Back to Top

Tech, Web, Cloud & Cabling Services

Author Archives: Website Admin

How to install and activate Windows 10 using your Windows 7 or Windows 8 product key

windowsproductkey

Summary

Microsoft recently announced the first major update to Windows 10 which includes numerous improvements for end users and businesses. One of the welcome improvements is the compliance check when qualifying for the Windows 10 upgrade. Previously, Windows 7, Windows 8.0 and Windows 8.1 users needed to have either of those versions Windows installed and activated in order to qualify for the free upgrade offer. For persons who needed to perform a clean install of Windows 10 from the outset, it was a two step process of first validating the machine through the upgrade routine, ensure the Windows 10 Upgrade was activated, then proceed to perform a Reset. With the latest November Update (1511), users no longer have to go through this process. In this article, we take a look at how to install and activate Windows 10 using your Windows 7 or Windows 8 product key.

Details

For the purposes of this article, We are using a Windows 7 license to perform clean install using Windows 10.

Please note: The copy of Windows 10 you download must correspond with the edition of Windows you are licensed for:

  • Windows 7 Starter, Home Basic, Home Premium, Windows 8.0 Core, Windows 8.1 Core must use a Windows 10 Home ISO
  • Windows 7 Professional, Windows 7 Ultimate, Windows 8.0 Pro, Windows 8.1 Pro must use a Windows 10 Pro ISO
  • If you are using Windows 7 Enterprise, Windows 8.0 Enterprise, Windows 8.1 Enterprise editions you won’t be able to use the free upgrade offer.

Review complete instructions how to download the Windows 10 ISO in the following article:

How to download official Windows 10 ISO files

Review instructions here how to start a clean install if you desire, if you want to perform an upgrade, clickhere.

Have your Windows 7 or 8/8.1 product key ready. If you purchased a retail license, you can find the product key within the product box. The Windows 7 product key is normally found on an orange sticker attached to a pamphlet inside the box. The Windows 8/8.1 product key is found on a small business size card. See examples below. Please note, you can also use your OEM product key too if Windows came preinstalled on your computer.

Retail:

retail

Windows 8/8.1

windows-8

If your computer came preinstalled with an OEM version of Windows 7, look for the Certificate of Authenticity sticker attached to the chassis of your computer. Normally this can be at the side or top of the system unit. For laptops, look at the bottom of the chassis or inside the battery or memory compartment. It looks like the following:

productkey

If you are running an OEM preinstalled Windows 8/8.1 license, Windows 10 setup should automatically detect the product key and install it automatically.

With Windows 8, Microsoft had changed from stickers that have the product key that the user has to type in when installing the operating system to new BIOS embedded product keys. The idea is that by eliminating the sticker, you eliminate one of the easier ways for nefarious users to get a legitimate product key. Eliminating the product key sticker also removes any worry that the sticker might get damaged while at the same time eliminating the long and irritating process of typing in various letters and numbers when installing the operating system.

If the user has to reinstall the operating system on a machine that came with Windows 8, the installation process automatically grabs the software product key from the motherboard BIOS with no input from the user. This means that those familiar Windows product key stickers will no longer appear on the Windows 8 computers.

If you have lost your Windows product key, Microsoft recommends you purchase a new one. 

http://windows.microsoft.com/en-gb/windows/where-find-windows-product-key#where-find-windows-product-key=windows-7

You might be lucky by contacting Microsoft Support who might be sympathetic to your situation:
http://support2.microsoft.com/kb/326246/en-us

Contact the Microsoft store:
US: http://www.store.microsoft.com/Help/Contact-Us
1-877-696-77861-877-696-7786 FREE
Canada: https://www.microsoftstore.ca/shop/en-CA/Contact-Us

Microsoft Support Contact Information:
http://support.microsoft.com/contactus/?ws=support

General Microsoft contact site: http://support.microsoft.com/contactus#tab0

If you are prompted to enter a product key during Windows 10 setup (November Update aka 1511) from within a running version of Windows, your Windows 7 or Windows 8/8.1 product key will not work. Instead, you should activate your Windows 7 or Windows 8/8.1 first, then re-run Windows 10 setup. You will not be prompted to enter a product key.

windows10productkey

During Setup: If you are prompted to enter a product key when you boot from the Windows 10 setup installation media, click the option ‘I don’t have a product key’. Select the appropriate edition you are licensed for.

Windows 7 Starter, Home Basic, Home Premium, Windows 8.0 Core, Windows 8.1 Core will install Windows 10 Home ISO

  • Windows 7 Professional, Windows 7 Ultimate, Windows 8.0 Pro, Windows 8.1 Pro will installWindows 10 Pro ISO

setup

  • Out of Box Experience, if you are prompted for a product key, Click Do this Later.Complete the installationReview instructions how to activateHow to troubleshoot Product Activation in Windows 10windowstroubleshootSuppose you decide to reinstall Windows 7 or Windows 8?You can reinstall or restore a system image of your previous version of Windows and continue using it, this will not affect the validity of the license.

    If you continue to experience problems entering your product key:

    Click Start > Settings (press Windows key + i) > Update & security > Activation then click Change product key

    windowsupdatekey

    OR

    Press Windows key + X

    Click Command Prompt (Admin)

    At the command prompt, type the following commands:

    slmgr.vbs -ipk xxxx-xxxx-xxxx-xxxx (allows you to replace the current product key with the specified)

    xxxx-xxxx-xxxx-xxxx – represents your product key

    Hit Enter on your keyboard

    Exit the command prompt

    Restart your computer

    Wait a while and it should activate, if not, give it a few days.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Move Over Skype, Calling From Gmail

Kon’nichiwa, hola, and bonjour says Google, as it expands Gmail calling to support a total of 38 languages and four currencies including Euros, British pounds and Canadian / US dolla dolla bills y’all. The calling feature allows Gmail users to call landlines and mobile phones from within their Gmail browser for next to nothing, making the email center a one-stop shop for IMs, emails, video and voice calls. The year-old service is lowering its call rates to $0.10 per minute to mobile phones in the UK, France, and Germany, $0.15 per minute to Mexico, and $0.02 per minute to any number in China and India. Calling landlines is even cheaper — which would be fantastic if you actually knew someone that still used one. The expanded language support and cheaper calls adds another piece of ammo to Google’s arsenal as it goes head-to-head with Skype (which charges $0.18 – $0.25 per minute for calls to UK mobile numbers), after the company conveniently partnered with Google+’s arch nemesis for calls from within the social network. But hey, at least those late-night arguments won’t cost the former nearly as much as it once did.

 


To view the original article in it’s entirety, Click Here.


 

HAPPY FALL Y’ALL!

South Jersey Techies invites you to stop by our office our 3rd Annual Holiday Lights-to-Music Display!

This time we are celebrating Halloween! 

Located at 229 North Locust Ave, Marlton NJ.

We hope you enjoy the show and have a Spooktacular time!!

Visit 7pm thru midnight each evening now until Halloween

 

South Jersey Techies

Park and Tune into 89.9FM

 

10 Tips for CyberSecurity Recommended By The FCC

Cybersecurity is of paramount importance in today’s digital age as it plays a crucial role in safeguarding sensitive information, ensuring the privacy of individuals, and maintaining the integrity of critical systems and infrastructure. The Federal Communications Commission (FCC) in the United States recognizes the significance of cybersecurity and has provided recommendations and guidelines to help individuals, businesses, and organizations protect themselves from cyber threats. Here are some key points highlighting the importance of cybersecurity along with recommendations from the FCC:

 

  • Train employees in security principles – Establish basic security practices and policies for employees, such as requiring strong passwords, and establish appropriate Internet use guidelines that detail penalties for violating company cybersecurity policies. Establish rules of behavior describing how to handle and protect customer information and other vital data. We offer Security Awareness Training as an option for continuous security training for staff.
  • Protect information, computers, and networks from cyber attacks – Keep clean machines: having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Set antivirus software to run a scan after each update. Install other key software updates as soon as they are available. We offer Managed Services & Support as an option for preventing cyber-attacks.
  • Provide firewall security for your Internet connection – A firewall is a set of related programs that prevent outsiders from accessing data on a private network. Make sure the operating system’s firewall is enabled or install free firewall software available online. If employees work from home, ensure that their home system(s) are protected by a firewall. We offer a Managed Network Services & Support as an option for firewall security.
  • Create a mobile device action plan – Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password-protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for lost or stolen equipment. We offer Mobile Device Management as an option for a mobile device action plan.
  • Make backup copies of important business data and information – Regularly backup the data on all computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly and store the copies either offsite or in the cloud. We offer various Backup & Recovery Solutions as an option for business continuity & disaster.
  • Control physical access to your computers and create user accounts for each employee – Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key personnel. We offer Multi-Form Authentication Solutions as an option for computer login security.
  • Secure your Wi-Fi networks – If you have a Wi-Fi network for your workplace, make sure it is secure, encrypted, and hidden. To hide your Wi-Fi network, set up your wireless access point or router, so it does not broadcast the network name, known as the Service Set Identifier (SSID). Password protect access to the router. We offer Managed Network Services & Support is an option for Wi-Fi security.
  • Employ best practices on payment cards – Work with banks or processors to ensure the most trusted and validated tools and anti-fraud services are being used. You may also have additional security obligations pursuant to agreements with your bank or processor. Isolate payment systems from other, less secure programs and don’t use the same computer to process payments and surf the Internet. Risk Intelligence is an option we offer to identify potential vulnerabilities.
  • Limit employee access to data and information, limit authority to install software – Do not provide any one employee with access to all data systems. Employees should only be given access to the specific data systems that they need for their jobs, and should not be able to install any software without permission. We offer Network & Security Assessments that can scan data repositories for user permissions, security and much more.
  • Passwords & authentication – Require employees to use unique passwords and change passwords every three months. Consider implementing multi-factor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data to see if they offer multi-factor authentication for your account. We offer Cloud Security Assessments which are used to ensure proper password & security practices are in place.

Download the 10 Tips Below

SJT-QR-CyberSecurity-10 Tips

If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.

The end is near: Say goodbye to the Windows 10 free upgrade

The deadline for a free Windows 10 upgrade is right around the corner. Find out what happens after the offer expires.

Windows 10-July29

Don’t look now, but July 29, 2016, is coming up fast. That is the one-year anniversary of the release of Windows 10, which means the ability to upgrade to the new operating system for FREE will soon expire. (If you are interested, you can take a look at the official countdown here.)

In a January 21, 2015, Windows Experience blog post titled The next generation of Windows: Windows 10, we learned that Windows 10 would be a free upgrade. Author Terry Myerson said:

Today was a monumental day for us on the Windows team because we shared our desire to redefine the relationship we have with you—our customers. We announced that a free upgrade for Windows 10 will be made available to customers running Windows 7, Windows 8.1, and Windows Phone 8.1 who upgrade in the first year after launch.

A little over six months later, on July 28, 2015, Myerson penned another Windows Experience blog post, titled Windows 10 Free Upgrade Available in 190 Countries Today, in which he reiterated the free upgrade policy:

From the beginning, Windows 10 has been unique—built with feedback from five million Windows Insiders, delivered as a service with ongoing innovations and security updates, and offered as a free upgrade to genuine Windows 7, Windows 8.1 and Windows Phone 8.1 customers.

If you’ve been reading articles by Woody Leonhard or Paul Thurrott in recent months, you know that Microsoft has been upping its game with the Get Windows 10, or GWX, program it built into Windows 7 and Windows 8.1. It really wants every Windows user everywhere to be running Windows 10.

Any holdouts—Windows 7 or Windows 8.1 users who have been sticking to their guns so far—have only a few more weeks to go before losing their chance to get Windows 10 for free.

In a recent Windows Experience blog post titled Windows 10 Now on 300 Million Active Devices – Free Upgrade Offer to End Soon, Yusuf Mehdi, the corporate vice president of Microsoft’s Windows and Devices Group, said:

…we want to remind you that if you haven’t taken advantage of the free upgrade offer, now is the time. The free upgrade offer to Windows 10 was a first for Microsoft, helping people upgrade faster than ever before. And time is running out. The free upgrade offer will end on July 29 and we want to make sure you don’t miss out. After July 29th, you’ll be able to continue to get Windows 10 on a new device, or purchase a full version of Windows 10 Home for $119.

What will Windows 10 cost after July 29?

As Mehdi pointed out in his post, you will be able to purchase a full version of Windows 10 Home for $119.

But how much will Windows 10 Pro cost?

Well, if you head over to the Microsoft Store right now, you’ll find that you can purchase both Windows 10 Home and Windows 10 Pro as a download or on a USB flash drive. Windows 10 Pro will cost you $199.99. And moving past the July 29 deadline for the free upgrade, it’s a pretty safe bet that prices will remain the same—especially since they’re the same price points that the full versions of Windows 8.1 Home and Pro sold for when that operating system was new.

Will there be upgrade versions of Windows 10 after July 29?

Since Microsoft provided free upgrades for a full year, I wonder if there will be upgrade packages for Windows 7 and Windows 8.1 users who decide to upgrade to Windows 10 after July 29. I suppose that it’s possible, but then again, maybe not. When Microsoft introduced Windows 8.1 packages, it offered only the full versions—there were no upgrade versions of Windows 8.1. With that in mind, it’s easy to speculate that this may also be the case with Windows 10.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Quick Reference CyberSecurity Guide

In today’s digital age, cybersecurity is at the forefront of technology, both at the workplace and in our personal lives. With the increasing frequency and sophistication of cyber threats, it is essential that we all play a role in protecting sensitive information both business and personal.

 

To help you stay informed and vigilant about cybersecurity best practices, we have created a Quick Reference Guide for Cybersecurity to be shared with your users as a courtesy to better protect themselves from cyber threats and contribute to a safer digital environment.

Please Download Our Quick Reference Cyber Security Guide Below

Quick Reference CyberSecurity Guide

If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.

RingCentral – New & Improved

ringcentralRingCentral is a company that specializes in providing business VoIP services, fax services and mobile communication solutions. With plans ranging from a single user to over 20 users, RingCentral makes it clear that they can cater to both small businesses and large corporations. With a cloud-based virtual office system and new Interface, RingCentral makes it possible to enjoy your virtual office from virtually anywhere.

Business SMS Beta

RingCentral-big-icon_6655Using your RingCentral number and App from Google Play or iTunes, you will have unlimited texting to customers and co-workers from your Tablet or Smartphone.  

Improved Web Interface

Boosting the efficiency of the RingCentral system, many features have been added, corrected and removed.   The new interface is mapped with navigation tabs that can be used on a Computer, Tablet or Smartphone.

RingCentral Conferencing

RingCentral Conferencing includes host and participant access codes for anytime conference calls.  All users can invite and have up to 1000 attendees for a conferencing from their mobile devices.

RingCentral Presence

RingCentral Presence feature allows you to see the status of colleagues on your phone.  Whether on you desk phone or cell phone,  Presence will tell you which lines are available, busy and on hold.

rc

For more information regarding RingCentral,

please contact us at 856-745-9990 or click here.

Zero-Day Security Vulnerability in Chrome, Firefox and Others

Google Chrome, Microsoft Edge, Mozilla Firefox and Apple’s Safari browser have all been impacted by a single zero-day vulnerability. The flaw, tracked as CVE-2023-4863, is caused by a heap buffer overflow in the WebP code library. Once exploited it can lead to system crashes and arbitrary code execution, where hackers can gain control over an infected device.

Where Does it Originate?

CVE-2023-4863 was first identified by researchers at The Citizen Lab, a research arm of the University of Toronto. The institution subsequently informed Google and Apple of the vulnerability’s existence. Both companies have now released patches. They were joined by Mozilla, which released its own advisory on CVE-2023-4863 yesterday and updates for several versions of its Firefox browser and Thunderbird email client, and Microsoft.

 

Vulnerability Originates In Webp Reader. Users of the affected browsers should update to the most up-to-date version in order to ensure the zero-day vulnerability is patched on their machines. The problem isn’t with the browsers — the vulnerability originates in the WebP Codec. Many applications use the WebP codec and libwebp library to render WebP images.

 

In more detail, a heap buffer overflow in WebP allowed attackers to perform an out-of-bounds memory write. A heap buffer overflow allows attackers to insert malicious code by “overflowing” the amount of data in a program. Since this particular heap buffer overflow targets the codec (essentially a translator that lets a computer render WebP images), the attacker could create an image in which malicious code is embedded. From there, they could steal data or infect the computer with malware. The vulnerability was first detected by the Apple Security Engineering and Architecture team and The Citizen Lab at The University of Toronto on September 6.

How Dangerous Is This Flaw?

Since many browsers, including Microsoft Edge, Brave, Opera, and Vivaldi are built on the Chromium platform, the same platform that Chrome is based on, this could affect their users as well. The same risk is also applicable for Firefox browser clones.

 

Such a widespread exploit in ubiquitously used software is dangerous, widening the attack surface for most organizations.

 

Patching will mitigate the risk, but users must act quickly as hackers will already be at work. Attackers will be working over the coming days and weeks to make the exploit more reliable meaning remote code execution will be more likely. Modern web browsers are exceptionally good at pushing out security updates rapidly and applying them as quickly as practicable, so users will shortly be protected.

 

The biggest risk is to organizations which don’t allow automatic updates and push out updates at their own release schedule.

What Steps Should You Take?

Google, Mozilla, Brave, Microsoft and Tor have released security patches for this vulnerability. Individuals running those apps should update to the latest version. In the case of other applications, this is an ongoing vulnerability for which patches may not exist; NIST noted that the vulnerability has not yet received full analysis.

 

If you are already a Managed Services client, please follow the steps below to check for updates

 

Google Chrome – Click the 3 dots in the top right corner for the menu and choose Help->About Google Chrome.  Chrome will check and install updates automatically from this screen.

 

Microsoft Edge – Click the 3 dots in the top right corner for the menu and choose Help and feedback->About Microsoft Edge.  Edge will check and install updates automatically from this screen.

 

Mozilla Firefox – Click the 3 lines in the top right corner for the menu and choose Help->About Firefox.  Firefox will check and install updates automatically from this screen.

 

 

If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990

CALL US NOW!