Back to Top

Tech, Web, Cloud & Cabling Services

Author Archives: Website Admin

Office 365 – the easiest way to get the new Office.

Microsoft
Partner Network

Office 2016

Now, there’s more opportunities than ever to build your business.Office 216 is the latest addition to Office 365—taking the work out of working together. The new Office is built for teamwork. Perfect for Windows 10. Smart. Secure. Full of new features.

Consider the opportunities.

Exciting new advances in Office open new opportunities for you to deepen your role as trusted advisor and to expand your practice—and your revenue potential. Here are a few paths to consider:

  • Reach new customers by leveraging the innovative user experiences in Office 2016 apps
  • Grow your hybrid practice with cloud-inspired infrastructure in Office 2016 servers
  • Capitalize on Office 2016 launch momentum to renew or upsell Office 365

We think that Office 2016 is an important step in empowering every organization on the planet to achieve more. Action Pack and Competency partners can get started right away by using your internal use rights (IUR) benefits to download Office 365. Once you’re familiar with the new Office you can show your customers how to get the most from the new features.

Quick steps to get started:

Let’s do great work together.Your Microsoft Partner Network Team

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

The 18 scariest computer viruses of all time

virus

 

Anna Kournikova (2001)

The Anna Kournikova virus is so named because it tricked its recipients into thinking they were downloading a sexy picture of the tennis star. Financial damages associated with Kournikova were limited, but the virus had a big pop culture impact: It became a plot point in a 2002 episode of the sitcom Friends.

Sasser (2004)

In April 2004, Microsoft issued a patch for a vulnerability in Windows’ Local Security Authority Subsystem Service (LSASS). Shortly after, a teenager in Germany released the Sasser worm to exploit the vulnerability in unpatched machines. Multiple variants of Sasser took out airline, public transportation, and hospital networks, causing $18 billion in damage.

Skulls.A (2004)

The Skulls.A is a legitimately spooky mobile trojan that affected the Nokia 7610 smartphone and other SymbOS devices. The malware was designed to change all icons on infected phones to Jolly Rogers and disable all phone functions, save for making and receiving calls.

F-Secure says Skulls.A caused little damage, but the trojan is undeniably creepy.

Zeus (2009)

While many malware programs on this list are little more than nuisances, Zeus (AKA Zbot) was a tool used by a complex criminal enterprise.

The trojan uses phishing and keylogging to steal online banking credentials, draining a cumulative $70 million from the accounts of its victims.

Melissa (1999)

Named after a Florida stripper, the Melissa virus was designed to propagate by sending itself to the first 50 contacts in its victims’ e-mail Outlook address book. The attack was so successful that the virus infected 20 percent of the world’s computers, causing an estimated $80 million in damage.

Virus creator David L. Smith (shown) was caught by the FBI, served 20 months in jail, and paid a $5,000 fine.

Sircam (2001)

Like many early malware scripts, Sircam used social engineering to trick people into opening an email attachment.

The worm chooses a random Microsoft Office file on victims’ computers, infects it, and sends it to all the people in the victims’ email contact list. A University of Florida study pegged Sircam cleanup costs at $3 billion.

Stuxnet (2009)

Stuxnet is one of the first known viruses created for cyberwarfare. Created in a joint effort between Israel and the U.S., Stuxnet targeted nuclear enrichment systems in Iran.

Infected computers instructed nuclear centrifuges to physically spin until they broke, all while providing fake feedback that operations were normal.

SQL Slammer/Sapphire (2003)

Taking up just 376 bytes, the SQL Slammer worm packed a lot of destruction into a tiny package. The worm slowed down the Internet, disabled 911 call centers, took down 12,000 Bank of America ATMs, and caused much of South Korea to go offline. It also crashed the network at Ohio’s Davis-Besse nuclear power plant.

Storm Trojan (2007)

Storm Trojan is a particularly sinister piece of email-distributed malware that accounted for 8 percent of all global infections just three days after its January 2007 launch.

The trojan created a massive botnet of between 1 and 10 million computers, and because it was designed to change its packing code every 10 minutes, Storm Trojan proved incredibly resilient.

Code Red (2001)

The Code Red worm, named after the Mountain Dew flavor preferred by its creators, infected up to one-third of all Microsoft ISS web servers upon release.

It even took down whitehouse.gov, replacing its homepage with a “Hacked by Chinese!” message. Estimated damages due to Code Red were in the billions of dollars worldwide.

Nimda (2001)

Released just after the 9/11 attack, many thought the devastating Nimda worm had an Al Qaeda connection (never proven).

It spread via multiple vectors, bringing down banking networks, federal courts and other key computer systems. Cleanup costs for Nimda exceeded $500 million in the first few days alone.

ILOVEYOU (2000)

The ILOVEYOU worm, AKA Love Letter, disguised itself in email inboxes as a text file from an admirer.

But this Love Letter was anything but sweet: In May 2000, it quickly spread to 10 percent of all Internet-connected computers, leading the CIA to shut down its own email servers to prevent its further spread. Estimated damages were $15 billion.

Cryptolocker (2014)

Computers infected with Cryptolocker have important files on their hard drives encrypted and held at ransom. Those who pay approximately $300 in bitcoin to the hackers are given access to the encryption key; those who fail to pay have their data deleted forever.

Netsky (2004)

The Netsky worm, created by the same teen who made Sasser, made its way around the world by way of email attachments. The P variant of Netsky was the most widespread worm in the world even more than two years after its February 2004 launch.

Conficker (2008)

The Conficker worm (AKA Downup, Downadup, Kido), first detected in December 2008, was designed to disable infected computers’ anti-virus programs and block autoupdates that may otherwise remove it from computers.

Conficker quickly spread to numerous important computer networks, including those of the English, French, and German armed forces, causing $9 billion in damage.

Michaelangelo (1992)

The Michelangelo virus itself spread to relatively few computers and caused little real damage. But the concept of a computer virus set to “detonate” on March 6, 1992 caused a media-fueled mass hysteria, with many afraid to operate their PCs even on anniversaries of the date.

Sobig.F (2003)

The Sobig.F trojan infected an estimated 2 million PCs in 2003, grounding Air Canada flights and causing slowdowns across computer networks worldwide. This tricky bug-in-disguise cost $37.1 billion to clean up, making it one of the most expensive malware recovery efforts in history.

MyDoom (2004)

In September 2004, TechRepublic called MyDoom “the worst virus outbreak ever,” and it’s no surprise why. The worm increased the average page load time on the Internet by 50 percent, blocked infected computers’ access to anti-virus sites, and launched a denial-of-service attack on computing giant Microsoft.

The worldwide costs associated with cleanup of MyDoom is estimated to be just shy of $40 billion.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Tech Tip

Cisco ASA – How to View pre-shared keys in plain text

Tech Tip

As engineers, you don’t always document things as well as we should OR someone you work with is always “too busy” to document their work. This little trick will show you how to recover pre-shared keys on a Cisco Pix or ASA firewall.

Normally, you use the ’show run’ command to view the running configuration. Pre-shared keys are marked with an asterisk (*). To view the password unencrypted, type ‘more system:running-config’. This will display the full configuration with unencrypted passwords.

To bad actually that the pre-shared key of an Cisco VPN Client doesn’t show up in the latest ASA software version 8.2.2. the pre-shared keys of the VPN Tunnels are showed.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Narberth Ambulance

Developed by,
South Jersey Techies, LLC.

This month our website team launched a website for Narberth Ambulance. Narberth Ambulance is an organization built on the countless hour of work over 70 years and now responds to over 6100 calls a year and provides most qualified EMT’s and Paramedics. Like the majority of websites we develop, Narberth Ambulance is fully responsive and is helping thousands of people.

Narberth Ambulance

Have questions?

Our Web Design team is here to help
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Five E-mail Etiquette Rules Every Professional Should Know

Tips and advice for making the best use of this medium.

email

E-mail is a great tool that has become both a blessing and a curse. Designed to enhance productivity in the workplace, it slowly had the reverse effect. Today, e-mail is ubiquitous, much easier to use, and often abused. It’s time to focus on how to turn e-mail back into an effective management tool for 21st century executives.

Don’t use it to do your thinking for you. Writing e-mails at work is not like doing calculus at school. At school you needed to show that your logic flow was part of the answer. With e-mail, assume no one is interested in how you came to your conclusion. They are only interested in what impacts them and their work and anything on which they need to take action.

Make your request clear. When publishers lay out a newspaper, they place the most important news “above the fold.” You should think the same way about your e-mails, especially when you are making requests. If you ask for something, always put that request, including names and dates related to it, in the first two or three sentences of your e-mail. Do not assume that the reader will read far enough to see the request buried in all of the detail.

Limit emotion of all types. Humor can cut through a lot of noise when you communicate, and it can help a team rally around a common thought or issue, but it rarely belongs in e-mail. This is especially true of sarcasm, which is very easy to misinterpret. The reader almost never understands what you are trying to communicate.

Use the save button before the send button. When we were young and got angry, people told us to count to 10 before saying anything. When you need to be cool and show that you have a levelheaded approach to problems, the last thing you want to do is send an e-mail. If you are writing an e-mail about an emotional or difficult topic, such as a performance review or a follow up to a contentious meeting, save the e-mail. Then, come back to it in 30 minutes or even the next day and decide whether you want to send at all.

Use the phone. These days, an e-mail lasts forever and there is no such thing as privacy in the workplace. In many cases, the laws and regulations governing publicly held companies require strict adherence to document retention rules. If you don’t want someone else to read what you wrote, don’t send it via e-mail. Also, if the subject matter you want to discuss is important and sensitive or personal, a phone call or face-to-face discussion is always the better option.

The bottom line. E-mail is a great tool for communicating, although we are never as effective as we think we are going to be. Remember to stop and think before hitting “send.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Internet doesn’t work on Windows 10?

PPTP VPN Blocks Internet Connection on Windows 10

After setting up a PPTP VPN from new Windows 10 computer our team couldn’t get internet access.

So we tested to make sure it wasn’t just DNS playing up and pinged 8.8.8.8 but no good.

DNS settings

So we tested pinging my default gateway and that worked, so then we tested pinging the default gateway of the remote network that we were connected to via the VPN and that also worked.

So we figured it must have something to do with Windows 10 not allowing split tunnels by default.

Configure Split Tunnel In Windows 10 PPTP VPN

 

You must be connected to the PPTP VPN for the network settings below to be available, if you are not connected to the VPN from Windows 10 then the network settings will not work.

 

Go to network and sharing center, you can get here by right clicking the network icon on the taskbar and selecting “Open Network and Sharing center”

Network and Sharing center

Select “Change adapter settings”

Right click on the PPTP VPN connection and select properties

Select “Networking” on the top menu

Select “Internet Protocol Version 4(IPv4)” and click the “Properties” button

Another window will open, in this windows select “Advanced”

Tick the box that says “Use default gateway on remote network” and hit “OK”

 

IP settingsNow you will be able to browse the internet through the VPN on Windows 10.

Found a solution using Powershell (Run as administrator):

Get-VpnConnection
That will get you the name, and other info, of the vpn

then run

Set-VpnConnection -Name MY_VPN_NAME -SplitTunneling $true

replace MY_VPN_NAME with the name of your vpn connection.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows 10 & network share access denied – Solution

Network Share access denial is another issue that users are facing with Windows 10.

Recent upgrade to Windows 10 all of a sudden makes network share no longer accessible on Windows machines you may have in your environment.

Here is the tutorial that solves the issue.

Problem

This is what you see when you try to go to any \\something network share:

\\something is not accessible. You might not have permission to use this network resource. Contact the administrator of this server to find out if you have access permissions. The account is not authorized to log in from this station.

open folder

There’s some changes in the Windows 10 internals which results in the access denial. The new build does not allow anonymous (guest) access to shares by default, as a security measure.It can be resolved by creating a new registry key in the right hive and rebooting.

Solution

Fire up the registry editor (regedit). Navigate to:

Registry editor

Here, you will need to create a new parameter (32-bit DWORD). Right-click:

Parameter

Then, name it AllowInsecureGuestAuth and assign it a value of 1.

DWORD

The hive should look thusly:

Registry Editor

And you’re done. Reboot, and enjoy your network access.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

How to upgrade to Windows 10: A step-by-step walkthrough

Windows 10 is now available as a free update. Here is what you can expect when you say “yes” to the update.

Here’s a step-by-step walkthrough of the upgrade process while upgrading Windows 8 machine to Windows 10.

Launch Windows 10 upgrade through Windows Update

Look for the Update screen in Windows 8 and click the Check for Updates link. When the check is over, you will see the screen shown in Figure A.

Figure A

As you can see, it is a 2699.0 MB download. Click the Get Started button and then the screen shown in Figure B will appear.

Figure B

You may be able to get Windows 10 via a free update, but it still requires that you agree to a license/user agreement.

The next screen (Figure C) is very important. Updating takes about 2 hours depending upon the machine. If you cannot afford to be off your computer for that long, it may be a good idea to schedule a time when you can.

Figure C

Installation process

After you start the update process, your PC will immediately restart. From that point on you will just have to wait for the update to finish. During update the screen gets blank for over an hour, so please don’t panic and turn your PC during this seeming lack of activity.

Your PC may also restart several times during the update, but eventually you will reach a screen that asks if you want to do an Express Configuration or a Custom Configuration. Express configuration will be the best choice for most people.

Note that the update does take a bit of bandwidth, so it might be more efficient to update one PC at a time.

When the entire update procedure is complete, you will be presented with the Windows 10 desktop or tablet interface depending on your device as you can see in Figure D.

Figure D

There are new versions of OneDrive and the Snipping Tool in Windows 10. Of course, there is also the new web browser, Microsoft Edge, too.

Get Windows 10 without using Windows Update

If you would like to get Windows 10 without going through the update process, for a clean install for example, then you will have to download the Windows 10 ISO file.

If you have a Windows Vista or Windows XP PC you would like to update, you have to purchase Windows 10. Windows 10 Home will cost you $119, while Windows 10 Pro will cost $199.

As of July 29, 2015, most new devices will be available with either Windows 10 or Windows 8.1, which can be upgraded to Windows 10 for free. If your PC is more than a few years old, it might make more sense to spend money on a new device rather than to update an old one.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

When should businesses upgrade to Windows 10?

Looking at upgrading your business PCs to Windows 10 but not sure when to make the leap? Here are some issues to consider.

Business customers can often be years behind the state of the operating system art: right now most businesses are still running Windows 7, launched back in July 2009, having shown limited interest in Windows 8 which arrived in August 2012.Windows 10

Even when they buy new PCs, most companies today still downgrade them to Windows 7, so it’s usually home users that are first to take the plunge with the new software, whether they like it or not.

However, businesses may be significantly faster to adopt Windows 10, which arrives on 29 July (volume licensing customers will be able to download Windows 10 Enterprise and Windows 10 Education on Volume Licensing Service Center from 1 August) than previous versions of Microsoft’s operating system.

Part of the reason for the change is the huge public testing process – five million testers strong – that has preceded the arrival of Windows 10. As a result, the standard policy of waiting for the first service pack to arrive before rolling out a new OS is now longer the right one, says Stephen Kleynhans, research vice president at analyst Gartner.

However, that doesn’t mean firms should be full steam ahead with upgrades. “I’m not one who believes there is a need to rush to a new operating system. You want to let the ecosystem around the operating system mature a little bit before you jump right in,” he says.

Companies should wait until it’s clear if the line of business applications they use work happily with Windows 10, and whether they can find enough expertise to make sure any rollout is a smooth one. “All of that has to build up before you want to jump in and start running it in your production environment,” he said.

Kleynhans said businesses need to spend some time testing out Windows 10 in a controlled fashion: “Bring it into a lab, bring it into a test environment, let some folks run it for the rest of this year. Then, in 2016, get serious about it, start looking at it in a real test environment, start piloting it with some real users to see how it’s performing.”

He said that if all goes well companies should be ready to start deployments in the second half of 2016 or the beginning of 2017, depending on how large and complex their IT environment is.

“If you’re a large company nothing happens really fast. If you’re a small company the timeline is going to be a lot faster – if you’re testing with 10 people you might be testing with ten percent of the company.”

Starting the rollout a year to 18 months after the operating system is launched might seem like a long delay, but it would still be six months to a year faster than with previous upgrades.

Kleynhans said that it took most big companies 18 months of testing and remediation work before they were able to start rolling out Windows 7. In contrast, most companies will get Windows 10 testing and remediation done in less than six months.

The analyst said that some organizations are keen to get moving as soon as Windows 10 is available – such as those that are still using Windows XP or who have plans to deploy hybrid PC devices. But, for most companies, this will be too soon.

“There are pieces of the operating system targeted at the enterprise that we really haven’t had a chance to try out yet. You can’t consider significant production rollouts even in the most aggressive cases until later in the fall.”

He cited Windows Update for Business as a new tool that small and medium sized businesses will want to use, but that wasn’t part of the tech preview. There are also some other security components that haven’t been as broadly tested or available during the tech preview, he said.

As Ed Bott notes over at Tech Pro Research, other missing features will include the new unified sync client for OneDrive (the consumer cloud storage service) and OneDrive for Business (the cloud storage service for business Office 365 subscriptions). He predicts these will be wrapped up by late October, in time for Windows 10 PCs to hit the retail channel for the festive season.

Other factors to consider: at a prosaic level, the upgrade will inevitably cause disruption so don’t plan it for a busy time of year. If you’re in retail, starting the upgrade in November or December might be a career limiting decision for the CIO.

The state of your current infrastructure is another element to take into account. Gartner says that companies planning Windows 8.1 deployments should instead redirect their efforts toward earlier deployment of Windows 10.

“In almost all cases, enterprises currently planning to deploy Windows 8.1 should switch to Windows 10. Enterprises that already have Windows 8.1 deployed should continue with those deployments for the time being. Customers on Windows 7 with no plans for Windows 8.1 should begin evaluating Windows 10 for deployment in 2H16 or later,” the analyst firm said in a research note.

Equally, for some, the upgrade may never take place. David Gewirtz has no plans to upgrade any of his Windows 7 devices to Windows 10: “They work, they’re rock solid, and all their drivers are perfectly tuned to the hardware they’re running on,” he notes.

However long it takes enterprises to take the plunge, Windows 10 is likely to become widely adopted, if only because most firms will need to move off of Windows 7 eventually, while the relatively few who did move to Windows 8 will also update sooner rather than later. The pressures that forced companies to migrate off Windows XP and onto Windows 7 will eventually make them move from Windows 7 to Windows 10.

“Windows 7 comes to end of life in January 2020. That’s only four and half years away so you’re going to see the same sorts of pressures mount to get off of Windows 7. They need to go somewhere and they’ll go to Windows 10,” he said.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Apple Updates iPod Touch

New iPod uses same chip as iPhone 6 and will come in an array of colors

Varieties of the new iPod Touch

Apple Inc. introduced its updated iPod Touch that features the same chip used in the iPhone 6 and other upgrades that bring the device’s capabilities more in line with those of its smartphones.

The update also includes a new color lineup—including space gray, silver, gold, pink and blue—for the iPod Touch, as well as the iPod Nano and iPod Shuffle models.

The iPod was a breakthrough portable music player when it was introduced in 2001, but it has been displaced by smartphones in recent years.

Starting at $199, Apple said the iPod Touch has 10-times faster graphics performance and improved fitness tracking. The company said the upgraded iPod also offers three-times faster Wi-Fi connectivity.

Apple also touted the iPod Touch’s new 8-megapixel iSight camera and an improved FaceTime HD camera, with features including slo-mo and burst mode, as well as improved face detection for higher quality selfies.

Have questions?

Call us at: 856-745-9990 or Visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read thsi article in its entirety click here.

CALL US NOW!