Back to Top

Tech, Web, Cloud & Cabling Services

Category: Quick Reference Guides

Quick Reference Guides Category

3 ways to create more secure passwords

The must-read IT business eNewsletter

Encrypted passwords

“There is no such thing as perfect security,” says Jim Waldron, Senior Architect for Platform Security at HP. If you can access a website or server, consider it vulnerable to security breaches. That’s why so many businesses account for fraud in their business models—they expect to lose a certain amount each year to security leaks, lost IP, and more.

While you can never be 100% secure from hackers while connected to the internet, there are steps you can take to help protect your personal and professional data. All you need to do is activate features that are increasingly common (or easy to manage) on modern business-class PCs: Multi-factor authentication, client-based user authentication, and password best practices.

Multi-factor authentication
Multi-factor authentication is a simple but effective security system that involves the use of at least two factors (or methods) of authentication. It groups different factors together so that even if one is compromised, the data remains protected. Under this system, factors are divided into three domains:

HP support

 

  • Something you know: Password, PIN, etc.
  • Something you have: ATM card, smartcard, etc.
  • Something you are: Fingerprint, iris, etc.

For multi-factor authentication to be successful, you want to pull from at least two different domains, with a maximum of three domains. A common example of multi-factor authentication is when you withdraw cash from an ATM. To do so, you insert your ATM card (something you have) and enter your PIN (something you know). Without both factors you can’t access your account—and neither should anyone else.

Businesses are taking notice too, and multi-factor authentication’s popularity is rising. In 2014, 37% of enterprise organizations surveyed used multi-factor authentication for the majority of their employees, and that number is expected to grow to 56% by 2016.

What you can do now
If you have a business-grade PC, chances are your PC already includes the technologies you need to start using multi-factor authentication. In fact, HP offers multi-factor authentication on all of its business PCs. Consult your manual or HP Support, and identify the factors your PC supports in addition to traditional passwords, such as fingerprint or smartcard readers. Just make sure to choose factors from separate domains.

Client-based user authentication
Every time you log into a system, your identity needs to be authenticated by that system. This process occurs one of two ways: server-side authentication or client-based authentication. With server-side authentication your unencrypted information—such as your password or fingerprint—is sent to a server where it is compared against that server’s records. With client-based authentication, the authentication process—e.g., “Does this fingerprint match the one in our records?”—is performed on the client device, such as your work PC.

While client-based authentication is not as common as its counterpart, it is far more secure. In fact, “In almost all authentication scenarios it is preferable to perform the direct authentication on the client and then communicate an ‘Identity Assurance’ to the relying party,” says Waldron.

Everyone wins when it comes to client-based authentication. The client no longer has to send unencrypted, private information over the internet or store that information on another party’s server, while the relying party no longer has to store sensitive client information on their server—reducing the amount of information that can be stolen if and when a hack occurs.

What you can do now
One of the easiest ways to use client-based authentication is with a hardened fingerprint sensor. The sensor authenticates your fingerprint directly in the hardware, rather than sending it to a server or hard drive, and returns a key that can be used to decrypt password vaults.

Password best practices
As we’ve mentioned before, passwords aren’t perfect. While implementing and using the above features might not seem practical for some of us, everyone can benefit from following basic password best practices. They are quick to implement, and can save you a lot of hassle down the line.

To make the most of your password security, your passwords should be:

  • Long—at least 16 characters. Use a password manager to store unique passwords and fill out log-in forms so that you don’t have to memorize them.
  • Complex—containing symbols, numbers, uppercase letters, lowercase letters, and spaces (if possible)
  • Unique—only use a password once, don’t recycle or repeat across accounts
  • Short-lived—the National Cyber Security Alliance suggests changing your password every 60 days
  • Difficult to guess—avoid common words found in a dictionary, all or part of your name, repeated letters, or combos that align to your keyboard layout, such as “QWERTY” or “123456”

If you are uncertain whether your password is secure enough or if it meets enough of the criteria above, there are several reliable services that will check your password strength for you. Microsoft’s Safety & Security Center offers a free password checker you can access through your browser, while Mac users can access Apple’s Password Assistant through the Keychain Access utility.

What you can do now
The first thing you can do—right this second—is revise your most important passwords to align with password best practices. That includes your work accounts, personal email, bank accounts, and any other services that contain sensitive data. If you need help remembering your new passwords, consider using a password manager such as HP Password Manager. That way you only have to authenticate once to gain access to all your systems. You can also adopt a system to make your passwords easier to remember. Using acronyms, for example, you can turn the phrase “I was born in 1986 and my parents still live on Lake Street!” into “Iwbi1986ampsloLS!”—creating a strong password that’s easy to remember.

Passwords are changing, and while they will never be perfect, they can still provide an effective first layer of defense against hackers and ne’er do wells. The above features and techniques are increasingly common on modern business PCs, making it easier than ever to protect your private data. All you have to do is use them.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

11 ergonomic gadgets your body will love

If you spend most of your day at a desk, any one of these tech tools will make your work station more comfortable and give your body some much-needed relief.

Ergonomics – they do a body good
Ergonomic-Gadgets

Do you work long hours on your computer? If so, we know the feeling and have identified a list of gadgets that you can use at your workstation, and which offer the necessary support and comfort as you work. While some may require making some adjustments or take some getting used to, your body will grow to love any of these devices — in the form of reduced aches and pain.

Kensington SmartFit Conform Back Rest
Kensington-Smartfit-back-rest

If you don’t have an ergonomic chair, the Kensington SmartFit Conform Back Rest lets you convert a plain office chair into one. The attachment fits onto most chairs with a back, and delivers support for your spine and lumbar using two ventilated back panels resting on four independent springs. The fit can be slightly adjusted for support that is highly comfortable, while the fabric itself can be removed for washing.

Price: $60

[ Find it on Amazon ]

Microsoft Sculpt Ergonomic Keyboard
Microsoft-Ergonomic-Keyboard

The Microsoft Sculpt Ergonomic Keyboard sets a new standard for the support and comfort of your wrist for those who type a lot at work. The split keyboard layout and arc shape of this wireless keyboard helps keep hands and arms in a relaxed position to significantly reduce the risk of repetitive stress injuries. The numeric keypad comes as a separate device so right-handers can hold their mouse at a more accessible angle. Though the keyboard does take some getting used to, you’re soon be wondering why you ever settled for the cramped layout of a normal keyboard.

Price: $81

[ Find it on Amazon ]

Microsoft Natural Ergonomic Keyboard 4000
Microsoft-Ergonomic-Keyboard-4000

The Microsoft Natural Ergonomic Keyboard 4000 adopts a similar split keyboard layout and arc shape of the Sculpt Ergonomic keyboard, though in a more conventional wired keyboard design. In addition, it comes with additional multimedia buttons that can be customized to quickly access files, launch web pages and create hot keys shortcuts to get things done faster. A dedicated slider located in the middle of the Natural Ergonomic Keyboard 4000 also makes it easy to zoom in and out.

Price: $50

[ Find it on Amazon ]

Logitech MX Master
Logitech-MX-Master

The Logitech MX Master is a wireless desktop mouse that offers a sculpted design meant to support your hand and wrist in a comfortable and natural position. Aside from the usual plethora of technologies such as dual Bluetooth and RF wireless modes and support for pairing with up to three devices, the MX Master also comes with a couple of additional capabilities that should reduce wrist fatigue. For example, a speed-adaptive scroll wheel makes scrolling through long documents easier than ever with its ability to automatically shift between normal “click-to-click” scrolling to hyper fast scroll, while a thumb wheel offers side-to-side scrolling.

Price: $100

[ Find it on Amazon ]

Kensington Expert Mouse Wireless Trackball
Kensington-Trackball

Users who find that a normal mouse just doesn’t cut it for them will appreciate the use of a trackball-based solution such as the Kensington Expert Mouse Wireless Trackball. The giant trackball help keeps wrist and hand movement is kept to a minimum, and uses optical tracking technology for smooth control. Notably, the Expert Mouse Wireless Trackball works just as well for right-handed and left-handed users, while a scroll ring positioned around the trackball also makes it easy to scroll up and down lengthy documents or Web pages.

Price: $100

[ Find it on Amazon ]

Microsoft Sculpt Ergonomic Mouse
Microsoft-Ergonomic-Mouse

Shaped almost like a slightly squashed softball, the Microsoft Sculpt Ergonomic Mousewas created to offer a more natural hand, wrist and forearm posture. While its ergonomic design may take get some getting used to, the Sculpt Ergonomic Mouse is arguably more like a normal mouse than some of the other vertical mouse designs on the market. A thumb scoop is positioned to help maintain the correct hand and wrist position, while the scroll wheel supports four ways scrolling: Left, right, front and back.

Price: $60

[ Find it on Amazon ]

Swiftpoint GT Mouse
Swiftpoint-GT-Mouse

The Swiftpoint GT mouse is a compact, travel-friendly mouse designed to reduce fatigue caused by your normal portable mouse. The Swiftpoint GT’s pen-like grip is more natural than the claw grip that is necessary for many of the travel mouse out there, yet is small enough to be used on your laptop next to the touchpad. Moreover, it has a touch surface that enables a full range of touch gestures such as swiping, flicking and zooming. You can also easily “park” the Swiftpoint GT on your laptop when moving between meetings with its included magnetic clip.

Price: $149

[ Find it on Amazon ]

Kensington SmartFit Mouse Pad
Kensington-Smartfit-Mouse-Pad

The Kensington SmartFit Mouse Pad is created to combat improper positioning of one’s wrist when using a mouse. It comes with a soft gel support to relief pressure points on the wrist, and stands out from your run-of-the-mill mousepad by how its height can be adjusted with the use of removable inserts. A nonskid base adds stability, while an anti-microbial surface to resist strains and odors to set the SmartFit Mouse Pad further apart from the rest.

Price: $20

[ Find it on Amazon ]

Ergotron WorkFit-P, Sit-Stand Workstation
Ergotron-Workstation

Laptop users looking to get off their butts in the office can consider the Ergotron WorkFit-P, Sit-Stand Workstation, an elegant height-adjustable laptop stand. Made of solid-aluminum construction, the WorkFit-P works like a standard monitor arm in how it can be quickly adjusted various positions – including for use while standing. The large surface has more than adequate space for a laptop and external mouse, and can also serve as an adjustable tray for writing or drawing with a graphics tablet.

Price: $299

[ Find it on Amazon ]

HiRise for MacBook
HiRise-MacBook

While its name suggests that it can only be used for a MacBook, the HiRise for MacBook is a height-adjustable stand that works just as well for other laptops. The beautiful brushed metal design aside, the stand lifts your laptop up to a half foot off the desk, bringing it to a more optimal height for your overstrained eyes. You will need a separate keyboard and mouse to work with your machine, but laptop’ keyboard and trackpad were never great for ergonomics anyway.

Price: $70

[ Find it on Amazon ]

Ergotron MX Mini Desk Mount Arm
MX-Mini-Desk-Mount-Arm

The Ergotron MX Mini Desk Mount Arm is a monitor arm that offers a slim profile without giving up on the expansive height adjustment range of full-fledged monitor arms, including full tilt, pan and rotation capability. This means you can set the ideal height and angle for optimal individual comfort, and adjust it as necessary to avoid the morning or mid-afternoon glare. The MX Mini Desk Mount Arm works with lightweight LCD monitors of up to 24-inches, as well as tablets such as the Apple’s iPad and Microsoft’s Surface.

Price: $315

[ Find it on Amazon ]

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

8 ways the iPhone 8 can beat the Galaxy S8

The Galaxy S8 might be the best phone of 2017, but the year’s not over until the next iPhone makes its debut. Here’s how Apple can take the crown back from Samsung.

If there wasn’t already a mountain of pressure on Apple to deliver something spectacular with this year’s iPhone update, there surely is now. If you haven’t noticed, Samsung has released the Galaxy S8 and S8+, and they’re pretty remarkable. As a former iPhone 7 Plus user, the S8+ might very well be the best phone I’ve ever used, with a stunning screen, speedy processor, and, yes, a gorgeous design.

But what makes the S8 so amazing is how unique it is. For the first time in a while, Samsung is standing alone on the cutting edge with a phone that needs to be seen to be believed. From its barely there bezels to its brilliant wraparound screen, the Galaxy S8 truly gives Apple a run for its money. No joke, it actually makes the iPhone 7 look pretty stale.

But there’s still a lot of time between now and the release of the next iPhone. According to rumors, the lineup this year will consist of the usual S models along with a fantabulous iPhone 8, which looks to adopt a similar aesthetic to the Galaxy S8, with an edge-to-edge OLED display and the removal of the physical home button. But just because it might look similar doesn’t mean it can’t still be better. Here’s how Apple can still steal the crown from Samsung:

The Galaxy S8 has a killer camera but the iPhone 7 is no slouch.

Killer camera

The Galaxy S phones has always had a camera on par with the iPhone, so it was a little surprising that Samsung didn’t upgrade the S8’s all that much. The iPhone 7 Plus is already a step ahead here, with 2X optical zoom and the sublime Portrait Mode, but the iPhone 8 could really separate itself from the S8 by taking it even further. Along with a megapixel bump, Apple could add optical image stabilization to the second lens, which will go a long way toward increasing photo and zoom quality. But what would really set it apart would be a larger sensor and greater ISO range to make it a low-light leader.

The Gear VR is a big part of the S8, but AR could be the iPhone 8’s big play.

AR not VR

While Samsung is going all-in on virtual reality with the Galaxy Gear and the S8, rumors suggest that Apple is more interested in augmented reality. And that could be one of the features that sets the iPhone 8 apart. Smartphones have been slow to incorporate AR into the interface, but if Pokémon Go has taught us anything, it’s that people are way more interested in seeing the world through their screens than strapping a headset to their faces. An AR-fueled iPhone 8 could connect us to the world in fun new ways without separating us from reality.

The Galaxy S8’s fingerprint sensor is just in the worst place.

Well-placed fingerprint sensor

While the Galaxy S8 is one of the best smartphones ever made, one tragic flaw prevented it from being perfect: the placement of the fingerprint sensor. For some god-awful reason, Samsung put it right next to the camera, all but ensuring your finger will not only miss it, but also repeatedly smudge the lens. If the rumors are correct that Apple will also be removing the home button in the iPhone 8, it has two options: under the screen or on the back. A first-of-its-kind in-panel sensor would be revolutionary, but if it’s on the back, Apple needs to learn from Samsung’s mistake and put it lower, like on the Pixel.

Bixby hasn’t exactly exploded out of the gate, but it does a lot that Siri doesn’t do.

Expanded Siri

When Samsung unveiled the S8, a major part of the presentation was spent introducing its new AI assistant, Bixby. However, the new service wasn’t just a competitor to Siri, Alexa, and Google Assistant. Samsung integrated Bixby deep into the interface to let it access apps, fetch information, and cut down on how often we need to touch our phones. It’s a cool idea, except the only problem is it doesn’t really work. If Apple could do something similar with Siri and expand its reach to work inside apps while we’re using them, it could beat Bixby at its own game.

The Galaxy S8’s screen is pretty, but It also uses its software to accentuate it.

iOS 11

One of the biggest gripes people have had about Samsung’s phones has always been its TouchWiz interface. But that’s changed with the S8, as Samsung has crafted an intuitive, refined system that takes full advantage of its superb hardware. If Apple is going to release a radically redesigned iPhone with curved edges and a wraparound screen, the same old iOS isn’t going to do it justice. It might be time to rethink iOS for modern times and give it more than new features and a fresh coat of pixels.

Samsung’s wireless charging supports Qi and PMA standards, and the pad stands up or lies flat. But it’s not long range wireless.

True wireless charging

While Samsung has had wireless charging in the Galaxy S since the S6, Apple has been slow to adopt it for the iPhone. All signs indicate that’s going to change for the iPhone 8, but if Apple wants to top the Galaxy S8 and not just keep pace, it’s going to need something a little more exciting than a pretty charging pad. One of the rumors we’ve read suggests that Apple could adopt true long-range wireless charging for the next iPhone, which would power up the battery whenever you’re within range of the charger, even if it’s in your pocket. That alone would be an S8 killer.

The Galaxy S8 includes a pretty great pair of earbuds.

Bundled AirPods

Samsung didn’t just resist the trend to ditch the headphone jack on S8, it embraced the 3.5mm jack in a big way. Inside the S8 box is a pair of premium AKG-tuned earbuds that are a few steps above the usual build and sound quality you get for free—certainly better than what Apple gives us. But if Apple really wants to embrace the wireless future of the iPhone, it needs to stop including a wired set of EarPods, even if they are Lightning. A pair of AirPods in the box (or a cheaper Beats alternative) would really set it apart from the 3.5mm S8 and make a strong statement.

The battery life on the S8 is really good, but the iPhone 8’s could be even better.

Blow-away battery

Samsung has had its share of battery issues, but the S8 looks to put them in the past with a long-lasting battery that hopefully won’t blow up. But while it can get through the whole day for the most part, the S8 didn’t deliver the the real breakthrough we were hoping for. We’re still waiting for a phone that lets us completely forget about the battery until our day is over, and we’d love to see the iPhone 8 deliver something in the range of 12 hours and truly change the game.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Apple’s bold new red iPhone 7 turns upgrading into a philanthropic decision

iPhone SE gets a storage boost, too.

Apple just made upgrading to an iPhone 7 a philanthropic decision by adding a red special edition to the lineup. The new red aluminum finish, which is available to order for both iPhone 7 and 7 Plus in-store and online on March 24, is a fundraising effort for the Global Fund. Apple will contribute a portion of red iPhone sales to the fight against AIDS and HIV.

The two new red iPhones will come in 128GB and 256GB storage variations and start at $749 in the U.S. Apple will sell the special editions in more than 40 countries by the end of March, with Brazil, Chile, Colombia, India, and Turkey to come in April. If you live in the U.S., U.K., or China and are part of the iPhone Upgrade Program, you’ll be able to snag an unlocked red iPhone with AppleCare+. In the U.S., the 128GB iPhone 7 will start at $37 a month with the ability to upgrade every year.

Apple has a long-standing relationship with the Global Fund and has a variety of products in its red lineup, including iPod’s, cases, headphones, and speakers. Last December, Apple celebrated its decade-long partnership with the Global Fund by donating proceeds from in-app purchases, exclusive downloads, and newly launched accessories to the nonprofit. The company has so far donated more than $130 million to the Global Fund, making it the organizations’s largest corporate donor.

You can snag a flashy new red iPhone 7 on March 24, starting at $749.

iPhone SE gets a bump, too

Apple hasn’t forgotten about the littlest phone in its lineup, the iPhone SE. The company just doubled the 4-inch phone’s storage to 32GB and 128GB, up from 16GB and 64GB. Those models will be phased out and the roomier new options will start at $399 beginning March 24.

While the flashy new color and iPhone SE upgrade aren’t the biggest iPhone news of the year—that will come in September with the 10th anniversary iPhone 8—it’s nice to see Apple add a little something extra to both its existing flagship and its entry-level phones.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Is Your Organization Using SHA-1 SSL Certificates? If so here’s what you need to know and do:

ssl

 

Following a recommendation by the National Institute of Standards and Technology (NIST), Microsoft will block Windows from accepting SSL certificates encrypted with the Secure Hash Algorithm-1 (SHA-1) algorithm after 2016. Given the number of mission-critical SSL certificates that are allowed to expire from inattention, administrators have their work cut out for them. By knowing what will happen, why it’s happening, and what you need to do, you won’t be surprised by these important policy changes.

What’s Happening?

On November 12, 2013, Microsoft announced that it’s deprecating the use of the SHA-1 algorithm in SSL and code signing certificates. The Windows PKI blog post “SHA1 Deprecation Policy” states that Windows will stop accepting SHA-1 end-entity certificates by January 1, 2017, and will stop accepting SHA-1 code signing certificates without timestamps after January 1, 2016. This policy officially applies to Windows Vista and later, and Windows Server 2008 and later, but it will also affect Windows XP and Windows Server 2003.

SHA-1 is currently the most widely used digest algorithm. In total, more than 98 percent of all SSL certificates in use on the Web are still using the SHA-1 algorithm and more than 92 percent of the certificates issued in the past year were issued using SHA-1.

Website operators should be aware that Google Chrome has started warning end users when they connect to a secure website using SSL certificates encrypted with the SHA-1 algorithm. Beginning in November 2014 with Chrome 39, end users will see visual indicators in the HTTP Secure (HTTPS) address bar when the site to which they’re connecting doesn’t meet the SHA-2 requirement. Figure 1 shows those indicators.

 

Figure 1: Visual Indicators in the HTTPS Address Bar

 

Google is doing this to raise end users’ awareness and to help guide other members of the Internet community to replace their SHA-1 certificates with SHA-2 certificates.

Why Is Microsoft Deprecating SHA-1?

SHA-1 has been in use among Certificate Authorities (CAs) since the U.S. National Security Agency (NSA) and NIST first published the specification in 1995. In January 2011, NIST released Special Publication 800-131A, “Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths.” This publication noted that SHA-1 shouldn’t be trusted past January 2016 because of the increasing practicality that a well-funded attacker or government could find a SHA-1 hash collision, allowing them to impersonate any SSL website.

Realizing that it’s highly unlikely that CAs and the industry at large will adopt more powerful encryption algorithms on their own, Microsoft is leading the charge by making Windows reject certificates using SHA-1 after January 1, 2017. Doing this will lead website operators to upgrade to stronger SHA-2 certificates for the betterment of all Windows users and the broader public key infrastructure (PKI) community. The Windows PKI blog post “SHA1 Deprecation Policy” noted that, “The quicker we can make such a transition, the fewer SHA-1 certificates there will be when collisions attacks occur and the sooner we can disable SHA1 certificates.”

In the end, the issue isn’t if SHA-1 encryption will be cracked but rather when it will be cracked.

What Do I Need to Do?

January 1, 2017, might seem like a long way away, but now is the time to understand the problem and how to mitigate it.

As per Microsoft’s SHA-1 deprecation policy, Windows users don’t need to do anything in response to this new technical requirement. XP Service Pack 3 (SP3) and later versions support SHA-2 SSL certificates. Server 2003 SP2 and later versions add SHA-2 functionality to SSL certificates by applying hotfixes (KB968730 and KB938397).

Web administrators must request new certificates to replace SHA-1 SSL and code-signing certificates that expire after January 1, 2017. As of this writing, that would probably affect only public SHA-1 certificates that were purchased with a long expiration date (three years or more) or long-duration certificates issued by internal SHA-1 CAs. Most third-party CAs will rekey their certificates for free, so you simply need to contact the CA to request a rekeyed certificate that uses the SHA-2 algorithm.

When ordering new SSL certificates, you should confirm with the CA that they’re being issued with the SHA-2 algorithm. New certificates with expiration dates after January 1, 2017, can only use SHA-2. Code-signing certificates with expiration dates after December 31, 2015, must also use SHA-2.

Note that the algorithm used in SHA-2 certificates is actually encoded to use SHA-256, SHA-384, or SHA-512. All of these are SHA-2 algorithms; the SHA number (e.g., 256) specifies the number of bits in the hash. The larger the hash, the more secure the certificate but possibly with less compatibility.

It’s important that the certificate chain be encrypted with SHA-2 certificates. (A certificate chain consists of all the certificates needed to certify the end certificate.) This means that any intermediate certificates must also use SHA-2 after January 1, 2017. Typically, your CA will provide the intermediate and root CA certificates when they provide the SHA-2 certificate. Sometimes they provide a link for you to download the certificate chain. It’s important that you update this chain with SHA-2 certificates. Otherwise, Windows might not trust your new SHA-2 certificate.

Root certificates are a different story. These can actually be SHA-1 certificates because Windows implicitly trusts these certificates since the OS trusts the root certificate public key directly. A root certificate is self-signed and isn’t signed by another entity that has been given authority.

For the same reason, any self-signed certificate can use the SHA-1 algorithm. For example, Microsoft Exchange Server generates self-signed SHA-1 certificates during installation. These certificates are exempt from the new SHA-2 policy since they aren’t chained to a CA. I expect, however, that future releases of Exchange will use SHA-2 in self-signed certificates.

What About My Enterprise CAs?

If your organization has its own internal CA PKI, you’ll want to ensure that it’s generating SHA-2 certificates. How this is done depends on whether the CA is running Windows Server 2008 R2 or later and if your CA has subordinate CAs.

If you have a Server 2008 R2 or later single-root CA without subordinates, you should update the CA to use SHA-2. Doing so will ensure that subsequent certificates generated will use the SHA-2 algorithm. To check which hash algorithm is being used, you can right-click the CA and go to the General tab. If SHA-1 is listed, you can run the following certutil command to configure the CA to use the SHA-256 algorithm:

certutil -setreg ca\csp\CNGHashAlgorithm SHA256

You must restart the CertSvc service to apply the change. Now when you view the CA properties, you’ll see that the hash algorithm is SHA-256. All future certificates issued by this CA will use SHA-256, but keep in mind that existing certificates will still be using SHA-1. You need to renew any SHA-1 certificates issued by this CA to upgrade them to SHA-2 certificates.

If your CA is older than Server 2008 R2, you can’t upgrade the CA to use SHA-2. You’ll need to rebuild it with a newer version.

If your organization’s internal CA is multi-tiered with one or more subordinate CAs, you’ll need to reconfigure them to use SHA-2. This is done using the same certutil command just given on each subordinate or issuing CA. Keep in mind that if you use subordinate CAs, you’re not required to update the root CA to SHA-2 since that certificate is at the top of the certificate chain, but it won’t cause any problems if you do. You still need to renew any SHA-1 certificates issued by the subordinate CAs to upgrade them to SHA-2 certificates.

Take Action Now

Administrators and website operators should identify all the SSL certificates used in their organizations and take action, as follows:

  • SHA-1 SSL certificates expiring before January 1, 2017, will need to be replaced with a SHA-2 equivalent certificate.
  • SHA-1 SSL certificates expiring after January 1, 2017, should be replaced with a SHA-2 certificate at the earliest convenience.
  • Any SHA-2 certificate chained to an SHA-1 intermediate certificate should be replaced with another one chained to an SHA-2 intermediate certificate.

The following tools and websites are useful for testing and for further information about SHA-1 remediation:

  • Microsoft Security Advisory 2880823. This website discusses the deprecation policy for the SHA-1 hashing algorithm for the Microsoft Root Certificate Program.
  • Migrating a Certification Authority Key from a Cryptographic Service Provider (CSP) to a Key Storage Provider (KSP). The section “How to migrate a CA from a CSP to a KSP and optionally, from SHA-1 to SHA-2” in this TechNet web page provides detailed instructions for upgrading a CA to use SHA-2.
  • Gradually sunsetting SHA-1.” This Google Online Security Blog post explains how the transition to SHA-2 affects Chrome and details Google’s rollout schedule.
  • SHA-256 Compatibility. This GlobalSign web page lists OS, browser, server, and signing support for SHA-256 certificates.
  • DigiCert SHA-1 Sunset Tool. This free web application tests public websites for SHA-1 certificates that expire after January 1, 2016.
  • DigiCert Certificate Inspector. This tool discovers and analyzes all certificates in an enterprise. It’s free, even if you don’t have a DigiCert account.
  • Qualys SSL Labs’ SSL Server Test. This free online service analyzes the configuration of any SSL web server on the public Internet.

iOS 9 PPTP VPN Setup Tutorial

Manual Setup

Step 1

Start from the home screen. Go to “Settings“.

 

sjt-blog-iphone-vpn-01

Step 2

Go to “General“.

 

sjt-blog-iphone-vpn-02

Step 3

Then proceed to “VPN“. You may need to scroll down to find it.

 

sjt-blog-iphone-vpn-03

Step 4

Tap on “Add VPN Configuration…“.

 

sjt-blog-iphone-vpn-04

Step 5

Tap on “Type“.

 

sjt-blog-iphone-vpn-05

Step 6

Select “PPTP” by tapping on it.

 

sjt-blog-iphone-vpn-06

Step 7

Description” is the name of the connection, can be any as you like, we recommend StrongVPN.
Fill the “Server“, “Account” and “Password” fields.
Server” is your server address. It is not remote.sjtechies.com, that is just an example.
Account” and “Password”. Account is neither Test\jsmith nor your email.
Encryption Level” option must be set to “Auto“. “Send All Traffic” should be “ON“.
When the fields are filled up correctly, tap “Done“.

 

sjt-blog-iphone-vpn-07

Step 8

It will give you the warning about using the PPTP connection, which has some downsides.
Tap Save button. (Hint: If you want stronger encryption just use L2TP.)

 

sjt-blog-iphone-vpn-08

Step 9

Now connect by tapping the switch button to the right of VPN Status.
(If you have more than one VPN configuration listed, the one with a check next to it will be connected. You can tap on a vpn configuration name to select it, or tap on the ‘i’ to the right of the name if you need to update the settings.)

 

sjt-blog-iphone-vpn-09

Step 10

It will show you “Connecting…” status, wait while it connects.
When the VPN connection is established the status will be “Connected“. Also notice the “VPN” badge on the top bar.

 

sjt-blog-iphone-vpn-10

Step 11

To check if your IP address is changed successfully open the Safari browser and proceed to http://strongvpn.com/.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

 

How to access the traditional Control Panel lost in the Windows 10 Creators Update

Microsoft is phasing out the traditional Control Panel with the Windows 10 Creators Update, but with a few tweaks you can still access it. Mark Kaelin explains how.

Microsoft has been slowly and methodically rolling out the Windows 10 Creators Update to customers throughout 2017. If you are one of the lucky ones to receive the update already, you have likely noticed more than a few changes to how Windows 10 looks and works. Some of the changes are good, some are a little annoying.

One of the changes Microsoft implemented in the Windows 10 Creators Update that I don’t like is the removal of the traditional Control Panel from the Win+X menu—that’s the menu you see displayed when you right-click the Start button from the Desktop interface (Figure A). Microsoft is migrating the interface for configuring the operating system to the new Settings screen, but some of us, especially IT pros who have been doing this for a long time, prefer the old Control Panel interface.

Figure A

Fortunately, the old Control Panel is still available; it is just lurking in the background. We can bring it back to the forefront with a few clicks, tweaks, and tricks, and this tutorial will show you how they work.

First, what you can’t do

The commands for the Win+X menu are located in this file folder, as shown in Figure B:

C:\Users\USERNAME\AppData\Local|Microsoft\Windows\WinX

Figure B

But you can’t just add a shortcut to the Control Panel executable to one of those Group folders and expect to see it show up in the Win+X menu. The special links within the Win+X menu system are protected with a special hash calculation, which greatly complicates any attempt to edit its contents.

To add the Control Panel back to the Win+X menu you will have to use a link with the hash already included. In general, that means acquiring a link from a version of Windows that is not the Creators Update. It is possible with the help of a third-party app, but it is complicated, convoluted, and not really necessary.

If you want to go through the process, you can check out this website for the details. But before you do, I have some simple solutions that might work better for you.

Now, what you can and should do

For those of us who want to keep things simple, here are a couple of ways to access the traditional Control Panel in Microsoft Windows 10 Creators Update.

1. Search for it

Figure C

If you just want to access the control panel occasionally and not add more icons to your desktop, the simplest way to access the Control Panel is by typing control panel in the Cortana search box. Control Panel should be the first entry in the search results (Figure C). You can left-click the link to start the app or right-click it and add the link to the Start Menu or to your Taskbar for easy future access.

Adding the Control Panel to the Start Menu is handy if you are using a touch screen interface. Adding it to the Taskbar works well if you find yourself accessing configuration settings on a regular basis.

2. Add to Desktop

Figure D

There are two ways to add the Control Panel to your Desktop. The first way is fairly obvious: Right-click an empty area on your Desktop and create a new shortcut that points to the Control Panel executable located here:

C:\Windows\System32

But you can also add the Control Panel icon to your Desktop through the Personalization screen. Right-click the Start button to open the Win+X menu and click the Settings menu item. Click the Personalization icon to open the next screen and drill down to the Themes screen. Scroll down until you see the Desktop Icon Settings item under the Related Settings area and click it. A dialog box will pop open and you can check the Control Panel radio button to add that link to your Desktop (Figure D). Click OK and the icon will be added as a primary system link on your Desktop.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Here are the top features of iOS 11

The 10 best features you won’t be able to live without

Ready for some new iPhone and iPad features? iOS 11 is now out of beta and ready for the public. Here are the best features that came with it.

Get ready to back up your iPhone and iPad: iOS 11 is here. Apple released the latest version of its mobile operating system on Tuesday, introducing us to a handful of brand-new features. In fact, this version of iOS feels like the most ambitious version of iOS that Apple has launched in a while. Here are the best new features that we already can’t live without. 

Siri’s new tricks

Siri is one of those features that keeps getting better with each software upgrade, and iOS 11 is no exception. This time, Siri gets a new voice, plus a super-helpful visual interface that lets you even edit your voice request with text input. And now, Siri is able to translate phrases for you—it can process English to Chinese, French, German, Italian, and Spanish. Apple said that it will add more languages in the months to come.

 

Customizable Control Center

Currently, Control Center in iOS 10 takes up two panels, so you have to navigate to the second panel to access volume controls. However, iOS 11 brings everything back to a single screen and relies more on 3D Touch. Not only that, but you can also customize which controls you’d like to have on there. You can add new controls to quickly access your Wallet, turn on Low Power Mode, and even start Screen Recording—an all-new feature for iOS.

 

New Live Photo effects

Apple has given us more reasons to want to take Live Photos, those GIF-like moving images. In iOS 11, you can add effects to your Live Photos after you take them. Find a Live Photo on your camera roll and then swipe up. You will be able to add a looping effect to your photo or make it “bounce” back-and-forth, similar to an Instagram Boomerang. You can also make it a long exposure shot for better photos of low-lit scenarios.

 

Drag-and-drop on iPad

iOS 11 makes for better multitasking on iPad. Now you can drag-and-drop images, links, and files between apps that are open side-by-side, either in Split View or Side Bar mode. In fact, you can drag-and-drop an app from Dock onto Side Bar mode, and drag that secondary app from the right to the left side of the screen.

 

Markup your screenshots

Everytime you take a screenshot in iOS 11, it will automatically remain floating on the lower left. You can swipe it offscreen to save it to your camera roll as per usual, or you can tap on it to go into Markup. So now, you can add handwritten notes or comments either with your finger or with your Apple Pencil if you’re using an iPad Pro.

 

Social profiles in Apple Music

Apple Music gets social in iOS 11. Taking a page from Spotify, Apple Music members now have a profile on the streaming app. You can use your profile page to showcase your favorite playlists, as well as the albums you’ve recently listened to. You can also follow friends on Apple Music, and their profile photo will show up next to the albums they’ve listened to. However, there is currently no way to listen to music on private or secret mode, so be ready for your Apple Music followers to get a glimpse at all your guilty pleasures.

 

Do Not Disturb While Driving

This feature could be a real life-saver. iOS 11 also introduces “Do Not Disturb While Driving” so that the screen goes totally dark when you’re on the road. You can activate this mode manually via Control Center or have it turn on automatically whenever you’re connected to CarPlay or a car’s Bluetooth. In addition, you can go into your Do Not Disturb Settings to setup an automatic response to all your incoming texts to alert people that you’re driving and will get back to them as soon as you arrive.

 

Document scanner in Notes

There’s no reason to run to the office scanner anymore, thanks to iOS 11. Using the Notes app you can now press the plus (+) sign to access an all-new document scanner. You can scan several documents at once and apply different filters. The scans can be saved inside your Notes, and you can also export them as PDF files that are Markup-friendly, so you can add your signature and send it back.

 

Search for handwritten Notes

Another cool feature that iOS 11 brings to Notes is the ability to search for things you’ve written our by hand. If you prefer to take notes using your finger or your Apple Pencil on iPad Pro, they are now searchable. 

 

QuickType keyboard improvements

iOS 11 also makes significant improvements to the software keyboard. On iPhone, you can press-down on the globe icon and choose one-handed mode. This will bring all the keys closer to either the left or right side of the screen to make it easier to type with one hand. You can also make one-handed mode your default keyboard by going into Settings. For iPad, you can now type numbers, symbols, and punctuation marks without switching to a secondary keyboard. Simply flick down on the key to insert the character you need. 

What we’re still waiting for

Apple previewed a lot of new features for iOS 11, but not all of them are yet available. Here’s a quick look at what’s to come later this fall.

1. Apple Pay Cash for sending or receiving cash within Messages

2. Indoor maps for Apple Maps to help you navigate popular shopping centers and major airports worldwide. 

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10 Windows 7 tips to get the most out of your machine

If you’re one of the many business users who has not upgraded their computer to Windows 10, there are still resources to boost your experience. Here are 10 tips for getting the most out of the OS.

Windows 10 faced a controversial roll-out, with privacy concerns, bugs, and other issues plaguing many users. And as of August 2016, just 1% of business machines had upgraded to Windows 10, according to a study from Softchoice. Instead, 91% of the machines were operating with Windows 7—an 18% increase over the same period of time in 2015.

“It seems businesses don’t see an urgent need to move operating systems, so long as their cloud-based applications are still running fine on Windows 7,” Softchoice’s Microsoft director Craig McQueen wrote in a press release at the time. “In addition to the security benefits, I think once organizations grasp the user benefits—such as touch and Cortana—we will start to see a boost in adoption.”

While experts predict Windows 10 deployments will pick up this year, it’s important for those still using Windows 7 for business to get the most out of their machines. Here are 10  articles with Windows 7 tips that will help enterprise users operate the machines more effectively.

1. 10 ways to speed up Windows 7

While Windows 7 generally performs well, over time, the system can slow down and require some care to get it back up to speed. The OS also contains certain features that users can take advantage of to improve overall performance. Here, we outline 10 steps business users can take to enhance the performance of your Windows 7 system.

2. Use multiple monitors with Windows 7’s Remote Desktop Connection

Windows 7 allows users to connect to a remote computer and utilize the local system’s multiple monitors. Here is a step by step advice on how to configure and operate multiple monitors using Windows 7’s Remote Desktop Connection, as well as how to connect to and from Windows versions that do not support this feature.

3. Quick Tips: Flush the ARP cache in Windows 7

The Address Resolution Protocol (ARP) cache is an important part of IP networking on any OS, as it links Ethernet addressing to hardware addressing. Newly mapped addresses are saved in an ARP cache, which is usually fine, but can sometimes cause issues with internet connections and web page loading times. Here, are the necessary steps to clear the ARP cache, and how to manage it going forward.

4. 10+ Windows 7 services you may not need

While every version of Windows includes a core set of system services, business users can disable some that are not necessary in order to improve performance and security. In this article, we highlight 13 services that users can disable if they so choose on Windows 7 systems that will likely not have any impact on business operations, including IP Helper, offline files, and Network Access Protection.

5. 10 Windows 7 commands every administrator should know

IT staff who troubleshoot Windows 7 problems often have to dive into the command line. Here, are 10 fundamental Windows 7 commands that are useful for IT administrators, including System File Checker, File Signature Verification, and Driverquery.

6. Modifying the Windows 7 boot loader with the Boot Configuration Data Editor tool

In Windows Vista and later versions of Windows, the bootloader was moved from boot.ini to a utility called BCDEdit. This article walks users through how to modify the boot config data using this tool.

7. Change and customize Windows 7’s Logon screen wallpaper

Changing and customizing the Windows 7 Logon screen wallpaper is easy once you know the steps, as Microsoft built the ability to change the wallpaper right into the OS, as opposed to needing any third-party software. Here, we offer a tutorial on doing so.

8. Change the Processor Affinity setting in Windows 7 to gain a performance edge

Most applications have been designed for multi-core processors, and work with an OS to distribute their operations evenly across cores to enhance performance. However, you can sometimes achieve better overall performance from certain applications by configuring them to run on different processor cores, which Windows 7 allows via the Processor Affinity setting. In this article, we explain two ways to change the Processor Affinity setting in Windows 7.

9. Use Windows 7 Event Viewer to track down issues that cause slower boot times

Experiencing a slow Windows 7 boot time? You can use Windows 7’s Event View to investigate the source of the problem. The Event Viewer includes a category of event logs called Applications and Services Logs, which track key elements of the OS. Here, we explain how it is possible to find out how long it took to boot up your system every time, since the day Windows 7 was first installed, along with instances where boot time slowed down, all through these logs.

10. Tag your files for easier searches in Windows 7

This article, walks users through how to tag files to make them searchable via the Search filters built into Windows Explorer’s Search box in Windows 7. It’s possible to do this easily from many applications while saving a file. The ability to more easily find files is a boon for business users who want to enhance their productivity.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!