Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

11 ergonomic gadgets your body will love

If you spend most of your day at a desk, any one of these tech tools will make your work station more comfortable and give your body some much-needed relief.

Ergonomics – they do a body good
Ergonomic-Gadgets

Do you work long hours on your computer? If so, we know the feeling and have identified a list of gadgets that you can use at your workstation, and which offer the necessary support and comfort as you work. While some may require making some adjustments or take some getting used to, your body will grow to love any of these devices — in the form of reduced aches and pain.

Kensington SmartFit Conform Back Rest
Kensington-Smartfit-back-rest

If you don’t have an ergonomic chair, the Kensington SmartFit Conform Back Rest lets you convert a plain office chair into one. The attachment fits onto most chairs with a back, and delivers support for your spine and lumbar using two ventilated back panels resting on four independent springs. The fit can be slightly adjusted for support that is highly comfortable, while the fabric itself can be removed for washing.

Price: $60

[ Find it on Amazon ]

Microsoft Sculpt Ergonomic Keyboard
Microsoft-Ergonomic-Keyboard

The Microsoft Sculpt Ergonomic Keyboard sets a new standard for the support and comfort of your wrist for those who type a lot at work. The split keyboard layout and arc shape of this wireless keyboard helps keep hands and arms in a relaxed position to significantly reduce the risk of repetitive stress injuries. The numeric keypad comes as a separate device so right-handers can hold their mouse at a more accessible angle. Though the keyboard does take some getting used to, you’re soon be wondering why you ever settled for the cramped layout of a normal keyboard.

Price: $81

[ Find it on Amazon ]

Microsoft Natural Ergonomic Keyboard 4000
Microsoft-Ergonomic-Keyboard-4000

The Microsoft Natural Ergonomic Keyboard 4000 adopts a similar split keyboard layout and arc shape of the Sculpt Ergonomic keyboard, though in a more conventional wired keyboard design. In addition, it comes with additional multimedia buttons that can be customized to quickly access files, launch web pages and create hot keys shortcuts to get things done faster. A dedicated slider located in the middle of the Natural Ergonomic Keyboard 4000 also makes it easy to zoom in and out.

Price: $50

[ Find it on Amazon ]

Logitech MX Master
Logitech-MX-Master

The Logitech MX Master is a wireless desktop mouse that offers a sculpted design meant to support your hand and wrist in a comfortable and natural position. Aside from the usual plethora of technologies such as dual Bluetooth and RF wireless modes and support for pairing with up to three devices, the MX Master also comes with a couple of additional capabilities that should reduce wrist fatigue. For example, a speed-adaptive scroll wheel makes scrolling through long documents easier than ever with its ability to automatically shift between normal “click-to-click” scrolling to hyper fast scroll, while a thumb wheel offers side-to-side scrolling.

Price: $100

[ Find it on Amazon ]

Kensington Expert Mouse Wireless Trackball
Kensington-Trackball

Users who find that a normal mouse just doesn’t cut it for them will appreciate the use of a trackball-based solution such as the Kensington Expert Mouse Wireless Trackball. The giant trackball help keeps wrist and hand movement is kept to a minimum, and uses optical tracking technology for smooth control. Notably, the Expert Mouse Wireless Trackball works just as well for right-handed and left-handed users, while a scroll ring positioned around the trackball also makes it easy to scroll up and down lengthy documents or Web pages.

Price: $100

[ Find it on Amazon ]

Microsoft Sculpt Ergonomic Mouse
Microsoft-Ergonomic-Mouse

Shaped almost like a slightly squashed softball, the Microsoft Sculpt Ergonomic Mousewas created to offer a more natural hand, wrist and forearm posture. While its ergonomic design may take get some getting used to, the Sculpt Ergonomic Mouse is arguably more like a normal mouse than some of the other vertical mouse designs on the market. A thumb scoop is positioned to help maintain the correct hand and wrist position, while the scroll wheel supports four ways scrolling: Left, right, front and back.

Price: $60

[ Find it on Amazon ]

Swiftpoint GT Mouse
Swiftpoint-GT-Mouse

The Swiftpoint GT mouse is a compact, travel-friendly mouse designed to reduce fatigue caused by your normal portable mouse. The Swiftpoint GT’s pen-like grip is more natural than the claw grip that is necessary for many of the travel mouse out there, yet is small enough to be used on your laptop next to the touchpad. Moreover, it has a touch surface that enables a full range of touch gestures such as swiping, flicking and zooming. You can also easily “park” the Swiftpoint GT on your laptop when moving between meetings with its included magnetic clip.

Price: $149

[ Find it on Amazon ]

Kensington SmartFit Mouse Pad
Kensington-Smartfit-Mouse-Pad

The Kensington SmartFit Mouse Pad is created to combat improper positioning of one’s wrist when using a mouse. It comes with a soft gel support to relief pressure points on the wrist, and stands out from your run-of-the-mill mousepad by how its height can be adjusted with the use of removable inserts. A nonskid base adds stability, while an anti-microbial surface to resist strains and odors to set the SmartFit Mouse Pad further apart from the rest.

Price: $20

[ Find it on Amazon ]

Ergotron WorkFit-P, Sit-Stand Workstation
Ergotron-Workstation

Laptop users looking to get off their butts in the office can consider the Ergotron WorkFit-P, Sit-Stand Workstation, an elegant height-adjustable laptop stand. Made of solid-aluminum construction, the WorkFit-P works like a standard monitor arm in how it can be quickly adjusted various positions – including for use while standing. The large surface has more than adequate space for a laptop and external mouse, and can also serve as an adjustable tray for writing or drawing with a graphics tablet.

Price: $299

[ Find it on Amazon ]

HiRise for MacBook
HiRise-MacBook

While its name suggests that it can only be used for a MacBook, the HiRise for MacBook is a height-adjustable stand that works just as well for other laptops. The beautiful brushed metal design aside, the stand lifts your laptop up to a half foot off the desk, bringing it to a more optimal height for your overstrained eyes. You will need a separate keyboard and mouse to work with your machine, but laptop’ keyboard and trackpad were never great for ergonomics anyway.

Price: $70

[ Find it on Amazon ]

Ergotron MX Mini Desk Mount Arm
MX-Mini-Desk-Mount-Arm

The Ergotron MX Mini Desk Mount Arm is a monitor arm that offers a slim profile without giving up on the expansive height adjustment range of full-fledged monitor arms, including full tilt, pan and rotation capability. This means you can set the ideal height and angle for optimal individual comfort, and adjust it as necessary to avoid the morning or mid-afternoon glare. The MX Mini Desk Mount Arm works with lightweight LCD monitors of up to 24-inches, as well as tablets such as the Apple’s iPad and Microsoft’s Surface.

Price: $315

[ Find it on Amazon ]

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

8 ways the iPhone 8 can beat the Galaxy S8

The Galaxy S8 might be the best phone of 2017, but the year’s not over until the next iPhone makes its debut. Here’s how Apple can take the crown back from Samsung.

If there wasn’t already a mountain of pressure on Apple to deliver something spectacular with this year’s iPhone update, there surely is now. If you haven’t noticed, Samsung has released the Galaxy S8 and S8+, and they’re pretty remarkable. As a former iPhone 7 Plus user, the S8+ might very well be the best phone I’ve ever used, with a stunning screen, speedy processor, and, yes, a gorgeous design.

But what makes the S8 so amazing is how unique it is. For the first time in a while, Samsung is standing alone on the cutting edge with a phone that needs to be seen to be believed. From its barely there bezels to its brilliant wraparound screen, the Galaxy S8 truly gives Apple a run for its money. No joke, it actually makes the iPhone 7 look pretty stale.

But there’s still a lot of time between now and the release of the next iPhone. According to rumors, the lineup this year will consist of the usual S models along with a fantabulous iPhone 8, which looks to adopt a similar aesthetic to the Galaxy S8, with an edge-to-edge OLED display and the removal of the physical home button. But just because it might look similar doesn’t mean it can’t still be better. Here’s how Apple can still steal the crown from Samsung:

The Galaxy S8 has a killer camera but the iPhone 7 is no slouch.

Killer camera

The Galaxy S phones has always had a camera on par with the iPhone, so it was a little surprising that Samsung didn’t upgrade the S8’s all that much. The iPhone 7 Plus is already a step ahead here, with 2X optical zoom and the sublime Portrait Mode, but the iPhone 8 could really separate itself from the S8 by taking it even further. Along with a megapixel bump, Apple could add optical image stabilization to the second lens, which will go a long way toward increasing photo and zoom quality. But what would really set it apart would be a larger sensor and greater ISO range to make it a low-light leader.

The Gear VR is a big part of the S8, but AR could be the iPhone 8’s big play.

AR not VR

While Samsung is going all-in on virtual reality with the Galaxy Gear and the S8, rumors suggest that Apple is more interested in augmented reality. And that could be one of the features that sets the iPhone 8 apart. Smartphones have been slow to incorporate AR into the interface, but if Pokémon Go has taught us anything, it’s that people are way more interested in seeing the world through their screens than strapping a headset to their faces. An AR-fueled iPhone 8 could connect us to the world in fun new ways without separating us from reality.

The Galaxy S8’s fingerprint sensor is just in the worst place.

Well-placed fingerprint sensor

While the Galaxy S8 is one of the best smartphones ever made, one tragic flaw prevented it from being perfect: the placement of the fingerprint sensor. For some god-awful reason, Samsung put it right next to the camera, all but ensuring your finger will not only miss it, but also repeatedly smudge the lens. If the rumors are correct that Apple will also be removing the home button in the iPhone 8, it has two options: under the screen or on the back. A first-of-its-kind in-panel sensor would be revolutionary, but if it’s on the back, Apple needs to learn from Samsung’s mistake and put it lower, like on the Pixel.

Bixby hasn’t exactly exploded out of the gate, but it does a lot that Siri doesn’t do.

Expanded Siri

When Samsung unveiled the S8, a major part of the presentation was spent introducing its new AI assistant, Bixby. However, the new service wasn’t just a competitor to Siri, Alexa, and Google Assistant. Samsung integrated Bixby deep into the interface to let it access apps, fetch information, and cut down on how often we need to touch our phones. It’s a cool idea, except the only problem is it doesn’t really work. If Apple could do something similar with Siri and expand its reach to work inside apps while we’re using them, it could beat Bixby at its own game.

The Galaxy S8’s screen is pretty, but It also uses its software to accentuate it.

iOS 11

One of the biggest gripes people have had about Samsung’s phones has always been its TouchWiz interface. But that’s changed with the S8, as Samsung has crafted an intuitive, refined system that takes full advantage of its superb hardware. If Apple is going to release a radically redesigned iPhone with curved edges and a wraparound screen, the same old iOS isn’t going to do it justice. It might be time to rethink iOS for modern times and give it more than new features and a fresh coat of pixels.

Samsung’s wireless charging supports Qi and PMA standards, and the pad stands up or lies flat. But it’s not long range wireless.

True wireless charging

While Samsung has had wireless charging in the Galaxy S since the S6, Apple has been slow to adopt it for the iPhone. All signs indicate that’s going to change for the iPhone 8, but if Apple wants to top the Galaxy S8 and not just keep pace, it’s going to need something a little more exciting than a pretty charging pad. One of the rumors we’ve read suggests that Apple could adopt true long-range wireless charging for the next iPhone, which would power up the battery whenever you’re within range of the charger, even if it’s in your pocket. That alone would be an S8 killer.

The Galaxy S8 includes a pretty great pair of earbuds.

Bundled AirPods

Samsung didn’t just resist the trend to ditch the headphone jack on S8, it embraced the 3.5mm jack in a big way. Inside the S8 box is a pair of premium AKG-tuned earbuds that are a few steps above the usual build and sound quality you get for free—certainly better than what Apple gives us. But if Apple really wants to embrace the wireless future of the iPhone, it needs to stop including a wired set of EarPods, even if they are Lightning. A pair of AirPods in the box (or a cheaper Beats alternative) would really set it apart from the 3.5mm S8 and make a strong statement.

The battery life on the S8 is really good, but the iPhone 8’s could be even better.

Blow-away battery

Samsung has had its share of battery issues, but the S8 looks to put them in the past with a long-lasting battery that hopefully won’t blow up. But while it can get through the whole day for the most part, the S8 didn’t deliver the the real breakthrough we were hoping for. We’re still waiting for a phone that lets us completely forget about the battery until our day is over, and we’d love to see the iPhone 8 deliver something in the range of 12 hours and truly change the game.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Is Your Organization Using SHA-1 SSL Certificates? If so here’s what you need to know and do:

ssl

 

Following a recommendation by the National Institute of Standards and Technology (NIST), Microsoft will block Windows from accepting SSL certificates encrypted with the Secure Hash Algorithm-1 (SHA-1) algorithm after 2016. Given the number of mission-critical SSL certificates that are allowed to expire from inattention, administrators have their work cut out for them. By knowing what will happen, why it’s happening, and what you need to do, you won’t be surprised by these important policy changes.

What’s Happening?

On November 12, 2013, Microsoft announced that it’s deprecating the use of the SHA-1 algorithm in SSL and code signing certificates. The Windows PKI blog post “SHA1 Deprecation Policy” states that Windows will stop accepting SHA-1 end-entity certificates by January 1, 2017, and will stop accepting SHA-1 code signing certificates without timestamps after January 1, 2016. This policy officially applies to Windows Vista and later, and Windows Server 2008 and later, but it will also affect Windows XP and Windows Server 2003.

SHA-1 is currently the most widely used digest algorithm. In total, more than 98 percent of all SSL certificates in use on the Web are still using the SHA-1 algorithm and more than 92 percent of the certificates issued in the past year were issued using SHA-1.

Website operators should be aware that Google Chrome has started warning end users when they connect to a secure website using SSL certificates encrypted with the SHA-1 algorithm. Beginning in November 2014 with Chrome 39, end users will see visual indicators in the HTTP Secure (HTTPS) address bar when the site to which they’re connecting doesn’t meet the SHA-2 requirement. Figure 1 shows those indicators.

 

Figure 1: Visual Indicators in the HTTPS Address Bar

 

Google is doing this to raise end users’ awareness and to help guide other members of the Internet community to replace their SHA-1 certificates with SHA-2 certificates.

Why Is Microsoft Deprecating SHA-1?

SHA-1 has been in use among Certificate Authorities (CAs) since the U.S. National Security Agency (NSA) and NIST first published the specification in 1995. In January 2011, NIST released Special Publication 800-131A, “Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths.” This publication noted that SHA-1 shouldn’t be trusted past January 2016 because of the increasing practicality that a well-funded attacker or government could find a SHA-1 hash collision, allowing them to impersonate any SSL website.

Realizing that it’s highly unlikely that CAs and the industry at large will adopt more powerful encryption algorithms on their own, Microsoft is leading the charge by making Windows reject certificates using SHA-1 after January 1, 2017. Doing this will lead website operators to upgrade to stronger SHA-2 certificates for the betterment of all Windows users and the broader public key infrastructure (PKI) community. The Windows PKI blog post “SHA1 Deprecation Policy” noted that, “The quicker we can make such a transition, the fewer SHA-1 certificates there will be when collisions attacks occur and the sooner we can disable SHA1 certificates.”

In the end, the issue isn’t if SHA-1 encryption will be cracked but rather when it will be cracked.

What Do I Need to Do?

January 1, 2017, might seem like a long way away, but now is the time to understand the problem and how to mitigate it.

As per Microsoft’s SHA-1 deprecation policy, Windows users don’t need to do anything in response to this new technical requirement. XP Service Pack 3 (SP3) and later versions support SHA-2 SSL certificates. Server 2003 SP2 and later versions add SHA-2 functionality to SSL certificates by applying hotfixes (KB968730 and KB938397).

Web administrators must request new certificates to replace SHA-1 SSL and code-signing certificates that expire after January 1, 2017. As of this writing, that would probably affect only public SHA-1 certificates that were purchased with a long expiration date (three years or more) or long-duration certificates issued by internal SHA-1 CAs. Most third-party CAs will rekey their certificates for free, so you simply need to contact the CA to request a rekeyed certificate that uses the SHA-2 algorithm.

When ordering new SSL certificates, you should confirm with the CA that they’re being issued with the SHA-2 algorithm. New certificates with expiration dates after January 1, 2017, can only use SHA-2. Code-signing certificates with expiration dates after December 31, 2015, must also use SHA-2.

Note that the algorithm used in SHA-2 certificates is actually encoded to use SHA-256, SHA-384, or SHA-512. All of these are SHA-2 algorithms; the SHA number (e.g., 256) specifies the number of bits in the hash. The larger the hash, the more secure the certificate but possibly with less compatibility.

It’s important that the certificate chain be encrypted with SHA-2 certificates. (A certificate chain consists of all the certificates needed to certify the end certificate.) This means that any intermediate certificates must also use SHA-2 after January 1, 2017. Typically, your CA will provide the intermediate and root CA certificates when they provide the SHA-2 certificate. Sometimes they provide a link for you to download the certificate chain. It’s important that you update this chain with SHA-2 certificates. Otherwise, Windows might not trust your new SHA-2 certificate.

Root certificates are a different story. These can actually be SHA-1 certificates because Windows implicitly trusts these certificates since the OS trusts the root certificate public key directly. A root certificate is self-signed and isn’t signed by another entity that has been given authority.

For the same reason, any self-signed certificate can use the SHA-1 algorithm. For example, Microsoft Exchange Server generates self-signed SHA-1 certificates during installation. These certificates are exempt from the new SHA-2 policy since they aren’t chained to a CA. I expect, however, that future releases of Exchange will use SHA-2 in self-signed certificates.

What About My Enterprise CAs?

If your organization has its own internal CA PKI, you’ll want to ensure that it’s generating SHA-2 certificates. How this is done depends on whether the CA is running Windows Server 2008 R2 or later and if your CA has subordinate CAs.

If you have a Server 2008 R2 or later single-root CA without subordinates, you should update the CA to use SHA-2. Doing so will ensure that subsequent certificates generated will use the SHA-2 algorithm. To check which hash algorithm is being used, you can right-click the CA and go to the General tab. If SHA-1 is listed, you can run the following certutil command to configure the CA to use the SHA-256 algorithm:

certutil -setreg ca\csp\CNGHashAlgorithm SHA256

You must restart the CertSvc service to apply the change. Now when you view the CA properties, you’ll see that the hash algorithm is SHA-256. All future certificates issued by this CA will use SHA-256, but keep in mind that existing certificates will still be using SHA-1. You need to renew any SHA-1 certificates issued by this CA to upgrade them to SHA-2 certificates.

If your CA is older than Server 2008 R2, you can’t upgrade the CA to use SHA-2. You’ll need to rebuild it with a newer version.

If your organization’s internal CA is multi-tiered with one or more subordinate CAs, you’ll need to reconfigure them to use SHA-2. This is done using the same certutil command just given on each subordinate or issuing CA. Keep in mind that if you use subordinate CAs, you’re not required to update the root CA to SHA-2 since that certificate is at the top of the certificate chain, but it won’t cause any problems if you do. You still need to renew any SHA-1 certificates issued by the subordinate CAs to upgrade them to SHA-2 certificates.

Take Action Now

Administrators and website operators should identify all the SSL certificates used in their organizations and take action, as follows:

  • SHA-1 SSL certificates expiring before January 1, 2017, will need to be replaced with a SHA-2 equivalent certificate.
  • SHA-1 SSL certificates expiring after January 1, 2017, should be replaced with a SHA-2 certificate at the earliest convenience.
  • Any SHA-2 certificate chained to an SHA-1 intermediate certificate should be replaced with another one chained to an SHA-2 intermediate certificate.

The following tools and websites are useful for testing and for further information about SHA-1 remediation:

  • Microsoft Security Advisory 2880823. This website discusses the deprecation policy for the SHA-1 hashing algorithm for the Microsoft Root Certificate Program.
  • Migrating a Certification Authority Key from a Cryptographic Service Provider (CSP) to a Key Storage Provider (KSP). The section “How to migrate a CA from a CSP to a KSP and optionally, from SHA-1 to SHA-2” in this TechNet web page provides detailed instructions for upgrading a CA to use SHA-2.
  • Gradually sunsetting SHA-1.” This Google Online Security Blog post explains how the transition to SHA-2 affects Chrome and details Google’s rollout schedule.
  • SHA-256 Compatibility. This GlobalSign web page lists OS, browser, server, and signing support for SHA-256 certificates.
  • DigiCert SHA-1 Sunset Tool. This free web application tests public websites for SHA-1 certificates that expire after January 1, 2016.
  • DigiCert Certificate Inspector. This tool discovers and analyzes all certificates in an enterprise. It’s free, even if you don’t have a DigiCert account.
  • Qualys SSL Labs’ SSL Server Test. This free online service analyzes the configuration of any SSL web server on the public Internet.

BBB Advises Internet Surfers to Use Caution

Protecting your identity is important and with Wi-Fi networks popping up nearly everywhere, many consumers don’t realize the dangers that come with using a Wi-Fi connection that is not their own. According to a recent poll conducted by Wakefield Research and Wi-Fi Alliance, 32 percent of respondents said they have tried to get on a Wi-Fi network that was not their own, a startling 18 percent more than a December 2008 poll. The Better Business Bureau, along with the Federal Trade Commission (FTC), urges consumers to think ahead before surfing the Web on a Wi-Fi hotspot.

Wi-Fi hotpots like coffee shops, libraries, airports, hotels and universities are all breeding grounds for hackers. According to the FTC, new hacking tools—available for free online—make hacking easy, even for users with limited technical know-how.

Consumers should be cautious before using a non-secure wireless network and before sending personal information via unencrypted websites. When surfing on a non-secure Internet connection, an individual’s personal information, private documents, contacts, photos and even login information can be up for grabs as other users on the network have the capability of seeing what is being sent.

Steve Cox, President and CEO of the Council of Better Business Bureaus, warns consumers against two popular security scams that can be associated with using an unsecure Internet connection. “Many consumers don’t realize the repercussions that come from using a Wi-Fi hotspot. Phishing, a popular e-mailing scam, and smishing, a SMS texting scam, grow exponentially when hackers obtain access to personal information on the Web via an unsecure Wi-Fi network.” BBB urges consumers to protect themselves from such scams by securing their Internet surfing.

In order to confirm that an Internet connection is secure, BBB advises consumers to follow the FTC’s top Wi-Fi tips:

Make sure the connection is protected by a unique password. If a Wi-Fi hotspot doesn’t ask for a password, the Internet connection is not secure. If a hotspot asks for a password just to grant access, consumers should proceed as if the connection were unsecured. Only trust home and work internet connections that are protected by a customized user password. Wi-Fi hotspot connections with generic passwords are vulnerable to hackers.

Transmitted information should be encrypted. When sending personal information like addresses, credit card numbers and Social Security numbers over the Internet, make sure the website is fully encrypted and the network is secure. Look for https (the “s” stands for secure) at the beginning of the URL address to confirm its security.

Don’t stay permanently logged-in to wireless hotspots. Never leave your Internet connection running while your computer is unattended and make sure to log-off after every use.

Change your passwords frequently. When creating new accounts, make sure you use different passwords. Do not use the same password for different sites. If one password is hacked, the chances of other accounts being hacked becomes greater with repeated passwords.

For more advice on security scams, visit www.bbb.org or to learn more about protecting your privacy online and what to do if your information is compromised, visit www.OnGuardOnline.gov and http://www.ftc.gov/opa/2011/02/wireless.shtm

Prepare for removal of PPTP VPN before you upgrade to iOS 10 and macOS Sierra

Prepare for removal of PPTP VPN before you upgrade to iOS 10 and macOS Sierra

apple-beta-ios10-macossierra

System administrators preparing for iOS 10 and macOS Sierra should stop using PPTP connections for VPN. Learn about alternatives you can use to protect your data.

If you’ve set up a PPTP VPN server, iOS 10 and macOS Sierra users won’t be able to connect to it. iOS 10 and macOS Sierra will remove PPTP connections from any VPN profile when a user upgrades their device.

Even though PPTP protocol is still available on iOS 9 and earlier or OS X El Capitan and earlier, we don’t recommend that you use it for secure, private communication.

Alternatives to PPTP connections for VPN

Try one of these other VPN protocols for user-based authentication that are more secure:

  • L2TP/IPSec
  • IKEv2/IPSec
  • Cisco IPSec
  • SSL VPN clients on the App Store such as those from AirWatch, Aruba, Check Point, Cisco, F5 Networks, MobileIron, NetMotion, Open VPN, Palo Alto Networks, Pulse Secure, and SonicWall

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT ServicesWebsite Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

10 places to recycle your cell phone

EcoAtm

Here are 10 places to take your phones so they can be refurbished, reused, or recycled and diverted from the landfill.

1. EcoATM

EcoATM is an automated kiosk that collects your unwanted cell phones and tablets and gives you cash for them. It’s made by the same people that make CoinStar, so you’ll find them by the checkout lines at various grocery store chains. It accepts devices from any era or in any condition, and offers anywhere between a few bucks to a few hundred dollars in return. EcoATM partners with R2 certified e-waste reclamation facilities to ensure they are recycled, or gives the phones a second life.

2. Eco-Cell

Eco-Cell is a Louisville, Kentucky-based e-waste recycling company. It partners with nonprofits and organizations such as the Jane Goodall Institute. Bins are located in coffee shops and other businesses around the country, where the collected phones are shipped to Eco-Cell in Louisville. If the phones are reusable, they resell them and pass some of the money back to the owner. If they are not reusable, the phones are recycled and the owner is paid the money for the value of the recycled materials.

3. Best Buy

Best Buy has recycling kiosks in their stores in the US, as well as recycling in-store for no charge to you. They typically limit it to three items per family, per day. From there, they work with recycling companies to make sure the phones and other electronics don’t end up in landfills.

4. Hope Phones

The Hope Phones campaign was started in 2009 by Medic Mobile, which works to advance health care in 16 countries by using mobile technology. Individuals, nonprofits, groups, or businesses can host a Hope Phones campaign to donate old phones. They are recycled and valued so the nonprofit can get new technology for the field. Most old models are valued at $5, but newer smartphones are regularly valued at $80, according to the website.

5. Cell Phones for Soldiers

Cell Phones for Soldiers is a nonprofit that works to provide cost-free communication services to active-duty military and veterans. New or gently used mobile phones are accepted and each device valued at $5 turns into 2.5 hours of free talk time for the soldiers.

6. Gazelle

Gazelle is one of the most popular trade-in options for old cell phones. The company is headquartered in Boston, with locations in Louisville, Kentucky and in Texas. Pick your brand, model, carrier, and plug in what kind of shape it’s in, then get an offer. Ship it for free, and receive a check or gift card to Amazon.com or PayPal after they check it out and make sure it’s worth what you say it is.

7. Call2Recycle

Call2Recyle  is a no-cost recycling program for batteries and cell phones in the US and Canada. It has collection boxes that can be placed anywhere, which have shipping permits so mailing them is easy. They also have bulk shipping if there is a large amount of recyclables.

8. Your carrier

AT&T has a trade-in program for unwanted phones and accessories regardless of manufacturer or carrier. The owner gets a “promotion card” which can then be used to take money off a new phone or other purchase. Make sure you erase all your information before you turn them in, though.

Verizon also offers a trade-in program where the owner can receive an electronic gift card once they send in the phone and have it appraised.

9. Local places

Your city undoubtedly has places to recycle old phones. Most local government websites, like New York’s, have directions of where to go to recycle phones. A lot of cities usually have nonprofits that donate old phones as well. The EPA also has an option to find out what electronics you can recycle with mail-in options.

10. Recycling for Charities

This nonprofit features one charity at a time, for which they donate money from recycling old phones. All makes and models are welcome at Recycling for Charities, and the phone condition is not an issue. They make an attempt to refurbish it first, then find recycling centers to ensure the materials won’t go into landfills if the phones cannot be reused.

These 10 services are well-researched and well-known options, but make sure to research on your own where your phone is going to make sure it is going to a certified e-waste recycler, so it doesn’t end up in a landfill despite your efforts.

 

When will the cloud burst?

Cloud Burst

The ‘Cloud’ has been at the horizon for quite some time and is now slowly moving to the center stage. A lot has been written about this topic and spoken of at numerous meetings and seminars for long. Both business magazines and IT journals have carried stories on this subject and some have even put them on the cover page. Such is the importance that ‘cloud computing’ enjoys.

 

The Cloudy Outlook

CIOs have often been accused of ignorance or for resisting application of this new technological phenomenon. CIOs perhaps are not the only ones to blame, as technology vendors, service providers, and the media, all have played a part and have done their bit, to create confusion. The hype that surrounds this subject is phenomenal and perhaps equals or exceeds the buzz created on new technologies in the past. Articles in business magazines, discussions on television and direct mailers to senior corporate honchos touted ‘cloud’ as the single most important thing to happen and as a harbinger for all ills. Speakers were eloquent about the transformation that ‘cloud’ could bring to the enterprises.

To View Full Article Click Here

Comcast Launches Xfinity Wi-Fi Hot Spots in Philadelphia, N.J.

Comcast on Monday launched Xfinity Wi-Fi, which will provide free wireless Internet access to customers in Northern New Jersey, areas along the Jersey Shore, and the Philadelphia metro area.

Users who subscribe to Comcast Xfinity Internet service will be able to log-in to more than 2,000 wireless hot spots with their Comcast username and password. The hot spots have been placed in areas like parks, shopping districts, boardwalks, and transit stations.

In Philadelphia, for example, customers can access Wi-Fi at SEPTA’s Suburban and Market East Stations, many train platforms along the Paoli/Landsdale and the Manayunk/Norristown Line, the Wells Fargo Center, and the South Street shopping district.

In New Jersey, access has been enabled in towns like Berkeley Heights, Livingston, Long Branch, Montclair, New Brunswick, Perth Amboy, Red Bank, Rumson, Summit, and Trenton.

Comcast said it would increase the number of hot spots in the NJ-Philadelphia area by year’s end, but does not have plans to expand into other markets or nationally in the near future. Earlier this year, Comcast announced a roaming agreement with Cablevision and Time Warner Cable that lets Xfinity Internet customers access hot spots in the New York Tri-State area.

A map of available hot spots is posted on comcast.com/wifi.

“With the explosion of wireless Internet devices, new platforms and apps, consumers are increasingly looking to enjoy entertainment and communications on the go,” Cathy Avgiris, senior vice president and general manager of communications and data services for Comcast Cable, said in a statement. “We offer some of the fastest Internet speeds in the home and, by offering Xfinity WiFi, we’re also providing a fast wireless Internet experience for our customers when they are outside the home.”


To read the original article in it’s entirety, Click Here

CALL US NOW!