Back to Top

Tech, Web, Cloud & Cabling Services

Author Archives: Website Admin

New Website Design – NJ Concrete Work

Developed by,
South Jersey Techies, LLC.

The Web Design team of South Jersey Techies has been constantly working on developing the best websites including easy mobile approach and the latest website developed by the team is Custom Concrete Designs. Custom Concrete Designs has been a family owned and operated stamped concrete business in South New Jersey and after spending more than 25 years in the business they know that quality work, affordable pricing, and superior customer service is what customers want. Their high standard of service, craftsmanship and top quality concrete products has been propelling the business since 1989.

CustomConcreteDesigns

Want to know how the websites developed by our team appears on your smartphone? Take a look.

CustomConcreteDesignsMobile

Have questions?

Our Web Design team is here to help
Call us at: 856-745-9990 or visit: https://www.sjtechies.com

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Hacker collects 272m email addresses and passwords, some from Gmail

Security firm announces it has persuaded fraudster to give up database of email addresses along with passwords users use to log in to websites

hacking gmail

The internet on Wednesday gave you another reminder that everyone has been hacked.

Hold Security, a Wisconsin-based security firm famous for obtaining hoards of stolen data from the hacking underworld, announced that it had persuaded a fraudster to give them a database of 272m unique email addresses along with the passwords consumers use to log in to websites. The escapade was detailed in a Reuters article.

It might sound bad, but it is also easily mitigated.

The passwords and email addresses, which include some from Gmail, Yahoo and Russia’s mail.ru service, aren’t necessarily the keys to millions of email accounts. Rather, they had been taken from various smaller, less secure websites where people use their email addresses along with a password to log in.

People who use a different password for both their email account and, say, Target.com, won’t be affected. But those who tend to use the same password for multiple sites as well as their email should change their email password.

“Some people use one key for everything in their house,” Hold Security founder Alex Holden says. “Some people have a huge set of keys that they use for each door individually.”

Holden said there is no way for consumers to check if their emails were included in his firm’s latest find. In 2014, when his firm tried to set up such a service after obtaining a billion hacked login credentials, his site crashed.

The hacker appears to have been largely targeting Russian users. Some 57m of the email addresses were for the country’s largest email provider mail.ru, which claims 100 million monthly users. Around 40m of the addresses were Yahoo Mail, 33m Hotmail and 24m for Google’s Gmail service.

In this case, the hacker had been bragging on internet chat forums that he had a treasure trove of login credentials that he was trying to sell. Holden, who is fluent in Russian, said he wouldn’t pay for the data but would give him “likes” on various social media posts in exchange.

The hacker, who apparently is quite young, agreed. “We kind of call him the collector,” Holden says in a heavy Russian accent. “Eventually, almost everyone gets breached.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows Tip of the week: Move your specialized data folders to a different drive

Move Documents, Downloads, and other data folders to a different drive:


Every supported version of Windows includes a group of “known folders” for storing specific data types–Documents, Downloads, Music, Pictures, and so on.

By default, these folders are stored on the system drive in your user profile folder, typically C:Users[username]. But you might want to move them to a more appropriate location if you have multiple physical drives. For example, say you have a relatively small SSD as a system drive (C:) on a desktop PC and a much larger conventional hard disk (D:) for data files. In that configuration, it makes sense to move your folders to the D: drive. (This procedure also works if you’ve expanded storage with a MicroSD card.)

Just open your user profile folder by entering %userprofile% in the Run box to display a list of all the folders in that location. Right-click the first folder you want to move, click Properties, and then click the Location tab. Enter the path of the location you want to use. (I created a new folder on the D: drive to hold data files, so my Downloads folder is at D:EdDownloads.)

If the folder name you entered doesn’t exist, Windows will create it. Be sure to click Yes when asked if you want to move all current data files to the new folder.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows tip of the week: Simplify password management

Manage your saved passwords:

Windows regularly offers to save passwords on your behalf. When you connect to a server on your network with a username and password other than the one you logged in with, for example, you’re prompted to save the credentials for reuse. Likewise, Internet Explorer and Edge allow you to save passwords so you can enter them automatically when you return to that page.

Those passwords are saved in a secure location that only you can open, using a well-hidden tool called Credential Manager.

You’ll find this option in Control Panel, under the User Accounts heading. In Windows 8.1 and Windows 10, it’s easier to just type credential in the search box and click Credential Manager at the top of the search results.

Separate icons at the top of the Credential Manager list let you view and manage saved Web credentials and Windows credentials. The Web Passwords list can’t be sorted and there’s no search option, so you’ll have to scroll through the list to find a specific entry. Click the down arrow to the right of any entry to see the saved username and password and click Remove if you don’t want that password stored. (The only way to change a saved password is to remove it and then save it by entering the new password in your web browser.)

The Windows Credentials screen offers Edit and Remove buttons for every entry, along with a handy option to back up and restore saved credentials. That’s a small timesaver when you’re setting up a new PC.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows tip of the week: Find out how your PC is managing power

Get the inside story on how your PC is managing power:

 

One of the most powerful diagnostic tools in Windows doesn’t have a graphical interface.

The Powercfg command, which is available only from a command line, allows you to manage, save, and export power settings. But its best trick is the ability to produce a detailed report of energy usage on your PC, including clues about devices or services that are preventing your system from going to sleep when it should.

To produce the energy report, open an administrative Command Prompt window. (From Windows 8.1 or Windows 10, right-click Start and then click Command Prompt (Admin).)

At the command prompt, type cd %temp% and then press Enter to switch to the Temp folder, where your report will be saved.

Enter the command powercfg /energy to begin generating the report. The process monitors your system for 60 seconds and then analyzes the results, saving the report as a document called energy-report.html in the current folder.

To open that report in your default browser, just enter the command start energy-report.html.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows tip of the week: Tap into these Software licensing secrets


Software Licensing secrets:

Every version of Windows dating back to Windows Vista has included the Windows Software Licensing Management Tool, a script file found in the Windows System 32 folder as Slmgr.vbs. The script is designed for a local administrator to run in an elevated Command Prompt window.

Most people never need to use this tool, but it can come in handy when you’re trying to resolve activation problems or upgrade a Windows PC. The secret is knowing which switches to add to the end of the command to achieve the desired result.

If you just type the command, with no switches, you get a series of five dialog boxes that list all those switches. Network administrators who manage a Key Management server for Volume Licensing will find a goldmine here. For the rest of us, the three most commonly used switches are the following:

Slmgr.vbs /dli Displays basic license information, including the last five characters of the product key

Slmgr.vbs /dlv Displays much more detailed license information

Slmgr.vbs /cpky Removes the product key from the registry so that it can’t be copied and reused

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows tip of the week: Organize your cloud files the easy way

How to set up a Cloud Files library:

Cloud Solutions

You probably have two, three, or maybe even more folders that sync files from cloud to your PC right now: Dropbox, Google Drive, OneDrive, and so on. How do you keep track of all that cloud content? Set up a Cloud Files library in File Explorer. Here’s how:

In Windows 8.1 or Windows 10, right-click any empty space in the navigation pane on the left and make sure Show Libraries is selected. (Libraries are visible by default in Windows 7’s Explorer.)

Right-click the Libraries heading and then click New | Library. Change the default name to something descriptive, like Cloud Files.

Right-click the first locally synced cloud folder and select Include In Library, choosing the name of your newly created library.

Repeat that step for each additional local folder.

That’s it. You can now get a unified view of all your cloud files by selecting that library in File Explorer. Use the search box to quickly find any file, regardless of where it’s stored.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Beware downloading some apps or risk “being spied on”

Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

A security firm found that between 75 and 80 percent of the top free apps onAndroid phones or iPhones were breached. The number jumps as high as 97 percent among the top paid apps on those devices.

Whether these apps help advertisers target you or help hackers rip you off, you’ll want to do your homework before downloading apps, reports CBS News correspondent Anna Werner.

California’s Susan Harvey said she was a victim after she used a debit card to download a slot machine game app to her cell phone through a Google Play store account.

“It was something you purchased once, for like $15,” Harvey said.

When she went to reload the game, she found hundreds of purchases had been made — by her math, more than $5,000 worth of transactions.

“My heart sank, I just sat there looking at it… I physically, I was sick, because I didn’t know what they were,” Harvey said.

That story’s no surprise to cybersecurity expert Gary Miliefsky, whose company SnoopWall tracks malware. He said certain apps are designed to steal your personal information.

“What are the consequences for me as a consumer?” Werner asked.

“You’re gonna lose your identity. You’re gonna wonder why there was a transaction. You’re gonna wonder how someone got into your bank account and paid a bill that doesn’t exist,” Miliefsky said.

Milifesky said when you download an app, you also give permission for it to access other parts of your phone, like an alarm clock app that can also track phone calls.

“You think an alarm clock needs all those permissions? Access to the Internet over wifi, your call information, calls you’ve made, call history, your device ID? This to me is not a safe alarm clock,” Miliefsky said.

And there’s the weather and flashlight apps that he says exploit legitimate banking apps to capture information, as he showed us in a demonstration of what could happen when someone takes a photo of a check to send to their bank.

“The flashlight app spies on the camera and noticed the check and grabbed a copy of it. Shipped it off to a server somewhere far away,” Miliefsky said.

Last year the group FireEye discovered 11 malware apps being used on iPhones that gathered users’ sensitive information and send it to a remote server, including text messages, Skype calls, contacts and photos Apple fought back by removing the apps and putting stricter security measures in place.

“They get at your GPS, your contacts list…to build a profile on you,” Miliefsky said.

Some apps are simply collecting information for advertising purposes. In 2014, the Federal Trade Commission settled a lawsuit with a company over its popular Brightest Flashlight app, alleging it transmitted consumers’ personal information to third parties without telling them.

But Miliefsky said he’s found another flashlight app that can do much more troubling things.

“This one turns on your microphone in the background, listens in on you, and sends an encrypted tunnel to a server we discovered in Beijing,” Miliefsky described.

“You’re saying that they’re actually listening to people’s conversations and sending that audio back to Beijing?” Werner asked.

“Yeah, we’ve tracked it. I can show you where it does it,” he said.

Miliefsky said it can be traced to a few blocks from Tiananmen Square on Information Drive in Beijing.

He gave a report on that app to the FBI.

“Because to me, it’s spyware at the nth degree,” Miliefsky said.

His recommendation?

“We really have to look at our phone and say, ‘This is really a personal computer that fits in our pocket. Let’s shut down all the apps we don’t use. Let’s delete apps that don’t make sense and reduce the risk of being spied on,'” Miliefsky said.

The creator of the Brightest Flashlight app settled with the FTC, agreeing to change its policy and delete all the information it had gathered.

Harvey sued Google over her alleged hack, but a judge recently dismissed it, saying she and her attorney filed too late. Google said fewer than one percent of Android devices got bad apps in 2014.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows tip of the week: How to save time with environment variables

Save time and keystrokes with environment variables:

When asked to open your user profile in File Explorer, you’ll probably type its full path: C, colon, backslash, Users, backslash, followed by your user name. But there’s a much faster way:

Type %userprofile% and press Enter.

Congratulations, you just saved a half-dozen keystrokes or so by using one of many useful environment variables in Windows. These are reserved names, enclosed between percent signs, that represent the current location of a specific system folder.

Here are a few other useful ones to know:

%localappdata% The hidden folder in your user profile where Windows apps store your data

%windir% The folder containing Windows system files; usually C:Windows

%public% A special user profile that contains folders for Documents, Downloads, Music, Pictures, and Videos, intended for sharing on a home network

%temp% or %tmp% The normally hidden folder where Windows and apps can store files necessary for one-time tasks

Some people write these variables using mixed case (%ProgramFiles%, for example) to make them easier to read. But they’re not case sensitive, so skip the Shift key if you want.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows tip of the week: How to customize the Send To menu

Customize the Send To menu:

The Send To menu is a particularly useful feature in File Explorer. You can right-click any file or folder, choose Send To, and copy or move those objects to a folder of your choosing. You can also open compatible files by sending them to an application shortcut.

Unfortunately, the default list of Send To destinations is sketchy to say the least. But if you create a shortcut, you can customize that list to your heart’s content. The secret is to open the Run box (Windows key + R), type the command shell:sendto, and then press Enter.

The folder with all the items you see on the Send To list will pop up. To delete an item, just right click it and select delete. To add destinations, like the Videos or Music folders, by dragging them from the menu on the left.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

CALL US NOW!