled, your computer will not work properly in a homegroup and your homegroup might not work properly. It is recommended that you keep this service running. Why this can be disabled: It’s highly unlikely that a business organization — except a very small one — is using HomeGroups as a way to share resources on a network. It’s almost always safe to disable this service in a business setting.

12: HomeGroup Provider

Windows description: Performs networking tasks associated with configuration and maintenance of homegroups. If this service is stopped or disabled, your computer will be unable to detect other homegroups and your homegroup might not work properly. It is recommended that you keep this service running. Why this can be disabled: As noted above: Only very small organizations are likely to use HomeGroups to share resources on a network, so it’s almost always safe to disable this service in a business setting.

13: Tablet PC Input Service

Windows description: Enables Tablet PC pen and ink functionality. Why this can be disabled: The vast majority of PCs that are deployed to users do not have hardware that can leverage tablet-like capability. This service simply uses system resources with no possible benefit.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10 ways to speed up Windows 7

You don’t have to live with a Windows 7 machine that’s becoming unbearably slow. Here are 10 basic steps that will optimize system performance.

With Windows 7, Microsoft did a really good job making the system perform well. However, over time, Windows 7 systems can slow down and need some care and feeding to regain their former glory. Further, some Windows 7 features can be leveraged to improve overall system performance. In this article, we will outline 10 steps you can take to boost the performance of your Windows 7 systems.

1: Disable unnecessary services

Not every system service that is running on a stock Windows 7 machine is necessary. A number of services can either be disabled or modified to run only when needed. Once you make these changes, the service no longer has to consume system resources and the system no longer has to spend time starting the service.

2: Reduce the number of startup items

Windows 7 systems eventually begin to suffer under the weight of software that is installed in the normal course of business. Many software titles install more than is necessary and include helper applications designed solely to make the software start up more quickly or facilitate other communication (e.g., iTunes helper). And new software installations might add a permanent presence to the system tray, even if it’s not absolutely necessary for the system to function (Steam games, for example).

You could go through your system tool by tool and remove the offending software, but you might want to keep the underlying tool around and just prevent the helper from loading. This and more can be accomplished through the use of MSconfig, a tool that has long been a part of Windows. MSconfig allows you to selectively disable startup items and take other steps toward improving overall system performance.

To use MSconfig, go to Start and in the search box, type MSconfig. From the Startup tab (Figure A), you can disable items. Just be careful about what you choose.

Figure A

Disable items to improve overall system performance.

3: Remove the bloatware installed by vendors

Microsoft’s OEMs sometimes actively work against the Redmond behemoth and sully the company’s name. Nowhere is this more evident than in the case of what has become known as “bloatware.” In the never-ending race to the bottom of the PC market, lower cost PCs have had their profit margins bolstered by OEMs through the inclusion of mostly junk software – short-term trials and the like — that does nothing but add a few dollars of profit while bringing performance to a crawl. Frankly, this is one of the reasons that I believe that Microsoft’s Surface announcement, in which Microsoft noted that it would make its own device, is brilliant. The company needs to start with a clean slate in some ways (no pun intended).

If your PC shipped with a bunch of stuff you’ll never use, get rid of that software. Generally, you can go to Start | Control Panel | Programs And Features (Figure B) and remove software you no longer plan to use. If the software adds items to the startup process, getting rid of it will make the PC start faster and, ultimately, perform better overall.

Figure B

Use Programs And Features to remove unwanted software.

4: Keep viruses and spyware off your system

If you’re running Windows, you need to be running an anti-malware program to keep viruses and spyware off your system. Nothing will ruin good performance like a boatload of spyware. Our personal favorite (and free!) tool for combating malware is Microsoft Security Essentials. In my experience, it’s been successful in catching bad stuff while not significantly degrading system performance itself.

5: Check your memory

How much RAM do you have? Is your system consuming all or most of your RAM? Does the system page out to disk? If so, you’re suffering a massive performance hit, which can be solved by adding more memory to your PC.

6: Go solid state

Solid state is all the rage these days, and with good reason. It’s fast! More and more laptops and even desktops are moving to the technology because of the performance benefits. Solid state disks use memory cells from which data can be read very quickly, as opposed to the relatively plodding nature of rotational storage. By moving to SSD, you can give your Windows 7 system renewed life — and give yourself a whole new user experience.

7: Ensure that power settings favor performance

This one is easy! When you’re plugged in, configure Windows 7’s power plans to favor performance over power savings. When you choose to use Windows 7′ high performance power plan, you might increase the computer’s performance in some (but not all) circumstances. It really depends on the kind of work you’re doing and how often you allow the computer to sit idle.

To change power plans, go to Start | Control Panel | Power Options and choose your power plan settings (Figure C).

Figure C

Go to Power Options to choose Windows 7 power plan settings.

8: Keep your system defragmented (unless you’ve followed item 6)

If you’re using a traditional spinning disk in your Windows 7 system, you can keep your system operating at peak efficiency by periodically defragmenting the hard drive. If, however, you’ve opted to go with SSD-based storage, don’t do this. First, you won’t get any performance benefit and second, you’ll significantly reduce the life of that expensive SSD.

Disk defragmentation is scheduled to take place once per week, but you can change this by going to Start | Accessories | System Tools | Disk Defragmenter (Figure D). In addition to changing the schedule, you can run an on-demand defrag from here. You can also run a defrag from the command line instead of from a GUI.

Figure D

You can schedule a defrag in the Disk Defragmenter dialog box.

9: Disable or tune search indexing

Windows 7’s search is good, but it can also affect system performance. If you really need to run a tool at full tilt, you can disable indexing altogether. Or you can tune the indexer to meet your specific needs, possibly reducing its overall impact on system performance.

10: Use ReadyBoost

Perhaps you don’t want to jump into the solid-state game right away but would like some of the benefit that can be had from flash-based storage. Using nothing more than a USB stick, you can do so through a Windows 7 feature known as ReadyBoost. (Note that if you’re already using an SSD as your system drive, ReadyBoost won’t be available, since there would be no performance gain.)

ReadyBoost allows the system to make use of one of these speedy storage devices as a cache, improving overall performance of the system. The flash storage device that you choose to use for ReadyBoost should meet the following specifications set by Microsoft:

  • Capacity of at least 256 MB, with at least 64 kilobytes (KB) of free space
  • At least a 2.5 MB/sec throughput for 4-KB random reads
  • At least a 1.75 MB/sec throughput for 1MB random writes

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

 

Quick Tips: Flush the ARP cache in Windows 7

Here’s how to clear the Address Resolution Protocol cache and how to manage that cache with a few command switches.

The Address Resolution Protocol (ARP) cache is a crucial component of IP networking on any operating system. What ARP does is link Ethernet addressing (IP addressing) to hardware addressing (MAC addressing). Without this system, a machine could not communicate to the outside world as one addressing scheme could not communicate with the other.

The ARP Cache is a collection of ARP entries (mostly dynamic) that are created when a hostname is resolved to an IP address and then an IP address is resolved to a MAC address (so the computer can effectively communicate with the IP address).

When this happens, the PC will store that newly mapped address in the ARP cache, and it will stay there until the ARP cache entry timeout expires. This isn’t usually a problem, but sometimes a bad ARP entry can cause issues with Internet connections and Web page loading. When this occurs, one step that can be taken toward resolution is to clear the ARP cache. Yes, this means the ARP cache has to be rebuilt, which means a little more work for the PC, but that cache will rebuild fairly quickly.

Clearing the ARP cache is done completely through the command line, so stretch out those fingers and get ready to type. After we show you how to clear the ARP cache, we will show you how to manage that cache with a few command switches.

Flush the cache

Step 1: Open the command prompt

Click Start and then type “cmd” (no quotes) in the search dialog box, but don’t hit Enter yet. Right-click the cmd.exe icon and select Run as Administrator (Figure A). After answering the UAC, the terminal window will open offering up the command prompt.

Figure A

If the icon is already pinned in the Start menu, entering cmd is not necessary.

Step 2: Run the commands

The first command to run is

arp -a

This command will display all your ARP entries (Figure B). Naturally the -a option is not the only option available. The arp command also allows for the following switches:

-d Delete an IP address (arp -d 192.168.100.10)
-d -a Delete all entries in the ARP table
-s Add an entry to the ARP table (arp -s ADDRESS MAC_ADDRESS – Where ADDRESS is the address to be added and MAC_ADDRESS is the MAC address of the machine)

Figure B

Here you see the arp cache for two different interfaces on a single machine.

To flush the entire cache, issue the following command:

netsh interface ip delete arpcache

The above command will flush the entire ARP cache on your system. Now as soon as network connections are made, the ARP cache will begin to repopulate.

Verify the flush

Once you have flushed the ARP cache, make sure to issue the command arp -a to see if the cache has, in fact, been flushed. If it does not flush, it could be the system is a victim of a Windows bug caused when Routing and Remote Services is enabled. This is a simple bug to fix:

1.           Click Start | Control Panel.

2.           Click Administrative Tools.

3.           Click Computer Management.

4.           Double-click Services and Applications.

5.           Double-click Services.

6.           Scroll down to Routing and Remote Services.

7.           Double-click Routing and Remote Services.

8.           Set the Startup Type to Disable.

9.           Make sure the service is stopped.

Now try flushing the ARP cache again. It should work this time.

Troubleshooting

It is also possible to troubleshoot network connections using the ARP cache. For example, it is important to look out for invalid ARP entries that go to a MAC address of 00-00-00-00-00-00. If one such entry shows up, make sure to delete it from the cache using the -d switch. Say you have an ARP entry that looks like:

224.0.0.24           00-00-00-00-00-00 static

In order to delete this entry, use the arp command like so:

arp -d 224.0.0.24

And that invalid entry will be gone.

Final thoughts

There are so many ways to troubleshoot networking connections. Flushing the ARP cache is just one of those methods that is rarely thought of, but when all else fails this might be the last-gasp effort that makes you the hero of the day.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10 pieces of obsolete technology still in use today

Dial-up internet

Modem

The tech world moves fast, but not always as fast as you think. Obsolete technology has a tendency to hang on, and hang on strong. Here’s a list of 10 pieces of obsolete technology that are still alive and kicking, starting with a surprising one: dial-up internet.

Everyone remembers that screeching sound, followed by “You’ve got mail.”

The days of connecting to the internet with a 56K modem are over for most of us, but approximately three percent of Americans are holding out–that’s about 9.5 million people. Who are they–and do they know they could get online faster?

Image: iStock/Alexey Vedernikov

Dot matrix printers

Dot matrix printer

The use of dot matrix printers goes hand in hand with carbon-free, triplicate, continuous-feed paper. Both still have a use in the business world, which is why both have survived well past their point of obsolescence.

Image: iStock/sewer11

Fax machines

Fax machine

Find me a person who likes using a fax machine and I’ll show you someone who’s at least a bit insane.

Why the world still relies on paper faxes when digital scans are available is beyond my understanding. They aren’t more secure, they aren’t tamper-proof, and they’re just a waste of paper. Down with the fax!

Image: iStock/HSNPhotography

CRT screens

Several old video monitors

Encountering a CRT screen in the wild is kind of surprising, but it happens. They’re becoming harder and harder to find, and it’s nearly impossible to uncover a new one on the internet.

Maybe the next generation of youths will begin a CRT renaissance. After all, who doesn’t love vintage tech? For now, however, CRTs are just holding on in the dark corners of the world, silently (or buzzingly?) waiting for death.

Image: iStock/Sidney de Almeida

Floppy disks

Old diskettes

When it came out in May of this year that the Pentagon is still using floppy disks in computers that control nuclear ICBMs people laughed. When we then learned they were eight-inch floppy disks people were shocked.

If anyone would be using computer technology from the 1970s in 2016 it’s the government, right? What’s worse is that they spend billions a year operating and maintaining those systems. Let’s hope for a modern replacement before the outbreak of nuclear war.

Image: iStock/hroe

Cash registers

Old vintage cash register

The modern cash register is a bit more advanced than its early 20th century predecessor, but not by a lot. With the advent of iPads as POSes the cash register is facing extinction.

Some of the hippest, newest businesses are only armed with an iPad and a cash drawer, and those new systems are working great. Maybe in the next few years cash registers will be relegated to the same corners of the world where you now find CRTs.

Image: iStock/ivansmuk

Telegrams

Antique telegraph isolated.

You can still send a telegram in 2016. It’s not cheap, either: $18.95 gets you 100 words that will be hand delivered within three to five business days.

Telegrams may have been advanced in 1844, but in 2016 it’s hard to see a practical use for them. Sure, it’s more personal for a stranger to hand deliver a letter than it is to send a faceless email, but with the speed of the modern postal service you can just send a handwritten letter in the same amount of time.

Image: iStock/Larasoul

Beepers

Pager is communication old.

I know a few doctors, and some of them still carry beepers. Cell phones replaced beepers for most of us, but the medical community is still hanging on. An estimated 85 percent of hospitals still using the old black boxes, and they have their reasons.

Pager signals are stronger than cellular, the batteries last for weeks, and satellites beam pages to multiple towers, guaranteeing doctors get notified in emergency situations. Beepers will probably go away someday, but not until we figure out how to improve cellular reception.

Image: iStock/koyjira

Magnetic tapes

Close up of vintage audio tape cassette, isolated on white

Believe it or not, the sale of audio cassettes is actually increasing. I don’t see a reason to use a cassette in the age of digital media, but apparently lots of people do.

In the business world the debate still rages over the relevancy of tape backups. Cheap cloud storage is raising the question of tape practicality, but it will likely be awhile before they’re gone completely.

Image: iStock/BigJoker

COBOL

tech10

The COmmon Business-Oriented Language was invented in 1959, and it has been in use ever since. More efficient programming languages have come and gone since COBOL entered the world, yet it is the one performing over 70 percent of global business transactions in 2016.

Image: National Museum of American History

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Simple steps to stay on top of your mobile data usage

Apps not required

Businessman in suit, jacket,shirt, tie, using his smart phone

Who said you needed to install something to control your mobile data use? Your iOS and Android devices come with all the tools you need to stay below your data cap. It takes a few taps to turn them on and configure them, which is exactly what we’re going to help you with.

Easy in Android

MobileDataUsage2

Tracking and limiting your data usage is easy on an Android device. There are a number of options available to stop yourself from going over the data limit.

The simplest solution is to activate two options under the Data Usage menu in your phone’s Settings app: Limit Mobile Data Usage and Alert Me About Data Usage. Toggle these two switches to on and your phone will turn off cell data once you reach a certain point, as well as warn you when you start getting close. Adjusting those thresholds is as simple as dragging a little line up or down.

Control data use per app

MobileDataUsage3

Scroll a bit further down in the Data Usage menu and you’ll find a list of apps sorted by how much mobile data they use. Click on one of those apps and you’ll see a few more options. Toggling Restrict Background Data on will stop the app from doing anything in the background, unless you’re connected to Wi-Fi.

App-specific options

MobileDataUsage4

Turning the Background Data Restriction on brings you face to face with a popup warning you that doing so might mess with the app’s performance. It also directs you to the View App Settings button, where you can change the settings right in the app.

In my experience going into the app hasn’t been necessary—just toggle the data restriction option on, but know that your weather, email, Twitter feed, and other apps that require a constant connection might not update without your telling them to (provided you’re not on Wi-Fi).

Other Android tips

MobileDataUsage-5

There are two other nifty things you can do on Android to save data: use the Chrome Data Saver and store frequently used Google Maps locations offline.

Chrome Data Saver is turned on by opening Settings in Chrome. Swipe down to the bottom of the menu and you’ll see Data Saver. Open that menu and turn it on—that’s it! Data Saver compresses incoming web traffic to save space, and it really doesn’t have that much effect on your experience.

Google Maps offline

MobileDataUsage6

Storing map data offline is a good idea whether you want to save data or not. It makes your commute smoother, and longer trips will never leave you without a map in unfamiliar territory. It’s easy to do, too.

Open the menu in Google Maps. You’ll see Offline Areas right in the first few options—that’s what you want to select. From there click the plus sign and you’ll see a map highlighted with a blue circle. Pinch to zoom in or out, tap download, and it will download anything inside the square.

Managing data on an iPhone

MobileDataUsage-7

iOS users aren’t nearly as fortunate as Android users when it comes to built-in data capping options. There are still a few ways to track and limit your data use, but if you’re hoping for an Android-like option that terminates data once you near your cap you’re out of luck.

Controlling background data

MobileDataUsage8

It’s simple to disable background app data in iOS. Open up the Settings app, and tap Cellular. Once you’re there, scroll down a bit and you’ll see a list of every single app you have installed. Tap to turn off the ones you want to stop from using cell data—that’s it!

App-specific options

MobileDataUsage-9

Disabling background use is one thing, but you can save even more data by tweaking options specifically to different apps. In the Settings app, scroll down a bit to see a list of all the apps you have installed. Tap one and you’ll see a list of app-specific options.

You can turn off cellular data for an app, background refresh, and location services, all which will eat up your data bit by bit.

Disable Wi-Fi Assist
MobileDataUsage-10

iOS devices have the option to hop to their cell networks when Wi-Fi signal is weak. Disabling this can save you a bit of data, but it’s all dependent on how often you have to deal with weak Wi-Fi.

You’ll find the toggle for Wi-Fi Assist at the bottom of the Cellular page.

Good luck saving that data

Mobile payment

Seven or eight gigs might seem like a lot, but constant travel, mobile gaming, and video streaming can eat that up before you know it. Hopefully some of these options will help save you megs and bucks!

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows 10 hack: How to beef up your jump lists to show more pinned items

The Windows 10 jump lists feature offers a convenient way to start your apps–but there’s no easy way to increase the size of the list. Here’s a hack for that.

giphy

Microsoft Windows 10 gives users several choices when it comes to how and where to start their applications. Some people use the desktop exclusively and some swear by the Start Menu, while others, prefer the pinned lists that hang off the icons on the Taskbar.

However, there is one small problem with the Taskbar pinned list in Windows 10—by default, there is a 12-slot limit.

Windows 7 allowed users to extend that number with a simple change to a configuration setting. But that feature is currently missing in Windows 10 for reasons no one has been able to explain. The workaround involves editing the Windows Registry file.

Standard disclaimer: Incorrectly editing the Windows Registry file could break your computer. Create a Restore Point before making any changes.

Jump listItems

Figure A shows an example of the default jump list hanging off the Word icon in a typical Windows 10 Taskbar. Note that there are 26 copies of the example file, but only 12 are listed in the pinned section. This is despite the fact that I have actually pinned them all, which is why the Recent section is fully populated.

Figure A

addpinnedlist

To increase the number of pinned items displayed, we’ll have to change the maximum number of jump list items associated with a particular key in the Windows Registry file.

Press Windows key + R or right-click the Start Menu icon and navigate to the Run command to open the Run prompt (Figure B). Type regedit into the box and click OK.

Figure B

addpinnedlist1

Navigate to this set of keys in the Windows Registry:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced

Look through the list in the right-hand pane until you find this DWORD: JumpListItems_Maximum

In case, the JumpListItems_Maximum DWORD is not there, create it.

Right-click the JumpListItems_Maximum DWORD and select Modify. Click the Decimal radio button and change the number to a value that works for you. As you can see in (Figure C).

Figure C

addpinnedlist2

To complete the change, you may need to restart your computer. You should now be able to see the number of pinned items you specified (Figure D).

Figure D

addpinnedlist4

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!