Back to Top

Tech, Web, Cloud & Cabling Services

Category: Utilities

Software / Utilities Category

Exclusive Offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532
Amit Shah — Customer Number: 57156051

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Looking to Save money on Web projects? Make a purchase of $80 or more with BigBeagle and get GoDaddy products at 15% off. Offer valid for limited period only.

coupon

Use promo code rs51338a in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Minimum purchase of $50 required. Offer expires Sunday, November 15, 2015 at midnight (Mountain Time).

Copyright © 2015 BigBeagle.com. All rights reserved.

Pro tip: Sort table data in a Word document

sort word

Microsoft Word

 

Sorting data in a Word document isn’t something you routinely do. On the other hand, presenting list and table data is, so the potential exists that one day you’ll want to sort something. The good news is that it’s easy to sort data in a table or a list. In this article, I’ll show you how to do just that. We’ll work through a few simple sorting examples. You can use most any table, or you can download the example .docx or .doc file.

Behind the scenes

Word relies on paragraphs when sorting, which seems a bit odd within the context of a table (or list). The paragraph formatting mark determines where one paragraph ends and the next starts. As you can see in Figure A, there’s no paragraph mark in a table. The end-of-cell markers denote the end of each cell’s content. The similar marker at the end of each row (outside the right border) is an end-of-row marker. These markers also contain cell and row formatting. When sorting a table, Word relies on the end-of-row marker to identify where one row ends and the next begins, the same way the paragraph mark does. (To see a document’s formatting symbols, click Show/Hide in the Paragraph group on the Home tab.)

Figure A

Table end-of-row markers are similar to paragraph markers.

Sort by the first column

We’ll start with the simplest sort possible; we’ll sort a table by the values in the first column. To do so, select, the table by clicking its move handle (the small square in the top-left corner). If you don’t see this handle, check the view. It’s available only in Print Layout and Web Layout. With the entire table selected, do the following:

  1. Click the contextual Layout tab. In the Data group, click Sort — or click Sort in the Paragraph group on the Home tab. In Word 2003, choose Sort from the Table menu.
  2. The resulting dialog does a good job of anticipating the sort. Notice that the Header Row option (at the bottom) is selected. As a result, the Sort By field is set to Species — the label in the first column’s header (Figure B).
    Figure B

  3. This is exactly what we want, so click OK. Figure C shows the sorted table.
    Figure C

Before we move on, let’s discuss the Type and Using options to the right. We didn’t need to change either, but sometimes you will. The Type options are Text, Number, and Date. Word usually defaults to the appropriate data type. You can force a specific type by choosing a different option other than the one Word assumes (but you’ll rarely have reason to do so). The Using options defaults to Paragraph — we talked about that earlier.

Sort by the second column

That first exercise was easy. Let’s complicate things a bit by sorting by the second column. Fortunately, it’s just as easy as the first. Repeat steps 1 and 2 from the first exercise. Then, do the following:

  1. In the resulting dialog, click the Sort By drop-down.
  2. Choose Common Name, the header label for the second column.
  3. Click OK. Figure D shows the results of sorting by the second column.
    Figure D

That wasn’t any more difficult that the first sort. Tell Word which column contains the values you want to sort by and click OK — that’s it!

Sort by multiple columns

With only two sort tasks under your belt, you’re beginning to see how simple the sorting process in Word can be. Let’s complicate things a bit so you can see how flexible this feature truly is. Let’s sort by the Class column and then sort the bird and mammal groups in a secondary sort. Repeat steps 1 and 2 from the first two exercises. Then, do the following:

  1. To sort by the Class, choose Class from the Sort By drop-down.
  2. To further sort each class group, click Common Name from the Then by drop-down (Figure E). You could add a third column to the sort if the results warranted the additional grouping.
    Figure E

  3. Click OK to see the results shown in Figure F.
    Figure F

What about lists?

You might be wondering how to sort the same data in list form. Word handles the list sort the same way — the exact same way. Highlight the list and click Sort in the Paragraph group on the Home tab. In the resulting dialog, check the header option and set appropriately (if necessary). Then, determine the sort order by choosing the fields (columns), appropriately.Figure G shows the result of sorting the same data in list form.

Figure G

Sort a columnar list the same way you sort a table.

 

10 Commandments of Windows Security

With the introduction of Windows 7, many PC and notebook users may feel more secure than they did using older versions of the Microsoft operating system. Newer OSs have more security features, offer better out-of-the-box security settings and have closed many of the historical security holes. Windows 7, for example, has changed the default User Account Control level so that it’s harder for rogue programs to run without first explicitly gaining the user’s permission.

[Also read 3 steps to protect your personal data]

However, feeling too secure can be dangerous. With that in mind, here are 10 tips–commandments, if you will–for ensuring your desktop or notebook computer can be used productively as well as safely. Many of the recommended tools are free, and all are affordable–and certainly less expensive than the potential problems of an unsecured computer. Similarly, many will take you only a minute or two to perform–again, far less time than you’d spend recovering from a security problem.

Yes, Windows 8 is on the way; it’ll be many years before that version runs on a majority of the installed base. So these tips are focused at the computers you are actually using today–especially Windows 7 computers, though most of the advice also applies to Windows Vista or XP machines.

1st commandment: Start with new hardware

Today’s new hardware–motherboards, BIOS, CPUs, hard drives, and the system as a whole–includes more security “baked in,” even before the operating system is installed. Examples include Trusted Platform Modules (TPM), which embed cryptographic security directly into the hard drive or other component, Unified Extensible Hardware Interface (UEFI) firmware instead of the traditional BIOS, and Intel’s vPro security and management technologies. For example, machines with UEFI and TPM will, as part of each boot-up, check the computer’s firmware and boot-up binaries to confirm they have not been infected with malware.

If you are working with an existing machine, consider doing a fresh install of the operating system, after completing one (or several) full backup. Ideally, the operating system would be the newest version rather than what was previously installed. (Products like LapLink’s PC-Mover can reduce the effort of saving and migrating settings and even application software–although applications should be freshly installed if possible, as well.)

Even if you’re working with an existing machine, consider swapping in new hard drives that include built-in encryption. Drives that support the OPAL Storage Specification standard enable companies to manage encrypted drives from multiple vendors–and have also helped reduce the extra cost for an encrypted drive from $100 to nearly zero. After-market drives often include migration tools to speed and simplify a drive swap.

If a self-encrypted drive isn’t an option, look at using full-disk encryption software, such as Windows’ BitLocker (available only on Enterprise or Ultimate Windows Vista, 7 or 8 ) or a third-party tool.

2nd commandment: Use current OS versions and automatically get OS and application updates

If you aren’t using the most current commercial version of the operating system, it’s time to upgrade. Additionally, make sure you set the software to automatically apply updates (not just the OS, but all applications) and periodically turn off the computer, which is when many updates are auto-applied. An appalling number of security breaches occur because applications lack important security fixes that have been available for a year or more.

The computer vendor may also include helpful update tools. For example, Lenovo includes an update process that is designed to show all BIOS and driver updates available for that particular model. You can also manually start the update-check apps process. This may take several cycles, particularly for the first time around, if some updates require other updates.

“Third-party software is usually the vector that security intrusions come through, not the operating system,” says Ed Bott, a Windows expert and ZDNet blogger. Flash, Adobe Reader and Java are three of the biggest targets, Bott says. While many programs include their own automatic update checker, Bott urges using a tool like Ninite orSecunia Personal Software Inspector, which automate update checking for all the applications on your computer.

3rd commandment: Use Windows’ new security tools (and/or third party software)

Windows 7 includes a number of security controls and tools through its Actions Center (which replaces the Security Center), and other tools are available via the Control Panel, including:

  • Windows Firewall: With its basic settings, this wards off basic attacks, and you can use its advanced settings for more specific control. There are also third-party firewall programs available.
  • Microsoft’s Microsoft Security Essentials and Windows Defender. These tools secure your computer against viruses, spyware
    and other malware.

Obviously another option is to invest in third-party security software, like individual anti-virus, anti-spam and other programs, or a security suite, such as Symantec’s.

4th commandment: Set up (or remove) user accounts

Historically in Windows, the default account had administrator privileges–meaning that programs capable of taking unwanted insecure actions wouldn’t have to first ask the user if they could run. Starting with Vista, Microsoft added User Account Control (UAC), which asked non-administrator users for permission to run certain programs or actions. With Windows 7, UAC still protects systems but less intrusively.

Even so, managing which user accounts are–and aren’t–available contributes to security in the following ways:

  • Establishes non-administrative user account(s) for each user.
  • Disables or removes user accounts that aren’t used or shouldn’t be there.
  • Disables the “guest” account, unless it’s needed. If it is needed, a password should be required for elevating privileges, to prevent unauthorized changes to the system.

Consider renaming the administrator account so that it’s not obvious to an intruder. Since this account can’t be “locked out,” password attacks can be performed indefinitely; changing the name makes the account less of a target.

5th commandment: Set passwords

Set the main Windows password, as well as the Power/Time to lock the system, with a screen saver, and require a password to resume activity.

Also, depending on the sensitivity of information on your system (did someone say “online banking”?), consider password alternatives, such as:

  • Smartcard reader (contact or contactless)
  • Biometric facial recognition
  • RSA software and external token
  • Password “gesture” (e.g., Android tablets)

Another option is two-factor authentication, such as requiring both a fingerprint and a password.

6th commandment: Add/activate anti-theft tools

Invest in, install and activate anti-theft tools that can either lock the system; conduct an IP trace; report, take and send pictures; and even wipe the computer when a lost or stolen computer reconnects to the Internet. An example is Absolute Software’s Lojack for Laptops.

Vendors like Lenovo are embedding Absolute’s CompuTrace Agent into the BIOS, so even if somebody erases or replaces the hard drive, the agent is automatically re-installed.

Computers that include Intel Anti-Theft technology in their hardware let you add additional security services, such as automatically locking the main board until it receives the “unlock” password, lock or wipe if a machine goes too long without connecting to the Internet or if a user fails the login process too many times. Intel Anti-Theft is typically part of third-party security products like CompuTrace, adding perhaps $3/year, and as the anti-theft option on WinMagic’s full disk encryption product.

7th commandment: Turn off sharing and other unneeded services

Windows allows you to share resources that are on your computer, like file-sharing (Shared Folders) and print sharing. Your computer’s Internet connection management utility (Windows includes one, but many systems have their own) lets you define each network as either Public, Home or Work. If you mis-set a connection, your Shared Folders will be visible to other computers on the network.

Suggested Desktop Security Reading

  • Windows 7: Explore New and Improved Security Features (Microsoft)
  • Security checklist for Windows 7 (Microsoft)
  • Enhancing Endpoint Security for Windows Desktops,” Derek Melber, President and CTO of BrainCore.Net
  • Best Practices: Windows Desktop, IT Security for the University of Missouri

If you are behind a firewall, when your computer’s Internet connection manager tool asks you what kind of location/connect it is, you can call it either a Home or Work network, Bott says. But specify Public network if you are connecting directly to the Internet (e.g., at home or in the office), if you don’t have a hardware router but instead are directly connected to the cable modem, or if you are connecting to a public network like a Wi-Fi hotspot or a hotel or conference Ethernet. This will ensure that no local sharing is allowed.

In general, disable any services and remove programs you don’t need. For example, if you’re sure your applications won’t need it, you may want to uninstall Java. If your machine has Internet Information Services (IIS) running but doesn’t need it, disable that, as well.

8th commandment: Secure your Web browser and other applications

Web browsers access Web sites that neither you nor your company control (and these sites, in turn, may have ads or link to other content that they don’t control). Any of these may try to inject malware onto your computer.

[Also read 10 ways to secure browsing in the enterprise]

Today’s browsers include more security, like “private browsing” session modes that prevent any personal information from being stored, or don’t save cookies or history for a session. However, this may interfere with productivity.

Check each browser’s security options and select the ones that look useful, like Firefox’s “Warn me when sites try to install add-ons” and “Block reported attack sites.”

Set Microsoft Internet Explorer to have the highest security setting you can tolerate (since higher security often means you have to click more often), suggests Tom Henderson, Managing Director of ExtremeLabs.com, an Indianapolis, Indiana technology testing lab.

Additionally, look for browser “extensions” and add-ons that increase your browser’s security, in a more per-tab, per-site or per-tab-session way. For example, the popular NoScript Firefox add-on allows JavaScript, Java, Flash and other plug-ins to be executed only by trusted Web sites of your choice.

PDF readers may also be vulnerable to JavaScript attacks within the documents they’re rendering. Make sure your PDF reader is secure; consider disabling JavaScript within it.

9th commandment: Rope in Autorun

AutoRun is a major threat vector for viruses and other malware in Windows XP and Windows Vista. [Editor’s note: Simson Garfinkel called Autorun an “OS design flaw” all the way back in 2006.] With this function, the operating systems automatically begins executing a program when it sees an autorun.inf file in the root directory of a new drive, such as a network drive, a CD or a flash drive. So, if you haven’t yet moved to Windows 7, make sure you’ve got all the security updates for the OS version you are running. (See MS Security Advisory: Update for Windows Autorun.

With Windows 7, all the security settings are “No Autorun.” When you attach external media like CDs, DVDs, SD cards and USB flash drives, they will give you a dialog box offering to run a program, but by default, nothing happens automatically.

10th commandment: Consider application whitelisting and other controls “Whitelisting” refers to a list of everything you allow on your computer, including e-mail addresses your mail program can accept, Web sites your browser is allowed to connect to and applications the operating system is allowed to run. Whitelisting may not be a match for e-mail or Web browsing, but for preventing unwanted applications from running–such as malware or zero-day attacks–it may be a good additional tool.

Windows 7 includes AppLocker, a whitelisting utility, or you can buy third-party white-listing products for either individual computers or groups of networked computers. For home users, Windows 7 has fairly robust parental controls that can restrict access by time-of-day or by site, and log Web access, Bott says.

Conclusion: It’s easy to become more secure

As you can see, there is a lot you can do affordably, even to existing Windows systems, to increase their security. It shouldn’t take a lot of time or money to do; however, it may take a lot of both if you don’t do anything and something avoidable goes wrong.

To View Entire Article Click Here

11 ergonomic gadgets your body will love

If you spend most of your day at a desk, any one of these tech tools will make your work station more comfortable and give your body some much-needed relief.

Ergonomics – they do a body good
Ergonomic-Gadgets

Do you work long hours on your computer? If so, we know the feeling and have identified a list of gadgets that you can use at your workstation, and which offer the necessary support and comfort as you work. While some may require making some adjustments or take some getting used to, your body will grow to love any of these devices — in the form of reduced aches and pain.

Kensington SmartFit Conform Back Rest
Kensington-Smartfit-back-rest

If you don’t have an ergonomic chair, the Kensington SmartFit Conform Back Rest lets you convert a plain office chair into one. The attachment fits onto most chairs with a back, and delivers support for your spine and lumbar using two ventilated back panels resting on four independent springs. The fit can be slightly adjusted for support that is highly comfortable, while the fabric itself can be removed for washing.

Price: $60

[ Find it on Amazon ]

Microsoft Sculpt Ergonomic Keyboard
Microsoft-Ergonomic-Keyboard

The Microsoft Sculpt Ergonomic Keyboard sets a new standard for the support and comfort of your wrist for those who type a lot at work. The split keyboard layout and arc shape of this wireless keyboard helps keep hands and arms in a relaxed position to significantly reduce the risk of repetitive stress injuries. The numeric keypad comes as a separate device so right-handers can hold their mouse at a more accessible angle. Though the keyboard does take some getting used to, you’re soon be wondering why you ever settled for the cramped layout of a normal keyboard.

Price: $81

[ Find it on Amazon ]

Microsoft Natural Ergonomic Keyboard 4000
Microsoft-Ergonomic-Keyboard-4000

The Microsoft Natural Ergonomic Keyboard 4000 adopts a similar split keyboard layout and arc shape of the Sculpt Ergonomic keyboard, though in a more conventional wired keyboard design. In addition, it comes with additional multimedia buttons that can be customized to quickly access files, launch web pages and create hot keys shortcuts to get things done faster. A dedicated slider located in the middle of the Natural Ergonomic Keyboard 4000 also makes it easy to zoom in and out.

Price: $50

[ Find it on Amazon ]

Logitech MX Master
Logitech-MX-Master

The Logitech MX Master is a wireless desktop mouse that offers a sculpted design meant to support your hand and wrist in a comfortable and natural position. Aside from the usual plethora of technologies such as dual Bluetooth and RF wireless modes and support for pairing with up to three devices, the MX Master also comes with a couple of additional capabilities that should reduce wrist fatigue. For example, a speed-adaptive scroll wheel makes scrolling through long documents easier than ever with its ability to automatically shift between normal “click-to-click” scrolling to hyper fast scroll, while a thumb wheel offers side-to-side scrolling.

Price: $100

[ Find it on Amazon ]

Kensington Expert Mouse Wireless Trackball
Kensington-Trackball

Users who find that a normal mouse just doesn’t cut it for them will appreciate the use of a trackball-based solution such as the Kensington Expert Mouse Wireless Trackball. The giant trackball help keeps wrist and hand movement is kept to a minimum, and uses optical tracking technology for smooth control. Notably, the Expert Mouse Wireless Trackball works just as well for right-handed and left-handed users, while a scroll ring positioned around the trackball also makes it easy to scroll up and down lengthy documents or Web pages.

Price: $100

[ Find it on Amazon ]

Microsoft Sculpt Ergonomic Mouse
Microsoft-Ergonomic-Mouse

Shaped almost like a slightly squashed softball, the Microsoft Sculpt Ergonomic Mousewas created to offer a more natural hand, wrist and forearm posture. While its ergonomic design may take get some getting used to, the Sculpt Ergonomic Mouse is arguably more like a normal mouse than some of the other vertical mouse designs on the market. A thumb scoop is positioned to help maintain the correct hand and wrist position, while the scroll wheel supports four ways scrolling: Left, right, front and back.

Price: $60

[ Find it on Amazon ]

Swiftpoint GT Mouse
Swiftpoint-GT-Mouse

The Swiftpoint GT mouse is a compact, travel-friendly mouse designed to reduce fatigue caused by your normal portable mouse. The Swiftpoint GT’s pen-like grip is more natural than the claw grip that is necessary for many of the travel mouse out there, yet is small enough to be used on your laptop next to the touchpad. Moreover, it has a touch surface that enables a full range of touch gestures such as swiping, flicking and zooming. You can also easily “park” the Swiftpoint GT on your laptop when moving between meetings with its included magnetic clip.

Price: $149

[ Find it on Amazon ]

Kensington SmartFit Mouse Pad
Kensington-Smartfit-Mouse-Pad

The Kensington SmartFit Mouse Pad is created to combat improper positioning of one’s wrist when using a mouse. It comes with a soft gel support to relief pressure points on the wrist, and stands out from your run-of-the-mill mousepad by how its height can be adjusted with the use of removable inserts. A nonskid base adds stability, while an anti-microbial surface to resist strains and odors to set the SmartFit Mouse Pad further apart from the rest.

Price: $20

[ Find it on Amazon ]

Ergotron WorkFit-P, Sit-Stand Workstation
Ergotron-Workstation

Laptop users looking to get off their butts in the office can consider the Ergotron WorkFit-P, Sit-Stand Workstation, an elegant height-adjustable laptop stand. Made of solid-aluminum construction, the WorkFit-P works like a standard monitor arm in how it can be quickly adjusted various positions – including for use while standing. The large surface has more than adequate space for a laptop and external mouse, and can also serve as an adjustable tray for writing or drawing with a graphics tablet.

Price: $299

[ Find it on Amazon ]

HiRise for MacBook
HiRise-MacBook

While its name suggests that it can only be used for a MacBook, the HiRise for MacBook is a height-adjustable stand that works just as well for other laptops. The beautiful brushed metal design aside, the stand lifts your laptop up to a half foot off the desk, bringing it to a more optimal height for your overstrained eyes. You will need a separate keyboard and mouse to work with your machine, but laptop’ keyboard and trackpad were never great for ergonomics anyway.

Price: $70

[ Find it on Amazon ]

Ergotron MX Mini Desk Mount Arm
MX-Mini-Desk-Mount-Arm

The Ergotron MX Mini Desk Mount Arm is a monitor arm that offers a slim profile without giving up on the expansive height adjustment range of full-fledged monitor arms, including full tilt, pan and rotation capability. This means you can set the ideal height and angle for optimal individual comfort, and adjust it as necessary to avoid the morning or mid-afternoon glare. The MX Mini Desk Mount Arm works with lightweight LCD monitors of up to 24-inches, as well as tablets such as the Apple’s iPad and Microsoft’s Surface.

Price: $315

[ Find it on Amazon ]

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10 free anti-malware tools worth checking out

Over the last few years, anti-malware software has become increasingly costly. But believe it or not, there are still ways to protect your computer for free. In this article, I will list 10 free utilities you can use to either prevent malware infections or to help clean up the mess once a PC becomes infected.

1: AVG Anti-Virus Free Edition 2011
I have been using AVG’s free antivirus product for a few years now, and although it isn’t perfect, it seems to be at least as good as most of the commercial anti-malware products. AVG’s free edition provides basic protection against viruses and spyware, but the company also offers a more comprehensive security suite called AVG Internet Security 2011. This suite offers the same anti-malware protection as the free edition, but it also provides real-time protection against Internet search and social networking sites.

2: Comodo Antivirus
Comodo Antivirus takes a different approach to virus protection than most other antivirus products do. Comodo is based on the idea that it is foolish to allow code to run without first proving itself to be benign. So Comodo implements a default denial until an executable proves itself trustworthy. To keep the software from being too chatty, Comodo executes unknown code in an isolated sandbox where its behavior can be monitored without running the risk of the executable harming the system.

3: PC Tools AntiVirus Free 2011
PC Tools AntiVirus Free 2011 is a basic antivirus / anti-spyware program that is designed to protect Windows desktops against various forms of malware. Besides its basic detection capabilities, PC Tools includes a feature called Search Defender that is designed to warn you about unsafe Web sites (or phishing sites) before you click on them. The software also includes a File Guard component that monitors the file system and blocks attempted malware infections in real time.

4: Avast Free Antivirus
Like AVG, Avast sells comprehensive security suites, but makes its basic antivirus / anti-spyware product available for free to home users. Although I have never used Avast Free Antivirus, I’ve recently noticed posts in various message boards from people who claim that Avast provides better protection than some of the commercial products.

5: Ad-Aware Free Internet Security
Although it was originally designed as a product for detecting adware, Lavasoft’s Ad-Aware has evolved into a complete anti-malware product. Ad-Aware Free Internet Security provides real-time protection against spyware, rootkits, and more. It also includes a utility called The Neutralizer, which you can use to clean a PC that has already been infected.

6: HijackThis
HijackThis is one of my favorite anti-malware utilities, but it’s not for the faint of heart. HijackThis is designed to compile a report of critical file and registry settings that are often prone to viral infections. The thing that makes HijackThis difficult to use is that it makes no distinction between malicious and legitimate entries. As a result, you can end up doing even more damage to a PC unless you know what you are doing. Even so, I consider HijackThis to be a must-have utility.

7: Microsoft Security Essentials
Microsoft provides free antivirus protection for home users through a relatively new application called Microsoft Security Essentials. Microsoft Security Essentials is based on the same ForeFront technology as Microsoft’s enterprise class anti-malware software. The difference is that Microsoft Security Essentials is available solely to home users and businesses with fewer than 10 Windows desktops.

8: Windows Defender
Microsoft’s Windows Defender is a free anti-spyware utility for Windows. It’s not comprehensive, but it does a surprisingly good job of protecting Windows as long as you install it before an infection occurs.
Windows Defender is included with Windows Vista and Windows 7, but you can also download a version for Windows XP. If you are using Windows 7 or Windows Vista, Windows Defender is disabled by default. You can enable Windows Defender by typing the word Defender into the Windows search box and then double-clicking on the Windows Defender option. When you do, Windows will tell you that Windows Defender is turned off and will give you the opportunity to enable it.

9: Malicious Software Removal Tool
Although not a comprehensive antivirus tool by any stretch of the imagination, Microsoft’s Malicious Software Removal Tool does a good job of detecting and removing the most common viruses. The Malicious Software Removal Tool works with Windows 7, Vista, XP, and Server 2003. Microsoft releases updates to this tool on the second Tuesday of each month.

10: McAfee virus removal tools
McAfee makes commercial antivirus products, but it also offers some free tools for removing viruses. Specifically, it offers tools for removing Sasser, Bagle, Zafi, Mydoom, Lovsan / Balster, Klez, and Bugbear. You can download all of these tools here

To view the original article in it’s entirety Click Here

Why business-class PCs are a smart investment

Business PCs

Think back to the last time you bought a new PC or laptop for your business. Did you approach the purchase the same way you would for a personal device? And if you had a problem, were you satisfied with the level of service you received?

Many small and medium-sized businesses purchase consumer-grade PCs and notebooks by default, not realizing the amount of difference a business-class model can make. Consumer-grade devices can work fine for many organizations, but businesses with more stringent performance, reliability, and support needs can save time and frustration by moving up to business-class devices.

Think of it this way: when you purchase an economy-class plane ticket you know there’s going to be a marked difference between your experience and the experience of someone flying first class. More legroom, better menu options, more responsive service—the benefits are clear, and for many business travelers it makes sense to upgrade, especially if the flight is long.

When it comes to technology, the difference between consumer-grade and business-class PCs is just as marked as for flights—and for many businesses, the upgrade is just as worthwhile. Here’s the difference a business-class device can make for you:

  • Performance: Many modern consumer-grade processors and mobile operating systems prioritize battery life over processing power. Business-class PCs often offer both better performance and longer battery life, allowing users to work faster and longer while on the road.
  • Reliability: HP Elite PCs are designed to pass MIL STD testing and are tested for 115,000 hours to HP’s own testing standards to help ensure durability. New HP EliteBook 700 series notebooks are also made with Corning® Gorilla® Glass and a magnesium alloy chassis that’s 18 times stronger than plastic.
  • Support: Every HP Elite PC comes with HP Elite Premium Support, providing 24/7/365 dedicated service from U.S.-based specialists who are dedicated solely to supporting HP Elite products.
  • Software and security: Business-class devices help their users take advantage of their advanced features with free, bundled software that is not available (or requires an additional purchase) on consumer-grade PCs. For example, HP Elite family products come with security software and features that protect at the data, identity, and device levels to help keep proprietary data safe.

On average, small businesses hold on to their PCs for five to seven years. Your next device purchase will likely be with you for years to come. So when you consider that many of us are quick to upgrade our airline tickets—even though flights don’t last more than a day—upgrading to a business-class device can make a lot of sense. Weigh the benefits, and choose the device with the level of support and reliability that meets your business needs.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

49% of businesses fell victim to cyber ransom attacks in 2016

Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here’s what you need to know.

Nearly half of businesses report that they were the subject of a cyber-ransom campaign in 2016, according to Radware’s, Global Application and Network Security Report 2016-2017.

Data loss topped the list of IT professionals’ cyber attack concerns, the report found, with 27% of tech leaders reporting this as their greatest worry. It was followed by service outage (19%), reputation loss (16%), and customer or partner loss (9%).

Malware or bot attacks hit half of all organizations surveyed in the last year. One reason for the pervasive attacks? The Internet of Things (IoT). Some 55% of respondents reported that IoT ecosystems had complicated their cybersecurity detection measures, as they create more vulnerabilities.

Ransomware attacks in particular continue to increase rapidly: 41% of respondents reported that ransom was the top motivator behind the cyber attacks they experienced in 2016. Meanwhile, 27% of respondents cited insider threats, 26% said political hacktivism, and 26% said competition.

While large-scale DDoS attacks dominated the headlines of 2016, this report found that only 4% of all attacks were more than 50 Gbps, while more than 83% of DDoS attacks reported were under 1 Gbps.

“One thing is clear: Money is the top motivator in the threat landscape today,” said Carl Herberger, vice president of security solutions at Radware, in a press release. “Attackers employ an ever-increasing number of tactics to steal valuable information, from ransom attacks that can lock up a company’s data, to DDoS attacks that act as a smoke screen for information theft, to direct brute force or injection attacks that grant direct access to internal data.”

Despite the growth in attacks, some 40% of organizations reported that they do not have an incident response plan in place, the survey found.

The report listed five cybersecurity predictions for 2017:

1. IoT will become an even larger risk. The Mirai IoT Botnet code is available to the public, making it more likely that cyber criminals of all experience levels are already strengthening their capabilities. “In 2017, exponentially more devices are expected to become targeted and enslaved into IoT botnets,” the press release stated. “IoT device manufacturers will have to face the issue of securing their devices before they are brought to market, as botnet attacks from these devices can generate large-scale attacks that easily exceed 1 Tbps.”

2. Ransomware attacks will continue to grow. These attacks will target phones, laptops, and company computers, and will likely take aim at healthcare devices such as defibrillators in the future, the press release stated.

3. Permanent Denial of Service (PDoS) attacks on data centers and IoT operations will rise. PDoS attacks, sometimes called “phlashing,” damage a system to the degree that it requires hardware replacement or reinstallation. These attacks are not new, but Radware predicts they are likely to become more pervasive in 2017 with the plethora of personal devices on the market.

4. Telephony DoS (TDoS) will become more sophisticated. These attacks, which cut off communications in a crisis, “could impede first responders’ situational awareness, exacerbate suffering and pain, and potentially increase loss of life,” the press release stated.

5. Public transportation system attacks will rise. As cars, trains, and planes become more automated, they also become more vulnerable to hackers, Radware stated.

You help your business avoid ransomware attacks and other cyber threats by keeping software up to date, backing up all information every day to a secure, offsite location, segmenting your network, performing penetration testing, and training staff on cyber security practices.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10 killer PC upgrades that are shockingly cheap

Looking to put more pep in your PC’s step? These surprisingly cheap PC upgrades and accessories do the trick without breaking the bank.

PCupgrades1

No need to break the bank

Sure, swanky new Surface Pros and $1,200 graphics cards may capture all the headlines, but on a practical level, the real story is that PCs aren’t cheap. But if your computer’s starting to feel pokey, there’s fortunately no reason to rush out a spend hundreds on a new one.

Investing small amounts in key new PC hardware can keep your computer running strong for years to come. These upgrades—most costing well under $100—breathe new life into slow machines. You just have to be strategic and make sure you’re putting your money in the best place for your particular system.

PCupgrades2

Speed up your PC with an SSD

Let’s start in the most obvious place. If your PC still runs with a mechanical hard drive, swapping it out with an SSD will make it feel like a whole new computer. SSDs inject face-melting speed into a PC, drastically improving boot times, file transfers, and overall system responsiveness.

A lot of PCs don’t have SSDs, for two reasons: Solid-state drives use to be extravagantly expensive, and computer makers often charge hefty mark-ups for upgrading to an SSD. Fortunately, SSD prices have plummeted in recent years. Superb models like theSamsung 850 EVO ($89.39 for 250GB on Amazon) and the OCZ Trion 150 ($45 for 120GB on Amazon) can be found for well under $100 online. If you find the storage capacities a bit too tight, you can always install the SSD as a boot drive alongside your current hard drive.

A word of warning about SSDs, and all the hardware discussed in this article: You can often find lower prices if you sift through Amazon or Newegg for no-name or lesser-known brands. But you’re gambling on reliability and support when you move away from established PC hardware makers. Stick with name brand gear unless you absolutely, positively can’t afford it.

PCupgrades3

Mass storage is dirt cheap

Good news if your available storage space is filled to the brim: Traditional hard drives are even cheaper than SSDs these days. A 1TB Western Digital Blue hard drive spinning at a speedy 7,200rpm will only set you back $50 on Amazon, while a 3TB WD Blue drive is just $90 on Amazon (albeit at a slower 5,400rpm).

Hybrid drives blend the best of both worlds, combining a large amount of traditional storage with a small, speedy flash storage cache. The drive monitors your oft-used files and keeps them on the cache, where they benefit from SSD-esque speeds. A Seagate 1TB hybrid drive goes for $85 on Amazon with an 8GB SSD cache, or $114 on Amazonwith a 32GB cache.

PCupgrades4

Add RAM for more multitasking

If your computer’s having trouble running multiple tasks simultaneously, low memory is a likely culprit. Two gigabytes of RAM is the absolute minimum modern Windows systems need to run smoothly, and even PCs with 4GB of memory can start to feel pokey if you’re running several programs, keep a dozen Chrome tabs open, or game with some background processes still running.

Fortunately, memory is dirt cheap. Picking up an 8GB memory kit from Corsair ($36 for 2x4GB kit on Amazon) or Kingston ($36 for 2x4GB kit on Amazon)—two reliable brands I’ve had nothing but success with personally—will set you back less than $5 per gigabyte.

Just be sure to get the right type of memory for your PC! RAM comes in all sorts of different packages. The easiest way to tell what type of RAM resides in your PC is to download the free, superb CPU-Z software, then open the Memory tab and look for the “type” option.

PCupgrades5

MAYBE upgrade your CPU

A pokey PC may be the result of an outdated processor. Unfortunately, replacing your CPU often means replacing your motherboard too, making the endeavor pretty pricey. But not always—especially if you have an AMD-powered system.

AMD’s AM3+ and FM2 motherboards have been powering AMD’s CPUs and APUs, respectively, since mid-2012. Since many prebuilt AMD systems sport modest processors, upgrading to a modern CPU can give your PC a shot in the arm. If you’re on FM3+, the new Athlon X4 860K ($75 on Amazon) is a solid entry-level quad-core processor for gaming, while the 8-core FX-8320E ($130 on Amazon) is a great step-up option and price-to-performance champion. If you have an FM2-based system with an AMD APU, the A10-7860K ($110 on Amazon) could be a solid upgrade, complete withintegrated graphics that let you get into e-sports games at modest frame rates.

Intel switches out its motherboards and socket types much more often, and its chips tend to be much more expensive. Replacing Intel chips aren’t really an affordable upgrade in most cases.

It’s important to make sure your new chip is compatible with your existing motherboard! Before you buy, fire up CPU-Z and search for the “Package” entry in the main CPU tab to see what sort of socket your motherboard packs.

PCupgrades6

Gaming doesn’t have to be expensive

Want to dip your toes into PC gaming? Despite what fearmongers may tell you, gaming doesn’t have to cost an arm and a leg.

AMD’s Radeon RX 460 ($110 and up on Newegg) delivers great performance in e-sports games like League of Legends and Overwatch. It also lets you play modern games at a console-esque 30 frames per second with High graphics settings at 1080p, or up to 60fps at Medium settings. That’s damned good for a hair over $100. Even better: Many models pull their power directly from your motherboard, with no need for additional power connectors. That makes AMD’s budget card a great option for adding gaming capabilities to prebuilt “big box” PCs from the likes of HP and Dell, as they often pack modest power supplies that lack extra connectors.

Be careful though: Some of the more potent Radeon RX 460 models require extra 6-pin power connectors. You don’t want that if you don’t have one available—unless you want to buy a power supply, too. A 500 watt power supply from a reputable company doesn’t cost much, as evidenced by the EVGA 500 W1, which only costs $35 on Amazon.

PCupgrades7

Buy some canned air

No, seriously. If you haven’t cleaned out your PC in a year or more, mounds of dust and debris can be collected inside. Clogged fans and exhaust ports lead to overheating, which leads to your PC throttling back performance. Single containers of canned air can be relatively pricey; grab a four pack ($16.22 on Amazon) for a lower price and enough air to clean out your PC for years to come.

PCupgrades8

Improve your cooling, improve your performance

If your PC’s still running hot after blowing out the dust, the thermal paste coating the area where your CPU or GPU touches its cooler could be old, dry, and ineffective, especially if you’ve had the equipment for several years.

First, install SpeedFan and double check that your CPU or GPU is indeed overheating. If one (or both!) is, grab a syringe of thermal paste—Arctic Silver 5 ($7.43 on Amazon)—then use guides to installing a CPU cooler and refreshing your graphics card to help you apply new thermal paste after scraping off the old stuff.

Still running hot overall? Try adding a case fan or two. Case fans from reputable vendors are shockingly cheap ($7.91 from Cooler Master on Amazon, or $9 from NZXT on Amazon) and can be installed in mere minutes.

PCupgrades9

A better monitor

You spend most of your time interacting with your computer’s input and output devices, so it’s definitely worth investing in decent peripherals if you spend considerable time at your PC.

Start with your monitor. If you’re still using a lower-resolution display or (shudder) a fat CRT display, embracing a high-definition 1080p monitor will provide a huge step up in usability. It won’t break the bank either: You can buy a 1080p HP with a 21.5-inch IPS screen for just $100 on Amazon. IPS screens provide a much more vibrant image than the twisted-nematic panels found in most budget monitors.

Alternatively, if you’re a gamer with a Radeon graphics card, consider buying a monitor that supports AMD’s FreeSync technology. FreeSync synchronizes the refresh rate of your graphics card and display to eliminate stutter and screen tearing in games. While monitors with Nvidia’s competing G-Sync technology fetch steep price premiums, FreeSync adds minimal cost to a display. A 22-inch 1080p FreeSync display by ViewSonic costs just $110 on Amazon, for example.

PCupgrades10

Aural bliss

Treat your ears, too. The speakers that come bundled with prebuilt PCs tend to be utter garbage. While audio gear pricing can escalate to frightening levels, some of our favorite headsets will set you back less than a Benjamin.

If you’re a gamer, our favorite all-around gaming headset is the Kingston HyperX Cloud($67.93 on Amazon). The sound quality is second to none in this bracket, the build quality is superb, and it’s extremely comfortable—though its microphone is merely average.

Don’t need a mic? Music lovers will find a lot to love in the Sennheiser HD 280 Pro ($99.95 on Amazon), which I’ve personally been using for years now. The comfortably snug cans lack the extreme bass kick of, say, Beats or Monster headphones, but make up for it by delivering rich, accurate, and dynamic audio across the full sound spectrum. They’re beloved among Amazon buyers for a reason.

PCupgrades11

Enhance the parts you physically touch

If you’re used to crappy bundled PC keyboards, or laptop keyboards, upgrading to a mechanical keyboard will change your life. The well-reviewed Logitech G610 Orion withCherry MX Brown or Red switches only costs $90 on Amazon.That’s probably more than most people have spent on a keyboard before, but it’s cheap by mechanical standards. Once you’ve tried it, you won’t be able to go back to a rubber-dome board.

Likewise, investing in a decent mouse makes interacting with your PC that much more pleasant. The Razer DeathAdder ($42.69 on Amazon) is ostensibly a gaming mouse, but its ergonomic design and high DPI sensor help it feel good in your palm and generate nice, smooth cursor movements. I’ve been using one for more than five years now, and grimace whenever i’m forced to use a cheap mouse bundled with a prebuilt PC.

PCupgrades12

But first…

Speeding up your well-loved PC doesn’t actually have to cost any money. You’ll find a few tips repeated from here—seriously, buy an SSD—but for the most part, it focuses on no-cost software solutions for potentially boosting your computer’s performance. Try those before dropping dough on new gear!

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows 10 Start menu will soon show twice as many ads. Here’s how to get rid of them

Want to never see a promoted app in the Start menu again? Follow this step-by-step guide for home users and businesses.

windows10giffy

Microsoft is to double the number of adverts for apps that appear in Windows 10’s Start menu.

Windows 10’s Start menu currently has five tiles that display ‘promoted apps’, which are Windows Store apps the user hasn’t installed on their PC. Three of these tiles are links to apps on the Windows Store and two are Windows Store apps that Windows 10 has previously automatically installed on the machine.

In future versions of Windows 10, the number of ‘promoted apps’ tiles in the Start menu will rise to 10. To make room, the number of tiles linking to apps installed on the machine will decrease, from 17 to 12.

Microsoft discussed the changes at the Windows Hardware Engineering Conference in late April, as part of a briefing on new features in the Windows 10 Anniversary Update, due out this summer.

It remains unclear whether all versions of Windows 10 will eventually see the Start menu changes or just new installs. Microsoft has been contacted for clarification.

If you don’t want adverts appearing in your Windows 10 Start menu, here’s how to remove them.

For home users

One option for removing these tiles is to install Classic Shell. The software will allow you to customize the look and feel of Windows, including changing the Start menu to resemble that of Windows 7 or earlier Microsoft operating systems.

If you don’t want to do that, here’s how to manually remove each tile from the Start menu.

In the slides below, you can see which tiles you will want to remove to get rid of promoted apps. Figure A shows the layout of promoted app tiles before the Anniversary Update changes and Figure B shows after.

Figure A
win10before
Figure B
win10after

Depending on which version of Windows you’re running, you’ll want to remove each of the tiles highlighted in Figure A or B. Let’s start by removing promoted apps that are installed on your machine. Right clicking on these tiles will show a drop down menu with an ‘Uninstall’ option at the bottom, as shown in Figure C. Click on this option to remove the app.

Figure C

cons5

Next to get rid of those promoted apps that link to the Windows Store. Right clicking on these apps will again show a drop down menu but this time click ‘Unpin from Start’ at the top, as shown in Figure D.

Figure D

consumerlatest

Finally, to remove suggested apps from the sidebar in the Start menu, you’ll need to make a change in Settings. Go to Settings->Personalization->Start and click the slider to ‘Off’ that sits under ‘Occasionally show suggestions in Start’, as shown in Figure E.

Figure E

consumerremoveads

For businesses

If you are running the Education or Enterprise versions of Windows 10 then promoted apps can also be disabled by changing a Group Policy setting. First open the Local Group Policy Editor. Next, as shown in Figure F, open the following folders in the left hand menu: Administrative templates->Windows Components->Cloud Content.

Figure F

cons4

 

Next double click Turn off Microsoft consumer experiences, as shown in Figure G.

Figure G

biz5

Inside the Turn off Microsoft consumer experiences window, click the radio button marked ‘Disabled’ and then click ‘Ok’ at the bottom of the window, as shown in Figure H.

Figure H

biz3

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Wawa introduces free WiFi services

PHILADELPHIA – Wawa began offering free WiFi Tuesday for customers at its 700-plus stores.

Wawa-free-xfinity

 

The service is available through a collaboration between the retailer and Philadelphia-based Comcast, the companies said.

To access the free service, Comcast said, “customers should log on to the ‘xfinitywifi’ SSID in the list of available networks on their devices.”

The service includes public Xfinity WiFi for Wawa customers and private access WiFi for employees and vendors.

Wawa stores operate across the tri-state area, as well as in Maryland, Virginia and Florida. The firm’s WiFi service will be available outside of Comcast’s traditional service areas, the companies said.

Wawa noted it needed “a fast and reliable WiFi solution to enable a consistent in-store experience for its mobile application.” It also said the service allows customers “to take advantage of a free connection without having to rely on their cellular service.”

Bill Stemper, president of Comcast Business, said WiFi has become a vital service for companies looking to improve “the customer experience at their branch locations.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!